Aug 26 13:26:36.466637: FIPS Product: YES Aug 26 13:26:36.466729: FIPS Kernel: NO Aug 26 13:26:36.466732: FIPS Mode: NO Aug 26 13:26:36.466733: NSS DB directory: sql:/etc/ipsec.d Aug 26 13:26:36.466853: Initializing NSS Aug 26 13:26:36.466859: Opening NSS database "sql:/etc/ipsec.d" read-only Aug 26 13:26:36.492358: NSS initialized Aug 26 13:26:36.492372: NSS crypto library initialized Aug 26 13:26:36.492374: FIPS HMAC integrity support [enabled] Aug 26 13:26:36.492376: FIPS mode disabled for pluto daemon Aug 26 13:26:36.517373: FIPS HMAC integrity verification self-test FAILED Aug 26 13:26:36.517908: libcap-ng support [enabled] Aug 26 13:26:36.517916: Linux audit support [enabled] Aug 26 13:26:36.518247: Linux audit activated Aug 26 13:26:36.518260: Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:10091 Aug 26 13:26:36.518263: core dump dir: /var/tmp Aug 26 13:26:36.518266: secrets file: /etc/ipsec.secrets Aug 26 13:26:36.518268: leak-detective enabled Aug 26 13:26:36.518270: NSS crypto [enabled] Aug 26 13:26:36.518272: XAUTH PAM support [enabled] Aug 26 13:26:36.518363: | libevent is using pluto's memory allocator Aug 26 13:26:36.518374: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Aug 26 13:26:36.518389: | libevent_malloc: new ptr-libevent@0x563313f9ec28 size 40 Aug 26 13:26:36.518397: | libevent_malloc: new ptr-libevent@0x563313fa0678 size 40 Aug 26 13:26:36.518400: | libevent_malloc: new ptr-libevent@0x563313fa05f8 size 40 Aug 26 13:26:36.518403: | creating event base Aug 26 13:26:36.518407: | libevent_malloc: new ptr-libevent@0x563313f9f3f8 size 56 Aug 26 13:26:36.518412: | libevent_malloc: new ptr-libevent@0x563313f28d18 size 664 Aug 26 13:26:36.518424: | libevent_malloc: new ptr-libevent@0x563313fd07c8 size 24 Aug 26 13:26:36.518427: | libevent_malloc: new ptr-libevent@0x563313fd0818 size 384 Aug 26 13:26:36.518436: | libevent_malloc: new ptr-libevent@0x563313fd0788 size 16 Aug 26 13:26:36.518439: | libevent_malloc: new ptr-libevent@0x563313fa0578 size 40 Aug 26 13:26:36.518442: | libevent_malloc: new ptr-libevent@0x563313fa04f8 size 48 Aug 26 13:26:36.518448: | libevent_realloc: new ptr-libevent@0x563313f289a8 size 256 Aug 26 13:26:36.518451: | libevent_malloc: new ptr-libevent@0x563313fd09c8 size 16 Aug 26 13:26:36.518457: | libevent_free: release ptr-libevent@0x563313f9f3f8 Aug 26 13:26:36.518461: | libevent initialized Aug 26 13:26:36.518464: | libevent_realloc: new ptr-libevent@0x563313f9f3f8 size 64 Aug 26 13:26:36.518470: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Aug 26 13:26:36.518536: | init_nat_traversal() initialized with keep_alive=0s Aug 26 13:26:36.518540: NAT-Traversal support [enabled] Aug 26 13:26:36.518543: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Aug 26 13:26:36.518549: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Aug 26 13:26:36.518553: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Aug 26 13:26:36.518587: | global one-shot timer EVENT_REVIVE_CONNS initialized Aug 26 13:26:36.518591: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Aug 26 13:26:36.518595: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Aug 26 13:26:36.518642: Encryption algorithms: Aug 26 13:26:36.518650: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Aug 26 13:26:36.518655: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Aug 26 13:26:36.518658: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Aug 26 13:26:36.518662: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Aug 26 13:26:36.518665: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Aug 26 13:26:36.518673: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Aug 26 13:26:36.518678: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Aug 26 13:26:36.518681: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Aug 26 13:26:36.518685: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Aug 26 13:26:36.518689: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Aug 26 13:26:36.518693: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Aug 26 13:26:36.518696: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Aug 26 13:26:36.518700: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Aug 26 13:26:36.518704: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Aug 26 13:26:36.518708: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Aug 26 13:26:36.518711: NULL IKEv1: ESP IKEv2: ESP [] Aug 26 13:26:36.518715: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Aug 26 13:26:36.518721: Hash algorithms: Aug 26 13:26:36.518724: MD5 IKEv1: IKE IKEv2: Aug 26 13:26:36.518727: SHA1 IKEv1: IKE IKEv2: FIPS sha Aug 26 13:26:36.518731: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Aug 26 13:26:36.518734: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Aug 26 13:26:36.518737: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Aug 26 13:26:36.518750: PRF algorithms: Aug 26 13:26:36.518754: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Aug 26 13:26:36.518757: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Aug 26 13:26:36.518760: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Aug 26 13:26:36.518764: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Aug 26 13:26:36.518767: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Aug 26 13:26:36.518770: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Aug 26 13:26:36.518797: Integrity algorithms: Aug 26 13:26:36.518801: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Aug 26 13:26:36.518804: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Aug 26 13:26:36.518809: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Aug 26 13:26:36.518813: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Aug 26 13:26:36.518817: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Aug 26 13:26:36.518820: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Aug 26 13:26:36.518824: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Aug 26 13:26:36.518827: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Aug 26 13:26:36.518830: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Aug 26 13:26:36.518842: DH algorithms: Aug 26 13:26:36.518846: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Aug 26 13:26:36.518849: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Aug 26 13:26:36.518852: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Aug 26 13:26:36.518859: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Aug 26 13:26:36.518862: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Aug 26 13:26:36.518865: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Aug 26 13:26:36.518868: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Aug 26 13:26:36.518872: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Aug 26 13:26:36.518875: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Aug 26 13:26:36.518878: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Aug 26 13:26:36.518881: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Aug 26 13:26:36.518884: testing CAMELLIA_CBC: Aug 26 13:26:36.518887: Camellia: 16 bytes with 128-bit key Aug 26 13:26:36.519020: Camellia: 16 bytes with 128-bit key Aug 26 13:26:36.519050: Camellia: 16 bytes with 256-bit key Aug 26 13:26:36.519081: Camellia: 16 bytes with 256-bit key Aug 26 13:26:36.519111: testing AES_GCM_16: Aug 26 13:26:36.519114: empty string Aug 26 13:26:36.519142: one block Aug 26 13:26:36.519167: two blocks Aug 26 13:26:36.519194: two blocks with associated data Aug 26 13:26:36.519220: testing AES_CTR: Aug 26 13:26:36.519223: Encrypting 16 octets using AES-CTR with 128-bit key Aug 26 13:26:36.519250: Encrypting 32 octets using AES-CTR with 128-bit key Aug 26 13:26:36.519278: Encrypting 36 octets using AES-CTR with 128-bit key Aug 26 13:26:36.519311: Encrypting 16 octets using AES-CTR with 192-bit key Aug 26 13:26:36.519341: Encrypting 32 octets using AES-CTR with 192-bit key Aug 26 13:26:36.519368: Encrypting 36 octets using AES-CTR with 192-bit key Aug 26 13:26:36.519396: Encrypting 16 octets using AES-CTR with 256-bit key Aug 26 13:26:36.519422: Encrypting 32 octets using AES-CTR with 256-bit key Aug 26 13:26:36.519450: Encrypting 36 octets using AES-CTR with 256-bit key Aug 26 13:26:36.519478: testing AES_CBC: Aug 26 13:26:36.519481: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Aug 26 13:26:36.519509: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Aug 26 13:26:36.519539: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Aug 26 13:26:36.519568: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Aug 26 13:26:36.519603: testing AES_XCBC: Aug 26 13:26:36.519606: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Aug 26 13:26:36.519724: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Aug 26 13:26:36.519855: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Aug 26 13:26:36.519989: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Aug 26 13:26:36.520116: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Aug 26 13:26:36.520244: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Aug 26 13:26:36.520389: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Aug 26 13:26:36.520685: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Aug 26 13:26:36.520814: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Aug 26 13:26:36.520953: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Aug 26 13:26:36.521205: testing HMAC_MD5: Aug 26 13:26:36.521210: RFC 2104: MD5_HMAC test 1 Aug 26 13:26:36.521406: RFC 2104: MD5_HMAC test 2 Aug 26 13:26:36.521566: RFC 2104: MD5_HMAC test 3 Aug 26 13:26:36.521799: 8 CPU cores online Aug 26 13:26:36.521805: starting up 7 crypto helpers Aug 26 13:26:36.521838: started thread for crypto helper 0 Aug 26 13:26:36.521858: started thread for crypto helper 1 Aug 26 13:26:36.521887: | starting up helper thread 0 Aug 26 13:26:36.521892: | starting up helper thread 1 Aug 26 13:26:36.521900: started thread for crypto helper 2 Aug 26 13:26:36.521904: | status value returned by setting the priority of this thread (crypto helper 1) 22 Aug 26 13:26:36.521902: | status value returned by setting the priority of this thread (crypto helper 0) 22 Aug 26 13:26:36.521904: | starting up helper thread 2 Aug 26 13:26:36.521925: started thread for crypto helper 3 Aug 26 13:26:36.521927: | starting up helper thread 3 Aug 26 13:26:36.521929: | status value returned by setting the priority of this thread (crypto helper 2) 22 Aug 26 13:26:36.521938: | status value returned by setting the priority of this thread (crypto helper 3) 22 Aug 26 13:26:36.521963: started thread for crypto helper 4 Aug 26 13:26:36.521965: | starting up helper thread 4 Aug 26 13:26:36.521982: | status value returned by setting the priority of this thread (crypto helper 4) 22 Aug 26 13:26:36.521913: | crypto helper 1 waiting (nothing to do) Aug 26 13:26:36.521990: | crypto helper 0 waiting (nothing to do) Aug 26 13:26:36.521995: started thread for crypto helper 5 Aug 26 13:26:36.521995: | crypto helper 2 waiting (nothing to do) Aug 26 13:26:36.522008: | crypto helper 3 waiting (nothing to do) Aug 26 13:26:36.522030: started thread for crypto helper 6 Aug 26 13:26:36.522030: | crypto helper 4 waiting (nothing to do) Aug 26 13:26:36.522048: | starting up helper thread 5 Aug 26 13:26:36.522031: | starting up helper thread 6 Aug 26 13:26:36.522051: | checking IKEv1 state table Aug 26 13:26:36.522057: | status value returned by setting the priority of this thread (crypto helper 5) 22 Aug 26 13:26:36.522059: | status value returned by setting the priority of this thread (crypto helper 6) 22 Aug 26 13:26:36.522067: | MAIN_R0: category: half-open IKE SA flags: 0: Aug 26 13:26:36.522066: | crypto helper 5 waiting (nothing to do) Aug 26 13:26:36.522071: | -> MAIN_R1 EVENT_SO_DISCARD Aug 26 13:26:36.522074: | crypto helper 6 waiting (nothing to do) Aug 26 13:26:36.522075: | MAIN_I1: category: half-open IKE SA flags: 0: Aug 26 13:26:36.522082: | -> MAIN_I2 EVENT_RETRANSMIT Aug 26 13:26:36.522086: | MAIN_R1: category: open IKE SA flags: 200: Aug 26 13:26:36.522089: | -> MAIN_R2 EVENT_RETRANSMIT Aug 26 13:26:36.522091: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:26:36.522094: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:26:36.522097: | MAIN_I2: category: open IKE SA flags: 0: Aug 26 13:26:36.522100: | -> MAIN_I3 EVENT_RETRANSMIT Aug 26 13:26:36.522103: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:26:36.522105: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:26:36.522109: | MAIN_R2: category: open IKE SA flags: 0: Aug 26 13:26:36.522111: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:26:36.522114: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:26:36.522117: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 13:26:36.522120: | MAIN_I3: category: open IKE SA flags: 0: Aug 26 13:26:36.522123: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:26:36.522125: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:26:36.522128: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 13:26:36.522131: | MAIN_R3: category: established IKE SA flags: 200: Aug 26 13:26:36.522134: | -> UNDEFINED EVENT_NULL Aug 26 13:26:36.522137: | MAIN_I4: category: established IKE SA flags: 0: Aug 26 13:26:36.522140: | -> UNDEFINED EVENT_NULL Aug 26 13:26:36.522143: | AGGR_R0: category: half-open IKE SA flags: 0: Aug 26 13:26:36.522146: | -> AGGR_R1 EVENT_SO_DISCARD Aug 26 13:26:36.522149: | AGGR_I1: category: half-open IKE SA flags: 0: Aug 26 13:26:36.522152: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 13:26:36.522155: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 13:26:36.522158: | AGGR_R1: category: open IKE SA flags: 200: Aug 26 13:26:36.522160: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 13:26:36.522163: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 13:26:36.522166: | AGGR_I2: category: established IKE SA flags: 200: Aug 26 13:26:36.522169: | -> UNDEFINED EVENT_NULL Aug 26 13:26:36.522172: | AGGR_R2: category: established IKE SA flags: 0: Aug 26 13:26:36.522175: | -> UNDEFINED EVENT_NULL Aug 26 13:26:36.522178: | QUICK_R0: category: established CHILD SA flags: 0: Aug 26 13:26:36.522181: | -> QUICK_R1 EVENT_RETRANSMIT Aug 26 13:26:36.522187: | QUICK_I1: category: established CHILD SA flags: 0: Aug 26 13:26:36.522190: | -> QUICK_I2 EVENT_SA_REPLACE Aug 26 13:26:36.522194: | QUICK_R1: category: established CHILD SA flags: 0: Aug 26 13:26:36.522196: | -> QUICK_R2 EVENT_SA_REPLACE Aug 26 13:26:36.522200: | QUICK_I2: category: established CHILD SA flags: 200: Aug 26 13:26:36.522203: | -> UNDEFINED EVENT_NULL Aug 26 13:26:36.522206: | QUICK_R2: category: established CHILD SA flags: 0: Aug 26 13:26:36.522208: | -> UNDEFINED EVENT_NULL Aug 26 13:26:36.522212: | INFO: category: informational flags: 0: Aug 26 13:26:36.522214: | -> UNDEFINED EVENT_NULL Aug 26 13:26:36.522218: | INFO_PROTECTED: category: informational flags: 0: Aug 26 13:26:36.522220: | -> UNDEFINED EVENT_NULL Aug 26 13:26:36.522223: | XAUTH_R0: category: established IKE SA flags: 0: Aug 26 13:26:36.522226: | -> XAUTH_R1 EVENT_NULL Aug 26 13:26:36.522229: | XAUTH_R1: category: established IKE SA flags: 0: Aug 26 13:26:36.522232: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:26:36.522235: | MODE_CFG_R0: category: informational flags: 0: Aug 26 13:26:36.522238: | -> MODE_CFG_R1 EVENT_SA_REPLACE Aug 26 13:26:36.522241: | MODE_CFG_R1: category: established IKE SA flags: 0: Aug 26 13:26:36.522244: | -> MODE_CFG_R2 EVENT_SA_REPLACE Aug 26 13:26:36.522247: | MODE_CFG_R2: category: established IKE SA flags: 0: Aug 26 13:26:36.522250: | -> UNDEFINED EVENT_NULL Aug 26 13:26:36.522253: | MODE_CFG_I1: category: established IKE SA flags: 0: Aug 26 13:26:36.522256: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:26:36.522259: | XAUTH_I0: category: established IKE SA flags: 0: Aug 26 13:26:36.522262: | -> XAUTH_I1 EVENT_RETRANSMIT Aug 26 13:26:36.522265: | XAUTH_I1: category: established IKE SA flags: 0: Aug 26 13:26:36.522268: | -> MAIN_I4 EVENT_RETRANSMIT Aug 26 13:26:36.522275: | checking IKEv2 state table Aug 26 13:26:36.522281: | PARENT_I0: category: ignore flags: 0: Aug 26 13:26:36.522284: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Aug 26 13:26:36.522297: | PARENT_I1: category: half-open IKE SA flags: 0: Aug 26 13:26:36.522303: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Aug 26 13:26:36.522306: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Aug 26 13:26:36.522310: | PARENT_I2: category: open IKE SA flags: 0: Aug 26 13:26:36.522325: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Aug 26 13:26:36.522328: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Aug 26 13:26:36.522331: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Aug 26 13:26:36.522334: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Aug 26 13:26:36.522338: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Aug 26 13:26:36.522341: | PARENT_I3: category: established IKE SA flags: 0: Aug 26 13:26:36.522344: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Aug 26 13:26:36.522347: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Aug 26 13:26:36.522350: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Aug 26 13:26:36.522353: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Aug 26 13:26:36.522356: | PARENT_R0: category: half-open IKE SA flags: 0: Aug 26 13:26:36.522359: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Aug 26 13:26:36.522362: | PARENT_R1: category: half-open IKE SA flags: 0: Aug 26 13:26:36.522365: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Aug 26 13:26:36.522368: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Aug 26 13:26:36.522371: | PARENT_R2: category: established IKE SA flags: 0: Aug 26 13:26:36.522376: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Aug 26 13:26:36.522380: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Aug 26 13:26:36.522383: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Aug 26 13:26:36.522386: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Aug 26 13:26:36.522389: | V2_CREATE_I0: category: established IKE SA flags: 0: Aug 26 13:26:36.522392: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Aug 26 13:26:36.522395: | V2_CREATE_I: category: established IKE SA flags: 0: Aug 26 13:26:36.522398: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Aug 26 13:26:36.522401: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Aug 26 13:26:36.522404: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Aug 26 13:26:36.522408: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Aug 26 13:26:36.522411: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Aug 26 13:26:36.522414: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Aug 26 13:26:36.522417: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Aug 26 13:26:36.522421: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Aug 26 13:26:36.522424: | V2_CREATE_R: category: established IKE SA flags: 0: Aug 26 13:26:36.522427: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Aug 26 13:26:36.522430: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Aug 26 13:26:36.522433: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Aug 26 13:26:36.522436: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Aug 26 13:26:36.522440: | V2_IPSEC_I: category: established CHILD SA flags: 0: Aug 26 13:26:36.522443: | V2_IPSEC_R: category: established CHILD SA flags: 0: Aug 26 13:26:36.522446: | IKESA_DEL: category: established IKE SA flags: 0: Aug 26 13:26:36.522449: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Aug 26 13:26:36.522453: | CHILDSA_DEL: category: informational flags: 0: Aug 26 13:26:36.522488: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 Aug 26 13:26:36.522938: | Hard-wiring algorithms Aug 26 13:26:36.522942: | adding AES_CCM_16 to kernel algorithm db Aug 26 13:26:36.522947: | adding AES_CCM_12 to kernel algorithm db Aug 26 13:26:36.522950: | adding AES_CCM_8 to kernel algorithm db Aug 26 13:26:36.522953: | adding 3DES_CBC to kernel algorithm db Aug 26 13:26:36.522956: | adding CAMELLIA_CBC to kernel algorithm db Aug 26 13:26:36.522959: | adding AES_GCM_16 to kernel algorithm db Aug 26 13:26:36.522962: | adding AES_GCM_12 to kernel algorithm db Aug 26 13:26:36.522965: | adding AES_GCM_8 to kernel algorithm db Aug 26 13:26:36.522967: | adding AES_CTR to kernel algorithm db Aug 26 13:26:36.522970: | adding AES_CBC to kernel algorithm db Aug 26 13:26:36.522973: | adding SERPENT_CBC to kernel algorithm db Aug 26 13:26:36.522976: | adding TWOFISH_CBC to kernel algorithm db Aug 26 13:26:36.522979: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Aug 26 13:26:36.522982: | adding NULL to kernel algorithm db Aug 26 13:26:36.522985: | adding CHACHA20_POLY1305 to kernel algorithm db Aug 26 13:26:36.522987: | adding HMAC_MD5_96 to kernel algorithm db Aug 26 13:26:36.522990: | adding HMAC_SHA1_96 to kernel algorithm db Aug 26 13:26:36.522993: | adding HMAC_SHA2_512_256 to kernel algorithm db Aug 26 13:26:36.522996: | adding HMAC_SHA2_384_192 to kernel algorithm db Aug 26 13:26:36.522999: | adding HMAC_SHA2_256_128 to kernel algorithm db Aug 26 13:26:36.523002: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Aug 26 13:26:36.523004: | adding AES_XCBC_96 to kernel algorithm db Aug 26 13:26:36.523007: | adding AES_CMAC_96 to kernel algorithm db Aug 26 13:26:36.523010: | adding NONE to kernel algorithm db Aug 26 13:26:36.523033: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Aug 26 13:26:36.523040: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Aug 26 13:26:36.523043: | setup kernel fd callback Aug 26 13:26:36.523047: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x563313fd01e8 Aug 26 13:26:36.523051: | libevent_malloc: new ptr-libevent@0x563313fce9f8 size 128 Aug 26 13:26:36.523054: | libevent_malloc: new ptr-libevent@0x563313fd5be8 size 16 Aug 26 13:26:36.523061: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x563313fd5f58 Aug 26 13:26:36.523064: | libevent_malloc: new ptr-libevent@0x563313fa4318 size 128 Aug 26 13:26:36.523067: | libevent_malloc: new ptr-libevent@0x563313fd6508 size 16 Aug 26 13:26:36.523359: | global one-shot timer EVENT_CHECK_CRLS initialized Aug 26 13:26:36.523369: selinux support is enabled. Aug 26 13:26:36.524004: | unbound context created - setting debug level to 5 Aug 26 13:26:36.524029: | /etc/hosts lookups activated Aug 26 13:26:36.524042: | /etc/resolv.conf usage activated Aug 26 13:26:36.524106: | outgoing-port-avoid set 0-65535 Aug 26 13:26:36.524135: | outgoing-port-permit set 32768-60999 Aug 26 13:26:36.524138: | Loading dnssec root key from:/var/lib/unbound/root.key Aug 26 13:26:36.524141: | No additional dnssec trust anchors defined via dnssec-trusted= option Aug 26 13:26:36.524144: | Setting up events, loop start Aug 26 13:26:36.524147: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x563313fd63f8 Aug 26 13:26:36.524151: | libevent_malloc: new ptr-libevent@0x563313fe1ee8 size 128 Aug 26 13:26:36.524154: | libevent_malloc: new ptr-libevent@0x563313fed1b8 size 16 Aug 26 13:26:36.524160: | libevent_realloc: new ptr-libevent@0x563313fed1f8 size 256 Aug 26 13:26:36.524163: | libevent_malloc: new ptr-libevent@0x563313fed328 size 8 Aug 26 13:26:36.524166: | libevent_realloc: new ptr-libevent@0x563313fed368 size 144 Aug 26 13:26:36.524168: | libevent_malloc: new ptr-libevent@0x563313f29108 size 152 Aug 26 13:26:36.524172: | libevent_malloc: new ptr-libevent@0x563313fed428 size 16 Aug 26 13:26:36.524176: | signal event handler PLUTO_SIGCHLD installed Aug 26 13:26:36.524179: | libevent_malloc: new ptr-libevent@0x563313fed468 size 8 Aug 26 13:26:36.524182: | libevent_malloc: new ptr-libevent@0x563313f348a8 size 152 Aug 26 13:26:36.524184: | signal event handler PLUTO_SIGTERM installed Aug 26 13:26:36.524187: | libevent_malloc: new ptr-libevent@0x563313fed4a8 size 8 Aug 26 13:26:36.524191: | libevent_malloc: new ptr-libevent@0x563313f2c6d8 size 152 Aug 26 13:26:36.524194: | signal event handler PLUTO_SIGHUP installed Aug 26 13:26:36.524197: | libevent_malloc: new ptr-libevent@0x563313fed4e8 size 8 Aug 26 13:26:36.524200: | libevent_realloc: release ptr-libevent@0x563313fed368 Aug 26 13:26:36.524202: | libevent_realloc: new ptr-libevent@0x563313fed528 size 256 Aug 26 13:26:36.524205: | libevent_malloc: new ptr-libevent@0x563313fed658 size 152 Aug 26 13:26:36.524208: | signal event handler PLUTO_SIGSYS installed Aug 26 13:26:36.524556: | created addconn helper (pid:10146) using fork+execve Aug 26 13:26:36.524572: | forked child 10146 Aug 26 13:26:36.524615: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:26:36.524632: listening for IKE messages Aug 26 13:26:36.534076: | Inspecting interface lo Aug 26 13:26:36.534096: | found lo with address 127.0.0.1 Aug 26 13:26:36.534099: | Inspecting interface eth0 Aug 26 13:26:36.534102: | found eth0 with address 192.1.3.209 Aug 26 13:26:36.534220: Kernel supports NIC esp-hw-offload Aug 26 13:26:36.534240: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.209:500 Aug 26 13:26:36.534311: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:26:36.534321: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:26:36.534327: adding interface eth0/eth0 192.1.3.209:4500 Aug 26 13:26:36.534357: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Aug 26 13:26:36.534389: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:26:36.534395: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:26:36.534399: adding interface lo/lo 127.0.0.1:4500 Aug 26 13:26:36.534473: | no interfaces to sort Aug 26 13:26:36.534479: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 13:26:36.534488: | add_fd_read_event_handler: new ethX-pe@0x563313fed9c8 Aug 26 13:26:36.534493: | libevent_malloc: new ptr-libevent@0x563313fe1e38 size 128 Aug 26 13:26:36.534499: | libevent_malloc: new ptr-libevent@0x563313feda38 size 16 Aug 26 13:26:36.534507: | setup callback for interface lo 127.0.0.1:4500 fd 20 Aug 26 13:26:36.534511: | add_fd_read_event_handler: new ethX-pe@0x563313feda78 Aug 26 13:26:36.534517: | libevent_malloc: new ptr-libevent@0x563313fa43c8 size 128 Aug 26 13:26:36.534520: | libevent_malloc: new ptr-libevent@0x563313fedae8 size 16 Aug 26 13:26:36.534527: | setup callback for interface lo 127.0.0.1:500 fd 19 Aug 26 13:26:36.534531: | add_fd_read_event_handler: new ethX-pe@0x563313fedb28 Aug 26 13:26:36.534536: | libevent_malloc: new ptr-libevent@0x563313fa55f8 size 128 Aug 26 13:26:36.534540: | libevent_malloc: new ptr-libevent@0x563313fedb98 size 16 Aug 26 13:26:36.534546: | setup callback for interface eth0 192.1.3.209:4500 fd 18 Aug 26 13:26:36.534550: | add_fd_read_event_handler: new ethX-pe@0x563313fedbd8 Aug 26 13:26:36.534556: | libevent_malloc: new ptr-libevent@0x563313f9eff8 size 128 Aug 26 13:26:36.534560: | libevent_malloc: new ptr-libevent@0x563313fedc48 size 16 Aug 26 13:26:36.534565: | setup callback for interface eth0 192.1.3.209:500 fd 17 Aug 26 13:26:36.534570: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:26:36.534573: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:26:36.534594: loading secrets from "/etc/ipsec.secrets" Aug 26 13:26:36.534632: | saving Modulus Aug 26 13:26:36.534639: | saving PublicExponent Aug 26 13:26:36.534683: | computed rsa CKAID 1a 15 cc e8 92 73 43 9c 2b f4 20 2a c1 06 6e f2 Aug 26 13:26:36.534687: | computed rsa CKAID 59 b0 ef 45 Aug 26 13:26:36.534691: loaded private key for keyid: PKK_RSA:AQPHFfpyJ Aug 26 13:26:36.534700: | certs and keys locked by 'process_secret' Aug 26 13:26:36.534705: | certs and keys unlocked by 'process_secret' Aug 26 13:26:36.534717: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:26:36.534726: | spent 0.766 milliseconds in whack Aug 26 13:26:36.553427: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:26:36.553449: listening for IKE messages Aug 26 13:26:36.553478: | Inspecting interface lo Aug 26 13:26:36.553483: | found lo with address 127.0.0.1 Aug 26 13:26:36.553485: | Inspecting interface eth0 Aug 26 13:26:36.553488: | found eth0 with address 192.1.3.209 Aug 26 13:26:36.553584: | no interfaces to sort Aug 26 13:26:36.553591: | libevent_free: release ptr-libevent@0x563313fe1e38 Aug 26 13:26:36.553593: | free_event_entry: release EVENT_NULL-pe@0x563313fed9c8 Aug 26 13:26:36.553596: | add_fd_read_event_handler: new ethX-pe@0x563313fed9c8 Aug 26 13:26:36.553598: | libevent_malloc: new ptr-libevent@0x563313fe1e38 size 128 Aug 26 13:26:36.553604: | setup callback for interface lo 127.0.0.1:4500 fd 20 Aug 26 13:26:36.553606: | libevent_free: release ptr-libevent@0x563313fa43c8 Aug 26 13:26:36.553608: | free_event_entry: release EVENT_NULL-pe@0x563313feda78 Aug 26 13:26:36.553610: | add_fd_read_event_handler: new ethX-pe@0x563313feda78 Aug 26 13:26:36.553611: | libevent_malloc: new ptr-libevent@0x563313fa43c8 size 128 Aug 26 13:26:36.553615: | setup callback for interface lo 127.0.0.1:500 fd 19 Aug 26 13:26:36.553617: | libevent_free: release ptr-libevent@0x563313fa55f8 Aug 26 13:26:36.553619: | free_event_entry: release EVENT_NULL-pe@0x563313fedb28 Aug 26 13:26:36.553620: | add_fd_read_event_handler: new ethX-pe@0x563313fedb28 Aug 26 13:26:36.553622: | libevent_malloc: new ptr-libevent@0x563313fa55f8 size 128 Aug 26 13:26:36.553628: | setup callback for interface eth0 192.1.3.209:4500 fd 18 Aug 26 13:26:36.553631: | libevent_free: release ptr-libevent@0x563313f9eff8 Aug 26 13:26:36.553633: | free_event_entry: release EVENT_NULL-pe@0x563313fedbd8 Aug 26 13:26:36.553635: | add_fd_read_event_handler: new ethX-pe@0x563313fedbd8 Aug 26 13:26:36.553636: | libevent_malloc: new ptr-libevent@0x563313f9eff8 size 128 Aug 26 13:26:36.553639: | setup callback for interface eth0 192.1.3.209:500 fd 17 Aug 26 13:26:36.553641: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:26:36.553643: forgetting secrets Aug 26 13:26:36.553649: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:26:36.553660: loading secrets from "/etc/ipsec.secrets" Aug 26 13:26:36.553672: | saving Modulus Aug 26 13:26:36.553674: | saving PublicExponent Aug 26 13:26:36.553689: | computed rsa CKAID 1a 15 cc e8 92 73 43 9c 2b f4 20 2a c1 06 6e f2 Aug 26 13:26:36.553691: | computed rsa CKAID 59 b0 ef 45 Aug 26 13:26:36.553694: loaded private key for keyid: PKK_RSA:AQPHFfpyJ Aug 26 13:26:36.553698: | certs and keys locked by 'process_secret' Aug 26 13:26:36.553700: | certs and keys unlocked by 'process_secret' Aug 26 13:26:36.553707: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:26:36.553712: | spent 0.297 milliseconds in whack Aug 26 13:26:36.554199: | processing signal PLUTO_SIGCHLD Aug 26 13:26:36.554211: | waitpid returned pid 10146 (exited with status 0) Aug 26 13:26:36.554214: | reaped addconn helper child (status 0) Aug 26 13:26:36.554219: | waitpid returned ECHILD (no child processes left) Aug 26 13:26:36.554222: | spent 0.0147 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:26:36.623130: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:26:36.623443: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:26:36.623451: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:26:36.623453: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:26:36.623454: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:26:36.623458: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:26:36.623463: | Added new connection xauth-road-eastnet with policy ENCRYPT+TUNNEL+PFS+XAUTH+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 13:26:36.623466: | No AUTH policy was set - defaulting to RSASIG Aug 26 13:26:36.623469: | counting wild cards for @road is 0 Aug 26 13:26:36.623472: | counting wild cards for @east is 0 Aug 26 13:26:36.623480: | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@(nil): none Aug 26 13:26:36.623482: | new hp@0x563313feed08 Aug 26 13:26:36.623486: added connection description "xauth-road-eastnet" Aug 26 13:26:36.623494: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+XAUTH+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 13:26:36.623506: | 192.1.3.209[@road,+XC+S=C]---192.1.3.254...192.1.2.23<192.1.2.23>[@east,+XS+S=C]===192.0.2.0/24 Aug 26 13:26:36.623513: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:26:36.623521: | spent 0.386 milliseconds in whack Aug 26 13:26:36.623551: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:26:36.623559: add keyid @road Aug 26 13:26:36.623563: | add pubkey 01 03 c7 15 fa 72 27 70 a4 e1 f3 0a 70 21 f9 0c Aug 26 13:26:36.623565: | add pubkey 3f e2 65 12 87 d9 fd 12 cb af d4 e0 c2 e3 dd 77 Aug 26 13:26:36.623567: | add pubkey a0 ef aa c7 d6 a2 b2 30 f2 64 b0 c5 e6 c7 a7 27 Aug 26 13:26:36.623568: | add pubkey 17 54 7a 8e 32 c9 ac fd bf 8f b3 33 b9 74 74 73 Aug 26 13:26:36.623570: | add pubkey dd 23 83 11 53 d6 d4 91 0e 36 7e 67 fc 89 1e 48 Aug 26 13:26:36.623571: | add pubkey ac e9 da 2e 66 9d 6e 4f e2 98 a7 dc 41 b3 a4 37 Aug 26 13:26:36.623573: | add pubkey f5 07 a9 9c 23 69 83 54 87 7b ea 00 a7 5b ab 2d Aug 26 13:26:36.623574: | add pubkey 41 34 d1 a3 17 1e a7 64 2d 7f ff 45 7a 5d 85 5c Aug 26 13:26:36.623580: | add pubkey 73 dd 63 e7 40 ad eb 71 e6 5f 21 43 80 f5 23 4c Aug 26 13:26:36.623582: | add pubkey 3d 4a 11 2c ca 9a d6 79 c5 c2 51 6e af c3 6e 99 Aug 26 13:26:36.623583: | add pubkey f5 26 1c 67 ee 8a 3e 30 4b c1 93 a7 92 34 36 8c Aug 26 13:26:36.623585: | add pubkey bf e6 d0 d3 fe 78 0b 0a 64 04 44 ca 8c 83 fd f1 Aug 26 13:26:36.623586: | add pubkey 2e b5 00 76 61 a6 de f1 59 67 2b 6d c2 57 e0 f2 Aug 26 13:26:36.623588: | add pubkey 7d 6b 9f d3 46 41 8c 31 c2 fd c4 60 72 08 3b bb Aug 26 13:26:36.623589: | add pubkey 56 fb 01 fc 1d 57 4e cf 7c 0f c4 6f 72 6f 2a 0e Aug 26 13:26:36.623591: | add pubkey f3 30 db a0 80 f9 70 cc bb 07 a9 f9 d7 76 99 63 Aug 26 13:26:36.623592: | add pubkey 4b 6a 0f 1a 37 95 cb 9b ea 17 f7 55 62 6b 8a 83 Aug 26 13:26:36.623594: | add pubkey 05 ff 43 78 57 dd bd 08 85 9c f1 62 35 6e 69 c7 Aug 26 13:26:36.623595: | add pubkey 04 0b 4b c4 1b d2 38 89 8c de 56 d0 c8 2c 51 54 Aug 26 13:26:36.623597: | add pubkey 32 1b 7d 27 dc cd 37 7a 4e cb 1a ec d2 ce 48 ed Aug 26 13:26:36.623598: | add pubkey 43 48 9c 8a fc 30 9f b1 57 1c a9 98 e5 84 93 6c Aug 26 13:26:36.623600: | add pubkey da 4d cc 95 e3 f5 f2 a5 b3 9d 70 ae 24 8d 08 3b Aug 26 13:26:36.623601: | add pubkey 0f 8c e9 5a a5 f0 4d 9c 3c 2f 7f bc 10 95 34 1c Aug 26 13:26:36.623603: | add pubkey 96 74 29 fc ab fb 8f 4b 71 aa 0b 26 b5 f0 32 98 Aug 26 13:26:36.623604: | add pubkey 90 6a fd 31 f5 ab Aug 26 13:26:36.623622: | computed rsa CKAID 1a 15 cc e8 92 73 43 9c 2b f4 20 2a c1 06 6e f2 Aug 26 13:26:36.623623: | computed rsa CKAID 59 b0 ef 45 Aug 26 13:26:36.623631: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:26:36.623637: | spent 0.0884 milliseconds in whack Aug 26 13:26:36.623663: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:26:36.623670: add keyid @east Aug 26 13:26:36.623674: | add pubkey 01 03 bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b Aug 26 13:26:36.623676: | add pubkey e5 16 c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 Aug 26 13:26:36.623677: | add pubkey 85 7a e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c Aug 26 13:26:36.623679: | add pubkey 78 ca 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 Aug 26 13:26:36.623680: | add pubkey 21 c9 f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d Aug 26 13:26:36.623682: | add pubkey d2 67 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 Aug 26 13:26:36.623683: | add pubkey 62 cd 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce Aug 26 13:26:36.623685: | add pubkey 62 b5 af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e Aug 26 13:26:36.623686: | add pubkey bb 23 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d Aug 26 13:26:36.623688: | add pubkey ac 47 f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce Aug 26 13:26:36.623689: | add pubkey e0 98 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a Aug 26 13:26:36.623691: | add pubkey 92 b8 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 Aug 26 13:26:36.623692: | add pubkey 4d 58 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 Aug 26 13:26:36.623694: | add pubkey 5f 56 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 Aug 26 13:26:36.623695: | add pubkey d5 f1 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c Aug 26 13:26:36.623697: | add pubkey 47 cc 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 Aug 26 13:26:36.623698: | add pubkey 07 8f 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 Aug 26 13:26:36.623699: | add pubkey 51 51 48 ef Aug 26 13:26:36.623708: | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Aug 26 13:26:36.623709: | computed rsa CKAID 8a 82 25 f1 Aug 26 13:26:36.623716: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:26:36.623721: | spent 0.0605 milliseconds in whack Aug 26 13:26:36.783457: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:26:36.783479: | dup_any(fd@16) -> fd@21 (in whack_process() at rcv_whack.c:590) Aug 26 13:26:36.783502: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:26:36.783507: | start processing: connection "xauth-road-eastnet" (in initiate_a_connection() at initiate.c:186) Aug 26 13:26:36.783510: | empty esp_info, returning defaults for ENCRYPT Aug 26 13:26:36.783514: | connection 'xauth-road-eastnet' +POLICY_UP Aug 26 13:26:36.783516: | dup_any(fd@21) -> fd@22 (in initiate_a_connection() at initiate.c:342) Aug 26 13:26:36.783531: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:26:36.783547: | creating state object #1 at 0x563313fef698 Aug 26 13:26:36.783549: | State DB: adding IKEv1 state #1 in UNDEFINED Aug 26 13:26:36.783556: | pstats #1 ikev1.isakmp started Aug 26 13:26:36.783561: | suspend processing: connection "xauth-road-eastnet" (in main_outI1() at ikev1_main.c:118) Aug 26 13:26:36.783565: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118) Aug 26 13:26:36.783568: | parent state #1: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA) Aug 26 13:26:36.783570: | dup_any(fd@22) -> fd@23 (in main_outI1() at ikev1_main.c:123) Aug 26 13:26:36.783573: | Queuing pending IPsec SA negotiating with 192.1.2.23 "xauth-road-eastnet" IKE SA #1 "xauth-road-eastnet" Aug 26 13:26:36.783576: "xauth-road-eastnet" #1: initiating Main Mode Aug 26 13:26:36.783617: | **emit ISAKMP Message: Aug 26 13:26:36.783620: | initiator cookie: Aug 26 13:26:36.783623: | a8 18 47 73 a5 79 00 f2 Aug 26 13:26:36.783625: | responder cookie: Aug 26 13:26:36.783627: | 00 00 00 00 00 00 00 00 Aug 26 13:26:36.783629: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:26:36.783632: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:26:36.783634: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:26:36.783636: | flags: none (0x0) Aug 26 13:26:36.783639: | Message ID: 0 (0x0) Aug 26 13:26:36.783641: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:26:36.783644: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:26:36.783647: | no specific IKE algorithms specified - using defaults Aug 26 13:26:36.783671: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0 Aug 26 13:26:36.783677: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0 Aug 26 13:26:36.783682: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0 Aug 26 13:26:36.783687: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0 Aug 26 13:26:36.783692: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0 Aug 26 13:26:36.783698: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0 Aug 26 13:26:36.783705: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0 Aug 26 13:26:36.783712: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0 Aug 26 13:26:36.783718: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0 Aug 26 13:26:36.783725: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0 Aug 26 13:26:36.783730: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0 Aug 26 13:26:36.783735: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0 Aug 26 13:26:36.783740: | oakley_alg_makedb() returning 0x563313ff2528 Aug 26 13:26:36.783746: | ***emit ISAKMP Security Association Payload: Aug 26 13:26:36.783749: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:26:36.783752: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:26:36.783755: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:26:36.783758: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:26:36.783764: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:26:36.783767: | ****emit IPsec DOI SIT: Aug 26 13:26:36.783770: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:26:36.783773: | ikev1_out_sa pcn: 0 has 1 valid proposals Aug 26 13:26:36.783776: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18 Aug 26 13:26:36.783779: | ****emit ISAKMP Proposal Payload: Aug 26 13:26:36.783781: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.783782: | proposal number: 0 (0x0) Aug 26 13:26:36.783784: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:26:36.783786: | SPI size: 0 (0x0) Aug 26 13:26:36.783787: | number of transforms: 18 (0x12) Aug 26 13:26:36.783789: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' Aug 26 13:26:36.783791: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.783793: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.783795: | ISAKMP transform number: 0 (0x0) Aug 26 13:26:36.783796: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.783798: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.783800: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783802: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.783804: | length/value: 1 (0x1) Aug 26 13:26:36.783806: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.783808: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783810: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.783812: | length/value: 3600 (0xe10) Aug 26 13:26:36.783813: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783815: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.783817: | length/value: 7 (0x7) Aug 26 13:26:36.783818: | [7 is OAKLEY_AES_CBC] Aug 26 13:26:36.783820: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783822: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.783823: | length/value: 4 (0x4) Aug 26 13:26:36.783825: | [4 is OAKLEY_SHA2_256] Aug 26 13:26:36.783826: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783828: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.783830: | length/value: 65005 (0xfded) Aug 26 13:26:36.783831: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.783833: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783835: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.783836: | length/value: 14 (0xe) Aug 26 13:26:36.783838: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:26:36.783840: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783841: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:26:36.783843: | length/value: 256 (0x100) Aug 26 13:26:36.783845: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:26:36.783846: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.783848: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.783850: | ISAKMP transform number: 1 (0x1) Aug 26 13:26:36.783851: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.783853: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.783868: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.783870: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783871: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.783873: | length/value: 1 (0x1) Aug 26 13:26:36.783874: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.783876: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783877: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.783879: | length/value: 3600 (0xe10) Aug 26 13:26:36.783880: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783882: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.783885: | length/value: 7 (0x7) Aug 26 13:26:36.783887: | [7 is OAKLEY_AES_CBC] Aug 26 13:26:36.783888: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783890: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.783891: | length/value: 4 (0x4) Aug 26 13:26:36.783893: | [4 is OAKLEY_SHA2_256] Aug 26 13:26:36.783894: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783896: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.783897: | length/value: 65005 (0xfded) Aug 26 13:26:36.783899: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.783900: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783902: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.783903: | length/value: 14 (0xe) Aug 26 13:26:36.783905: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:26:36.783906: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783908: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:26:36.783910: | length/value: 128 (0x80) Aug 26 13:26:36.783911: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:26:36.783913: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.783914: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.783916: | ISAKMP transform number: 2 (0x2) Aug 26 13:26:36.783917: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.783919: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.783921: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.783923: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783926: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.783928: | length/value: 1 (0x1) Aug 26 13:26:36.783930: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.783933: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783935: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.783938: | length/value: 3600 (0xe10) Aug 26 13:26:36.783940: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783942: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.783945: | length/value: 7 (0x7) Aug 26 13:26:36.783947: | [7 is OAKLEY_AES_CBC] Aug 26 13:26:36.783949: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783951: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.783954: | length/value: 6 (0x6) Aug 26 13:26:36.783956: | [6 is OAKLEY_SHA2_512] Aug 26 13:26:36.783971: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783974: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.783976: | length/value: 65005 (0xfded) Aug 26 13:26:36.783979: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.783981: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783984: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.783986: | length/value: 14 (0xe) Aug 26 13:26:36.783989: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:26:36.783991: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.783994: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:26:36.783997: | length/value: 256 (0x100) Aug 26 13:26:36.784000: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:26:36.784002: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.784005: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784007: | ISAKMP transform number: 3 (0x3) Aug 26 13:26:36.784010: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.784014: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784017: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.784020: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784023: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.784028: | length/value: 1 (0x1) Aug 26 13:26:36.784031: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.784034: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784037: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.784040: | length/value: 3600 (0xe10) Aug 26 13:26:36.784043: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784046: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.784049: | length/value: 7 (0x7) Aug 26 13:26:36.784064: | [7 is OAKLEY_AES_CBC] Aug 26 13:26:36.784067: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784069: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.784085: | length/value: 6 (0x6) Aug 26 13:26:36.784087: | [6 is OAKLEY_SHA2_512] Aug 26 13:26:36.784090: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784093: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.784095: | length/value: 65005 (0xfded) Aug 26 13:26:36.784098: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.784101: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784104: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.784106: | length/value: 14 (0xe) Aug 26 13:26:36.784109: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:26:36.784112: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784115: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:26:36.784117: | length/value: 128 (0x80) Aug 26 13:26:36.784120: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:26:36.784122: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.784125: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784128: | ISAKMP transform number: 4 (0x4) Aug 26 13:26:36.784130: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.784134: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784137: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.784140: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784143: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.784145: | length/value: 1 (0x1) Aug 26 13:26:36.784148: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.784151: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784153: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.784156: | length/value: 3600 (0xe10) Aug 26 13:26:36.784158: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784161: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.784164: | length/value: 7 (0x7) Aug 26 13:26:36.784166: | [7 is OAKLEY_AES_CBC] Aug 26 13:26:36.784168: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784171: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.784174: | length/value: 2 (0x2) Aug 26 13:26:36.784176: | [2 is OAKLEY_SHA1] Aug 26 13:26:36.784178: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784181: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.784183: | length/value: 65005 (0xfded) Aug 26 13:26:36.784186: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.784188: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784191: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.784193: | length/value: 14 (0xe) Aug 26 13:26:36.784196: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:26:36.784198: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784201: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:26:36.784203: | length/value: 256 (0x100) Aug 26 13:26:36.784207: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:26:36.784210: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.784212: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784215: | ISAKMP transform number: 5 (0x5) Aug 26 13:26:36.784218: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.784224: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784227: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.784230: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784233: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.784236: | length/value: 1 (0x1) Aug 26 13:26:36.784238: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.784241: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784244: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.784246: | length/value: 3600 (0xe10) Aug 26 13:26:36.784249: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784251: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.784254: | length/value: 7 (0x7) Aug 26 13:26:36.784256: | [7 is OAKLEY_AES_CBC] Aug 26 13:26:36.784259: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784262: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.784264: | length/value: 2 (0x2) Aug 26 13:26:36.784267: | [2 is OAKLEY_SHA1] Aug 26 13:26:36.784269: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784272: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.784274: | length/value: 65005 (0xfded) Aug 26 13:26:36.784277: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.784280: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784282: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.784284: | length/value: 14 (0xe) Aug 26 13:26:36.784287: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:26:36.784296: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784299: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:26:36.784301: | length/value: 128 (0x80) Aug 26 13:26:36.784304: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:26:36.784307: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.784309: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784312: | ISAKMP transform number: 6 (0x6) Aug 26 13:26:36.784315: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.784319: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784322: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.784325: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784328: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.784331: | length/value: 1 (0x1) Aug 26 13:26:36.784334: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.784336: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784339: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.784341: | length/value: 3600 (0xe10) Aug 26 13:26:36.784344: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784347: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.784349: | length/value: 7 (0x7) Aug 26 13:26:36.784352: | [7 is OAKLEY_AES_CBC] Aug 26 13:26:36.784354: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784357: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.784360: | length/value: 4 (0x4) Aug 26 13:26:36.784362: | [4 is OAKLEY_SHA2_256] Aug 26 13:26:36.784365: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784368: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.784370: | length/value: 65005 (0xfded) Aug 26 13:26:36.784373: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.784376: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784379: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.784381: | length/value: 5 (0x5) Aug 26 13:26:36.784384: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:26:36.784386: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784389: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:26:36.784394: | length/value: 256 (0x100) Aug 26 13:26:36.784397: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:26:36.784400: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.784403: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784406: | ISAKMP transform number: 7 (0x7) Aug 26 13:26:36.784408: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.784411: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784414: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.784417: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784420: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.784423: | length/value: 1 (0x1) Aug 26 13:26:36.784425: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.784428: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784431: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.784433: | length/value: 3600 (0xe10) Aug 26 13:26:36.784436: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784439: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.784441: | length/value: 7 (0x7) Aug 26 13:26:36.784444: | [7 is OAKLEY_AES_CBC] Aug 26 13:26:36.784447: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784450: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.784453: | length/value: 4 (0x4) Aug 26 13:26:36.784456: | [4 is OAKLEY_SHA2_256] Aug 26 13:26:36.784459: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784462: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.784465: | length/value: 65005 (0xfded) Aug 26 13:26:36.784467: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.784470: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784473: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.784476: | length/value: 5 (0x5) Aug 26 13:26:36.784478: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:26:36.784481: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784483: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:26:36.784486: | length/value: 128 (0x80) Aug 26 13:26:36.784489: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:26:36.784491: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.784494: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784496: | ISAKMP transform number: 8 (0x8) Aug 26 13:26:36.784499: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.784501: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784504: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.784507: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784509: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.784512: | length/value: 1 (0x1) Aug 26 13:26:36.784514: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.784517: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784520: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.784522: | length/value: 3600 (0xe10) Aug 26 13:26:36.784525: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784527: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.784530: | length/value: 7 (0x7) Aug 26 13:26:36.784532: | [7 is OAKLEY_AES_CBC] Aug 26 13:26:36.784535: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784537: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.784540: | length/value: 6 (0x6) Aug 26 13:26:36.784542: | [6 is OAKLEY_SHA2_512] Aug 26 13:26:36.784544: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784547: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.784549: | length/value: 65005 (0xfded) Aug 26 13:26:36.784556: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.784560: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784562: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.784565: | length/value: 5 (0x5) Aug 26 13:26:36.784567: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:26:36.784570: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784572: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:26:36.784575: | length/value: 256 (0x100) Aug 26 13:26:36.784578: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:26:36.784580: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.784583: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784586: | ISAKMP transform number: 9 (0x9) Aug 26 13:26:36.784588: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.784591: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784594: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.784597: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784600: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.784603: | length/value: 1 (0x1) Aug 26 13:26:36.784605: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.784608: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784611: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.784614: | length/value: 3600 (0xe10) Aug 26 13:26:36.784616: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784619: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.784621: | length/value: 7 (0x7) Aug 26 13:26:36.784624: | [7 is OAKLEY_AES_CBC] Aug 26 13:26:36.784627: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784630: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.784632: | length/value: 6 (0x6) Aug 26 13:26:36.784634: | [6 is OAKLEY_SHA2_512] Aug 26 13:26:36.784637: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784640: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.784643: | length/value: 65005 (0xfded) Aug 26 13:26:36.784645: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.784648: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784651: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.784653: | length/value: 5 (0x5) Aug 26 13:26:36.784656: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:26:36.784659: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784661: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:26:36.784664: | length/value: 128 (0x80) Aug 26 13:26:36.784667: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:26:36.784670: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.784673: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784675: | ISAKMP transform number: 10 (0xa) Aug 26 13:26:36.784678: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.784681: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784684: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.784687: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784690: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.784693: | length/value: 1 (0x1) Aug 26 13:26:36.784696: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.784698: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784701: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.784704: | length/value: 3600 (0xe10) Aug 26 13:26:36.784707: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784710: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.784713: | length/value: 7 (0x7) Aug 26 13:26:36.784715: | [7 is OAKLEY_AES_CBC] Aug 26 13:26:36.784720: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784723: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.784725: | length/value: 2 (0x2) Aug 26 13:26:36.784728: | [2 is OAKLEY_SHA1] Aug 26 13:26:36.784731: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784734: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.784736: | length/value: 65005 (0xfded) Aug 26 13:26:36.784739: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.784741: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784744: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.784747: | length/value: 5 (0x5) Aug 26 13:26:36.784750: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:26:36.784752: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784755: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:26:36.784758: | length/value: 256 (0x100) Aug 26 13:26:36.784761: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:26:36.784764: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.784767: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784770: | ISAKMP transform number: 11 (0xb) Aug 26 13:26:36.784772: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.784775: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784779: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.784782: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784785: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.784787: | length/value: 1 (0x1) Aug 26 13:26:36.784790: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.784793: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784796: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.784798: | length/value: 3600 (0xe10) Aug 26 13:26:36.784801: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784804: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.784806: | length/value: 7 (0x7) Aug 26 13:26:36.784809: | [7 is OAKLEY_AES_CBC] Aug 26 13:26:36.784811: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784814: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.784817: | length/value: 2 (0x2) Aug 26 13:26:36.784819: | [2 is OAKLEY_SHA1] Aug 26 13:26:36.784822: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784824: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.784827: | length/value: 65005 (0xfded) Aug 26 13:26:36.784829: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.784832: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784834: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.784837: | length/value: 5 (0x5) Aug 26 13:26:36.784839: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:26:36.784842: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784845: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:26:36.784847: | length/value: 128 (0x80) Aug 26 13:26:36.784850: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:26:36.784853: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.784855: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784858: | ISAKMP transform number: 12 (0xc) Aug 26 13:26:36.784861: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.784864: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784867: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.784870: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784872: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.784875: | length/value: 1 (0x1) Aug 26 13:26:36.784878: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.784882: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784885: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.784887: | length/value: 3600 (0xe10) Aug 26 13:26:36.784890: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784893: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.784895: | length/value: 5 (0x5) Aug 26 13:26:36.784898: | [5 is OAKLEY_3DES_CBC] Aug 26 13:26:36.784900: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784903: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.784905: | length/value: 4 (0x4) Aug 26 13:26:36.784908: | [4 is OAKLEY_SHA2_256] Aug 26 13:26:36.784910: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784913: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.784915: | length/value: 65005 (0xfded) Aug 26 13:26:36.784917: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.784920: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784923: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.784926: | length/value: 14 (0xe) Aug 26 13:26:36.784929: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:26:36.784931: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:26:36.784934: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.784937: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784939: | ISAKMP transform number: 13 (0xd) Aug 26 13:26:36.784941: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.784945: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.784948: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.784950: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784953: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.784956: | length/value: 1 (0x1) Aug 26 13:26:36.784958: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.784961: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784963: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.784966: | length/value: 3600 (0xe10) Aug 26 13:26:36.784968: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784970: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.784973: | length/value: 5 (0x5) Aug 26 13:26:36.784975: | [5 is OAKLEY_3DES_CBC] Aug 26 13:26:36.784977: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784980: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.784982: | length/value: 6 (0x6) Aug 26 13:26:36.784985: | [6 is OAKLEY_SHA2_512] Aug 26 13:26:36.784988: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.784991: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.784994: | length/value: 65005 (0xfded) Aug 26 13:26:36.784996: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.784999: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785002: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.785004: | length/value: 14 (0xe) Aug 26 13:26:36.785007: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:26:36.785010: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:26:36.785012: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.785015: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.785018: | ISAKMP transform number: 14 (0xe) Aug 26 13:26:36.785020: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.785023: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.785026: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.785029: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785032: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.785034: | length/value: 1 (0x1) Aug 26 13:26:36.785039: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.785042: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785044: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.785047: | length/value: 3600 (0xe10) Aug 26 13:26:36.785050: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785053: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.785055: | length/value: 5 (0x5) Aug 26 13:26:36.785058: | [5 is OAKLEY_3DES_CBC] Aug 26 13:26:36.785061: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785064: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.785066: | length/value: 2 (0x2) Aug 26 13:26:36.785069: | [2 is OAKLEY_SHA1] Aug 26 13:26:36.785071: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785074: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.785078: | length/value: 65005 (0xfded) Aug 26 13:26:36.785080: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.785083: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785086: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.785088: | length/value: 14 (0xe) Aug 26 13:26:36.785091: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:26:36.785094: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:26:36.785097: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.785100: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.785102: | ISAKMP transform number: 15 (0xf) Aug 26 13:26:36.785105: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.785109: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.785112: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.785115: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785118: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.785121: | length/value: 1 (0x1) Aug 26 13:26:36.785124: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.785126: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785129: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.785132: | length/value: 3600 (0xe10) Aug 26 13:26:36.785135: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785138: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.785141: | length/value: 5 (0x5) Aug 26 13:26:36.785143: | [5 is OAKLEY_3DES_CBC] Aug 26 13:26:36.785146: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785149: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.785152: | length/value: 4 (0x4) Aug 26 13:26:36.785155: | [4 is OAKLEY_SHA2_256] Aug 26 13:26:36.785157: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785160: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.785163: | length/value: 65005 (0xfded) Aug 26 13:26:36.785166: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.785169: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785172: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.785174: | length/value: 5 (0x5) Aug 26 13:26:36.785177: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:26:36.785180: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:26:36.785183: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.785185: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.785188: | ISAKMP transform number: 16 (0x10) Aug 26 13:26:36.785191: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.785194: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.785198: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.785201: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785203: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.785207: | length/value: 1 (0x1) Aug 26 13:26:36.785210: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.785213: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785216: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.785219: | length/value: 3600 (0xe10) Aug 26 13:26:36.785222: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785224: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.785227: | length/value: 5 (0x5) Aug 26 13:26:36.785229: | [5 is OAKLEY_3DES_CBC] Aug 26 13:26:36.785231: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785234: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.785236: | length/value: 6 (0x6) Aug 26 13:26:36.785238: | [6 is OAKLEY_SHA2_512] Aug 26 13:26:36.785241: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785243: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.785246: | length/value: 65005 (0xfded) Aug 26 13:26:36.785248: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.785250: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785253: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.785255: | length/value: 5 (0x5) Aug 26 13:26:36.785257: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:26:36.785260: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:26:36.785262: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.785265: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.785267: | ISAKMP transform number: 17 (0x11) Aug 26 13:26:36.785269: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.785273: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:26:36.785276: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:26:36.785279: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785282: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.785285: | length/value: 1 (0x1) Aug 26 13:26:36.785287: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.785304: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785307: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.785314: | length/value: 3600 (0xe10) Aug 26 13:26:36.785318: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785321: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.785323: | length/value: 5 (0x5) Aug 26 13:26:36.785326: | [5 is OAKLEY_3DES_CBC] Aug 26 13:26:36.785329: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785332: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.785335: | length/value: 2 (0x2) Aug 26 13:26:36.785338: | [2 is OAKLEY_SHA1] Aug 26 13:26:36.785341: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785344: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.785347: | length/value: 65005 (0xfded) Aug 26 13:26:36.785349: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.785352: | ******emit ISAKMP Oakley attribute: Aug 26 13:26:36.785355: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.785358: | length/value: 5 (0x5) Aug 26 13:26:36.785362: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:26:36.785364: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:26:36.785368: | emitting length of ISAKMP Proposal Payload: 632 Aug 26 13:26:36.785371: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0 Aug 26 13:26:36.785375: | emitting length of ISAKMP Security Association Payload: 644 Aug 26 13:26:36.785379: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 Aug 26 13:26:36.785387: | out_vid(): sending [FRAGMENTATION] Aug 26 13:26:36.785391: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:26:36.785394: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:26:36.785400: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:26:36.785405: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:26:36.785408: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:26:36.785412: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:26:36.785415: | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 Aug 26 13:26:36.785419: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:26:36.785424: | out_vid(): sending [XAUTH] Aug 26 13:26:36.785427: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:26:36.785430: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:26:36.785433: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:26:36.785436: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:26:36.785439: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:26:36.785442: | emitting 8 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:26:36.785444: | V_ID 09 00 26 89 df d6 b7 12 Aug 26 13:26:36.785447: | emitting length of ISAKMP Vendor ID Payload: 12 Aug 26 13:26:36.785449: | out_vid(): sending [Dead Peer Detection] Aug 26 13:26:36.785452: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:26:36.785454: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.785470: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:26:36.785472: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:26:36.785475: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:26:36.785478: | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 Aug 26 13:26:36.785480: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:26:36.785482: | nat add vid Aug 26 13:26:36.785485: | sending draft and RFC NATT VIDs Aug 26 13:26:36.785488: | out_vid(): sending [RFC 3947] Aug 26 13:26:36.785490: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:26:36.785492: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:26:36.785509: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:26:36.785512: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:26:36.785514: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:26:36.785517: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:26:36.785519: | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f Aug 26 13:26:36.785522: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:26:36.785524: | skipping VID_NATT_RFC Aug 26 13:26:36.785526: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03] Aug 26 13:26:36.785528: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:26:36.785530: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:26:36.785533: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:26:36.785536: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:26:36.785539: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:26:36.785542: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:26:36.785544: | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 13:26:36.785546: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:26:36.785553: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n] Aug 26 13:26:36.785556: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:26:36.785558: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:26:36.785561: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:26:36.785564: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:26:36.785567: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:26:36.785570: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:26:36.785573: | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f Aug 26 13:26:36.785576: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:26:36.785579: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02] Aug 26 13:26:36.785582: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:26:36.785585: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.785588: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:26:36.785592: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:26:36.785595: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:26:36.785598: | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 Aug 26 13:26:36.785600: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:26:36.785603: | no IKEv1 message padding required Aug 26 13:26:36.785605: | emitting length of ISAKMP Message: 804 Aug 26 13:26:36.785623: | sending 804 bytes for reply packet for main_outI1 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 13:26:36.785627: | a8 18 47 73 a5 79 00 f2 00 00 00 00 00 00 00 00 Aug 26 13:26:36.785630: | 01 10 02 00 00 00 00 00 00 00 03 24 0d 00 02 84 Aug 26 13:26:36.785632: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Aug 26 13:26:36.785635: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:26:36.785638: | 80 01 00 07 80 02 00 04 80 03 fd ed 80 04 00 0e Aug 26 13:26:36.785640: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Aug 26 13:26:36.785643: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 fd ed Aug 26 13:26:36.785645: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Aug 26 13:26:36.785648: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Aug 26 13:26:36.785651: | 80 03 fd ed 80 04 00 0e 80 0e 01 00 03 00 00 24 Aug 26 13:26:36.785653: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:26:36.785656: | 80 02 00 06 80 03 fd ed 80 04 00 0e 80 0e 00 80 Aug 26 13:26:36.785658: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:26:36.785660: | 80 01 00 07 80 02 00 02 80 03 fd ed 80 04 00 0e Aug 26 13:26:36.785663: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Aug 26 13:26:36.785666: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 fd ed Aug 26 13:26:36.785668: | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 Aug 26 13:26:36.785671: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Aug 26 13:26:36.785673: | 80 03 fd ed 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:26:36.785674: | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:26:36.785676: | 80 02 00 04 80 03 fd ed 80 04 00 05 80 0e 00 80 Aug 26 13:26:36.785678: | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:26:36.785679: | 80 01 00 07 80 02 00 06 80 03 fd ed 80 04 00 05 Aug 26 13:26:36.785681: | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 Aug 26 13:26:36.785682: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 fd ed Aug 26 13:26:36.785684: | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 Aug 26 13:26:36.785685: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Aug 26 13:26:36.785687: | 80 03 fd ed 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:26:36.785689: | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:26:36.785691: | 80 02 00 02 80 03 fd ed 80 04 00 05 80 0e 00 80 Aug 26 13:26:36.785693: | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:26:36.785694: | 80 01 00 05 80 02 00 04 80 03 fd ed 80 04 00 0e Aug 26 13:26:36.785696: | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:26:36.785697: | 80 01 00 05 80 02 00 06 80 03 fd ed 80 04 00 0e Aug 26 13:26:36.785699: | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:26:36.785700: | 80 01 00 05 80 02 00 02 80 03 fd ed 80 04 00 0e Aug 26 13:26:36.785702: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:26:36.785703: | 80 01 00 05 80 02 00 04 80 03 fd ed 80 04 00 05 Aug 26 13:26:36.785705: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:26:36.785706: | 80 01 00 05 80 02 00 06 80 03 fd ed 80 04 00 05 Aug 26 13:26:36.785708: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:26:36.785709: | 80 01 00 05 80 02 00 02 80 03 fd ed 80 04 00 05 Aug 26 13:26:36.785711: | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f Aug 26 13:26:36.785712: | 00 d6 c2 d3 0d 00 00 0c 09 00 26 89 df d6 b7 12 Aug 26 13:26:36.785714: | 0d 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc Aug 26 13:26:36.785715: | 77 57 01 00 0d 00 00 14 4a 13 1c 81 07 03 58 45 Aug 26 13:26:36.785717: | 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 7d 94 19 a6 Aug 26 13:26:36.785718: | 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 0d 00 00 14 Aug 26 13:26:36.785720: | 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f Aug 26 13:26:36.785721: | 00 00 00 14 cd 60 46 43 35 df 21 f8 7c fd b2 fc Aug 26 13:26:36.785723: | 68 b6 a4 48 Aug 26 13:26:36.785797: | event_schedule: new EVENT_RETRANSMIT-pe@0x563313feede8 Aug 26 13:26:36.785803: | inserting event EVENT_RETRANSMIT, timeout in 25 seconds for #1 Aug 26 13:26:36.785807: | libevent_malloc: new ptr-libevent@0x563313feee58 size 128 Aug 26 13:26:36.785814: | #1 STATE_MAIN_I1: retransmits: first event in 25 seconds; timeout in 107 seconds; limit of 12 retransmits; current time is 11282.528262 Aug 26 13:26:36.785829: | #1 spent 2.26 milliseconds in main_outI1() Aug 26 13:26:36.785835: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in main_outI1() at ikev1_main.c:228) Aug 26 13:26:36.785839: | resume processing: connection "xauth-road-eastnet" (in main_outI1() at ikev1_main.c:228) Aug 26 13:26:36.785843: | stop processing: connection "xauth-road-eastnet" (in initiate_a_connection() at initiate.c:349) Aug 26 13:26:36.785847: | close_any(fd@21) (in initiate_connection() at initiate.c:372) Aug 26 13:26:36.785851: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:26:36.785855: | spent 2.36 milliseconds in whack Aug 26 13:26:36.787129: | spent 0.00229 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:26:36.787159: | *received 156 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) Aug 26 13:26:36.787165: | a8 18 47 73 a5 79 00 f2 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.787167: | 01 10 02 00 00 00 00 00 00 00 00 9c 0d 00 00 38 Aug 26 13:26:36.787170: | 00 00 00 01 00 00 00 01 00 00 00 2c 00 01 00 01 Aug 26 13:26:36.787173: | 00 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:26:36.787175: | 80 01 00 07 80 02 00 04 80 03 fd ed 80 04 00 0e Aug 26 13:26:36.787177: | 80 0e 01 00 0d 00 00 14 40 48 b7 d5 6e bc e8 85 Aug 26 13:26:36.787180: | 25 e7 de 7f 00 d6 c2 d3 0d 00 00 0c 09 00 26 89 Aug 26 13:26:36.787182: | df d6 b7 12 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Aug 26 13:26:36.787185: | 6b 86 96 fc 77 57 01 00 00 00 00 14 4a 13 1c 81 Aug 26 13:26:36.787187: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f Aug 26 13:26:36.787192: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:26:36.787196: | **parse ISAKMP Message: Aug 26 13:26:36.787199: | initiator cookie: Aug 26 13:26:36.787201: | a8 18 47 73 a5 79 00 f2 Aug 26 13:26:36.787205: | responder cookie: Aug 26 13:26:36.787208: | 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.787211: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:26:36.787214: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:26:36.787217: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:26:36.787219: | flags: none (0x0) Aug 26 13:26:36.787222: | Message ID: 0 (0x0) Aug 26 13:26:36.787225: | length: 156 (0x9c) Aug 26 13:26:36.787228: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:26:36.787231: | State DB: IKEv1 state not found (find_state_ikev1) Aug 26 13:26:36.787235: | State DB: found IKEv1 state #1 in MAIN_I1 (find_state_ikev1_init) Aug 26 13:26:36.787240: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) Aug 26 13:26:36.787243: | #1 is idle Aug 26 13:26:36.787246: | #1 idle Aug 26 13:26:36.787249: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:26:36.787252: | ***parse ISAKMP Security Association Payload: Aug 26 13:26:36.787255: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:26:36.787258: | length: 56 (0x38) Aug 26 13:26:36.787261: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:26:36.787264: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Aug 26 13:26:36.787266: | ***parse ISAKMP Vendor ID Payload: Aug 26 13:26:36.787269: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:26:36.787271: | length: 20 (0x14) Aug 26 13:26:36.787274: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Aug 26 13:26:36.787277: | ***parse ISAKMP Vendor ID Payload: Aug 26 13:26:36.787280: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:26:36.787282: | length: 12 (0xc) Aug 26 13:26:36.787285: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Aug 26 13:26:36.787291: | ***parse ISAKMP Vendor ID Payload: Aug 26 13:26:36.787296: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:26:36.787298: | length: 20 (0x14) Aug 26 13:26:36.787301: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Aug 26 13:26:36.787304: | ***parse ISAKMP Vendor ID Payload: Aug 26 13:26:36.787306: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.787309: | length: 20 (0x14) Aug 26 13:26:36.787312: | message 'main_inR1_outI2' HASH payload not checked early Aug 26 13:26:36.787329: | received Vendor ID payload [FRAGMENTATION] Aug 26 13:26:36.787332: | received Vendor ID payload [XAUTH] Aug 26 13:26:36.787336: | received Vendor ID payload [Dead Peer Detection] Aug 26 13:26:36.787339: | quirks.qnat_traversal_vid set to=117 [RFC 3947] Aug 26 13:26:36.787342: | received Vendor ID payload [RFC 3947] Aug 26 13:26:36.787346: | ****parse IPsec DOI SIT: Aug 26 13:26:36.787348: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:26:36.787366: | ****parse ISAKMP Proposal Payload: Aug 26 13:26:36.787369: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.787372: | length: 44 (0x2c) Aug 26 13:26:36.787374: | proposal number: 0 (0x0) Aug 26 13:26:36.787377: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:26:36.787380: | SPI size: 0 (0x0) Aug 26 13:26:36.787383: | number of transforms: 1 (0x1) Aug 26 13:26:36.787386: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:26:36.787401: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.787403: | length: 36 (0x24) Aug 26 13:26:36.787406: | ISAKMP transform number: 0 (0x0) Aug 26 13:26:36.787408: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:26:36.787411: | ******parse ISAKMP Oakley attribute: Aug 26 13:26:36.787413: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:26:36.787416: | length/value: 1 (0x1) Aug 26 13:26:36.787418: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:26:36.787421: | ******parse ISAKMP Oakley attribute: Aug 26 13:26:36.787423: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:26:36.787426: | length/value: 3600 (0xe10) Aug 26 13:26:36.787430: | ******parse ISAKMP Oakley attribute: Aug 26 13:26:36.787434: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:26:36.787436: | length/value: 7 (0x7) Aug 26 13:26:36.787439: | [7 is OAKLEY_AES_CBC] Aug 26 13:26:36.787442: | ******parse ISAKMP Oakley attribute: Aug 26 13:26:36.787445: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:26:36.787447: | length/value: 4 (0x4) Aug 26 13:26:36.787450: | [4 is OAKLEY_SHA2_256] Aug 26 13:26:36.787452: | ******parse ISAKMP Oakley attribute: Aug 26 13:26:36.787455: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:26:36.787457: | length/value: 65005 (0xfded) Aug 26 13:26:36.787460: | [65005 is XAUTHInitRSA] Aug 26 13:26:36.787463: | ******parse ISAKMP Oakley attribute: Aug 26 13:26:36.787465: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:26:36.787468: | length/value: 14 (0xe) Aug 26 13:26:36.787470: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:26:36.787473: | ******parse ISAKMP Oakley attribute: Aug 26 13:26:36.787475: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:26:36.787478: | length/value: 256 (0x100) Aug 26 13:26:36.787495: | OAKLEY proposal verified unconditionally; no alg_info to check against Aug 26 13:26:36.787498: | Oakley Transform 0 accepted Aug 26 13:26:36.787501: | sender checking NAT-T: enabled; VID 117 Aug 26 13:26:36.787503: | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC Aug 26 13:26:36.787506: | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) Aug 26 13:26:36.787511: | adding outI2 KE work-order 1 for state #1 Aug 26 13:26:36.787514: | state #1 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:26:36.787517: | #1 STATE_MAIN_I1: retransmits: cleared Aug 26 13:26:36.787521: | libevent_free: release ptr-libevent@0x563313feee58 Aug 26 13:26:36.787524: | free_event_entry: release EVENT_RETRANSMIT-pe@0x563313feede8 Aug 26 13:26:36.787528: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x563313feede8 Aug 26 13:26:36.787532: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 13:26:36.787535: | libevent_malloc: new ptr-libevent@0x563313feee58 size 128 Aug 26 13:26:36.787558: | complete v1 state transition with STF_SUSPEND Aug 26 13:26:36.787578: | [RE]START processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) Aug 26 13:26:36.787581: | suspending state #1 and saving MD Aug 26 13:26:36.787584: | #1 is busy; has a suspended MD Aug 26 13:26:36.787585: | crypto helper 1 resuming Aug 26 13:26:36.787589: | #1 spent 0.242 milliseconds in process_packet_tail() Aug 26 13:26:36.787605: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:26:36.787597: | crypto helper 1 starting work-order 1 for state #1 Aug 26 13:26:36.787612: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:26:36.787618: | crypto helper 1 doing build KE and nonce (outI2 KE); request ID 1 Aug 26 13:26:36.787620: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:26:36.787624: | spent 0.474 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:26:36.788206: | crypto helper 1 finished build KE and nonce (outI2 KE); request ID 1 time elapsed 0.000588 seconds Aug 26 13:26:36.788212: | (#1) spent 0.594 milliseconds in crypto helper computing work-order 1: outI2 KE (pcr) Aug 26 13:26:36.788214: | crypto helper 1 sending results from work-order 1 for state #1 to event queue Aug 26 13:26:36.788216: | scheduling resume sending helper answer for #1 Aug 26 13:26:36.788219: | libevent_malloc: new ptr-libevent@0x7f2b94002888 size 128 Aug 26 13:26:36.788225: | crypto helper 1 waiting (nothing to do) Aug 26 13:26:36.788231: | processing resume sending helper answer for #1 Aug 26 13:26:36.788238: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:26:36.788241: | crypto helper 1 replies to request ID 1 Aug 26 13:26:36.788246: | calling continuation function 0x563313202b50 Aug 26 13:26:36.788249: | main_inR1_outI2_continue for #1: calculated ke+nonce, sending I2 Aug 26 13:26:36.788254: | **emit ISAKMP Message: Aug 26 13:26:36.788257: | initiator cookie: Aug 26 13:26:36.788259: | a8 18 47 73 a5 79 00 f2 Aug 26 13:26:36.788262: | responder cookie: Aug 26 13:26:36.788264: | 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.788267: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.788270: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:26:36.788272: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:26:36.788275: | flags: none (0x0) Aug 26 13:26:36.788277: | Message ID: 0 (0x0) Aug 26 13:26:36.788280: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:26:36.788283: | ***emit ISAKMP Key Exchange Payload: Aug 26 13:26:36.788286: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 13:26:36.788295: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE Aug 26 13:26:36.788299: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) Aug 26 13:26:36.788302: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' Aug 26 13:26:36.788305: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload Aug 26 13:26:36.788308: | keyex value 70 c5 df 02 b7 09 fc dc f0 4d 85 08 3a f2 2e 38 Aug 26 13:26:36.788311: | keyex value 77 19 eb b5 2b 07 47 96 96 49 60 63 e2 f8 17 c2 Aug 26 13:26:36.788313: | keyex value 2a 37 39 10 4a 44 4c af 8d 83 ab e3 4f 9d 3a 41 Aug 26 13:26:36.788315: | keyex value 1e b2 8c bd 12 0b 17 c3 2e e2 90 6c b3 56 fe 67 Aug 26 13:26:36.788318: | keyex value 0f 0e c4 05 65 b2 0a c3 3e 1b 1a c1 c5 f6 df 7f Aug 26 13:26:36.788320: | keyex value 17 42 4e 7d ab ba 31 fb 00 0a 84 fc 43 49 84 82 Aug 26 13:26:36.788323: | keyex value 49 83 b2 ac 9f ec 31 62 c6 23 25 51 c6 9a 3f 8f Aug 26 13:26:36.788325: | keyex value 32 6c c3 ec dc 5d a5 b1 be 88 95 5e 83 50 38 91 Aug 26 13:26:36.788328: | keyex value d8 6b 12 58 15 26 2a b1 8c ec ee b4 8f 80 fb 6f Aug 26 13:26:36.788330: | keyex value da f2 b1 48 48 07 02 27 8a 75 6d 37 f5 c4 ba 57 Aug 26 13:26:36.788333: | keyex value 68 ec 83 0f 4b 88 f7 d1 3c 70 bc fe 0a 66 d6 94 Aug 26 13:26:36.788335: | keyex value 36 89 0e 2d 5d 78 b9 98 98 6d 42 ec 09 19 b7 87 Aug 26 13:26:36.788338: | keyex value d8 84 10 98 7d 40 dc 3e eb 49 b3 7d a8 06 23 99 Aug 26 13:26:36.788340: | keyex value 6c fa aa b6 43 e8 50 e0 11 f3 95 63 3e 3b 6c 30 Aug 26 13:26:36.788355: | keyex value 58 75 a0 c8 f0 cf 0d 57 4c 36 55 3d e1 25 61 d5 Aug 26 13:26:36.788358: | keyex value 0d 7f 40 2b fe 5f c6 1c 06 80 08 a9 bd 5f 86 08 Aug 26 13:26:36.788360: | emitting length of ISAKMP Key Exchange Payload: 260 Aug 26 13:26:36.788363: | ***emit ISAKMP Nonce Payload: Aug 26 13:26:36.788366: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.788369: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) Aug 26 13:26:36.788372: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' Aug 26 13:26:36.788374: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload Aug 26 13:26:36.788377: | Ni d3 91 1c af c1 b3 11 53 97 c3 29 c6 8b 3b cd 8c Aug 26 13:26:36.788379: | Ni d2 34 34 76 6a be ee 78 5c 76 18 40 c4 b3 52 35 Aug 26 13:26:36.788382: | emitting length of ISAKMP Nonce Payload: 36 Aug 26 13:26:36.788384: | NAT-T checking st_nat_traversal Aug 26 13:26:36.788387: | NAT-T found (implies NAT_T_WITH_NATD) Aug 26 13:26:36.788389: | sending NAT-D payloads Aug 26 13:26:36.788401: | natd_hash: hasher=0x5633132d7ca0(32) Aug 26 13:26:36.788404: | natd_hash: icookie= a8 18 47 73 a5 79 00 f2 Aug 26 13:26:36.788406: | natd_hash: rcookie= 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.788410: | natd_hash: ip= c0 01 02 17 Aug 26 13:26:36.788413: | natd_hash: port=500 Aug 26 13:26:36.788416: | natd_hash: hash= e6 36 59 c8 60 ca 3d 5c bd 3f dc bf ba 22 4c 1f Aug 26 13:26:36.788418: | natd_hash: hash= 9d 2b aa 80 74 4d 17 4c 37 08 16 4f c9 4b 1f 8b Aug 26 13:26:36.788421: | ***emit ISAKMP NAT-D Payload: Aug 26 13:26:36.788423: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Aug 26 13:26:36.788426: | next payload chain: ignoring supplied 'ISAKMP NAT-D Payload'.'next payload type' value 20:ISAKMP_NEXT_NATD_RFC Aug 26 13:26:36.788429: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) Aug 26 13:26:36.788432: | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' Aug 26 13:26:36.788435: | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload Aug 26 13:26:36.788437: | NAT-D e6 36 59 c8 60 ca 3d 5c bd 3f dc bf ba 22 4c 1f Aug 26 13:26:36.788440: | NAT-D 9d 2b aa 80 74 4d 17 4c 37 08 16 4f c9 4b 1f 8b Aug 26 13:26:36.788442: | emitting length of ISAKMP NAT-D Payload: 36 Aug 26 13:26:36.788449: | natd_hash: hasher=0x5633132d7ca0(32) Aug 26 13:26:36.788451: | natd_hash: icookie= a8 18 47 73 a5 79 00 f2 Aug 26 13:26:36.788454: | natd_hash: rcookie= 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.788456: | natd_hash: ip= c0 01 03 d1 Aug 26 13:26:36.788459: | natd_hash: port=500 Aug 26 13:26:36.788461: | natd_hash: hash= 2b 82 03 b2 24 60 09 4b b0 98 13 1c 5d 6c 14 1c Aug 26 13:26:36.788464: | natd_hash: hash= 6a 5b 92 76 f1 a5 e6 f9 21 bf 31 99 a1 80 35 03 Aug 26 13:26:36.788466: | ***emit ISAKMP NAT-D Payload: Aug 26 13:26:36.788469: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.788472: | next payload chain: setting previous 'ISAKMP NAT-D Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) Aug 26 13:26:36.788475: | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' Aug 26 13:26:36.788477: | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload Aug 26 13:26:36.788480: | NAT-D 2b 82 03 b2 24 60 09 4b b0 98 13 1c 5d 6c 14 1c Aug 26 13:26:36.788495: | NAT-D 6a 5b 92 76 f1 a5 e6 f9 21 bf 31 99 a1 80 35 03 Aug 26 13:26:36.788498: | emitting length of ISAKMP NAT-D Payload: 36 Aug 26 13:26:36.788500: | no IKEv1 message padding required Aug 26 13:26:36.788503: | emitting length of ISAKMP Message: 396 Aug 26 13:26:36.788505: | State DB: re-hashing IKEv1 state #1 IKE SPIi and SPI[ir] Aug 26 13:26:36.788511: | complete v1 state transition with STF_OK Aug 26 13:26:36.788515: | [RE]START processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:26:36.788518: | #1 is idle Aug 26 13:26:36.788521: | doing_xauth:yes, t_xauth_client_done:no Aug 26 13:26:36.788523: | peer supports fragmentation Aug 26 13:26:36.788525: | peer supports DPD Aug 26 13:26:36.788528: | IKEv1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 Aug 26 13:26:36.788532: | parent state #1: MAIN_I1(half-open IKE SA) => MAIN_I2(open IKE SA) Aug 26 13:26:36.788534: | event_already_set, deleting event Aug 26 13:26:36.788537: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:26:36.788540: | libevent_free: release ptr-libevent@0x563313feee58 Aug 26 13:26:36.788556: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x563313feede8 Aug 26 13:26:36.788561: | sending reply packet to 192.1.2.23:500 (from 192.1.3.209:500) Aug 26 13:26:36.788582: | sending 396 bytes for STATE_MAIN_I1 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 13:26:36.788585: | a8 18 47 73 a5 79 00 f2 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.788588: | 04 10 02 00 00 00 00 00 00 00 01 8c 0a 00 01 04 Aug 26 13:26:36.788603: | 70 c5 df 02 b7 09 fc dc f0 4d 85 08 3a f2 2e 38 Aug 26 13:26:36.788605: | 77 19 eb b5 2b 07 47 96 96 49 60 63 e2 f8 17 c2 Aug 26 13:26:36.788609: | 2a 37 39 10 4a 44 4c af 8d 83 ab e3 4f 9d 3a 41 Aug 26 13:26:36.788612: | 1e b2 8c bd 12 0b 17 c3 2e e2 90 6c b3 56 fe 67 Aug 26 13:26:36.788614: | 0f 0e c4 05 65 b2 0a c3 3e 1b 1a c1 c5 f6 df 7f Aug 26 13:26:36.788616: | 17 42 4e 7d ab ba 31 fb 00 0a 84 fc 43 49 84 82 Aug 26 13:26:36.788619: | 49 83 b2 ac 9f ec 31 62 c6 23 25 51 c6 9a 3f 8f Aug 26 13:26:36.788621: | 32 6c c3 ec dc 5d a5 b1 be 88 95 5e 83 50 38 91 Aug 26 13:26:36.788623: | d8 6b 12 58 15 26 2a b1 8c ec ee b4 8f 80 fb 6f Aug 26 13:26:36.788626: | da f2 b1 48 48 07 02 27 8a 75 6d 37 f5 c4 ba 57 Aug 26 13:26:36.788628: | 68 ec 83 0f 4b 88 f7 d1 3c 70 bc fe 0a 66 d6 94 Aug 26 13:26:36.788631: | 36 89 0e 2d 5d 78 b9 98 98 6d 42 ec 09 19 b7 87 Aug 26 13:26:36.788633: | d8 84 10 98 7d 40 dc 3e eb 49 b3 7d a8 06 23 99 Aug 26 13:26:36.788635: | 6c fa aa b6 43 e8 50 e0 11 f3 95 63 3e 3b 6c 30 Aug 26 13:26:36.788638: | 58 75 a0 c8 f0 cf 0d 57 4c 36 55 3d e1 25 61 d5 Aug 26 13:26:36.788640: | 0d 7f 40 2b fe 5f c6 1c 06 80 08 a9 bd 5f 86 08 Aug 26 13:26:36.788642: | 14 00 00 24 d3 91 1c af c1 b3 11 53 97 c3 29 c6 Aug 26 13:26:36.788645: | 8b 3b cd 8c d2 34 34 76 6a be ee 78 5c 76 18 40 Aug 26 13:26:36.788647: | c4 b3 52 35 14 00 00 24 e6 36 59 c8 60 ca 3d 5c Aug 26 13:26:36.788650: | bd 3f dc bf ba 22 4c 1f 9d 2b aa 80 74 4d 17 4c Aug 26 13:26:36.788652: | 37 08 16 4f c9 4b 1f 8b 00 00 00 24 2b 82 03 b2 Aug 26 13:26:36.788654: | 24 60 09 4b b0 98 13 1c 5d 6c 14 1c 6a 5b 92 76 Aug 26 13:26:36.788657: | f1 a5 e6 f9 21 bf 31 99 a1 80 35 03 Aug 26 13:26:36.788687: | !event_already_set at reschedule Aug 26 13:26:36.788704: | event_schedule: new EVENT_RETRANSMIT-pe@0x563313feede8 Aug 26 13:26:36.788708: | inserting event EVENT_RETRANSMIT, timeout in 25 seconds for #1 Aug 26 13:26:36.788711: | libevent_malloc: new ptr-libevent@0x563313ff1c58 size 128 Aug 26 13:26:36.788716: | #1 STATE_MAIN_I2: retransmits: first event in 25 seconds; timeout in 107 seconds; limit of 12 retransmits; current time is 11282.531171 Aug 26 13:26:36.788719: "xauth-road-eastnet" #1: STATE_MAIN_I2: sent MI2, expecting MR2 Aug 26 13:26:36.788729: | XAUTH client is not yet authenticated Aug 26 13:26:36.788733: | resume sending helper answer for #1 suppresed complete_v1_state_transition() Aug 26 13:26:36.788739: | #1 spent 0.477 milliseconds in resume sending helper answer Aug 26 13:26:36.788743: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:26:36.788746: | libevent_free: release ptr-libevent@0x7f2b94002888 Aug 26 13:26:36.790341: | spent 0.00193 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:26:36.790357: | *received 396 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) Aug 26 13:26:36.790361: | a8 18 47 73 a5 79 00 f2 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.790363: | 04 10 02 00 00 00 00 00 00 00 01 8c 0a 00 01 04 Aug 26 13:26:36.790366: | de d3 4e 80 1f de 5d f7 c4 15 d1 0f 82 cf a3 28 Aug 26 13:26:36.790369: | 5e 8d ab e6 e8 5a 5f 52 b9 06 82 56 98 64 80 a9 Aug 26 13:26:36.790371: | 13 48 6c 46 09 25 4e 40 35 37 b5 bb c4 0c e5 fe Aug 26 13:26:36.790374: | 9a 33 0b f8 fa b7 af 75 e9 59 99 1c 88 14 28 d2 Aug 26 13:26:36.790376: | 24 e1 1d 6b b1 49 11 70 e4 89 e4 e8 e8 a3 04 2f Aug 26 13:26:36.790379: | f2 29 48 53 86 1a f3 57 5c 3c bb 29 b8 2a f4 e4 Aug 26 13:26:36.790381: | 75 99 5b 12 8a eb 2a 69 f1 eb f2 d6 7b e2 44 60 Aug 26 13:26:36.790383: | 6a 09 5d 8c 60 17 5d b8 e3 f9 e6 29 8c 53 ba d7 Aug 26 13:26:36.790386: | 32 de bc 0b dc 2d 15 c5 99 f5 ee ce 2f f2 1f 97 Aug 26 13:26:36.790388: | cc 20 72 d5 ba f2 f2 26 5a 5d c3 a7 48 b1 d6 9c Aug 26 13:26:36.790391: | db 04 67 06 39 b1 3c 71 12 ff a0 59 cf 95 e3 28 Aug 26 13:26:36.790393: | 09 d1 f3 08 7d 66 4e d1 a3 7a 2c e8 c7 f4 38 ec Aug 26 13:26:36.790395: | 54 63 7f e9 31 54 8e 42 4a 03 3f 9e a8 6a 61 c8 Aug 26 13:26:36.790398: | 7c b2 51 a3 7c 7b c3 e3 71 23 e4 d7 69 ce 17 c2 Aug 26 13:26:36.790402: | 26 f8 2e fb 7b e6 a3 36 78 c0 db 11 f6 eb 23 07 Aug 26 13:26:36.790405: | 35 24 01 83 73 d0 66 a2 22 0c 85 4f 72 e6 c8 0c Aug 26 13:26:36.790408: | 14 00 00 24 6c 95 1d 9b f7 cc 2d 75 11 0a ed 74 Aug 26 13:26:36.790410: | 80 53 e9 25 5f f4 49 31 27 0a d4 76 3a d6 20 ca Aug 26 13:26:36.790412: | 4f 68 17 bc 14 00 00 24 2b 82 03 b2 24 60 09 4b Aug 26 13:26:36.790415: | b0 98 13 1c 5d 6c 14 1c 6a 5b 92 76 f1 a5 e6 f9 Aug 26 13:26:36.790417: | 21 bf 31 99 a1 80 35 03 00 00 00 24 e6 36 59 c8 Aug 26 13:26:36.790420: | 60 ca 3d 5c bd 3f dc bf ba 22 4c 1f 9d 2b aa 80 Aug 26 13:26:36.790422: | 74 4d 17 4c 37 08 16 4f c9 4b 1f 8b Aug 26 13:26:36.790427: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:26:36.790430: | **parse ISAKMP Message: Aug 26 13:26:36.790433: | initiator cookie: Aug 26 13:26:36.790435: | a8 18 47 73 a5 79 00 f2 Aug 26 13:26:36.790438: | responder cookie: Aug 26 13:26:36.790440: | 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.790443: | next payload type: ISAKMP_NEXT_KE (0x4) Aug 26 13:26:36.790446: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:26:36.790448: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:26:36.790451: | flags: none (0x0) Aug 26 13:26:36.790453: | Message ID: 0 (0x0) Aug 26 13:26:36.790456: | length: 396 (0x18c) Aug 26 13:26:36.790459: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:26:36.790462: | State DB: found IKEv1 state #1 in MAIN_I2 (find_state_ikev1) Aug 26 13:26:36.790467: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) Aug 26 13:26:36.790470: | #1 is idle Aug 26 13:26:36.790472: | #1 idle Aug 26 13:26:36.790476: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080 Aug 26 13:26:36.790478: | ***parse ISAKMP Key Exchange Payload: Aug 26 13:26:36.790481: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 13:26:36.790483: | length: 260 (0x104) Aug 26 13:26:36.790486: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080 Aug 26 13:26:36.790489: | ***parse ISAKMP Nonce Payload: Aug 26 13:26:36.790492: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Aug 26 13:26:36.790494: | length: 36 (0x24) Aug 26 13:26:36.790497: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 Aug 26 13:26:36.790500: | ***parse ISAKMP NAT-D Payload: Aug 26 13:26:36.790503: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Aug 26 13:26:36.790505: | length: 36 (0x24) Aug 26 13:26:36.790508: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 Aug 26 13:26:36.790510: | ***parse ISAKMP NAT-D Payload: Aug 26 13:26:36.790513: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.790515: | length: 36 (0x24) Aug 26 13:26:36.790518: | message 'main_inR2_outI3' HASH payload not checked early Aug 26 13:26:36.790536: | started looking for secret for @road->@east of kind PKK_PSK Aug 26 13:26:36.790539: | actually looking for secret for @road->@east of kind PKK_PSK Aug 26 13:26:36.790542: | line 1: key type PKK_PSK(@road) to type PKK_RSA Aug 26 13:26:36.790546: | concluding with best_match=000 best=(nil) (lineno=-1) Aug 26 13:26:36.790548: | no PreShared Key Found Aug 26 13:26:36.790552: | adding aggr outR1 DH work-order 2 for state #1 Aug 26 13:26:36.790555: | state #1 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:26:36.790557: | #1 STATE_MAIN_I2: retransmits: cleared Aug 26 13:26:36.790561: | libevent_free: release ptr-libevent@0x563313ff1c58 Aug 26 13:26:36.790564: | free_event_entry: release EVENT_RETRANSMIT-pe@0x563313feede8 Aug 26 13:26:36.790567: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x563313feede8 Aug 26 13:26:36.790570: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 13:26:36.790573: | libevent_malloc: new ptr-libevent@0x7f2b94002888 size 128 Aug 26 13:26:36.790580: | complete v1 state transition with STF_SUSPEND Aug 26 13:26:36.790601: | [RE]START processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) Aug 26 13:26:36.790604: | suspending state #1 and saving MD Aug 26 13:26:36.790606: | #1 is busy; has a suspended MD Aug 26 13:26:36.790609: | crypto helper 0 resuming Aug 26 13:26:36.790611: | #1 spent 0.0757 milliseconds in process_packet_tail() Aug 26 13:26:36.790620: | crypto helper 0 starting work-order 2 for state #1 Aug 26 13:26:36.790627: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:26:36.790635: | crypto helper 0 doing compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 Aug 26 13:26:36.790639: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:26:36.790642: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:26:36.790647: | spent 0.29 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:26:36.791617: | crypto helper 0 finished compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 time elapsed 0.000982 seconds Aug 26 13:26:36.791628: | (#1) spent 0.983 milliseconds in crypto helper computing work-order 2: aggr outR1 DH (pcr) Aug 26 13:26:36.791631: | crypto helper 0 sending results from work-order 2 for state #1 to event queue Aug 26 13:26:36.791633: | scheduling resume sending helper answer for #1 Aug 26 13:26:36.791635: | libevent_malloc: new ptr-libevent@0x7f2b8c000f48 size 128 Aug 26 13:26:36.791641: | crypto helper 0 waiting (nothing to do) Aug 26 13:26:36.791676: | processing resume sending helper answer for #1 Aug 26 13:26:36.791684: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:26:36.791688: | crypto helper 0 replies to request ID 2 Aug 26 13:26:36.791690: | calling continuation function 0x563313202b50 Aug 26 13:26:36.791692: | main_inR2_outI3_cryptotail for #1: calculated DH, sending R1 Aug 26 13:26:36.791696: | **emit ISAKMP Message: Aug 26 13:26:36.791697: | initiator cookie: Aug 26 13:26:36.791699: | a8 18 47 73 a5 79 00 f2 Aug 26 13:26:36.791701: | responder cookie: Aug 26 13:26:36.791702: | 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.791704: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:26:36.791706: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:26:36.791707: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:26:36.791709: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:26:36.791711: | Message ID: 0 (0x0) Aug 26 13:26:36.791713: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:26:36.791715: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 5:ISAKMP_NEXT_ID Aug 26 13:26:36.791717: | thinking about whether to send my certificate: Aug 26 13:26:36.791719: | I have RSA key: OAKLEY_RSA_SIG cert.type: 0?? Aug 26 13:26:36.791721: | sendcert: CERT_ALWAYSSEND and I did not get a certificate request Aug 26 13:26:36.791723: | so do not send cert. Aug 26 13:26:36.791724: | I did not send a certificate because I do not have one. Aug 26 13:26:36.791726: | I am not sending a certificate request Aug 26 13:26:36.791728: | I will NOT send an initial contact payload Aug 26 13:26:36.791729: | init checking NAT-T: enabled; RFC 3947 (NAT-Traversal) Aug 26 13:26:36.791738: | natd_hash: hasher=0x5633132d7ca0(32) Aug 26 13:26:36.791740: | natd_hash: icookie= a8 18 47 73 a5 79 00 f2 Aug 26 13:26:36.791741: | natd_hash: rcookie= 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.791743: | natd_hash: ip= c0 01 03 d1 Aug 26 13:26:36.791744: | natd_hash: port=500 Aug 26 13:26:36.791746: | natd_hash: hash= 2b 82 03 b2 24 60 09 4b b0 98 13 1c 5d 6c 14 1c Aug 26 13:26:36.791748: | natd_hash: hash= 6a 5b 92 76 f1 a5 e6 f9 21 bf 31 99 a1 80 35 03 Aug 26 13:26:36.791751: | natd_hash: hasher=0x5633132d7ca0(32) Aug 26 13:26:36.791753: | natd_hash: icookie= a8 18 47 73 a5 79 00 f2 Aug 26 13:26:36.791757: | natd_hash: rcookie= 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.791758: | natd_hash: ip= c0 01 02 17 Aug 26 13:26:36.791760: | natd_hash: port=500 Aug 26 13:26:36.791761: | natd_hash: hash= e6 36 59 c8 60 ca 3d 5c bd 3f dc bf ba 22 4c 1f Aug 26 13:26:36.791763: | natd_hash: hash= 9d 2b aa 80 74 4d 17 4c 37 08 16 4f c9 4b 1f 8b Aug 26 13:26:36.791765: | expected NAT-D(me): 2b 82 03 b2 24 60 09 4b b0 98 13 1c 5d 6c 14 1c Aug 26 13:26:36.791766: | expected NAT-D(me): 6a 5b 92 76 f1 a5 e6 f9 21 bf 31 99 a1 80 35 03 Aug 26 13:26:36.791768: | expected NAT-D(him): Aug 26 13:26:36.791769: | e6 36 59 c8 60 ca 3d 5c bd 3f dc bf ba 22 4c 1f Aug 26 13:26:36.791771: | 9d 2b aa 80 74 4d 17 4c 37 08 16 4f c9 4b 1f 8b Aug 26 13:26:36.791772: | received NAT-D: 2b 82 03 b2 24 60 09 4b b0 98 13 1c 5d 6c 14 1c Aug 26 13:26:36.791774: | received NAT-D: 6a 5b 92 76 f1 a5 e6 f9 21 bf 31 99 a1 80 35 03 Aug 26 13:26:36.791776: | received NAT-D: e6 36 59 c8 60 ca 3d 5c bd 3f dc bf ba 22 4c 1f Aug 26 13:26:36.791777: | received NAT-D: 9d 2b aa 80 74 4d 17 4c 37 08 16 4f c9 4b 1f 8b Aug 26 13:26:36.791779: | NAT_TRAVERSAL encaps using auto-detect Aug 26 13:26:36.791781: | NAT_TRAVERSAL this end is NOT behind NAT Aug 26 13:26:36.791782: | NAT_TRAVERSAL that end is NOT behind NAT Aug 26 13:26:36.791784: | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 Aug 26 13:26:36.791786: | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected Aug 26 13:26:36.791788: | NAT_T_WITH_KA detected Aug 26 13:26:36.791790: | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds Aug 26 13:26:36.791792: | ***emit ISAKMP Identification Payload (IPsec DOI): Aug 26 13:26:36.791794: | next payload type: ISAKMP_NEXT_SIG (0x9) Aug 26 13:26:36.791796: | ID type: ID_FQDN (0x2) Aug 26 13:26:36.791798: | Protocol ID: 0 (0x0) Aug 26 13:26:36.791799: | port: 0 (0x0) Aug 26 13:26:36.791801: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 9:ISAKMP_NEXT_SIG Aug 26 13:26:36.791803: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) Aug 26 13:26:36.791805: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' Aug 26 13:26:36.791807: | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:26:36.791809: | my identity 72 6f 61 64 Aug 26 13:26:36.791811: | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 Aug 26 13:26:36.791833: | started looking for secret for @road->@east of kind PKK_RSA Aug 26 13:26:36.791836: | actually looking for secret for @road->@east of kind PKK_RSA Aug 26 13:26:36.791838: | line 1: key type PKK_RSA(@road) to type PKK_RSA Aug 26 13:26:36.791840: | 1: compared key (none) to @road / @east -> 002 Aug 26 13:26:36.791842: | 2: compared key (none) to @road / @east -> 002 Aug 26 13:26:36.791844: | line 1: match=002 Aug 26 13:26:36.791846: | match 002 beats previous best_match 000 match=0x563313efbb58 (line=1) Aug 26 13:26:36.791848: | concluding with best_match=002 best=0x563313efbb58 (lineno=1) Aug 26 13:26:36.798954: | ***emit ISAKMP Signature Payload: Aug 26 13:26:36.798971: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.798975: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Signature Payload (9:ISAKMP_NEXT_SIG) Aug 26 13:26:36.798977: | next payload chain: saving location 'ISAKMP Signature Payload'.'next payload type' in 'reply packet' Aug 26 13:26:36.798979: | emitting 388 raw bytes of SIG_I into ISAKMP Signature Payload Aug 26 13:26:36.798981: | SIG_I c2 f2 70 9a f7 0d b2 3b 61 73 0f 2d 28 d1 6a 36 Aug 26 13:26:36.798983: | SIG_I fa 73 c4 c9 3b 1f a8 de a4 24 02 fe 7f 06 a3 13 Aug 26 13:26:36.798985: | SIG_I 68 72 be 2b 12 cf 5f 7a ef fe 81 7e 79 73 dd 19 Aug 26 13:26:36.798990: | SIG_I 27 57 ca 1d 16 50 15 50 a0 4a ab 97 4a a1 64 23 Aug 26 13:26:36.798992: | SIG_I 31 ec 4d ab c2 3e 87 39 57 12 84 f7 e3 d7 79 46 Aug 26 13:26:36.798993: | SIG_I 48 34 63 1a a4 97 af eb 77 10 8f 59 22 86 69 eb Aug 26 13:26:36.798995: | SIG_I 47 7c 0a 74 3f 34 ba 6a 02 20 e5 0a 15 b0 0b 67 Aug 26 13:26:36.798996: | SIG_I 1a 84 ce 46 6b 3a 44 58 6f 23 ed 68 1d 02 39 63 Aug 26 13:26:36.798998: | SIG_I 67 c8 28 2d ea ba 09 23 5a be 86 20 55 3e 36 76 Aug 26 13:26:36.798999: | SIG_I d0 3a b9 86 db 9c 2a 86 e5 93 4d 7c f0 ba 12 5c Aug 26 13:26:36.799001: | SIG_I 55 c3 c5 9e b6 61 5b 0f 63 a1 59 68 06 5b 32 da Aug 26 13:26:36.799002: | SIG_I 3f bb 89 49 a7 64 14 c4 74 56 1e 6a 4a 25 19 80 Aug 26 13:26:36.799004: | SIG_I 7a 16 6f 90 2e a0 80 a6 1d 27 38 75 15 4b 8d d0 Aug 26 13:26:36.799005: | SIG_I 1a 10 04 55 b8 17 a3 47 7d 0b 8c 11 01 b8 80 1d Aug 26 13:26:36.799007: | SIG_I 7a 48 7e 92 85 81 cc 4f 88 6f 64 78 ef 4c e0 3d Aug 26 13:26:36.799008: | SIG_I 0b 7b 96 f5 5c 2e 9f 56 b6 61 24 b7 b2 8c 53 ad Aug 26 13:26:36.799010: | SIG_I 97 23 30 0d ce 9c b1 59 ac ff 52 2f fa b1 a1 1b Aug 26 13:26:36.799012: | SIG_I 99 8c 7d 51 ea d9 a1 81 e7 cd b8 8c 66 76 39 13 Aug 26 13:26:36.799013: | SIG_I 54 34 68 52 07 d4 77 2e 87 dd 1c b2 d6 7a 8e ce Aug 26 13:26:36.799015: | SIG_I 30 e6 69 f0 ad 1b d0 df eb 96 40 28 5f 51 10 23 Aug 26 13:26:36.799016: | SIG_I 0c 38 0b ce e5 45 1b 27 86 70 6f 98 91 d9 e1 08 Aug 26 13:26:36.799018: | SIG_I 46 0c 08 42 e8 11 8d 16 8c 18 21 cf 48 eb 37 cd Aug 26 13:26:36.799019: | SIG_I 39 f1 30 aa a6 0d b6 e1 a0 dc a2 2f 66 ba ee 7e Aug 26 13:26:36.799021: | SIG_I bc 1c b9 70 06 09 3f 8d d3 8c 29 c0 55 71 c3 93 Aug 26 13:26:36.799022: | SIG_I 12 58 8f 4d Aug 26 13:26:36.799024: | emitting length of ISAKMP Signature Payload: 392 Aug 26 13:26:36.799026: | Not sending INITIAL_CONTACT Aug 26 13:26:36.799028: | emitting 12 zero bytes of encryption padding into ISAKMP Message Aug 26 13:26:36.799030: | no IKEv1 message padding required Aug 26 13:26:36.799032: | emitting length of ISAKMP Message: 444 Aug 26 13:26:36.799047: | complete v1 state transition with STF_OK Aug 26 13:26:36.799052: | [RE]START processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:26:36.799054: | #1 is idle Aug 26 13:26:36.799056: | doing_xauth:yes, t_xauth_client_done:no Aug 26 13:26:36.799058: | IKEv1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 Aug 26 13:26:36.799061: | parent state #1: MAIN_I2(open IKE SA) => MAIN_I3(open IKE SA) Aug 26 13:26:36.799063: | event_already_set, deleting event Aug 26 13:26:36.799065: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:26:36.799069: | libevent_free: release ptr-libevent@0x7f2b94002888 Aug 26 13:26:36.799071: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x563313feede8 Aug 26 13:26:36.799076: | sending reply packet to 192.1.2.23:500 (from 192.1.3.209:500) Aug 26 13:26:36.799083: | sending 444 bytes for STATE_MAIN_I2 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 13:26:36.799084: | a8 18 47 73 a5 79 00 f2 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.799086: | 05 10 02 01 00 00 00 00 00 00 01 bc a2 3f c5 36 Aug 26 13:26:36.799087: | 7e ef 89 b4 75 20 b0 ad 5a f3 db 81 c4 e9 08 10 Aug 26 13:26:36.799089: | 3c 08 27 4d ac bf 4f b3 91 09 80 0a 49 d1 5f 80 Aug 26 13:26:36.799090: | b2 51 98 74 71 b1 ce 6b ba 92 6a 5f 1f e0 b9 18 Aug 26 13:26:36.799092: | d0 4d c0 8e da 4a 1e 0b ee 4c ef 0c 51 72 d0 fd Aug 26 13:26:36.799093: | a2 2a 44 1d a3 99 dd 55 a5 2a b1 38 08 1a 80 44 Aug 26 13:26:36.799095: | 8a 03 0e bb 10 96 74 0f 40 87 6e 52 11 2d d3 73 Aug 26 13:26:36.799096: | 83 51 fb 3d 9f 4e 87 2a 34 0b 53 e0 9d a5 35 e8 Aug 26 13:26:36.799098: | 1c cc 2e e4 b1 d4 3a a7 8b 29 e4 c6 6b 1b 55 8d Aug 26 13:26:36.799099: | aa 7f 0f 04 3e bd ad be 50 00 67 ca 42 10 f7 c9 Aug 26 13:26:36.799101: | cf cd 5f a9 6a 87 a5 5c d8 b2 43 ea 9d 38 97 66 Aug 26 13:26:36.799104: | c7 14 05 5b 26 35 85 9c fe 8c 82 ef 0e a2 d8 35 Aug 26 13:26:36.799106: | 67 11 0b 22 f9 56 70 85 08 bd a4 8f 4e ae 97 af Aug 26 13:26:36.799107: | 59 dc e8 ff 95 11 fb 12 73 ed 21 6c 35 46 dd d0 Aug 26 13:26:36.799109: | 8b 11 19 cc e7 ac ed 33 ff f0 99 2a b9 3d 3c 4d Aug 26 13:26:36.799110: | 1e a9 d9 57 dc b4 a6 1e 69 54 6e 56 22 5a 19 e5 Aug 26 13:26:36.799112: | 62 51 c5 48 f5 88 f9 45 b1 d5 87 ac d5 7a f7 b0 Aug 26 13:26:36.799113: | 30 52 df 2f 0c 6f 94 72 b5 72 24 45 0d a3 f1 aa Aug 26 13:26:36.799115: | b9 a2 05 5d 02 30 74 69 96 c7 2d f9 2b 2c 59 c2 Aug 26 13:26:36.799116: | e4 19 53 2d eb 7c 68 93 04 da 1a ca fe 07 c1 4d Aug 26 13:26:36.799118: | 23 6c 92 78 4d 98 32 9b e1 f6 56 0d bd 83 6a 6b Aug 26 13:26:36.799119: | 73 96 0c 40 02 26 8a f7 8d 30 13 b7 32 eb 9b c9 Aug 26 13:26:36.799121: | 96 2a 5b 2b b5 7d 6c b3 eb ae dd 3f 43 3c a7 e5 Aug 26 13:26:36.799122: | 55 16 6a 54 65 02 c7 9f 4f 75 06 e8 80 62 6d 2c Aug 26 13:26:36.799124: | dc 59 53 63 80 ca b5 37 3a 79 f2 09 9b 82 5f 09 Aug 26 13:26:36.799125: | ae 7a 98 f1 66 00 ca dd 54 08 a7 51 ac ee 64 46 Aug 26 13:26:36.799127: | 8d 1b 07 af f0 b6 d0 8e 21 7f 8d 1b Aug 26 13:26:36.799177: | !event_already_set at reschedule Aug 26 13:26:36.799181: | event_schedule: new EVENT_RETRANSMIT-pe@0x563313feede8 Aug 26 13:26:36.799184: | inserting event EVENT_RETRANSMIT, timeout in 25 seconds for #1 Aug 26 13:26:36.799186: | libevent_malloc: new ptr-libevent@0x563313feee58 size 128 Aug 26 13:26:36.799190: | #1 STATE_MAIN_I3: retransmits: first event in 25 seconds; timeout in 107 seconds; limit of 12 retransmits; current time is 11282.541647 Aug 26 13:26:36.799193: "xauth-road-eastnet" #1: STATE_MAIN_I3: sent MI3, expecting MR3 Aug 26 13:26:36.799202: | XAUTH client is not yet authenticated Aug 26 13:26:36.799207: | resume sending helper answer for #1 suppresed complete_v1_state_transition() Aug 26 13:26:36.799213: | #1 spent 7.45 milliseconds in resume sending helper answer Aug 26 13:26:36.799218: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:26:36.799222: | libevent_free: release ptr-libevent@0x7f2b8c000f48 Aug 26 13:26:36.804498: | spent 0.00292 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:26:36.804518: | *received 332 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) Aug 26 13:26:36.804521: | a8 18 47 73 a5 79 00 f2 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.804523: | 05 10 02 01 00 00 00 00 00 00 01 4c d1 27 95 5f Aug 26 13:26:36.804524: | 92 23 56 c5 53 de 6e 3d 27 6e 21 7c eb c4 0f f6 Aug 26 13:26:36.804526: | 1f e8 e7 ba f6 94 ee 2e 87 f8 b0 0c 58 ec cd 87 Aug 26 13:26:36.804528: | f9 b8 8d a1 12 ab 18 bd 5d d2 07 e9 49 25 8a fb Aug 26 13:26:36.804529: | 66 25 36 2e 41 7c a5 53 d4 0c 42 55 42 07 0e 30 Aug 26 13:26:36.804531: | 4c 0a 3c f0 ab c8 5c ab 4b 37 69 91 b2 85 b2 10 Aug 26 13:26:36.804532: | f4 40 6a b8 c4 a2 d4 32 ac 44 52 ee a8 bc 8d 4e Aug 26 13:26:36.804534: | 50 20 61 be c7 a9 3e 5b 2a 1f c3 bd c8 e6 3d b7 Aug 26 13:26:36.804536: | 4d 73 76 51 8d 96 d1 0a bc ee 04 d3 b4 af c8 f2 Aug 26 13:26:36.804537: | 57 c4 0e 09 60 c5 a0 72 16 48 f5 0c 2a 32 87 ad Aug 26 13:26:36.804539: | 95 6c 4c 1d d6 aa 6e 5a e8 5d 60 0f 07 d3 a7 31 Aug 26 13:26:36.804540: | 17 7a 96 33 3e 04 e1 89 82 b9 a1 a1 9a ca 28 6f Aug 26 13:26:36.804542: | d4 92 76 4f 1d 2d 1d 92 b8 60 b2 f8 06 81 0c 3f Aug 26 13:26:36.804544: | 0b fd 70 f8 3b 31 ac 03 ed b9 fe 7f ed 20 5f 15 Aug 26 13:26:36.804545: | 90 c6 5e b2 c4 af 9e 46 3e 63 6a 2e cc aa 6a 80 Aug 26 13:26:36.804547: | e7 81 02 3b e7 0a 43 34 6d a6 31 f7 1f e7 44 d4 Aug 26 13:26:36.804549: | fe b0 21 b9 67 01 21 2b 20 ee c2 8a d8 cf be 18 Aug 26 13:26:36.804550: | 08 2a 13 da ff 25 91 12 c7 aa 34 35 4e 82 d4 81 Aug 26 13:26:36.804552: | 33 93 64 f2 67 a7 77 40 ea ab 06 68 87 06 20 d6 Aug 26 13:26:36.804555: | 53 01 fc e9 f7 3d 01 b4 b6 e5 b4 b9 Aug 26 13:26:36.804559: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:26:36.804562: | **parse ISAKMP Message: Aug 26 13:26:36.804564: | initiator cookie: Aug 26 13:26:36.804566: | a8 18 47 73 a5 79 00 f2 Aug 26 13:26:36.804567: | responder cookie: Aug 26 13:26:36.804569: | 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.804571: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:26:36.804574: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:26:36.804581: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:26:36.804584: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:26:36.804588: | Message ID: 0 (0x0) Aug 26 13:26:36.804591: | length: 332 (0x14c) Aug 26 13:26:36.804594: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:26:36.804599: | State DB: found IKEv1 state #1 in MAIN_I3 (find_state_ikev1) Aug 26 13:26:36.804605: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) Aug 26 13:26:36.804608: | #1 is idle Aug 26 13:26:36.804611: | #1 idle Aug 26 13:26:36.804615: | received encrypted packet from 192.1.2.23:500 Aug 26 13:26:36.804633: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x220 opt: 0x20c0 Aug 26 13:26:36.804638: | ***parse ISAKMP Identification Payload: Aug 26 13:26:36.804641: | next payload type: ISAKMP_NEXT_SIG (0x9) Aug 26 13:26:36.804644: | length: 12 (0xc) Aug 26 13:26:36.804646: | ID type: ID_FQDN (0x2) Aug 26 13:26:36.804649: | DOI specific A: 0 (0x0) Aug 26 13:26:36.804652: | DOI specific B: 0 (0x0) Aug 26 13:26:36.804654: | obj: 65 61 73 74 Aug 26 13:26:36.804657: | got payload 0x200 (ISAKMP_NEXT_SIG) needed: 0x200 opt: 0x20c0 Aug 26 13:26:36.804660: | ***parse ISAKMP Signature Payload: Aug 26 13:26:36.804663: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.804665: | length: 278 (0x116) Aug 26 13:26:36.804668: | removing 14 bytes of padding Aug 26 13:26:36.804671: | message 'main_inR3' HASH payload not checked early Aug 26 13:26:36.804678: "xauth-road-eastnet" #1: Peer ID is ID_FQDN: '@east' Aug 26 13:26:36.804711: | X509: no CERT payloads to process Aug 26 13:26:36.804748: | required RSA CA is '%any' Aug 26 13:26:36.804753: | checking RSA keyid '@east' for match with '@east' Aug 26 13:26:36.804756: | key issuer CA is '%any' Aug 26 13:26:36.804813: | an RSA Sig check passed with *AQO9bJbr3 [preloaded key] Aug 26 13:26:36.804820: | #1 spent 0.059 milliseconds in try_all_RSA_keys() trying a pubkey Aug 26 13:26:36.804824: "xauth-road-eastnet" #1: Authenticated using RSA Aug 26 13:26:36.804842: | FOR_EACH_CONNECTION_... in ISAKMP_SA_established Aug 26 13:26:36.804915: | complete v1 state transition with STF_OK Aug 26 13:26:36.804926: | [RE]START processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:26:36.804929: | #1 is idle Aug 26 13:26:36.804933: | doing_xauth:yes, t_xauth_client_done:no Aug 26 13:26:36.804936: | IKEv1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 Aug 26 13:26:36.804939: | parent state #1: MAIN_I3(open IKE SA) => MAIN_I4(established IKE SA) Aug 26 13:26:36.804942: | event_already_set, deleting event Aug 26 13:26:36.804946: | state #1 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:26:36.804949: | #1 STATE_MAIN_I4: retransmits: cleared Aug 26 13:26:36.804953: | libevent_free: release ptr-libevent@0x563313feee58 Aug 26 13:26:36.804957: | free_event_entry: release EVENT_RETRANSMIT-pe@0x563313feede8 Aug 26 13:26:36.804960: | !event_already_set at reschedule Aug 26 13:26:36.804964: | event_schedule: new EVENT_SA_REPLACE-pe@0x563313feede8 Aug 26 13:26:36.804968: | inserting event EVENT_SA_REPLACE, timeout in 2607 seconds for #1 Aug 26 13:26:36.804972: | libevent_malloc: new ptr-libevent@0x7f2b8c000f48 size 128 Aug 26 13:26:36.804976: | pstats #1 ikev1.isakmp established Aug 26 13:26:36.804980: "xauth-road-eastnet" #1: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} Aug 26 13:26:36.805002: | DPD: dpd_init() called on ISAKMP SA Aug 26 13:26:36.805006: | DPD: Peer supports Dead Peer Detection Aug 26 13:26:36.805009: | DPD: not initializing DPD because DPD is disabled locally Aug 26 13:26:36.805012: | XAUTH client is not yet authenticated Aug 26 13:26:36.805017: | #1 spent 0.296 milliseconds in process_packet_tail() Aug 26 13:26:36.805023: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:26:36.805030: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:26:36.805034: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:26:36.805039: | spent 0.484 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:26:36.884965: | spent 0.0157 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:26:36.884993: | *received 92 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) Aug 26 13:26:36.884997: | a8 18 47 73 a5 79 00 f2 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.885000: | 08 10 06 01 53 72 d0 a0 00 00 00 5c b6 f5 89 6c Aug 26 13:26:36.885002: | 20 d5 6a dd 8c f3 b3 bd 3c 9b 44 ec 38 dc f8 a3 Aug 26 13:26:36.885005: | af 2a c0 be 62 e1 c4 42 c7 21 d1 c7 6e 8f 40 05 Aug 26 13:26:36.885007: | f8 ff f5 63 25 1e 18 6b eb 0d 21 3e c3 91 7a de Aug 26 13:26:36.885009: | b8 6d 81 f1 c7 9c 60 ad 27 19 33 98 Aug 26 13:26:36.885014: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:26:36.885019: | **parse ISAKMP Message: Aug 26 13:26:36.885022: | initiator cookie: Aug 26 13:26:36.885024: | a8 18 47 73 a5 79 00 f2 Aug 26 13:26:36.885026: | responder cookie: Aug 26 13:26:36.885029: | 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.885032: | next payload type: ISAKMP_NEXT_HASH (0x8) Aug 26 13:26:36.885035: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:26:36.885038: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6) Aug 26 13:26:36.885041: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:26:36.885044: | Message ID: 1400033440 (0x5372d0a0) Aug 26 13:26:36.885046: | length: 92 (0x5c) Aug 26 13:26:36.885050: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_MODE_CFG (6) Aug 26 13:26:36.885054: | peer and cookies match on #1; msgid=5372d0a0 st_msgid=00000000 st_msgid_phase15=00000000 Aug 26 13:26:36.885057: | State DB: IKEv1 state not found (find_v1_info_state) Aug 26 13:26:36.885060: | No appropriate Mode Config state yet. See if we have a Main Mode state Aug 26 13:26:36.885063: | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 Aug 26 13:26:36.885066: | p15 state object #1 found, in STATE_MAIN_I4 Aug 26 13:26:36.885069: | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) Aug 26 13:26:36.885074: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1678) Aug 26 13:26:36.885077: | processing received isakmp_xchg_type ISAKMP_XCHG_MODE_CFG. Aug 26 13:26:36.885079: | this is a xauthclient Aug 26 13:26:36.885081: | call init_phase2_iv Aug 26 13:26:36.885094: | set from_state to STATE_MAIN_I4 this is xauthclient and IS_PHASE1() is TRUE Aug 26 13:26:36.885096: | #1 is idle Aug 26 13:26:36.885097: | #1 idle Aug 26 13:26:36.885100: | received encrypted packet from 192.1.2.23:500 Aug 26 13:26:36.885108: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x4100 opt: 0x2000 Aug 26 13:26:36.885110: | ***parse ISAKMP Hash Payload: Aug 26 13:26:36.885112: | next payload type: ISAKMP_NEXT_MODECFG (0xe) Aug 26 13:26:36.885114: | length: 36 (0x24) Aug 26 13:26:36.885116: | got payload 0x4000 (ISAKMP_NEXT_MODECFG) needed: 0x4000 opt: 0x2000 Aug 26 13:26:36.885118: | ***parse ISAKMP Mode Attribute: Aug 26 13:26:36.885119: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.885121: | length: 16 (0x10) Aug 26 13:26:36.885123: | Attr Msg Type: ISAKMP_CFG_REQUEST (0x1) Aug 26 13:26:36.885126: | Identifier: 0 (0x0) Aug 26 13:26:36.885128: | removing 12 bytes of padding Aug 26 13:26:36.885144: | xauth_inI0 HASH(1): Aug 26 13:26:36.885146: | 9c 13 f7 c4 f2 f3 89 5d 3a 84 6d af 4a d1 49 aa Aug 26 13:26:36.885148: | fe db ce 07 f1 86 56 f2 79 fa 02 d3 82 8c 7b 14 Aug 26 13:26:36.885150: | received 'xauth_inI0' message HASH(1) data ok Aug 26 13:26:36.885154: | **emit ISAKMP Message: Aug 26 13:26:36.885157: | initiator cookie: Aug 26 13:26:36.885158: | a8 18 47 73 a5 79 00 f2 Aug 26 13:26:36.885160: | responder cookie: Aug 26 13:26:36.885161: | 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.885163: | next payload type: ISAKMP_NEXT_HASH (0x8) Aug 26 13:26:36.885164: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:26:36.885166: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6) Aug 26 13:26:36.885168: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:26:36.885169: | Message ID: 1400033440 (0x5372d0a0) Aug 26 13:26:36.885171: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:26:36.885173: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 8:ISAKMP_NEXT_HASH Aug 26 13:26:36.885175: | arrived in xauth_inI0 Aug 26 13:26:36.885177: | ****parse ISAKMP ModeCfg attribute: Aug 26 13:26:36.885179: | ModeCfg attr type: XAUTH-USER-NAME (0x4089) Aug 26 13:26:36.885180: | length/value: 0 (0x0) Aug 26 13:26:36.885182: | Received Cisco XAUTH username Aug 26 13:26:36.885184: | ****parse ISAKMP ModeCfg attribute: Aug 26 13:26:36.885185: | ModeCfg attr type: XAUTH-USER-PASSWORD (0x408a) Aug 26 13:26:36.885187: | length/value: 0 (0x0) Aug 26 13:26:36.885188: | Received Cisco XAUTH password Aug 26 13:26:36.885190: | XAUTH: Username or password request received Aug 26 13:26:36.885192: | ***emit ISAKMP Hash Payload: Aug 26 13:26:36.885193: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.885195: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:26:36.885197: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' Aug 26 13:26:36.885199: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:26:36.885201: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:26:36.885203: | ***emit ISAKMP Mode Attribute: Aug 26 13:26:36.885204: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:26:36.885206: | Attr Msg Type: ISAKMP_CFG_REPLY (0x2) Aug 26 13:26:36.885208: | Identifier: 0 (0x0) Aug 26 13:26:36.885210: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Mode Attribute (14:ISAKMP_NEXT_MODECFG) Aug 26 13:26:36.885211: | next payload chain: saving location 'ISAKMP Mode Attribute'.'next payload type' in 'reply packet' Aug 26 13:26:36.885213: | ****emit ISAKMP ModeCfg attribute: Aug 26 13:26:36.885215: | ModeCfg attr type: XAUTH-USER-NAME (0x4089) Aug 26 13:26:36.885217: | prompting for Username: Aug 26 13:26:36.885711: | emitting 10 raw bytes of XAUTH username into ISAKMP ModeCfg attribute Aug 26 13:26:36.885721: | XAUTH username 67 6f 6f 64 75 73 65 72 39 30 Aug 26 13:26:36.885724: | emitting length of ISAKMP ModeCfg attribute: 10 Aug 26 13:26:36.885726: | ****emit ISAKMP ModeCfg attribute: Aug 26 13:26:36.885728: | ModeCfg attr type: XAUTH-USER-PASSWORD (0x408a) Aug 26 13:26:36.885730: | started looking for xauth secret for gooduser90 Aug 26 13:26:36.885733: | line 1: key type PKK_XAUTH(@gooduser90) to type PKK_RSA Aug 26 13:26:36.885735: | concluding with best_match=000 best=(nil) (lineno=-1) Aug 26 13:26:36.885737: | looked up username=gooduser90, got=(nil) Aug 26 13:26:36.885738: | prompting for Password: Aug 26 13:26:36.885767: | emitting 8 raw bytes of XAUTH password into ISAKMP ModeCfg attribute Aug 26 13:26:36.885786: | XAUTH password 75 73 65 31 70 61 73 73 Aug 26 13:26:36.885788: | emitting length of ISAKMP ModeCfg attribute: 8 Aug 26 13:26:36.885792: | emitting length of ISAKMP Mode Attribute: 34 Aug 26 13:26:36.885794: "xauth-road-eastnet" #1: XAUTH: Answering XAUTH challenge with user='gooduser90' Aug 26 13:26:36.885816: | XAUTH: client response HASH(1): Aug 26 13:26:36.885819: | 9c d4 9f f3 70 22 fa b3 5e 29 80 7b ab 14 33 f0 Aug 26 13:26:36.885820: | be cb 1d b0 04 21 90 12 78 ef 1c 36 c0 ff 92 4d Aug 26 13:26:36.885822: | padding IKEv1 message with 2 bytes Aug 26 13:26:36.885824: | emitting 2 zero bytes of message padding into ISAKMP Message Aug 26 13:26:36.885826: | emitting length of ISAKMP Message: 100 Aug 26 13:26:36.885828: | emitting 8 zero bytes of encryption padding into ISAKMP Message Aug 26 13:26:36.885830: | no IKEv1 message padding required Aug 26 13:26:36.885831: | emitting length of ISAKMP Message: 108 Aug 26 13:26:36.885837: | xauth_inI0(STF_OK) Aug 26 13:26:36.885840: | complete v1 state transition with STF_OK Aug 26 13:26:36.885843: | [RE]START processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:26:36.885845: | #1 is idle Aug 26 13:26:36.885847: | doing_xauth:yes, t_xauth_client_done:no Aug 26 13:26:36.885849: | IKEv1: transition from state STATE_XAUTH_I0 to state STATE_XAUTH_I1 Aug 26 13:26:36.885851: | parent state #1: MAIN_I4(established IKE SA) => XAUTH_I1(established IKE SA) Aug 26 13:26:36.885853: | event_already_set, deleting event Aug 26 13:26:36.885855: | state #1 requesting EVENT_SA_REPLACE to be deleted Aug 26 13:26:36.885859: | libevent_free: release ptr-libevent@0x7f2b8c000f48 Aug 26 13:26:36.885861: | free_event_entry: release EVENT_SA_REPLACE-pe@0x563313feede8 Aug 26 13:26:36.885865: | sending reply packet to 192.1.2.23:500 (from 192.1.3.209:500) Aug 26 13:26:36.885870: | sending 108 bytes for STATE_XAUTH_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 13:26:36.885872: | a8 18 47 73 a5 79 00 f2 6d 79 1b 35 fb 25 5b 6f Aug 26 13:26:36.885873: | 08 10 06 01 53 72 d0 a0 00 00 00 6c b7 a9 aa f4 Aug 26 13:26:36.885875: | bf 84 b5 c5 90 2c 6f 1d 63 90 91 ba 9e 0a aa 2a Aug 26 13:26:36.885876: | 61 ee 99 5e 48 b0 f8 0d 05 65 12 02 40 42 6f 88 Aug 26 13:26:36.885878: | 19 a2 a3 b4 17 9a 08 fc be ab 61 d7 91 db 18 08 Aug 26 13:26:36.885879: | 0a 1e d7 5e 34 d7 8b a4 6c ee fb 87 b0 8d 0b 1d Aug 26 13:26:36.885881: | d8 17 53 32 3a 34 cf 49 c9 f4 00 76 Aug 26 13:26:36.885914: | !event_already_set at reschedule Aug 26 13:26:36.885919: | event_schedule: new EVENT_RETRANSMIT-pe@0x563313feede8 Aug 26 13:26:36.885922: | inserting event EVENT_RETRANSMIT, timeout in 25 seconds for #1 Aug 26 13:26:36.885924: | libevent_malloc: new ptr-libevent@0x563313feee58 size 128 Aug 26 13:26:36.885927: | #1 STATE_XAUTH_I1: retransmits: first event in 25 seconds; timeout in 107 seconds; limit of 12 retransmits; current time is 11282.628385 Aug 26 13:26:36.885929: | pstats #1 ikev1.isakmp established Aug 26 13:26:36.885933: "xauth-road-eastnet" #1: STATE_XAUTH_I1: XAUTH client - possibly awaiting CFG_set {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} Aug 26 13:26:36.885938: | DPD: dpd_init() called on ISAKMP SA Aug 26 13:26:36.885939: | DPD: Peer supports Dead Peer Detection Aug 26 13:26:36.885941: | DPD: not initializing DPD because DPD is disabled locally Aug 26 13:26:36.885942: | XAUTH client is not yet authenticated Aug 26 13:26:36.885948: | #1 spent 0.318 milliseconds in process_packet_tail() Aug 26 13:26:36.885952: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:26:36.885955: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:26:36.885957: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:26:36.885960: | spent 0.504 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:26:56.544334: | processing global timer EVENT_SHUNT_SCAN Aug 26 13:26:56.544351: | expiring aged bare shunts from shunt table Aug 26 13:26:56.544362: | spent 0.00954 milliseconds in global timer EVENT_SHUNT_SCAN Aug 26 13:26:56.791631: | processing global timer EVENT_NAT_T_KEEPALIVE Aug 26 13:26:56.791652: | FOR_EACH_STATE_... in nat_traversal_ka_event (for_each_state) Aug 26 13:26:56.791661: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in for_each_state() at state.c:1575) Aug 26 13:26:56.791664: | not behind NAT: no NAT-T KEEP-ALIVE required for conn xauth-road-eastnet Aug 26 13:26:56.791669: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in for_each_state() at state.c:1577) Aug 26 13:26:56.791676: | spent 0.0213 milliseconds in global timer EVENT_NAT_T_KEEPALIVE Aug 26 13:27:01.889324: | timer_event_cb: processing event@0x563313feede8 Aug 26 13:27:01.889337: | handling event EVENT_RETRANSMIT for parent state #1 Aug 26 13:27:01.889343: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:27:01.889346: | IKEv1 retransmit event Aug 26 13:27:01.889350: | [RE]START processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61) Aug 26 13:27:01.889353: | handling event EVENT_RETRANSMIT for 192.1.2.23 "xauth-road-eastnet" #1 keying attempt 1 of 0; retransmit 1 Aug 26 13:27:01.889358: | retransmits: current time 11307.631823; retransmit count 0 exceeds limit? NO; deltatime 25 exceeds limit? NO; monotime 25.003438 exceeds limit? NO Aug 26 13:27:01.889361: | event_schedule: new EVENT_RETRANSMIT-pe@0x7f2b94002b78 Aug 26 13:27:01.889364: | inserting event EVENT_RETRANSMIT, timeout in 25 seconds for #1 Aug 26 13:27:01.889366: | libevent_malloc: new ptr-libevent@0x563313fef5e8 size 128 Aug 26 13:27:01.889370: "xauth-road-eastnet" #1: STATE_XAUTH_I1: retransmission; will wait 25 seconds for response Aug 26 13:27:01.889383: | sending 108 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 13:27:01.889386: | a8 18 47 73 a5 79 00 f2 6d 79 1b 35 fb 25 5b 6f Aug 26 13:27:01.889387: | 08 10 06 01 53 72 d0 a0 00 00 00 6c b7 a9 aa f4 Aug 26 13:27:01.889389: | bf 84 b5 c5 90 2c 6f 1d 63 90 91 ba 9e 0a aa 2a Aug 26 13:27:01.889390: | 61 ee 99 5e 48 b0 f8 0d 05 65 12 02 40 42 6f 88 Aug 26 13:27:01.889392: | 19 a2 a3 b4 17 9a 08 fc be ab 61 d7 91 db 18 08 Aug 26 13:27:01.889393: | 0a 1e d7 5e 34 d7 8b a4 6c ee fb 87 b0 8d 0b 1d Aug 26 13:27:01.889395: | d8 17 53 32 3a 34 cf 49 c9 f4 00 76 Aug 26 13:27:01.889704: | libevent_free: release ptr-libevent@0x563313feee58 Aug 26 13:27:01.889708: | free_event_entry: release EVENT_RETRANSMIT-pe@0x563313feede8 Aug 26 13:27:01.889715: | #1 spent 0.363 milliseconds in timer_event_cb() EVENT_RETRANSMIT Aug 26 13:27:01.889719: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in timer_event_cb() at timer.c:557)