FIPS Product: YES
FIPS Kernel: NO
FIPS Mode: NO
NSS DB directory: sql:/etc/ipsec.d
Initializing NSS
Opening NSS database "sql:/etc/ipsec.d" read-only
NSS initialized
NSS crypto library initialized
FIPS HMAC integrity support [enabled]
FIPS mode disabled for pluto daemon
FIPS HMAC integrity verification self-test FAILED
libcap-ng support [enabled]
Linux audit support [enabled]
Linux audit activated
Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:22783
core dump dir: /tmp
secrets file: /etc/ipsec.secrets
leak-detective enabled
NSS crypto [enabled]
XAUTH PAM support [enabled]
| libevent is using pluto's memory allocator
Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800)
| libevent_malloc: new ptr-libevent@0x55ffe56dfba8 size 40
| libevent_malloc: new ptr-libevent@0x55ffe56dfcd8 size 40
| libevent_malloc: new ptr-libevent@0x55ffe56dfdd8 size 40
| creating event base
| libevent_malloc: new ptr-libevent@0x55ffe5764458 size 56
| libevent_malloc: new ptr-libevent@0x55ffe5708cb8 size 664
| libevent_malloc: new ptr-libevent@0x55ffe57644c8 size 24
| libevent_malloc: new ptr-libevent@0x55ffe5764518 size 384
| libevent_malloc: new ptr-libevent@0x55ffe5764418 size 16
| libevent_malloc: new ptr-libevent@0x55ffe56df908 size 40
| libevent_malloc: new ptr-libevent@0x55ffe56dfd38 size 48
| libevent_realloc: new ptr-libevent@0x55ffe570a3f8 size 256
| libevent_malloc: new ptr-libevent@0x55ffe57646c8 size 16
| libevent_free: release ptr-libevent@0x55ffe5764458
| libevent initialized
| libevent_realloc: new ptr-libevent@0x55ffe5764458 size 64
| global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds
| init_nat_traversal() initialized with keep_alive=0s
NAT-Traversal support  [enabled]
| global one-shot timer EVENT_NAT_T_KEEPALIVE initialized
| global one-shot timer EVENT_FREE_ROOT_CERTS initialized
| global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds
| global one-shot timer EVENT_REVIVE_CONNS initialized
| global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds
| global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds
Encryption algorithms:
  AES_CCM_16              IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm, aes_ccm_c
  AES_CCM_12              IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm_b
  AES_CCM_8               IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm_a
  3DES_CBC                IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  [*192]  3des
  CAMELLIA_CTR            IKEv1:     ESP     IKEv2:     ESP           {256,192,*128}
  CAMELLIA_CBC            IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  camellia
  AES_GCM_16              IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm, aes_gcm_c
  AES_GCM_12              IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm_b
  AES_GCM_8               IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm_a
  AES_CTR                 IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aesctr
  AES_CBC                 IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes
  SERPENT_CBC             IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  serpent
  TWOFISH_CBC             IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  twofish
  TWOFISH_SSH             IKEv1: IKE         IKEv2: IKE ESP           {256,192,*128}  twofish_cbc_ssh
  NULL_AUTH_AES_GMAC      IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_gmac
  NULL                    IKEv1:     ESP     IKEv2:     ESP           []
  CHACHA20_POLY1305       IKEv1:             IKEv2: IKE ESP           [*256]  chacha20poly1305
Hash algorithms:
  MD5                     IKEv1: IKE         IKEv2:                 
  SHA1                    IKEv1: IKE         IKEv2:             FIPS  sha
  SHA2_256                IKEv1: IKE         IKEv2:             FIPS  sha2, sha256
  SHA2_384                IKEv1: IKE         IKEv2:             FIPS  sha384
  SHA2_512                IKEv1: IKE         IKEv2:             FIPS  sha512
PRF algorithms:
  HMAC_MD5                IKEv1: IKE         IKEv2: IKE               md5
  HMAC_SHA1               IKEv1: IKE         IKEv2: IKE         FIPS  sha, sha1
  HMAC_SHA2_256           IKEv1: IKE         IKEv2: IKE         FIPS  sha2, sha256, sha2_256
  HMAC_SHA2_384           IKEv1: IKE         IKEv2: IKE         FIPS  sha384, sha2_384
  HMAC_SHA2_512           IKEv1: IKE         IKEv2: IKE         FIPS  sha512, sha2_512
  AES_XCBC                IKEv1:             IKEv2: IKE               aes128_xcbc
Integrity algorithms:
  HMAC_MD5_96             IKEv1: IKE ESP AH  IKEv2: IKE ESP AH        md5, hmac_md5
  HMAC_SHA1_96            IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha, sha1, sha1_96, hmac_sha1
  HMAC_SHA2_512_256       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha512, sha2_512, sha2_512_256, hmac_sha2_512
  HMAC_SHA2_384_192       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha384, sha2_384, sha2_384_192, hmac_sha2_384
  HMAC_SHA2_256_128       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256
  HMAC_SHA2_256_TRUNCBUG  IKEv1:     ESP AH  IKEv2:         AH      
  AES_XCBC_96             IKEv1:     ESP AH  IKEv2: IKE ESP AH        aes_xcbc, aes128_xcbc, aes128_xcbc_96
  AES_CMAC_96             IKEv1:     ESP AH  IKEv2:     ESP AH  FIPS  aes_cmac
  NONE                    IKEv1:     ESP     IKEv2: IKE ESP     FIPS  null
DH algorithms:
  NONE                    IKEv1:             IKEv2: IKE ESP AH  FIPS  null, dh0
  MODP1536                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH        dh5
  MODP2048                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh14
  MODP3072                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh15
  MODP4096                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh16
  MODP6144                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh17
  MODP8192                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh18
  DH19                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_256, ecp256
  DH20                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_384, ecp384
  DH21                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_521, ecp521
  DH31                    IKEv1: IKE         IKEv2: IKE ESP AH        curve25519
testing CAMELLIA_CBC:
  Camellia: 16 bytes with 128-bit key
  Camellia: 16 bytes with 128-bit key
  Camellia: 16 bytes with 256-bit key
  Camellia: 16 bytes with 256-bit key
testing AES_GCM_16:
  empty string
  one block
  two blocks
  two blocks with associated data
testing AES_CTR:
  Encrypting 16 octets using AES-CTR with 128-bit key
  Encrypting 32 octets using AES-CTR with 128-bit key
  Encrypting 36 octets using AES-CTR with 128-bit key
  Encrypting 16 octets using AES-CTR with 192-bit key
  Encrypting 32 octets using AES-CTR with 192-bit key
  Encrypting 36 octets using AES-CTR with 192-bit key
  Encrypting 16 octets using AES-CTR with 256-bit key
  Encrypting 32 octets using AES-CTR with 256-bit key
  Encrypting 36 octets using AES-CTR with 256-bit key
testing AES_CBC:
  Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key
  Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key
  Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key
  Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key
testing AES_XCBC:
  RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input
  RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input
  RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input
  RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input
  RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input
  RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input
  RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input
  RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16)
  RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10)
  RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18)
testing HMAC_MD5:
  RFC 2104: MD5_HMAC test 1
  RFC 2104: MD5_HMAC test 2
  RFC 2104: MD5_HMAC test 3
8 CPU cores online
starting up 7 crypto helpers
started thread for crypto helper 0
started thread for crypto helper 1
| starting up helper thread 1
| starting up helper thread 0
| status value returned by setting the priority of this thread (crypto helper 1) 22
| status value returned by setting the priority of this thread (crypto helper 0) 22
| crypto helper 0 waiting (nothing to do)
started thread for crypto helper 2
started thread for crypto helper 3
| starting up helper thread 3
| status value returned by setting the priority of this thread (crypto helper 3) 22
| crypto helper 3 waiting (nothing to do)
started thread for crypto helper 4
| starting up helper thread 4
| status value returned by setting the priority of this thread (crypto helper 4) 22
| crypto helper 4 waiting (nothing to do)
started thread for crypto helper 5
| starting up helper thread 5
| status value returned by setting the priority of this thread (crypto helper 5) 22
| crypto helper 5 waiting (nothing to do)
started thread for crypto helper 6
| starting up helper thread 6
| status value returned by setting the priority of this thread (crypto helper 6) 22
| crypto helper 6 waiting (nothing to do)
| checking IKEv1 state table
|   MAIN_R0: category: half-open IKE SA flags: 0:
|     -> MAIN_R1 EVENT_SO_DISCARD
|   MAIN_I1: category: half-open IKE SA flags: 0:
|     -> MAIN_I2 EVENT_RETRANSMIT
|   MAIN_R1: category: open IKE SA flags: 200:
|     -> MAIN_R2 EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
|   MAIN_I2: category: open IKE SA flags: 0:
|     -> MAIN_I3 EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
|   MAIN_R2: category: open IKE SA flags: 0:
|     -> MAIN_R3 EVENT_SA_REPLACE
|     -> MAIN_R3 EVENT_SA_REPLACE
|     -> UNDEFINED EVENT_SA_REPLACE
|   MAIN_I3: category: open IKE SA flags: 0:
|     -> MAIN_I4 EVENT_SA_REPLACE
|     -> MAIN_I4 EVENT_SA_REPLACE
|     -> UNDEFINED EVENT_SA_REPLACE
|   MAIN_R3: category: established IKE SA flags: 200:
|     -> UNDEFINED EVENT_NULL
|   MAIN_I4: category: established IKE SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   AGGR_R0: category: half-open IKE SA flags: 0:
|     -> AGGR_R1 EVENT_SO_DISCARD
|   AGGR_I1: category: half-open IKE SA flags: 0:
|     -> AGGR_I2 EVENT_SA_REPLACE
|     -> AGGR_I2 EVENT_SA_REPLACE
|   AGGR_R1: category: open IKE SA flags: 200:
|     -> AGGR_R2 EVENT_SA_REPLACE
|     -> AGGR_R2 EVENT_SA_REPLACE
|   AGGR_I2: category: established IKE SA flags: 200:
|     -> UNDEFINED EVENT_NULL
|   AGGR_R2: category: established IKE SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   QUICK_R0: category: established CHILD SA flags: 0:
|     -> QUICK_R1 EVENT_RETRANSMIT
|   QUICK_I1: category: established CHILD SA flags: 0:
|     -> QUICK_I2 EVENT_SA_REPLACE
|   QUICK_R1: category: established CHILD SA flags: 0:
|     -> QUICK_R2 EVENT_SA_REPLACE
|   QUICK_I2: category: established CHILD SA flags: 200:
|     -> UNDEFINED EVENT_NULL
|   QUICK_R2: category: established CHILD SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   INFO: category: informational flags: 0:
|     -> UNDEFINED EVENT_NULL
|   INFO_PROTECTED: category: informational flags: 0:
|     -> UNDEFINED EVENT_NULL
|   XAUTH_R0: category: established IKE SA flags: 0:
|     -> XAUTH_R1 EVENT_NULL
|   XAUTH_R1: category: established IKE SA flags: 0:
|     -> MAIN_R3 EVENT_SA_REPLACE
|   MODE_CFG_R0: category: informational flags: 0:
|     -> MODE_CFG_R1 EVENT_SA_REPLACE
|   MODE_CFG_R1: category: established IKE SA flags: 0:
|     -> MODE_CFG_R2 EVENT_SA_REPLACE
|   MODE_CFG_R2: category: established IKE SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   MODE_CFG_I1: category: established IKE SA flags: 0:
|     -> MAIN_I4 EVENT_SA_REPLACE
|   XAUTH_I0: category: established IKE SA flags: 0:
|     -> XAUTH_I1 EVENT_RETRANSMIT
|   XAUTH_I1: category: established IKE SA flags: 0:
|     -> MAIN_I4 EVENT_RETRANSMIT
| checking IKEv2 state table
|   PARENT_I0: category: ignore flags: 0:
|     -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT)
|   PARENT_I1: category: half-open IKE SA flags: 0:
|     -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification)
|     -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH)
|   PARENT_I2: category: open IKE SA flags: 0:
|     -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification)
|     -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification)
|     -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification)
|     -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response)
|     -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification)
|   PARENT_I3: category: established IKE SA flags: 0:
|     -> PARENT_I3 EVENT_RETAIN (I3: Informational Request)
|     -> PARENT_I3 EVENT_RETAIN (I3: Informational Response)
|     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request)
|     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response)
|   PARENT_R0: category: half-open IKE SA flags: 0:
|     -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT)
|   PARENT_R1: category: half-open IKE SA flags: 0:
|     -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED))
|     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request)
|   PARENT_R2: category: established IKE SA flags: 0:
|     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request)
|     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response)
|     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request)
|     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response)
|   V2_CREATE_I0: category: established IKE SA flags: 0:
|     -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA)
|   V2_CREATE_I: category: established IKE SA flags: 0:
|     -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response)
|   V2_REKEY_IKE_I0: category: established IKE SA flags: 0:
|     -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey)
|   V2_REKEY_IKE_I: category: established IKE SA flags: 0:
|     -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response)
|   V2_REKEY_CHILD_I0: category: established IKE SA flags: 0:
|     -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA)
|   V2_REKEY_CHILD_I: category: established IKE SA flags: 0: <none>
|   V2_CREATE_R: category: established IKE SA flags: 0:
|     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request)
|   V2_REKEY_IKE_R: category: established IKE SA flags: 0:
|     -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey)
|   V2_REKEY_CHILD_R: category: established IKE SA flags: 0: <none>
|   V2_IPSEC_I: category: established CHILD SA flags: 0: <none>
|   V2_IPSEC_R: category: established CHILD SA flags: 0: <none>
|   IKESA_DEL: category: established IKE SA flags: 0:
|     -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL)
|   CHILDSA_DEL: category: informational flags: 0: <none>
Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64
| starting up helper thread 2
| status value returned by setting the priority of this thread (crypto helper 2) 22
| crypto helper 2 waiting (nothing to do)
| Hard-wiring algorithms
| adding AES_CCM_16 to kernel algorithm db
| adding AES_CCM_12 to kernel algorithm db
| adding AES_CCM_8 to kernel algorithm db
| adding 3DES_CBC to kernel algorithm db
| adding CAMELLIA_CBC to kernel algorithm db
| adding AES_GCM_16 to kernel algorithm db
| adding AES_GCM_12 to kernel algorithm db
| adding AES_GCM_8 to kernel algorithm db
| adding AES_CTR to kernel algorithm db
| adding AES_CBC to kernel algorithm db
| adding SERPENT_CBC to kernel algorithm db
| adding TWOFISH_CBC to kernel algorithm db
| adding NULL_AUTH_AES_GMAC to kernel algorithm db
| adding NULL to kernel algorithm db
| adding CHACHA20_POLY1305 to kernel algorithm db
| adding HMAC_MD5_96 to kernel algorithm db
| adding HMAC_SHA1_96 to kernel algorithm db
| adding HMAC_SHA2_512_256 to kernel algorithm db
| adding HMAC_SHA2_384_192 to kernel algorithm db
| adding HMAC_SHA2_256_128 to kernel algorithm db
| adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db
| adding AES_XCBC_96 to kernel algorithm db
| adding AES_CMAC_96 to kernel algorithm db
| adding NONE to kernel algorithm db
| net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes
| global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds
| setup kernel fd callback
| add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x55ffe5769128
| libevent_malloc: new ptr-libevent@0x55ffe574d4f8 size 128
| libevent_malloc: new ptr-libevent@0x55ffe5769238 size 16
| add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x55ffe5769c68
| libevent_malloc: new ptr-libevent@0x55ffe570bbb8 size 128
| libevent_malloc: new ptr-libevent@0x55ffe5769c28 size 16
| global one-shot timer EVENT_CHECK_CRLS initialized
selinux support is enabled.
| crypto helper 1 waiting (nothing to do)
| unbound context created - setting debug level to 5
| /etc/hosts lookups activated
| /etc/resolv.conf usage activated
| outgoing-port-avoid set 0-65535
| outgoing-port-permit set 32768-60999
| Loading dnssec root key from:/var/lib/unbound/root.key
| No additional dnssec trust anchors defined via dnssec-trusted= option
| Setting up events, loop start
| add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x55ffe5769cd8
| libevent_malloc: new ptr-libevent@0x55ffe5775ee8 size 128
| libevent_malloc: new ptr-libevent@0x55ffe57811b8 size 16
| libevent_realloc: new ptr-libevent@0x55ffe5708948 size 256
| libevent_malloc: new ptr-libevent@0x55ffe57811f8 size 8
| libevent_realloc: new ptr-libevent@0x55ffe5781238 size 144
| libevent_malloc: new ptr-libevent@0x55ffe5709818 size 152
| libevent_malloc: new ptr-libevent@0x55ffe57812f8 size 16
| signal event handler PLUTO_SIGCHLD installed
| libevent_malloc: new ptr-libevent@0x55ffe5781338 size 8
| libevent_malloc: new ptr-libevent@0x55ffe5714808 size 152
| signal event handler PLUTO_SIGTERM installed
| libevent_malloc: new ptr-libevent@0x55ffe5781378 size 8
| libevent_malloc: new ptr-libevent@0x55ffe570c638 size 152
| signal event handler PLUTO_SIGHUP installed
| libevent_malloc: new ptr-libevent@0x55ffe57813b8 size 8
| libevent_realloc: release ptr-libevent@0x55ffe5781238
| libevent_realloc: new ptr-libevent@0x55ffe57813f8 size 256
| libevent_malloc: new ptr-libevent@0x55ffe5781528 size 152
| signal event handler PLUTO_SIGSYS installed
| created addconn helper (pid:23021) using fork+execve
| forked child 23021
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
listening for IKE messages
| Inspecting interface lo 
| found lo with address 127.0.0.1
| Inspecting interface eth0 
| found eth0 with address 192.0.1.254
| Inspecting interface eth1 
| found eth1 with address 192.1.2.45
Kernel supports NIC esp-hw-offload
adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.45:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
adding interface eth1/eth1 192.1.2.45:4500
adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.1.254:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
adding interface eth0/eth0 192.0.1.254:4500
adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
adding interface lo/lo 127.0.0.1:4500
| no interfaces to sort
| FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
| add_fd_read_event_handler: new ethX-pe@0x55ffe5781928
| libevent_malloc: new ptr-libevent@0x55ffe5775e38 size 128
| libevent_malloc: new ptr-libevent@0x55ffe5781998 size 16
| setup callback for interface lo 127.0.0.1:4500 fd 22
| add_fd_read_event_handler: new ethX-pe@0x55ffe57819d8
| libevent_malloc: new ptr-libevent@0x55ffe570b8a8 size 128
| libevent_malloc: new ptr-libevent@0x55ffe5781a48 size 16
| setup callback for interface lo 127.0.0.1:500 fd 21
| add_fd_read_event_handler: new ethX-pe@0x55ffe5781a88
| libevent_malloc: new ptr-libevent@0x55ffe570c328 size 128
| libevent_malloc: new ptr-libevent@0x55ffe5781af8 size 16
| setup callback for interface eth0 192.0.1.254:4500 fd 20
| add_fd_read_event_handler: new ethX-pe@0x55ffe5781b38
| libevent_malloc: new ptr-libevent@0x55ffe570c568 size 128
| libevent_malloc: new ptr-libevent@0x55ffe5781ba8 size 16
| setup callback for interface eth0 192.0.1.254:500 fd 19
| add_fd_read_event_handler: new ethX-pe@0x55ffe5781be8
| libevent_malloc: new ptr-libevent@0x55ffe56e04e8 size 128
| libevent_malloc: new ptr-libevent@0x55ffe5781c58 size 16
| setup callback for interface eth1 192.1.2.45:4500 fd 18
| add_fd_read_event_handler: new ethX-pe@0x55ffe5781c98
| libevent_malloc: new ptr-libevent@0x55ffe56e01d8 size 128
| libevent_malloc: new ptr-libevent@0x55ffe5781d08 size 16
| setup callback for interface eth1 192.1.2.45:500 fd 17
| certs and keys locked by 'free_preshared_secrets'
| certs and keys unlocked by 'free_preshared_secrets'
loading secrets from "/etc/ipsec.secrets"
| saving Modulus
| saving PublicExponent
| ignoring PrivateExponent
| ignoring Prime1
| ignoring Prime2
| ignoring Exponent1
| ignoring Exponent2
| ignoring Coefficient
| ignoring CKAIDNSS
| computed rsa CKAID  b4 9f 1a ac  9e 45 6e 79  29 c8 81 97  3a 0c 6a d3
| computed rsa CKAID  7f 0f 03 50
loaded private key for keyid: PKK_RSA:AQOm9dY/4
| certs and keys locked by 'process_secret'
| certs and keys unlocked by 'process_secret'
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 1 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
listening for IKE messages
| Inspecting interface lo 
| found lo with address 127.0.0.1
| Inspecting interface eth0 
| found eth0 with address 192.0.1.254
| Inspecting interface eth1 
| found eth1 with address 192.1.2.45
| no interfaces to sort
| libevent_free: release ptr-libevent@0x55ffe5775e38
| free_event_entry: release EVENT_NULL-pe@0x55ffe5781928
| add_fd_read_event_handler: new ethX-pe@0x55ffe5781928
| libevent_malloc: new ptr-libevent@0x55ffe5775e38 size 128
| setup callback for interface lo 127.0.0.1:4500 fd 22
| libevent_free: release ptr-libevent@0x55ffe570b8a8
| free_event_entry: release EVENT_NULL-pe@0x55ffe57819d8
| add_fd_read_event_handler: new ethX-pe@0x55ffe57819d8
| libevent_malloc: new ptr-libevent@0x55ffe570b8a8 size 128
| setup callback for interface lo 127.0.0.1:500 fd 21
| libevent_free: release ptr-libevent@0x55ffe570c328
| free_event_entry: release EVENT_NULL-pe@0x55ffe5781a88
| add_fd_read_event_handler: new ethX-pe@0x55ffe5781a88
| libevent_malloc: new ptr-libevent@0x55ffe570c328 size 128
| setup callback for interface eth0 192.0.1.254:4500 fd 20
| libevent_free: release ptr-libevent@0x55ffe570c568
| free_event_entry: release EVENT_NULL-pe@0x55ffe5781b38
| add_fd_read_event_handler: new ethX-pe@0x55ffe5781b38
| libevent_malloc: new ptr-libevent@0x55ffe570c568 size 128
| setup callback for interface eth0 192.0.1.254:500 fd 19
| libevent_free: release ptr-libevent@0x55ffe56e04e8
| free_event_entry: release EVENT_NULL-pe@0x55ffe5781be8
| add_fd_read_event_handler: new ethX-pe@0x55ffe5781be8
| libevent_malloc: new ptr-libevent@0x55ffe56e04e8 size 128
| setup callback for interface eth1 192.1.2.45:4500 fd 18
| libevent_free: release ptr-libevent@0x55ffe56e01d8
| free_event_entry: release EVENT_NULL-pe@0x55ffe5781c98
| add_fd_read_event_handler: new ethX-pe@0x55ffe5781c98
| libevent_malloc: new ptr-libevent@0x55ffe56e01d8 size 128
| setup callback for interface eth1 192.1.2.45:500 fd 17
| certs and keys locked by 'free_preshared_secrets'
forgetting secrets
| certs and keys unlocked by 'free_preshared_secrets'
loading secrets from "/etc/ipsec.secrets"
| saving Modulus
| saving PublicExponent
| ignoring PrivateExponent
| ignoring Prime1
| ignoring Prime2
| ignoring Exponent1
| ignoring Exponent2
| ignoring Coefficient
| ignoring CKAIDNSS
| computed rsa CKAID  b4 9f 1a ac  9e 45 6e 79  29 c8 81 97  3a 0c 6a d3
| computed rsa CKAID  7f 0f 03 50
loaded private key for keyid: PKK_RSA:AQOm9dY/4
| certs and keys locked by 'process_secret'
| certs and keys unlocked by 'process_secret'
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.373 milliseconds in whack
| processing signal PLUTO_SIGCHLD
| waitpid returned pid 23021 (exited with status 0)
| reaped addconn helper child (status 0)
| waitpid returned ECHILD (no child processes left)
| spent 0.0154 milliseconds in signal handler PLUTO_SIGCHLD
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| Added new connection westnet-eastnet-ah with policy AUTHENTICATE+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
| No AUTH policy was set - defaulting to RSASIG
| from whack: got --esp=aes_xcbc
| ESP/AH string values: AES_XCBC_96
| counting wild cards for @west is 0
| counting wild cards for @east is 0
| connect_to_host_pair: 192.1.2.45:500 192.1.2.23:500 -> hp@(nil): none
| new hp@0x55ffe5782dd8
added connection description "westnet-eastnet-ah"
| ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+AUTHENTICATE+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
| 192.0.1.0/24===192.1.2.45<192.1.2.45>[@west]...192.1.2.23<192.1.2.23>[@east]===192.0.2.0/24
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.136 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
add keyid @west
| add pubkey  01 03 a6 f5  d6 3f e3 8f  6c 01 6a fc  7b 7c 6d 57
| add pubkey  8b 49 39 0d  77 f7 ac e2  85 f1 98 1e  4b 6d a5 3e
| add pubkey  b3 96 9a d1  99 5a bc 10  f2 97 de f2  28 f9 5f 92
| add pubkey  09 f0 c8 d4  12 e4 60 6e  9c 60 98 10  01 7d 26 b7
| add pubkey  8f 95 62 2d  87 dd cd de  f6 d3 8f 35  b0 50 d0 18
| add pubkey  f5 99 f8 04  f1 ff 61 5b  bc 7f 1f c0  04 d8 e4 8c
| add pubkey  ac 34 ad 7a  c1 da 3c 2d  8c 30 ae d6  3c 59 b1 3a
| add pubkey  94 d3 d5 2a  73 91 bd 59  5f 3e 72 bf  4a 1b 9d c5
| add pubkey  b2 2b 4d e7  0d 24 3e 77  f9 7f 2d d6  9d 29 ef 70
| add pubkey  7d 7a 6d a2  b8 61 0c 4b  09 4a 06 71  84 70 85 9a
| add pubkey  8f 52 a1 80  06 fd c6 fc  3e 27 fa 16  fa 32 83 a9
| add pubkey  ca 80 db 0f  4a bf f7 e9  55 8e bd 29  4d 23 a6 dc
| add pubkey  2a b3 5d 62  a9 21 1e be  83 d8 69 3c  03 0a 48 8e
| add pubkey  d3 3a 11 f2  86 5a d1 30  65 bd c8 f4  83 87 ff 04
| add pubkey  87 33 05 4f  e0 d8 8c fe  b3 19 4c dd  85 40 f3 4d
| add pubkey  6e e8 49 14  06 2c 1f 59  59 05 8f 20  b0 ca 46 3f
| add pubkey  c9 20 7e 04  30 7d 9a 80  6c 3f 0a 89  f7 d3 af d8
| add pubkey  15 04 37 f9
| computed rsa CKAID  b4 9f 1a ac  9e 45 6e 79  29 c8 81 97  3a 0c 6a d3
| computed rsa CKAID  7f 0f 03 50
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.0804 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
add keyid @east
| add pubkey  01 03 bd 6c  96 eb df 78  89 b3 ed 77  0d a1 7f 7b
| add pubkey  e5 16 c2 c9  e4 7d 92 0a  90 9d 55 43  b4 62 13 03
| add pubkey  85 7a e0 26  7b 54 1f ca  09 93 cf ff  25 c9 02 4c
| add pubkey  78 ca 94 e5  3e ac d1 f9  a8 e5 bb 7f  cc 20 84 e0
| add pubkey  21 c9 f0 0d  c5 44 ba f3  48 64 61 58  f6 0f 63 0d
| add pubkey  d2 67 1e 59  8b ec f3 50  39 71 fb 39  da 11 64 b6
| add pubkey  62 cd 5f d3  8d 2e c1 50  ed 9c 6e 22  0c 39 a7 ce
| add pubkey  62 b5 af 8a  80 0f 2e 4c  05 5c 82 c7  8d 29 02 2e
| add pubkey  bb 23 5f db  f2 9e b5 7d  e2 20 70 1a  63 f3 8e 5d
| add pubkey  ac 47 f0 5c  26 4e b1 d0  42 60 52 4a  b0 77 25 ce
| add pubkey  e0 98 2b 43  f4 c7 59 1a  64 01 83 ea  4e e3 1a 2a
| add pubkey  92 b8 55 ab  63 dd 4b 70  47 29 dc e9  b4 60 bf 43
| add pubkey  4d 58 8f 64  73 95 70 ac  35 89 b2 c2  9c d4 62 c0
| add pubkey  5f 56 5f ad  1b e5 dd 49  93 6a f5 23  82 ed d4 e7
| add pubkey  d5 f1 55 f2  2d a2 26 a6  36 53 2f 94  fb 99 22 5c
| add pubkey  47 cc 6d 80  30 88 96 38  0c f5 f2 ed  37 d0 09 d5
| add pubkey  07 8f 69 ef  a9 99 ce 4d  1a 77 9e 39  c4 38 f3 c5
| add pubkey  51 51 48 ef
| computed rsa CKAID  61 55 99 73  d3 ac ef 7d  3a 37 0e 3e  82 ad 92 c1
| computed rsa CKAID  8a 82 25 f1
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.0715 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| old debugging base+cpu-usage + none
| base debugging = base+cpu-usage
| old impairing none + suppress-retransmits
| base impairing = suppress-retransmits
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.422 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| dup_any(fd@16) -> fd@23 (in whack_process() at rcv_whack.c:590)
| FOR_EACH_CONNECTION_... in conn_by_name
| start processing: connection "westnet-eastnet-ah" (in initiate_a_connection() at initiate.c:186)
| kernel_alg_db_new() initial trans_cnt=9
| adding proposal: AES_XCBC_96
| kernel_alg_db_new() will return p_new->protoid=2, p_new->trans_cnt=1
| kernel_alg_db_new()     trans[0]: transid=9, attr_cnt=1, attrs[0].type=5, attrs[0].val=9
| returning new proposal from esp_info
| connection 'westnet-eastnet-ah' +POLICY_UP
| dup_any(fd@23) -> fd@24 (in initiate_a_connection() at initiate.c:342)
| FOR_EACH_STATE_... in find_phase1_state
| creating state object #1 at 0x55ffe57838a8
| State DB: adding IKEv1 state #1 in UNDEFINED
| pstats #1 ikev1.isakmp started
| suspend processing: connection "westnet-eastnet-ah" (in main_outI1() at ikev1_main.c:118)
| start processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118)
| parent state #1: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA)
| dup_any(fd@24) -> fd@25 (in main_outI1() at ikev1_main.c:123)
| Queuing pending IPsec SA negotiating with 192.1.2.23 "westnet-eastnet-ah" IKE SA #1 "westnet-eastnet-ah"
"westnet-eastnet-ah" #1: initiating Main Mode
| **emit ISAKMP Message:
|    initiator cookie:
|   4f fe ff bb  08 e5 c2 f7
|    responder cookie:
|   00 00 00 00  00 00 00 00
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
| no specific IKE algorithms specified - using defaults
| oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0
| oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0
| oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0
| oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0
| oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0
| oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0
| oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0
| oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0
| oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0
| oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0
| oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0
| oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0
| oakley_alg_makedb() returning 0x55ffe5786758
| ***emit ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
| next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
| next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
| ****emit IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ikev1_out_sa pcn: 0 has 1 valid proposals
| ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18
| ****emit ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_ISAKMP (0x1)
|    SPI size: 0 (0x0)
|    number of transforms: 18 (0x12)
| last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 0 (0x0)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|     [4 is OAKLEY_SHA2_256]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 1 (0x1)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|     [4 is OAKLEY_SHA2_256]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 2 (0x2)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 6 (0x6)
|     [6 is OAKLEY_SHA2_512]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 3 (0x3)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 6 (0x6)
|     [6 is OAKLEY_SHA2_512]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 4 (0x4)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 2 (0x2)
|     [2 is OAKLEY_SHA1]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 5 (0x5)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 2 (0x2)
|     [2 is OAKLEY_SHA1]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 6 (0x6)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|     [4 is OAKLEY_SHA2_256]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 7 (0x7)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|     [4 is OAKLEY_SHA2_256]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 8 (0x8)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 6 (0x6)
|     [6 is OAKLEY_SHA2_512]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 9 (0x9)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 6 (0x6)
|     [6 is OAKLEY_SHA2_512]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 10 (0xa)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 2 (0x2)
|     [2 is OAKLEY_SHA1]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 11 (0xb)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 2 (0x2)
|     [2 is OAKLEY_SHA1]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 12 (0xc)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|     [4 is OAKLEY_SHA2_256]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 13 (0xd)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 6 (0x6)
|     [6 is OAKLEY_SHA2_512]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 14 (0xe)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 2 (0x2)
|     [2 is OAKLEY_SHA1]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 15 (0xf)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|     [4 is OAKLEY_SHA2_256]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 16 (0x10)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 6 (0x6)
|     [6 is OAKLEY_SHA2_512]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP transform number: 17 (0x11)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 2 (0x2)
|     [2 is OAKLEY_SHA1]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| emitting length of ISAKMP Proposal Payload: 632
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0
| emitting length of ISAKMP Security Association Payload: 644
| last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
| out_vid(): sending [FRAGMENTATION]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
| next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
| next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  40 48 b7 d5  6e bc e8 85  25 e7 de 7f  00 d6 c2 d3
| emitting length of ISAKMP Vendor ID Payload: 20
| out_vid(): sending [Dead Peer Detection]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  af ca d7 13  68 a1 f1 c9  6b 86 96 fc  77 57 01 00
| emitting length of ISAKMP Vendor ID Payload: 20
| nat add vid
| sending draft and RFC NATT VIDs
| out_vid(): sending [RFC 3947]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
| next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
| next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
| emitting length of ISAKMP Vendor ID Payload: 20
| skipping VID_NATT_RFC
| out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
| next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
| next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
| emitting length of ISAKMP Vendor ID Payload: 20
| out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
| next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
| next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  90 cb 80 91  3e bb 69 6e  08 63 81 b5  ec 42 7b 1f
| emitting length of ISAKMP Vendor ID Payload: 20
| out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  cd 60 46 43  35 df 21 f8  7c fd b2 fc  68 b6 a4 48
| emitting length of ISAKMP Vendor ID Payload: 20
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 792
| sending 792 bytes for reply packet for main_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1)
|   4f fe ff bb  08 e5 c2 f7  00 00 00 00  00 00 00 00
|   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
|   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
|   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
|   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
|   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
|   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
|   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
|   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
|   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
|   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
|   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
|   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
|   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
|   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
|   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
|   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
|   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
|   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
|   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
|   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
|   7c fd b2 fc  68 b6 a4 48
"westnet-eastnet-ah" #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds
| event_schedule: new EVENT_RETRANSMIT-pe@0x55ffe5782eb8
| inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #1
| libevent_malloc: new ptr-libevent@0x55ffe5783238 size 128
| #1 STATE_MAIN_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29895.472287
| #1 spent 1.92 milliseconds in main_outI1()
| stop processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in main_outI1() at ikev1_main.c:228)
| resume processing: connection "westnet-eastnet-ah" (in main_outI1() at ikev1_main.c:228)
| stop processing: connection "westnet-eastnet-ah" (in initiate_a_connection() at initiate.c:349)
| close_any(fd@23) (in initiate_connection() at initiate.c:372)
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 2.26 milliseconds in whack
| spent 0.00257 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 144 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500)
|   4f fe ff bb  08 e5 c2 f7  f3 71 17 f7  62 65 9f 92
|   01 10 02 00  00 00 00 00  00 00 00 90  0d 00 00 38
|   00 00 00 01  00 00 00 01  00 00 00 2c  00 01 00 01
|   00 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  0d 00 00 14  40 48 b7 d5  6e bc e8 85
|   25 e7 de 7f  00 d6 c2 d3  0d 00 00 14  af ca d7 13
|   68 a1 f1 c9  6b 86 96 fc  77 57 01 00  00 00 00 14
|   4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
| start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   4f fe ff bb  08 e5 c2 f7
|    responder cookie:
|   f3 71 17 f7  62 65 9f 92
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
|    length: 144 (0x90)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| State DB: IKEv1 state not found (find_state_ikev1)
| State DB: found IKEv1 state #1 in MAIN_I1 (find_state_ikev1_init)
| start processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459)
| #1 is idle
| #1 idle
| got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
| ***parse ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 56 (0x38)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 20 (0x14)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 20 (0x14)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 20 (0x14)
| message 'main_inR1_outI2' HASH payload not checked early
| received Vendor ID payload [FRAGMENTATION]
| received Vendor ID payload [Dead Peer Detection]
|  quirks.qnat_traversal_vid set to=117 [RFC 3947]
| received Vendor ID payload [RFC 3947]
| ****parse IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ****parse ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 44 (0x2c)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_ISAKMP (0x1)
|    SPI size: 0 (0x0)
|    number of transforms: 1 (0x1)
| *****parse ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 36 (0x24)
|    ISAKMP transform number: 0 (0x0)
|    ISAKMP transform ID: KEY_IKE (0x1)
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|    [1 is OAKLEY_LIFE_SECONDS]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|    [7 is OAKLEY_AES_CBC]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|    [4 is OAKLEY_SHA2_256]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|    [3 is OAKLEY_RSA_SIG]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|    [14 is OAKLEY_GROUP_MODP2048]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| OAKLEY proposal verified unconditionally; no alg_info to check against
| Oakley Transform 0 accepted
| sender checking NAT-T: enabled; VID 117
| returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC
| enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
| adding outI2 KE work-order 1 for state #1
| state #1 requesting EVENT_RETRANSMIT to be deleted
| #1 STATE_MAIN_I1: retransmits: cleared
| libevent_free: release ptr-libevent@0x55ffe5783238
| free_event_entry: release EVENT_RETRANSMIT-pe@0x55ffe5782eb8
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55ffe5782eb8
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1
| libevent_malloc: new ptr-libevent@0x55ffe5783238 size 128
| complete v1 state transition with STF_SUSPEND
| [RE]START processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648)
| suspending state #1 and saving MD
| #1 is busy; has a suspended MD
| #1 spent 0.118 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.252 milliseconds in comm_handle_cb() reading and processing packet
| crypto helper 0 resuming
| crypto helper 0 starting work-order 1 for state #1
| crypto helper 0 doing build KE and nonce (outI2 KE); request ID 1
| crypto helper 0 finished build KE and nonce (outI2 KE); request ID 1 time elapsed 0.001048 seconds
| (#1) spent 1.06 milliseconds in crypto helper computing work-order 1: outI2 KE (pcr)
| crypto helper 0 sending results from work-order 1 for state #1 to event queue
| scheduling resume sending helper answer for #1
| libevent_malloc: new ptr-libevent@0x7f0c90002888 size 128
| crypto helper 0 waiting (nothing to do)
| processing resume sending helper answer for #1
| start processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in resume_handler() at server.c:797)
| crypto helper 0 replies to request ID 1
| calling continuation function 0x55ffe4f2cb50
| main_inR1_outI2_continue for #1: calculated ke+nonce, sending I2
| **emit ISAKMP Message:
|    initiator cookie:
|   4f fe ff bb  08 e5 c2 f7
|    responder cookie:
|   f3 71 17 f7  62 65 9f 92
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_NONCE (0xa)
| next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE)
| next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet'
| emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
| keyex value  82 fc 27 b0  33 30 a5 0d  3b 7d f5 08  50 23 45 0c
| keyex value  09 5a 57 76  b0 9b c8 0a  2a a1 8a b9  db d4 1f b0
| keyex value  51 66 55 6e  30 82 de b5  35 78 77 93  4d 92 3a 6e
| keyex value  6a 77 ce 08  cf e6 40 0c  ae 7b 8d c5  da ea a7 09
| keyex value  75 4f 3e a3  d5 78 53 45  bb f7 84 ec  3e 3b d3 04
| keyex value  76 4e 11 32  cf 45 d1 34  8b 51 ea 52  67 0e fe 49
| keyex value  9c eb e6 f7  9a 00 4f 73  10 5b 00 4e  28 3b 18 68
| keyex value  6f 9a 99 f0  6d 7a 64 e9  e9 89 b6 13  b7 b8 03 2c
| keyex value  34 a8 7c 81  2c a8 45 e5  cd 0a 9f 87  e4 ad c9 0d
| keyex value  60 32 3a b0  24 0b 1e e1  60 6e 9b b9  3e 65 05 8c
| keyex value  31 fa ef a4  65 c9 03 f6  d9 af 09 4c  72 f7 cb f2
| keyex value  e2 01 0f ac  d8 a8 be b6  b5 fd 6e 8e  22 2b 57 60
| keyex value  c3 87 16 06  b3 a2 12 0a  5f 8b 70 8c  75 c6 68 39
| keyex value  9c 06 3b aa  71 d3 33 41  e7 b5 5e 63  a2 dd e4 da
| keyex value  e0 f1 31 c6  ab 4c e7 83  7c 9d 42 24  4c bf 13 a8
| keyex value  12 84 25 61  d4 5e 8d 50  b3 2e e1 b0  d5 91 e3 ba
| emitting length of ISAKMP Key Exchange Payload: 260
| ***emit ISAKMP Nonce Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE)
| next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of Ni into ISAKMP Nonce Payload
| Ni  4e 53 b1 39  ba 9a d3 e3  c3 54 61 ef  62 25 3a 5f
| Ni  3a f7 df e2  1b ca bc 61  46 54 78 f4  32 c0 4e 5a
| emitting length of ISAKMP Nonce Payload: 36
| NAT-T checking st_nat_traversal
| NAT-T found (implies NAT_T_WITH_NATD)
| sending NAT-D payloads
| natd_hash: hasher=0x55ffe5001ca0(32)
| natd_hash: icookie=  4f fe ff bb  08 e5 c2 f7
| natd_hash: rcookie=  f3 71 17 f7  62 65 9f 92
| natd_hash: ip=  c0 01 02 17
| natd_hash: port=500
| natd_hash: hash=  f5 04 67 a4  c7 54 47 8d  5f e7 c7 b6  7e 7d 50 97
| natd_hash: hash=  18 05 99 e9  2b 3b 55 3e  6c 25 b8 cd  5b 75 48 34
| ***emit ISAKMP NAT-D Payload:
|    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
| next payload chain: ignoring supplied 'ISAKMP NAT-D Payload'.'next payload type' value 20:ISAKMP_NEXT_NATD_RFC
| next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC)
| next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload
| NAT-D  f5 04 67 a4  c7 54 47 8d  5f e7 c7 b6  7e 7d 50 97
| NAT-D  18 05 99 e9  2b 3b 55 3e  6c 25 b8 cd  5b 75 48 34
| emitting length of ISAKMP NAT-D Payload: 36
| natd_hash: hasher=0x55ffe5001ca0(32)
| natd_hash: icookie=  4f fe ff bb  08 e5 c2 f7
| natd_hash: rcookie=  f3 71 17 f7  62 65 9f 92
| natd_hash: ip=  c0 01 02 2d
| natd_hash: port=500
| natd_hash: hash=  5e 16 c7 44  ef 98 96 9a  af eb da 92  53 4c 2d 59
| natd_hash: hash=  06 f7 c2 a9  5e cd e9 1a  38 41 ea b8  19 28 34 f7
| ***emit ISAKMP NAT-D Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP NAT-D Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC)
| next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload
| NAT-D  5e 16 c7 44  ef 98 96 9a  af eb da 92  53 4c 2d 59
| NAT-D  06 f7 c2 a9  5e cd e9 1a  38 41 ea b8  19 28 34 f7
| emitting length of ISAKMP NAT-D Payload: 36
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 396
| State DB: re-hashing IKEv1 state #1 IKE SPIi and SPI[ir]
| complete v1 state transition with STF_OK
| [RE]START processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673)
| #1 is idle
| doing_xauth:no, t_xauth_client_done:no
| peer supports fragmentation
| peer supports DPD
| IKEv1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
| parent state #1: MAIN_I1(half-open IKE SA) => MAIN_I2(open IKE SA)
| event_already_set, deleting event
| state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x55ffe5783238
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55ffe5782eb8
| sending reply packet to 192.1.2.23:500 (from 192.1.2.45:500)
| sending 396 bytes for STATE_MAIN_I1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1)
|   4f fe ff bb  08 e5 c2 f7  f3 71 17 f7  62 65 9f 92
|   04 10 02 00  00 00 00 00  00 00 01 8c  0a 00 01 04
|   82 fc 27 b0  33 30 a5 0d  3b 7d f5 08  50 23 45 0c
|   09 5a 57 76  b0 9b c8 0a  2a a1 8a b9  db d4 1f b0
|   51 66 55 6e  30 82 de b5  35 78 77 93  4d 92 3a 6e
|   6a 77 ce 08  cf e6 40 0c  ae 7b 8d c5  da ea a7 09
|   75 4f 3e a3  d5 78 53 45  bb f7 84 ec  3e 3b d3 04
|   76 4e 11 32  cf 45 d1 34  8b 51 ea 52  67 0e fe 49
|   9c eb e6 f7  9a 00 4f 73  10 5b 00 4e  28 3b 18 68
|   6f 9a 99 f0  6d 7a 64 e9  e9 89 b6 13  b7 b8 03 2c
|   34 a8 7c 81  2c a8 45 e5  cd 0a 9f 87  e4 ad c9 0d
|   60 32 3a b0  24 0b 1e e1  60 6e 9b b9  3e 65 05 8c
|   31 fa ef a4  65 c9 03 f6  d9 af 09 4c  72 f7 cb f2
|   e2 01 0f ac  d8 a8 be b6  b5 fd 6e 8e  22 2b 57 60
|   c3 87 16 06  b3 a2 12 0a  5f 8b 70 8c  75 c6 68 39
|   9c 06 3b aa  71 d3 33 41  e7 b5 5e 63  a2 dd e4 da
|   e0 f1 31 c6  ab 4c e7 83  7c 9d 42 24  4c bf 13 a8
|   12 84 25 61  d4 5e 8d 50  b3 2e e1 b0  d5 91 e3 ba
|   14 00 00 24  4e 53 b1 39  ba 9a d3 e3  c3 54 61 ef
|   62 25 3a 5f  3a f7 df e2  1b ca bc 61  46 54 78 f4
|   32 c0 4e 5a  14 00 00 24  f5 04 67 a4  c7 54 47 8d
|   5f e7 c7 b6  7e 7d 50 97  18 05 99 e9  2b 3b 55 3e
|   6c 25 b8 cd  5b 75 48 34  00 00 00 24  5e 16 c7 44
|   ef 98 96 9a  af eb da 92  53 4c 2d 59  06 f7 c2 a9
|   5e cd e9 1a  38 41 ea b8  19 28 34 f7
| !event_already_set at reschedule
"westnet-eastnet-ah" #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds
| event_schedule: new EVENT_RETRANSMIT-pe@0x55ffe5782eb8
| inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #1
| libevent_malloc: new ptr-libevent@0x55ffe57863b8 size 128
| #1 STATE_MAIN_I2: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29895.474884
"westnet-eastnet-ah" #1: STATE_MAIN_I2: sent MI2, expecting MR2
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| resume sending helper answer for #1 suppresed complete_v1_state_transition()
| #1 spent 0.311 milliseconds in resume sending helper answer
| stop processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7f0c90002888
| spent 0.0034 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 396 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500)
|   4f fe ff bb  08 e5 c2 f7  f3 71 17 f7  62 65 9f 92
|   04 10 02 00  00 00 00 00  00 00 01 8c  0a 00 01 04
|   ba e1 fd 29  ac db 59 9e  0f a0 75 85  31 dd 9f 85
|   f6 ce a2 ee  38 4a 4b a9  d4 c6 79 b6  aa b9 b5 4b
|   f3 cb 77 d0  e9 8e ce f4  f2 d7 de b2  32 73 73 58
|   10 65 30 40  08 b3 ef 44  8b d8 98 91  53 16 de e0
|   90 1c 1e af  61 bb 61 cf  f5 f3 a7 7c  ca 53 3d 76
|   56 dc 00 ea  b3 09 af 07  f3 9a e0 55  89 52 5f b6
|   62 d1 7c dd  38 a6 2d 95  e4 ad ca 1c  e6 e3 d1 a2
|   63 ab 48 07  70 d9 20 43  29 0e 6c ec  84 4b 74 80
|   4d b0 7f c1  5b d0 da fc  59 f1 02 93  80 da 66 fa
|   44 67 eb 30  42 4f 5d 6a  e1 b6 31 7f  63 64 c8 6e
|   f1 28 43 bf  cf 31 8f a0  d8 12 4d 5b  84 bb 27 28
|   3a 07 12 0c  49 95 f5 e5  a3 12 d0 c4  fd 76 a7 15
|   b5 3d c3 85  ae e5 3d 83  88 a0 57 ac  dc 5f b9 4f
|   24 65 bc 66  a8 aa 1f 6e  5f f4 64 42  d2 c2 40 55
|   6b 82 a7 0b  ec a7 04 c1  f9 aa be 6a  34 c0 ec 46
|   77 66 c6 b6  15 73 c5 fc  51 fd 13 ab  b8 bb c1 c8
|   14 00 00 24  83 a0 52 9d  dc 58 6d a1  fc 60 10 91
|   ca dc 91 5a  fc 5b a6 b2  24 8f 92 af  6d 50 f4 0d
|   4c 8f 85 7d  14 00 00 24  5e 16 c7 44  ef 98 96 9a
|   af eb da 92  53 4c 2d 59  06 f7 c2 a9  5e cd e9 1a
|   38 41 ea b8  19 28 34 f7  00 00 00 24  f5 04 67 a4
|   c7 54 47 8d  5f e7 c7 b6  7e 7d 50 97  18 05 99 e9
|   2b 3b 55 3e  6c 25 b8 cd  5b 75 48 34
| start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   4f fe ff bb  08 e5 c2 f7
|    responder cookie:
|   f3 71 17 f7  62 65 9f 92
|    next payload type: ISAKMP_NEXT_KE (0x4)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
|    length: 396 (0x18c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| State DB: found IKEv1 state #1 in MAIN_I2 (find_state_ikev1)
| start processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459)
| #1 is idle
| #1 idle
| got payload 0x10  (ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080
| ***parse ISAKMP Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_NONCE (0xa)
|    length: 260 (0x104)
| got payload 0x400  (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080
| ***parse ISAKMP Nonce Payload:
|    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
|    length: 36 (0x24)
| got payload 0x100000  (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080
| ***parse ISAKMP NAT-D Payload:
|    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
|    length: 36 (0x24)
| got payload 0x100000  (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080
| ***parse ISAKMP NAT-D Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 36 (0x24)
| message 'main_inR2_outI3' HASH payload not checked early
| started looking for secret for @west->@east of kind PKK_PSK
| actually looking for secret for @west->@east of kind PKK_PSK
| line 1: key type PKK_PSK(@west) to type PKK_RSA
| concluding with best_match=000 best=(nil) (lineno=-1)
| no PreShared Key Found
| adding aggr outR1 DH work-order 2 for state #1
| state #1 requesting EVENT_RETRANSMIT to be deleted
| #1 STATE_MAIN_I2: retransmits: cleared
| libevent_free: release ptr-libevent@0x55ffe57863b8
| free_event_entry: release EVENT_RETRANSMIT-pe@0x55ffe5782eb8
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55ffe5782eb8
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1
| libevent_malloc: new ptr-libevent@0x7f0c90002888 size 128
| complete v1 state transition with STF_SUSPEND
| [RE]START processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648)
| suspending state #1 and saving MD
| #1 is busy; has a suspended MD
| #1 spent 0.0658 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.258 milliseconds in comm_handle_cb() reading and processing packet
| crypto helper 3 resuming
| crypto helper 3 starting work-order 2 for state #1
| crypto helper 3 doing compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2
| crypto helper 3 finished compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 time elapsed 0.00115 seconds
| (#1) spent 1.15 milliseconds in crypto helper computing work-order 2: aggr outR1 DH (pcr)
| crypto helper 3 sending results from work-order 2 for state #1 to event queue
| scheduling resume sending helper answer for #1
| libevent_malloc: new ptr-libevent@0x7f0c88000f48 size 128
| crypto helper 3 waiting (nothing to do)
| processing resume sending helper answer for #1
| start processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in resume_handler() at server.c:797)
| crypto helper 3 replies to request ID 2
| calling continuation function 0x55ffe4f2cb50
| main_inR2_outI3_cryptotail for #1: calculated DH, sending R1
| **emit ISAKMP Message:
|    initiator cookie:
|   4f fe ff bb  08 e5 c2 f7
|    responder cookie:
|   f3 71 17 f7  62 65 9f 92
|    next payload type: ISAKMP_NEXT_ID (0x5)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 0 (0x0)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 5:ISAKMP_NEXT_ID
| thinking about whether to send my certificate:
|   I have RSA key: OAKLEY_RSA_SIG cert.type: 0?? 
|   sendcert: CERT_ALWAYSSEND and I did not get a certificate request 
|   so do not send cert.
| I did not send a certificate because I do not have one.
|  I am not sending a certificate request
| I will NOT send an initial contact payload
| init checking NAT-T: enabled; RFC 3947 (NAT-Traversal)
| natd_hash: hasher=0x55ffe5001ca0(32)
| natd_hash: icookie=  4f fe ff bb  08 e5 c2 f7
| natd_hash: rcookie=  f3 71 17 f7  62 65 9f 92
| natd_hash: ip=  c0 01 02 2d
| natd_hash: port=500
| natd_hash: hash=  5e 16 c7 44  ef 98 96 9a  af eb da 92  53 4c 2d 59
| natd_hash: hash=  06 f7 c2 a9  5e cd e9 1a  38 41 ea b8  19 28 34 f7
| natd_hash: hasher=0x55ffe5001ca0(32)
| natd_hash: icookie=  4f fe ff bb  08 e5 c2 f7
| natd_hash: rcookie=  f3 71 17 f7  62 65 9f 92
| natd_hash: ip=  c0 01 02 17
| natd_hash: port=500
| natd_hash: hash=  f5 04 67 a4  c7 54 47 8d  5f e7 c7 b6  7e 7d 50 97
| natd_hash: hash=  18 05 99 e9  2b 3b 55 3e  6c 25 b8 cd  5b 75 48 34
| expected NAT-D(me):  5e 16 c7 44  ef 98 96 9a  af eb da 92  53 4c 2d 59
| expected NAT-D(me):  06 f7 c2 a9  5e cd e9 1a  38 41 ea b8  19 28 34 f7
| expected NAT-D(him):
|   f5 04 67 a4  c7 54 47 8d  5f e7 c7 b6  7e 7d 50 97
|   18 05 99 e9  2b 3b 55 3e  6c 25 b8 cd  5b 75 48 34
| received NAT-D:  5e 16 c7 44  ef 98 96 9a  af eb da 92  53 4c 2d 59
| received NAT-D:  06 f7 c2 a9  5e cd e9 1a  38 41 ea b8  19 28 34 f7
| received NAT-D:  f5 04 67 a4  c7 54 47 8d  5f e7 c7 b6  7e 7d 50 97
| received NAT-D:  18 05 99 e9  2b 3b 55 3e  6c 25 b8 cd  5b 75 48 34
| NAT_TRAVERSAL encaps using auto-detect
| NAT_TRAVERSAL this end is NOT behind NAT
| NAT_TRAVERSAL that end is NOT behind NAT
| NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23
| NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected
|  NAT_T_WITH_KA detected
| global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds
| ***emit ISAKMP Identification Payload (IPsec DOI):
|    next payload type: ISAKMP_NEXT_SIG (0x9)
|    ID type: ID_FQDN (0x2)
|    Protocol ID: 0 (0x0)
|    port: 0 (0x0)
| next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 9:ISAKMP_NEXT_SIG
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
| next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
| emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI)
| my identity  77 65 73 74
| emitting length of ISAKMP Identification Payload (IPsec DOI): 12
| started looking for secret for @west->@east of kind PKK_RSA
| actually looking for secret for @west->@east of kind PKK_RSA
| line 1: key type PKK_RSA(@west) to type PKK_RSA
| 1: compared key (none) to @west / @east -> 002
| 2: compared key (none) to @west / @east -> 002
| line 1: match=002
| match 002 beats previous best_match 000 match=0x55ffe56dbb58 (line=1)
| concluding with best_match=002 best=0x55ffe56dbb58 (lineno=1)
| ***emit ISAKMP Signature Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Signature Payload (9:ISAKMP_NEXT_SIG)
| next payload chain: saving location 'ISAKMP Signature Payload'.'next payload type' in 'reply packet'
| emitting 274 raw bytes of SIG_I into ISAKMP Signature Payload
| SIG_I  31 d9 78 b7  56 fe 2a 9b  6a a4 9f c8  20 e3 17 63
| SIG_I  25 77 ab 89  a8 4b ee 8f  19 fc 60 33  a4 03 ba e6
| SIG_I  1a 6d 2a 2f  b2 c9 cf a8  99 40 a4 f1  53 29 68 f4
| SIG_I  c6 d5 79 4c  70 4b dd 5a  13 1f 5d 58  6c e8 d8 50
| SIG_I  98 ac 17 de  5c d9 22 06  0f e0 3f c6  81 27 34 dc
| SIG_I  5d 02 b3 3c  7d ac bb 05  92 af 76 4f  e5 03 90 8c
| SIG_I  25 3c ac 1f  ce 2d b7 14  79 ea a9 43  10 b8 44 d1
| SIG_I  70 b6 97 48  f5 12 32 28  f3 19 cb 90  03 dc c5 ef
| SIG_I  5c f3 cf 70  a1 d8 09 ca  2f 68 62 04  37 17 30 46
| SIG_I  d4 be 83 0d  e7 46 9b 98  4f 50 c0 b8  67 d7 7b 9f
| SIG_I  24 9f 27 97  4e 62 56 d8  bc 52 87 6b  20 37 5c d4
| SIG_I  b6 e6 b3 6d  67 75 6c 2d  5e ae a1 26  68 0b 0d df
| SIG_I  47 61 f7 52  6a 83 11 e9  48 96 d3 93  53 32 d6 e7
| SIG_I  a0 44 38 32  04 76 ec 51  86 01 92 a9  c8 2a 4c ed
| SIG_I  97 6d 86 65  9a 07 59 aa  96 f4 34 e8  64 4e c0 62
| SIG_I  ca 21 8c 0c  ce e3 b1 b5  69 ad 11 79  a3 18 08 fb
| SIG_I  8b 05 a2 ba  b8 4e 5b 75  9e 43 14 b5  4f 02 8c e3
| SIG_I  5d e8
| emitting length of ISAKMP Signature Payload: 278
| Not sending INITIAL_CONTACT
| emitting 14 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 332
| complete v1 state transition with STF_OK
| [RE]START processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673)
| #1 is idle
| doing_xauth:no, t_xauth_client_done:no
| IKEv1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
| parent state #1: MAIN_I2(open IKE SA) => MAIN_I3(open IKE SA)
| event_already_set, deleting event
| state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x7f0c90002888
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55ffe5782eb8
| sending reply packet to 192.1.2.23:500 (from 192.1.2.45:500)
| sending 332 bytes for STATE_MAIN_I2 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1)
|   4f fe ff bb  08 e5 c2 f7  f3 71 17 f7  62 65 9f 92
|   05 10 02 01  00 00 00 00  00 00 01 4c  2c 81 e9 55
|   6d e4 10 e5  f6 4c 81 ff  41 ad ec 2d  c7 26 05 34
|   2d 07 16 fe  f4 81 08 44  d2 32 53 3a  87 b3 17 04
|   9c b9 3f 61  9f 99 17 59  24 ae 13 13  ca 13 35 7d
|   ed 5a e1 75  62 c7 f4 3f  3d 28 67 83  dd ea dc a8
|   66 9a ff 6f  db 39 b2 d7  c8 93 e3 2b  79 8b 6f 00
|   76 7b 2e e3  2d 88 0f 8b  47 fe a6 05  ac 8e 2b 7f
|   9a c5 73 68  a7 6f 12 6e  26 5e 51 c2  14 22 c4 d7
|   d2 3a 7d 4d  25 bf 9b 5b  c3 39 b0 a3  b0 9c af 1c
|   ea 5c 08 fb  40 65 c8 90  aa 96 e6 7a  da 2c 5d ac
|   2d 69 aa 2d  24 4b d1 35  10 92 41 aa  8c ae 95 a8
|   18 6a da ca  84 50 24 1c  73 b2 76 0e  00 28 d9 35
|   3a 5a 3b a8  62 af 55 99  48 ea 80 45  c7 57 96 d4
|   1b 0a ff b0  6d 19 2d db  8a 97 d9 90  fd 01 e0 36
|   da 57 cf 1a  af 0b bd ae  8a ff 3b bd  64 5c 87 97
|   d9 c7 ef 5e  2d ba f0 44  31 a1 c6 7d  ae ae c7 9b
|   16 56 e8 a4  b9 a7 ca ae  1d 69 eb 5b  5c a2 ed 3a
|   01 25 51 29  53 9d ef e3  34 5f d2 ff  ab 88 a7 e8
|   c3 12 c4 6e  22 7c 43 e6  17 62 0b b7  03 4f f5 6c
|   c9 e0 2f 58  0b be 5c f5  c2 4f 87 22
| !event_already_set at reschedule
"westnet-eastnet-ah" #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds
| event_schedule: new EVENT_RETRANSMIT-pe@0x55ffe5782eb8
| inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #1
| libevent_malloc: new ptr-libevent@0x55ffe5783238 size 128
| #1 STATE_MAIN_I3: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29895.496181
"westnet-eastnet-ah" #1: STATE_MAIN_I3: sent MI3, expecting MR3
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| resume sending helper answer for #1 suppresed complete_v1_state_transition()
| #1 spent 5.3 milliseconds in resume sending helper answer
| stop processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7f0c88000f48
| spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 332 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500)
|   4f fe ff bb  08 e5 c2 f7  f3 71 17 f7  62 65 9f 92
|   05 10 02 01  00 00 00 00  00 00 01 4c  bf f0 15 40
|   bb dd 27 02  af 74 01 44  d1 1f fb bf  5e f1 91 33
|   4e 02 22 65  fe 8d c3 35  92 41 a3 af  fc 74 dd 35
|   f8 88 25 93  ce cf d8 6f  73 5e 2a 32  a2 1a eb 95
|   35 6a 4a 26  21 53 25 c6  af 12 4a df  0a 2f b8 53
|   a8 c7 8a 2c  4f fa a0 39  36 9e b3 4b  84 8c be ef
|   99 5d f9 b8  ab 3a 19 c8  0f 0c 2a a3  1a 83 f9 ed
|   72 8a 63 cb  d0 00 52 f3  61 76 7d 00  bb 7c 8a 99
|   30 f3 2c 73  69 b1 8e 41  e8 08 a3 3c  90 e3 d2 9d
|   f0 69 dc 76  a0 70 90 30  77 6b 56 7f  ec c7 a2 78
|   6a b8 8c e5  ae f9 af 19  87 49 bb 13  68 77 ac 61
|   fb d3 97 47  ef e4 ac 53  c3 a5 42 e9  6b 74 6d 0f
|   12 85 60 2f  b9 7d c9 00  c2 38 f8 86  c4 19 c1 e1
|   8c c8 3c b4  74 9a 14 7b  32 5d c9 d7  29 db 3a 8f
|   79 31 1d 50  38 e8 c6 30  b9 50 a3 0a  d5 95 53 16
|   8a 82 bc 7e  02 36 41 8d  e9 de 8c ce  63 df cc a7
|   b6 4f f2 4f  34 8a d4 98  0b 93 92 85  fe 2d 93 ef
|   49 1a 20 d7  f5 1e ab b3  5f d0 19 3f  e2 f7 7d 85
|   fb 22 b2 b4  49 82 4b f1  c4 93 f5 8e  51 d5 fa f3
|   75 b9 2f 8f  74 48 63 06  8b fd 96 5a
| start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   4f fe ff bb  08 e5 c2 f7
|    responder cookie:
|   f3 71 17 f7  62 65 9f 92
|    next payload type: ISAKMP_NEXT_ID (0x5)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 0 (0x0)
|    length: 332 (0x14c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| State DB: found IKEv1 state #1 in MAIN_I3 (find_state_ikev1)
| start processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.23:500
| got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x220 opt: 0x20c0
| ***parse ISAKMP Identification Payload:
|    next payload type: ISAKMP_NEXT_SIG (0x9)
|    length: 12 (0xc)
|    ID type: ID_FQDN (0x2)
|    DOI specific A: 0 (0x0)
|    DOI specific B: 0 (0x0)
|      obj:   65 61 73 74
| got payload 0x200  (ISAKMP_NEXT_SIG) needed: 0x200 opt: 0x20c0
| ***parse ISAKMP Signature Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 278 (0x116)
| removing 14 bytes of padding
| message 'main_inR3' HASH payload not checked early
"westnet-eastnet-ah" #1: Peer ID is ID_FQDN: '@east'
| X509: no CERT payloads to process
| required RSA CA is '%any'
| checking RSA keyid '@east' for match with '@east'
| key issuer CA is '%any'
| an RSA Sig check passed with *AQO9bJbr3 [preloaded key]
|   #1 spent 0.0653 milliseconds in try_all_RSA_keys() trying a pubkey
"westnet-eastnet-ah" #1: Authenticated using RSA
| FOR_EACH_CONNECTION_... in ISAKMP_SA_established
| complete v1 state transition with STF_OK
| [RE]START processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673)
| #1 is idle
| doing_xauth:no, t_xauth_client_done:no
| IKEv1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
| parent state #1: MAIN_I3(open IKE SA) => MAIN_I4(established IKE SA)
| event_already_set, deleting event
| state #1 requesting EVENT_RETRANSMIT to be deleted
| #1 STATE_MAIN_I4: retransmits: cleared
| libevent_free: release ptr-libevent@0x55ffe5783238
| free_event_entry: release EVENT_RETRANSMIT-pe@0x55ffe5782eb8
| !event_already_set at reschedule
| event_schedule: new EVENT_SA_REPLACE-pe@0x55ffe5782eb8
| inserting event EVENT_SA_REPLACE, timeout in 2607 seconds for #1
| libevent_malloc: new ptr-libevent@0x7f0c88000f48 size 128
| pstats #1 ikev1.isakmp established
"westnet-eastnet-ah" #1: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048}
| DPD: dpd_init() called on ISAKMP SA
| DPD: Peer supports Dead Peer Detection
| DPD: not initializing DPD because DPD is disabled locally
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| unpending state #1
| creating state object #2 at 0x55ffe5784398
| State DB: adding IKEv1 state #2 in UNDEFINED
| pstats #2 ikev1.ipsec started
| duplicating state object #1 "westnet-eastnet-ah" as #2 for IPSEC SA
| #2 setting local endpoint to 192.1.2.45:500 from #1.st_localport (in duplicate_state() at state.c:1484)
| suspend processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685)
| start processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685)
| child state #2: UNDEFINED(ignore) => QUICK_I1(established CHILD SA)
"westnet-eastnet-ah" #2: initiating Quick Mode RSASIG+AUTHENTICATE+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#1 msgid:6c4ca9db proposal=AES_XCBC_96 pfsgroup=MODP2048}
| adding quick_outI1 KE work-order 3 for state #2
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f0c90002b78
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2
| libevent_malloc: new ptr-libevent@0x55ffe5782fd8 size 128
| stop processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764)
| resume processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764)
| crypto helper 4 resuming
| crypto helper 4 starting work-order 3 for state #2
| crypto helper 4 doing build KE and nonce (quick_outI1 KE); request ID 3
| crypto helper 4 finished build KE and nonce (quick_outI1 KE); request ID 3 time elapsed 0.001011 seconds
| (#2) spent 1 milliseconds in crypto helper computing work-order 3: quick_outI1 KE (pcr)
| crypto helper 4 sending results from work-order 3 for state #2 to event queue
| scheduling resume sending helper answer for #2
| libevent_malloc: new ptr-libevent@0x7f0c8c003f28 size 128
| libevent_realloc: release ptr-libevent@0x55ffe5764458
| libevent_realloc: new ptr-libevent@0x7f0c8c003e78 size 128
| crypto helper 4 waiting (nothing to do)
| unqueuing pending Quick Mode with 192.1.2.23 "westnet-eastnet-ah"
| removing pending policy for no connection {0x55ffe57752c8}
| close_any(fd@24) (in release_whack() at state.c:654)
| #1 spent 0.37 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.528 milliseconds in comm_handle_cb() reading and processing packet
| processing resume sending helper answer for #2
| start processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in resume_handler() at server.c:797)
| crypto helper 4 replies to request ID 3
| calling continuation function 0x55ffe4f2cb50
| quick_outI1_continue for #2: calculated ke+nonce, sending I1
| **emit ISAKMP Message:
|    initiator cookie:
|   4f fe ff bb  08 e5 c2 f7
|    responder cookie:
|   f3 71 17 f7  62 65 9f 92
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_QUICK (0x20)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 1816963547 (0x6c4ca9db)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| emitting quick defaults using policy none
| kernel_alg_db_new() initial trans_cnt=9
| adding proposal: AES_XCBC_96
| kernel_alg_db_new() will return p_new->protoid=2, p_new->trans_cnt=1
| kernel_alg_db_new()     trans[0]: transid=9, attr_cnt=1, attrs[0].type=5, attrs[0].val=9
| returning new proposal from esp_info
| ***emit ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_NONCE (0xa)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
| next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
| next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
| ****emit IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ikev1_out_sa pcn: 0 has 1 valid proposals
| ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 1
| ****emit ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_IPSEC_AH (0x2)
|    SPI size: 4 (0x4)
|    number of transforms: 1 (0x1)
| last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
| netlink_get_spi: allocated 0xd11807ab for ah.0@192.1.2.45
| emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
| SPI  d1 18 07 ab
| *****emit ISAKMP Transform Payload (AH):
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    AH transform number: 0 (0x0)
|    AH transform ID: AH_AES_XCBC_MAC (0x9)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (AH)'.'next payload type'
| ******emit ISAKMP IPsec DOI attribute:
|    af+type: AF+GROUP_DESCRIPTION (0x8003)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| ******emit ISAKMP IPsec DOI attribute:
|    af+type: AF+ENCAPSULATION_MODE (0x8004)
|    length/value: 1 (0x1)
|     [1 is ENCAPSULATION_MODE_TUNNEL]
| ******emit ISAKMP IPsec DOI attribute:
|    af+type: AF+SA_LIFE_TYPE (0x8001)
|    length/value: 1 (0x1)
|     [1 is SA_LIFE_TYPE_SECONDS]
| ******emit ISAKMP IPsec DOI attribute:
|    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
|    length/value: 28800 (0x7080)
| ******emit ISAKMP IPsec DOI attribute:
|    af+type: AF+AUTH_ALGORITHM (0x8005)
|    length/value: 9 (0x9)
|     [9 is AUTH_ALGORITHM_AES_XCBC]
| emitting length of ISAKMP Transform Payload (AH): 28
| emitting length of ISAKMP Proposal Payload: 40
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (AH)'.'next payload type' is 0
| emitting length of ISAKMP Security Association Payload: 52
| last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
| ***emit ISAKMP Nonce Payload:
|    next payload type: ISAKMP_NEXT_KE (0x4)
| next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE
| next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE)
| next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of Ni into ISAKMP Nonce Payload
| Ni  b6 9b 61 c3  86 d7 e4 7a  ea c9 3e 22  69 54 70 cc
| Ni  3a 6e 38 df  33 1d f1 03  62 6e b0 e7  0b 72 6a 3b
| emitting length of ISAKMP Nonce Payload: 36
| ***emit ISAKMP Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_ID (0x5)
| next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID
| next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE)
| next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet'
| emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
| keyex value  97 86 78 5c  8b 29 cd c5  24 ef 7c ac  01 83 7a 21
| keyex value  0a 78 11 33  c7 9a da aa  a7 be ac 01  42 ec 7a b8
| keyex value  ba cd d5 95  36 c8 9d 90  78 f2 cc 49  b5 18 b9 54
| keyex value  0a f2 60 60  38 00 25 50  57 80 4e 28  b9 33 f2 bb
| keyex value  4b 86 12 d9  c6 dc c9 d9  40 38 92 f5  29 5f 17 3e
| keyex value  66 1d 39 5f  e8 6d 7e 63  0b 4e 36 8a  e3 37 b8 dc
| keyex value  03 e4 0b b0  52 1c a3 d8  14 6b ce 21  0d c5 35 8b
| keyex value  dc 04 b5 db  da 1c f8 a0  a8 5f 8b aa  39 d7 d7 00
| keyex value  b8 4d 94 7d  6c f4 06 22  c8 6e 3c 17  a1 52 b0 5b
| keyex value  fc 91 47 19  8c b0 e4 0c  78 c0 b0 5c  b7 63 0e 51
| keyex value  06 98 0b 45  8b 18 d3 38  35 b6 38 b9  53 f9 44 2b
| keyex value  29 a3 f5 5c  27 fa 30 38  4b 3f 23 6b  7b 67 1b 97
| keyex value  b0 1b 72 e7  f6 e5 5c bf  86 59 f5 40  8a 74 f7 c0
| keyex value  56 66 6b a9  28 17 3d 6d  24 bd 2a 89  a9 df 6d bf
| keyex value  c5 96 fc 09  22 b7 5c a9  da c1 49 a1  9a 48 97 71
| keyex value  f9 05 c6 07  77 a7 b7 4e  2a c0 ec e1  26 d7 3b bb
| emitting length of ISAKMP Key Exchange Payload: 260
| ***emit ISAKMP Identification Payload (IPsec DOI):
|    next payload type: ISAKMP_NEXT_ID (0x5)
|    ID type: ID_IPV4_ADDR_SUBNET (0x4)
|    Protocol ID: 0 (0x0)
|    port: 0 (0x0)
| next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID
| next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
| next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
| emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
| client network  c0 00 01 00
| emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
| client mask  ff ff ff 00
| emitting length of ISAKMP Identification Payload (IPsec DOI): 16
| ***emit ISAKMP Identification Payload (IPsec DOI):
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ID type: ID_IPV4_ADDR_SUBNET (0x4)
|    Protocol ID: 0 (0x0)
|    port: 0 (0x0)
| next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
| next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
| emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
| client network  c0 00 02 00
| emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
| client mask  ff ff ff 00
| emitting length of ISAKMP Identification Payload (IPsec DOI): 16
| outI1 HASH(1):
|   d0 e6 49 f9  c9 92 20 e7  ed 5d 61 b1  ab c1 6b 09
|   48 97 7e 59  12 c1 ae d1  b6 4a 14 a7  62 89 27 23
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 444
| sending 444 bytes for reply packet from quick_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #2)
|   4f fe ff bb  08 e5 c2 f7  f3 71 17 f7  62 65 9f 92
|   08 10 20 01  6c 4c a9 db  00 00 01 bc  03 17 2e 8c
|   a9 fa 4c 64  df 90 b8 70  6f de 20 ec  aa 13 ce e4
|   70 3d 33 1b  a5 f7 27 12  f5 c4 96 55  d6 88 ce 3e
|   b5 d1 9e 63  07 b9 f5 45  d3 d0 ea c7  ed d3 a2 a1
|   a1 16 6d 3c  94 8e f4 e6  50 df 93 50  34 b9 5c 1d
|   53 15 76 e5  d4 3f 23 70  99 be a1 ac  77 62 40 d6
|   1c 56 69 2a  50 98 c3 03  4e 39 06 56  5f f0 51 75
|   88 6f a0 7a  ee bd fd 20  6f 54 b1 33  41 19 8f 16
|   22 73 a7 17  00 dd 88 47  cc 85 50 12  b1 e2 24 70
|   93 e8 e8 a5  bc dd c4 b6  a7 55 40 97  27 b9 65 36
|   13 7b e7 1b  6f 7e 65 b2  76 8e e7 7f  c0 90 54 0d
|   81 6c a6 52  e5 97 48 7b  4e 2d f0 83  ed ac d5 79
|   f9 f7 c1 31  1a ee 68 d0  0d 72 d4 d9  f5 1a b7 ba
|   0c 76 08 78  39 59 02 4a  bb 23 e6 12  1f f3 bc 1d
|   00 b7 b8 22  bf 9c 5d 7b  12 4c fd 32  92 eb 23 7b
|   bb c1 43 4f  de ba 40 a5  56 00 a8 cc  f6 66 0c d0
|   5b 99 b0 94  c2 33 a1 bb  6c 59 5f 26  da 11 a6 ec
|   3c 96 7e d3  8a 1b 7f 59  84 31 30 fd  8b 58 ed cc
|   c5 4b 26 48  b2 b5 7c c8  52 92 99 5a  9f 05 63 6a
|   31 2c 17 fd  07 4f 14 dc  37 d5 09 19  88 19 5e d0
|   db f8 4a 91  48 76 1c b4  57 96 6e be  86 5b e3 cd
|   cb 43 4f 00  8e 05 50 f8  64 31 28 84  2b dd 29 f6
|   d0 f2 93 c9  dd 71 90 b1  4d d9 e9 2e  01 fe 20 9b
|   94 c7 32 62  9e b0 a2 ae  23 d6 67 11  f8 54 d8 fa
|   82 86 a8 ca  bf 55 42 b1  8c b5 ec 39  e2 15 ab 27
|   d3 4e 26 f7  85 37 5a 93  e1 6f ac f6  af c4 95 58
|   7b cb 7e d2  7f 7b 1c 57  a3 2f dd 5f
| state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x55ffe5782fd8
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f0c90002b78
"westnet-eastnet-ah" #2: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds
| event_schedule: new EVENT_RETRANSMIT-pe@0x7f0c90002b78
| inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #2
| libevent_malloc: new ptr-libevent@0x55ffe5785018 size 128
| #2 STATE_QUICK_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29895.504589
| resume sending helper answer for #2 suppresed complete_v1_state_transition()
| #2 spent 0.523 milliseconds in resume sending helper answer
| stop processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7f0c8c003f28
| spent 0.00332 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 444 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500)
|   4f fe ff bb  08 e5 c2 f7  f3 71 17 f7  62 65 9f 92
|   08 10 20 01  6c 4c a9 db  00 00 01 bc  fa ba 13 26
|   ed d4 ba 42  36 6d 6e b3  53 e3 5a bf  c7 b9 0c b9
|   50 22 65 55  d9 b0 72 b3  be a6 61 0e  3d 43 bc df
|   53 2f 84 3e  ae 0e bf 08  69 fd dc 81  c4 d0 db a7
|   91 ca 76 5c  5d de 4a 61  49 c1 69 88  ad e4 e8 7d
|   7c d7 0c 17  ad 10 21 2c  60 8a 70 b8  9e 4b d9 eb
|   01 12 0b 9e  20 64 2b 66  4a 4c a3 57  f4 97 38 88
|   03 64 ab e3  91 59 bd 19  6f 2d 20 3e  73 ee 53 a5
|   36 ec 3e 90  fc 80 0f e7  3c 28 af 5a  62 dc 27 fb
|   90 26 42 18  c9 d7 86 e7  08 7c 01 bb  77 3e 47 6e
|   a5 08 c3 3c  cb fa cf 03  52 5b cb 1e  f4 24 57 04
|   bc d3 81 28  86 a7 a6 df  25 ce ea aa  5d b6 31 86
|   db 6c 95 f1  21 31 6b cb  ad bc 25 db  69 4a 6d f9
|   cc e1 a0 59  b9 91 21 52  bc d4 b4 03  73 15 5e 60
|   46 11 e7 ee  10 20 b5 d0  09 a4 1d 2a  1e f6 f0 ac
|   34 22 94 4a  f5 00 22 d8  9f ad 6b 95  4c 81 c0 c2
|   c3 10 54 7b  40 22 7a 40  13 7a fc 9a  e2 7c af 98
|   7f 3a 00 0e  19 b0 13 8b  ee e5 9f d5  eb ce 53 24
|   09 7c 3b 40  d7 17 a4 c3  0d 95 d3 fe  51 3d 3b 86
|   6b b3 7c 2f  08 d4 15 5f  7c f6 47 8c  ca c6 b5 a2
|   90 6d b2 df  e7 3e 45 a9  ec 82 c9 cc  5f 46 be 0a
|   d6 75 b1 72  e6 ef bc 7c  4b 0a 84 da  f1 26 76 6c
|   eb 32 54 3c  c8 78 0c 24  71 f8 dd 40  cc 8b 81 ee
|   56 85 5f 30  b7 75 73 aa  da f0 7a 18  4f 16 91 b9
|   35 07 0f b0  29 8c d8 a5  3e fa bd e1  8f d9 1f 1d
|   86 a3 8d 90  71 45 19 d6  55 3a ea 0d  53 45 3b 34
|   92 75 31 db  80 c8 08 be  07 09 91 2b
| start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   4f fe ff bb  08 e5 c2 f7
|    responder cookie:
|   f3 71 17 f7  62 65 9f 92
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_QUICK (0x20)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 1816963547 (0x6c4ca9db)
|    length: 444 (0x1bc)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
| State DB: found IKEv1 state #2 in QUICK_I1 (find_state_ikev1)
| start processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1633)
| #2 is idle
| #2 idle
| received encrypted packet from 192.1.2.23:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    length: 36 (0x24)
| got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030
| ***parse ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_NONCE (0xa)
|    length: 52 (0x34)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
| got payload 0x400  (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030
| ***parse ISAKMP Nonce Payload:
|    next payload type: ISAKMP_NEXT_KE (0x4)
|    length: 36 (0x24)
| got payload 0x10  (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030
| ***parse ISAKMP Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_ID (0x5)
|    length: 260 (0x104)
| got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030
| ***parse ISAKMP Identification Payload (IPsec DOI):
|    next payload type: ISAKMP_NEXT_ID (0x5)
|    length: 16 (0x10)
|    ID type: ID_IPV4_ADDR_SUBNET (0x4)
|    Protocol ID: 0 (0x0)
|    port: 0 (0x0)
|      obj:   c0 00 01 00  ff ff ff 00
| got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030
| ***parse ISAKMP Identification Payload (IPsec DOI):
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 16 (0x10)
|    ID type: ID_IPV4_ADDR_SUBNET (0x4)
|    Protocol ID: 0 (0x0)
|    port: 0 (0x0)
|      obj:   c0 00 02 00  ff ff ff 00
| quick_inR1_outI2 HASH(2):
|   87 95 b4 f5  10 be f8 a0  fb f7 5c e3  cc 2a df 34
|   cb 9c 22 4a  c8 ff cc da  6e a9 c8 46  be 27 3b f6
| received 'quick_inR1_outI2' message HASH(2) data ok
| ****parse IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ****parse ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 40 (0x28)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_IPSEC_AH (0x2)
|    SPI size: 4 (0x4)
|    number of transforms: 1 (0x1)
| parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
| SPI  7f 59 37 af
| *****parse ISAKMP Transform Payload (AH):
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 28 (0x1c)
|    AH transform number: 0 (0x0)
|    AH transform ID: AH_AES_XCBC_MAC (0x9)
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+GROUP_DESCRIPTION (0x8003)
|    length/value: 14 (0xe)
|    [14 is OAKLEY_GROUP_MODP2048]
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+ENCAPSULATION_MODE (0x8004)
|    length/value: 1 (0x1)
|    [1 is ENCAPSULATION_MODE_TUNNEL]
| NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+SA_LIFE_TYPE (0x8001)
|    length/value: 1 (0x1)
|    [1 is SA_LIFE_TYPE_SECONDS]
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
|    length/value: 28800 (0x7080)
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+AUTH_ALGORITHM (0x8005)
|    length/value: 9 (0x9)
|    [9 is AUTH_ALGORITHM_AES_XCBC]
| ESP IPsec Transform verified; matches alg_info entry
| started looking for secret for @west->@east of kind PKK_PSK
| actually looking for secret for @west->@east of kind PKK_PSK
| line 1: key type PKK_PSK(@west) to type PKK_RSA
| concluding with best_match=000 best=(nil) (lineno=-1)
| no PreShared Key Found
| adding quick outI2 DH work-order 4 for state #2
| state #2 requesting EVENT_RETRANSMIT to be deleted
| #2 STATE_QUICK_I1: retransmits: cleared
| libevent_free: release ptr-libevent@0x55ffe5785018
| free_event_entry: release EVENT_RETRANSMIT-pe@0x7f0c90002b78
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f0c90002b78
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2
| libevent_malloc: new ptr-libevent@0x7f0c8c003f28 size 128
| complete v1 state transition with STF_SUSPEND
| [RE]START processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648)
| suspending state #2 and saving MD
| #2 is busy; has a suspended MD
| crypto helper 5 resuming
| crypto helper 5 starting work-order 4 for state #2
| #2 spent 0.126 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.376 milliseconds in comm_handle_cb() reading and processing packet
| crypto helper 5 doing compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 4
| crypto helper 5 finished compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 4 time elapsed 0.000849 seconds
| (#2) spent 0.831 milliseconds in crypto helper computing work-order 4: quick outI2 DH (pcr)
| crypto helper 5 sending results from work-order 4 for state #2 to event queue
| scheduling resume sending helper answer for #2
| libevent_malloc: new ptr-libevent@0x7f0c80001f78 size 128
| crypto helper 5 waiting (nothing to do)
| processing resume sending helper answer for #2
| start processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in resume_handler() at server.c:797)
| crypto helper 5 replies to request ID 4
| calling continuation function 0x55ffe4f2cb50
| quick_inR1_outI2_continue for #2: calculated ke+nonce, calculating DH
| **emit ISAKMP Message:
|    initiator cookie:
|   4f fe ff bb  08 e5 c2 f7
|    responder cookie:
|   f3 71 17 f7  62 65 9f 92
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_QUICK (0x20)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 1816963547 (0x6c4ca9db)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address
| ID address  c0 00 01 00
| parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask
| ID mask  ff ff ff 00
| our client is subnet 192.0.1.0/24
| our client protocol/port is 0/0
| parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address
| ID address  c0 00 02 00
| parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask
| ID mask  ff ff ff 00
| peer client is subnet 192.0.2.0/24
| peer client protocol/port is 0/0
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| quick_inR1_outI2 HASH(3):
|   81 bb b2 d7  4e 54 ba 99  e7 ec 4e b9  93 ae 58 ae
|   af c3 b9 60  d9 bf 64 a5  33 ee 78 50  94 fe be da
| install_ipsec_sa() for #2: inbound and outbound
| could_route called for westnet-eastnet-ah (kind=CK_PERMANENT)
| FOR_EACH_CONNECTION_... in route_owner
|  conn westnet-eastnet-ah mark 0/00000000, 0/00000000 vs
|  conn westnet-eastnet-ah mark 0/00000000, 0/00000000
| route owner of "westnet-eastnet-ah" unrouted: NULL; eroute owner: NULL
| setting IPsec SA replay-window to 32
| netlink: enabling tunnel mode
| netlink: aligning IPv4 AH to 32bits as per RFC-4302, Section 3.3.3.2.1
| netlink: setting IPsec SA replay-window to 32 using old-style req
| netlink: esp-hw-offload not set for IPsec SA
| netlink response for Add SA ah.7f5937af@192.1.2.23 included non-error error
| set up outgoing SA, ref=0/0
| setting IPsec SA replay-window to 32
| netlink: enabling tunnel mode
| netlink: aligning IPv4 AH to 32bits as per RFC-4302, Section 3.3.3.2.1
| netlink: setting IPsec SA replay-window to 32 using old-style req
| netlink: esp-hw-offload not set for IPsec SA
| netlink response for Add SA ah.d11807ab@192.1.2.45 included non-error error
| priority calculation of connection "westnet-eastnet-ah" is 0xfe7e7
| add inbound eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => tun.10000@192.1.2.45 (raw_eroute)
| IPsec Sa SPD priority set to 1042407
| raw_eroute result=success
| set up incoming SA, ref=0/0
| sr for #2: unrouted
| route_and_eroute() for proto 0, and source port 0 dest port 0
| FOR_EACH_CONNECTION_... in route_owner
|  conn westnet-eastnet-ah mark 0/00000000, 0/00000000 vs
|  conn westnet-eastnet-ah mark 0/00000000, 0/00000000
| route owner of "westnet-eastnet-ah" unrouted: NULL; eroute owner: NULL
| route_and_eroute with c: westnet-eastnet-ah (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2
| priority calculation of connection "westnet-eastnet-ah" is 0xfe7e7
| eroute_connection add eroute 192.0.1.0/24:0 --0-> 192.0.2.0/24:0 => tun.0@192.1.2.23 (raw_eroute)
| IPsec Sa SPD priority set to 1042407
| raw_eroute result=success
| running updown command "ipsec _updown" for verb up 
| command executing up-client
| executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ah' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='AH' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+AUTHENTICATE+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=
| popen cmd is 1044 chars long
| cmd(   0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ah':
| cmd(  80): PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_:
| cmd( 160):MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLU:
| cmd( 240):TO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_:
| cmd( 320):SA_REQID='16388' PLUTO_SA_TYPE='AH' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east:
| cmd( 400):' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_:
| cmd( 480):CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PE:
| cmd( 560):ER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+AUTHEN:
| cmd( 640):TICATE+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_K:
| cmd( 720):IND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CIS:
| cmd( 800):CO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLU:
| cmd( 880):TO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_:
| cmd( 960):ROUTING='no' VTI_SHARED='no' SPI_IN=0x7f5937af SPI_OUT=0xd11807ab ipsec _updown :
| cmd(1040):2>&1:
| route_and_eroute: firewall_notified: true
| running updown command "ipsec _updown" for verb prepare 
| command executing prepare-client
| executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ah' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='AH' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+AUTHENTICATE+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='n
| popen cmd is 1049 chars long
| cmd(   0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastne:
| cmd(  80):t-ah' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' P:
| cmd( 160):LUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0:
| cmd( 240):' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' P:
| cmd( 320):LUTO_SA_REQID='16388' PLUTO_SA_TYPE='AH' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID=':
| cmd( 400):@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_:
| cmd( 480):PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLU:
| cmd( 560):TO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+A:
| cmd( 640):UTHENTICATE+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_C:
| cmd( 720):ONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEE:
| cmd( 800):R_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER=':
| cmd( 880):' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='':
| cmd( 960): VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x7f5937af SPI_OUT=0xd11807ab ipsec _up:
| cmd(1040):down 2>&1:
| running updown command "ipsec _updown" for verb route 
| command executing route-client
| executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ah' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='AH' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+AUTHENTICATE+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' S
| popen cmd is 1047 chars long
| cmd(   0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-:
| cmd(  80):ah' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLU:
| cmd( 160):TO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' :
| cmd( 240):PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLU:
| cmd( 320):TO_SA_REQID='16388' PLUTO_SA_TYPE='AH' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@e:
| cmd( 400):ast' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PE:
| cmd( 480):ER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO:
| cmd( 560):_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+AUT:
| cmd( 640):HENTICATE+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CON:
| cmd( 720):N_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_:
| cmd( 800):CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' :
| cmd( 880):PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' V:
| cmd( 960):TI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x7f5937af SPI_OUT=0xd11807ab ipsec _updo:
| cmd(1040):wn 2>&1:
| route_and_eroute: instance "westnet-eastnet-ah", setting eroute_owner {spd=0x55ffe5782728,sr=0x55ffe5782728} to #2 (was #0) (newest_ipsec_sa=#0)
| #1 spent 1.75 milliseconds in install_ipsec_sa()
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 76
| inR1_outI2: instance westnet-eastnet-ah[0], setting IKEv1 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1
| DPD: dpd_init() called on IPsec SA
| DPD: Peer does not support Dead Peer Detection
| complete v1 state transition with STF_OK
| [RE]START processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673)
| #2 is idle
| doing_xauth:no, t_xauth_client_done:no
| IKEv1: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
| child state #2: QUICK_I1(established CHILD SA) => QUICK_I2(established CHILD SA)
| event_already_set, deleting event
| state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x7f0c8c003f28
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f0c90002b78
| sending reply packet to 192.1.2.23:500 (from 192.1.2.45:500)
| sending 76 bytes for STATE_QUICK_I1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #2)
|   4f fe ff bb  08 e5 c2 f7  f3 71 17 f7  62 65 9f 92
|   08 10 20 01  6c 4c a9 db  00 00 00 4c  1c e4 31 6a
|   a3 d6 81 38  93 dd 8e de  cf 80 4d 65  9e 72 28 06
|   cf 36 5e 7d  56 57 30 4d  ac 99 12 09  02 04 42 82
|   ad 87 70 8a  22 8e 2c f2  c9 c2 80 c4
| !event_already_set at reschedule
| event_schedule: new EVENT_SA_REPLACE-pe@0x7f0c90002b78
| inserting event EVENT_SA_REPLACE, timeout in 28048 seconds for #2
| libevent_malloc: new ptr-libevent@0x55ffe578cf28 size 128
| pstats #2 ikev1.ipsec established
"westnet-eastnet-ah" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {AH=>0x7f5937af <0xd11807ab xfrm=AES_XCBC_96 NATOA=none NATD=none DPD=passive}
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| close_any(fd@25) (in release_whack() at state.c:654)
| resume sending helper answer for #2 suppresed complete_v1_state_transition()
| #2 spent 2.14 milliseconds in resume sending helper answer
| stop processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7f0c80001f78
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.00451 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.00308 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.00301 milliseconds in signal handler PLUTO_SIGCHLD
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in show_connections_status
| FOR_EACH_CONNECTION_... in show_connections_status
| FOR_EACH_STATE_... in show_states_status (sort_states)
| FOR_EACH_STATE_... in sort_states
| get_sa_info ah.7f5937af@192.1.2.23
| get_sa_info ah.d11807ab@192.1.2.45
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.384 milliseconds in whack
| spent 0.00299 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500)
|   4f fe ff bb  08 e5 c2 f7  f3 71 17 f7  62 65 9f 92
|   08 10 05 01  f7 a3 cd 8c  00 00 00 5c  be 25 c8 0a
|   24 e1 95 38  22 92 7a 8d  fb 0e a4 ef  78 59 f8 14
|   a9 40 56 f2  69 c7 eb 77  d3 bc e6 88  45 69 59 1e
|   37 5f 87 06  0f 91 05 4f  c1 da 54 61  b8 0d 5d bf
|   44 b8 cb 10  ad bb b3 44  c0 12 2d d2
| start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   4f fe ff bb  08 e5 c2 f7
|    responder cookie:
|   f3 71 17 f7  62 65 9f 92
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 4154707340 (0xf7a3cd8c)
|    length: 92 (0x5c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| peer and cookies match on #2; msgid=00000000 st_msgid=6c4ca9db st_msgid_phase15=00000000
| peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
| p15 state object #1 found, in STATE_MAIN_I4
| State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state)
| start processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.23:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_D (0xc)
|    length: 36 (0x24)
| got payload 0x1000  (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0
| ***parse ISAKMP Delete Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 16 (0x10)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 2 (0x2)
|    SPI size: 4 (0x4)
|    number of SPIs: 1 (0x1)
| removing 12 bytes of padding
| informational HASH(1):
|   bf f1 b5 92  ad ac c6 c2  8d 58 44 0c  c4 1a c7 5f
|   99 ee 11 59  71 36 32 3b  e7 d2 7b e7  9e ce 62 d0
| received 'informational' message HASH(1) data ok
| parsing 4 raw bytes of ISAKMP Delete Payload into SPI
| SPI  7f 59 37 af
| FOR_EACH_STATE_... in find_phase2_state_to_delete
| start processing: connection "westnet-eastnet-ah" (BACKGROUND) (in accept_delete() at ikev1_main.c:2515)
"westnet-eastnet-ah" #1: received Delete SA payload: replace IPsec State #2 now
| state #2 requesting EVENT_SA_REPLACE to be deleted
| libevent_free: release ptr-libevent@0x55ffe578cf28
| free_event_entry: release EVENT_SA_REPLACE-pe@0x7f0c90002b78
| event_schedule: new EVENT_SA_REPLACE-pe@0x7f0c90002b78
| inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #2
| libevent_malloc: new ptr-libevent@0x7f0c80001f78 size 128
| stop processing: connection "westnet-eastnet-ah" (BACKGROUND) (in accept_delete() at ikev1_main.c:2559)
| del:
| complete v1 state transition with STF_IGNORE
| #1 spent 0.0043 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.248 milliseconds in comm_handle_cb() reading and processing packet
| timer_event_cb: processing event@0x7f0c90002b78
| handling event EVENT_SA_REPLACE for child state #2
| start processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
| picked newest_ipsec_sa #2 for #2
| replacing stale IPsec SA
| dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351)
| FOR_EACH_STATE_... in find_phase1_state
| creating state object #3 at 0x55ffe578ac08
| State DB: adding IKEv1 state #3 in UNDEFINED
| pstats #3 ikev1.ipsec started
| duplicating state object #1 "westnet-eastnet-ah" as #3 for IPSEC SA
| #3 setting local endpoint to 192.1.2.45:500 from #1.st_localport (in duplicate_state() at state.c:1484)
| suspend processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685)
| start processing: state #3 connection "westnet-eastnet-ah" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685)
| child state #3: UNDEFINED(ignore) => QUICK_I1(established CHILD SA)
"westnet-eastnet-ah" #3: initiating Quick Mode RSASIG+AUTHENTICATE+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO to replace #2 {using isakmp#1 msgid:ee1e5f7e proposal=AES_XCBC_96 pfsgroup=MODP2048}
| adding quick_outI1 KE work-order 5 for state #3
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55ffe5786708
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3
| libevent_malloc: new ptr-libevent@0x55ffe578d6f8 size 128
| stop processing: state #3 connection "westnet-eastnet-ah" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764)
| resume processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764)
| event_schedule: new EVENT_SA_EXPIRE-pe@0x7f0c8c004218
| crypto helper 6 resuming
| inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #2
| libevent_malloc: new ptr-libevent@0x55ffe5782f28 size 128
| libevent_free: release ptr-libevent@0x7f0c80001f78
| free_event_entry: release EVENT_SA_REPLACE-pe@0x7f0c90002b78
| #2 spent 0.14 milliseconds in timer_event_cb() EVENT_SA_REPLACE
| stop processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
| timer_event_cb: processing event@0x7f0c8c004218
| handling event EVENT_SA_EXPIRE for child state #2
| start processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
| picked newest_ipsec_sa #2 for #2
| un-established partial CHILD SA timeout (SA expired)
| pstats #2 ikev1.ipsec re-failed exchange-timeout
| pstats #2 ikev1.ipsec deleted completed
| [RE]START processing: state #2 connection "westnet-eastnet-ah" from 192.1.2.23 (in delete_state() at state.c:879)
"westnet-eastnet-ah" #2: deleting state (STATE_QUICK_I2) aged 5.082s and sending notification
| child state #2: QUICK_I2(established CHILD SA) => delete
| get_sa_info ah.7f5937af@192.1.2.23
| get_sa_info ah.d11807ab@192.1.2.45
"westnet-eastnet-ah" #2: AH traffic information: in=336B out=336B
| #2 send IKEv1 delete notification for STATE_QUICK_I2
| FOR_EACH_STATE_... in find_phase1_state
| **emit ISAKMP Message:
|    initiator cookie:
|   4f fe ff bb  08 e5 c2 f7
|    responder cookie:
|   f3 71 17 f7  62 65 9f 92
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 471464954 (0x1c19fbfa)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Delete Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 2 (0x2)
|    SPI size: 4 (0x4)
|    number of SPIs: 1 (0x1)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D)
| next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg'
| emitting 4 raw bytes of delete payload into ISAKMP Delete Payload
| delete payload  d1 18 07 ab
| emitting length of ISAKMP Delete Payload: 16
| send delete HASH(1):
|   8e e8 e2 90  51 61 dd bc  03 09 db 8a  f4 87 d7 15
|   a7 10 3e ef  0a 95 d4 1d  c9 f2 33 60  bb d3 29 08
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 92
| sending 92 bytes for delete notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1)
|   4f fe ff bb  08 e5 c2 f7  f3 71 17 f7  62 65 9f 92
|   08 10 05 01  1c 19 fb fa  00 00 00 5c  67 79 22 c3
|   0c 03 ad 11  04 09 7a 6b  6c 1a d5 9b  7e b2 f8 18
|   f0 7e 2b 55  aa b2 92 86  c5 08 e1 a6  91 1f be 35
|   f0 df eb 21  47 ba 89 53  6e ee 29 e7  a3 30 47 2b
|   a2 58 72 bd  29 a2 45 1f  53 44 d7 87
| running updown command "ipsec _updown" for verb down 
| command executing down-client
| executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ah' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='AH' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+AUTHENTICATE+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI
| popen cmd is 1046 chars long
| cmd(   0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-a:
| cmd(  80):h' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUT:
| cmd( 160):O_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' P:
| cmd( 240):LUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUT:
| cmd( 320):O_SA_REQID='16388' PLUTO_SA_TYPE='AH' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@ea:
| cmd( 400):st' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEE:
| cmd( 480):R_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_:
| cmd( 560):PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+AUTH:
| cmd( 640):ENTICATE+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN:
| cmd( 720):_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_C:
| cmd( 800):ISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' P:
| cmd( 880):LUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VT:
| cmd( 960):I_ROUTING='no' VTI_SHARED='no' SPI_IN=0x7f5937af SPI_OUT=0xd11807ab ipsec _updow:
| cmd(1040):n 2>&1:
| crypto helper 6 starting work-order 5 for state #3
| crypto helper 6 doing build KE and nonce (quick_outI1 KE); request ID 5
| crypto helper 6 finished build KE and nonce (quick_outI1 KE); request ID 5 time elapsed 0.00095 seconds
| (#3) spent 0.959 milliseconds in crypto helper computing work-order 5: quick_outI1 KE (pcr)
| crypto helper 6 sending results from work-order 5 for state #3 to event queue
| scheduling resume sending helper answer for #3
| libevent_malloc: new ptr-libevent@0x7f0c84002888 size 128
| crypto helper 6 waiting (nothing to do)
| shunt_eroute() called for connection 'westnet-eastnet-ah' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "westnet-eastnet-ah" is 0xfe7e7
| IPsec Sa SPD priority set to 1042407
| delete ah.7f5937af@192.1.2.23
| netlink response for Del SA ah.7f5937af@192.1.2.23 included non-error error
| priority calculation of connection "westnet-eastnet-ah" is 0xfe7e7
| delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => unk255.10000@192.1.2.45 (raw_eroute)
| raw_eroute result=success
| delete ah.d11807ab@192.1.2.45
| netlink response for Del SA ah.d11807ab@192.1.2.45 included non-error error
| in connection_discard for connection westnet-eastnet-ah
| State DB: deleting IKEv1 state #2 in QUICK_I2
| child state #2: QUICK_I2(established CHILD SA) => UNDEFINED(ignore)
| stop processing: state #2 from 192.1.2.23 (in delete_state() at state.c:1143)
| libevent_free: release ptr-libevent@0x55ffe5782f28
| free_event_entry: release EVENT_SA_EXPIRE-pe@0x7f0c8c004218
| in statetime_stop() and could not find #2
| processing: STOP state #0 (in timer_event_cb() at timer.c:557)
| processing resume sending helper answer for #3
| start processing: state #3 connection "westnet-eastnet-ah" from 192.1.2.23 (in resume_handler() at server.c:797)
| crypto helper 6 replies to request ID 5
| calling continuation function 0x55ffe4f2cb50
| quick_outI1_continue for #3: calculated ke+nonce, sending I1
| **emit ISAKMP Message:
|    initiator cookie:
|   4f fe ff bb  08 e5 c2 f7
|    responder cookie:
|   f3 71 17 f7  62 65 9f 92
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_QUICK (0x20)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 3994967934 (0xee1e5f7e)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| emitting quick defaults using policy none
| kernel_alg_db_new() initial trans_cnt=9
| adding proposal: AES_XCBC_96
| kernel_alg_db_new() will return p_new->protoid=2, p_new->trans_cnt=1
| kernel_alg_db_new()     trans[0]: transid=9, attr_cnt=1, attrs[0].type=5, attrs[0].val=9
| returning new proposal from esp_info
| ***emit ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_NONCE (0xa)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
| next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
| next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
| ****emit IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ikev1_out_sa pcn: 0 has 1 valid proposals
| ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 1
| ****emit ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_IPSEC_AH (0x2)
|    SPI size: 4 (0x4)
|    number of transforms: 1 (0x1)
| last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
| netlink_get_spi: allocated 0xe740c76b for ah.0@192.1.2.45
| emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
| SPI  e7 40 c7 6b
| *****emit ISAKMP Transform Payload (AH):
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    AH transform number: 0 (0x0)
|    AH transform ID: AH_AES_XCBC_MAC (0x9)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (AH)'.'next payload type'
| ******emit ISAKMP IPsec DOI attribute:
|    af+type: AF+GROUP_DESCRIPTION (0x8003)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| ******emit ISAKMP IPsec DOI attribute:
|    af+type: AF+ENCAPSULATION_MODE (0x8004)
|    length/value: 1 (0x1)
|     [1 is ENCAPSULATION_MODE_TUNNEL]
| ******emit ISAKMP IPsec DOI attribute:
|    af+type: AF+SA_LIFE_TYPE (0x8001)
|    length/value: 1 (0x1)
|     [1 is SA_LIFE_TYPE_SECONDS]
| ******emit ISAKMP IPsec DOI attribute:
|    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
|    length/value: 28800 (0x7080)
| ******emit ISAKMP IPsec DOI attribute:
|    af+type: AF+AUTH_ALGORITHM (0x8005)
|    length/value: 9 (0x9)
|     [9 is AUTH_ALGORITHM_AES_XCBC]
| emitting length of ISAKMP Transform Payload (AH): 28
| emitting length of ISAKMP Proposal Payload: 40
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (AH)'.'next payload type' is 0
| emitting length of ISAKMP Security Association Payload: 52
| last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
| ***emit ISAKMP Nonce Payload:
|    next payload type: ISAKMP_NEXT_KE (0x4)
| next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE
| next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE)
| next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of Ni into ISAKMP Nonce Payload
| Ni  1e 14 e6 bc  6c 0b 4c a1  e0 3d c2 9f  5d 73 75 e8
| Ni  e7 3b b3 5d  c6 82 92 50  ae b4 0a b0  47 ec 23 c6
| emitting length of ISAKMP Nonce Payload: 36
| ***emit ISAKMP Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_ID (0x5)
| next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID
| next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE)
| next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet'
| emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
| keyex value  b5 fe 79 fd  6f a1 a0 59  8b ff 57 11  ad 46 41 bb
| keyex value  5f fc a4 89  11 52 ac 22  bf d9 c6 b4  aa e0 c5 6f
| keyex value  46 78 5c a5  a3 27 5f 8b  ab 31 ef 25  0e cc f8 be
| keyex value  64 ba f8 cd  7c b7 82 44  36 2e 98 bc  d8 f5 cd e4
| keyex value  17 83 6e 57  b8 f4 a3 8c  50 c5 17 8d  53 a4 08 c0
| keyex value  cb 55 57 e2  92 80 91 da  06 23 e3 76  c4 6f fb 68
| keyex value  7b d5 44 cb  83 14 82 d1  ac bc ec 09  b5 e4 b2 55
| keyex value  2f f9 d0 28  8e 24 4b 96  04 58 19 9d  f8 40 3c d5
| keyex value  b2 d6 a7 2a  e5 59 fe 8b  da 4e 8a 32  a8 25 01 12
| keyex value  48 9d dd 3a  3a 4e 43 1f  78 6d 3c 8a  c9 ff 8c 58
| keyex value  41 b7 5d fe  4c 9d 4b 33  02 25 c5 f3  fe a4 79 c6
| keyex value  e6 a0 7c 95  d9 55 70 96  45 6b be eb  a5 01 6f 8e
| keyex value  66 09 6f 80  3d 06 c7 59  e6 b2 0a 08  8a f9 4e 21
| keyex value  d2 e2 86 f9  b8 17 51 26  c1 83 e1 8f  4a 9a 8e 24
| keyex value  1c 5a 1d ae  a4 eb 4a 07  bd b8 1c 49  f9 8b c8 19
| keyex value  8f 28 cb e0  da 90 93 b8  54 90 81 7c  d6 b6 5f 33
| emitting length of ISAKMP Key Exchange Payload: 260
| ***emit ISAKMP Identification Payload (IPsec DOI):
|    next payload type: ISAKMP_NEXT_ID (0x5)
|    ID type: ID_IPV4_ADDR_SUBNET (0x4)
|    Protocol ID: 0 (0x0)
|    port: 0 (0x0)
| next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID
| next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
| next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
| emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
| client network  c0 00 01 00
| emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
| client mask  ff ff ff 00
| emitting length of ISAKMP Identification Payload (IPsec DOI): 16
| ***emit ISAKMP Identification Payload (IPsec DOI):
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ID type: ID_IPV4_ADDR_SUBNET (0x4)
|    Protocol ID: 0 (0x0)
|    port: 0 (0x0)
| next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
| next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
| emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
| client network  c0 00 02 00
| emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
| client mask  ff ff ff 00
| emitting length of ISAKMP Identification Payload (IPsec DOI): 16
| outI1 HASH(1):
|   8a a5 8f 14  12 31 6d d1  94 e0 35 38  dd 8d 63 9b
|   3d 24 3c 6e  64 3d c7 d2  f2 70 f4 54  42 ab 2f 9d
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 444
| sending 444 bytes for reply packet from quick_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #3)
|   4f fe ff bb  08 e5 c2 f7  f3 71 17 f7  62 65 9f 92
|   08 10 20 01  ee 1e 5f 7e  00 00 01 bc  39 3b b2 a2
|   45 ce 0d d7  bd b7 5a c4  c3 0d c3 8c  ef b1 de 37
|   3d 19 4a 76  28 1b a1 0f  aa 5f c3 5f  8c 2a 6e 00
|   2d a2 17 a9  e7 d2 08 0d  4e 9f e7 61  71 23 89 ee
|   a1 15 c3 f7  c5 00 a0 b6  39 e4 0c 4d  30 a9 a9 5f
|   1c 10 dd 2a  8f 7e 97 0d  23 77 0e 1e  df 4f cb 47
|   3c 6f 88 8d  3f 51 3e e7  4d e0 46 e3  e2 87 21 3d
|   c3 9f c5 21  85 93 41 be  07 05 f0 3a  84 53 e2 97
|   e4 2c 30 ee  3b 84 c3 22  fe ef b4 fe  b9 65 75 44
|   e9 e0 d6 e3  3d e7 b9 17  59 f3 9a b1  f3 59 ae 3c
|   3d e5 21 91  76 35 8f 1d  ae d8 39 96  0e ea 8c bd
|   e6 3d eb 0e  b5 38 1a 9e  2f 5c 9d 21  eb 91 0b 99
|   6c 48 a0 05  bf ca 01 ab  18 2d b6 bc  d0 99 1e c6
|   00 c4 68 f2  a7 0e 8d 52  9b 3f ff 6b  0b d8 7a 17
|   b1 ee 49 28  52 f1 c6 14  80 6a f7 17  02 c4 5a e5
|   06 17 51 7f  ef 9c 49 65  23 3f 23 c0  cb c0 e7 d4
|   6e 9a 33 cb  ac b1 8b ae  80 bf 12 a0  11 34 4a bf
|   5b fd 86 a0  01 38 cf 68  ed 56 34 d4  3e db 9e 7a
|   3b 38 58 3d  1e 5f 79 b0  ab 52 b4 97  9b eb 66 19
|   04 c2 b9 22  de 1a b2 ad  99 82 3c 54  7d a5 cb b1
|   5d f4 ba bf  89 0a f8 23  71 74 74 35  23 11 a7 64
|   16 5e bd 24  84 52 83 10  d2 7b 00 5e  a4 e0 96 3b
|   5f 3c 31 81  4e ba 88 6a  75 d1 4f 2a  73 9f dc 82
|   a3 fe 30 79  08 a2 2d 1c  e5 f9 a1 3f  3e 06 20 66
|   e1 f2 61 be  90 8f 6c a0  d3 7a 2f 0d  16 27 cd d5
|   35 14 f9 b5  34 47 c5 1a  f3 67 7d e9  57 68 f3 84
|   16 80 9f 16  af 37 b8 7b  7d 10 59 b0
| state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x55ffe578d6f8
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55ffe5786708
"westnet-eastnet-ah" #3: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds
| event_schedule: new EVENT_RETRANSMIT-pe@0x55ffe5786708
| inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #3
| libevent_malloc: new ptr-libevent@0x55ffe57851a8 size 128
| #3 STATE_QUICK_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29900.59957
| resume sending helper answer for #3 suppresed complete_v1_state_transition()
| #3 spent 0.535 milliseconds in resume sending helper answer
| stop processing: state #3 connection "westnet-eastnet-ah" from 192.1.2.23 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7f0c84002888
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.0062 milliseconds in signal handler PLUTO_SIGCHLD
| spent 0.00137 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500)
|   4f fe ff bb  08 e5 c2 f7  f3 71 17 f7  62 65 9f 92
|   08 10 05 01  a8 f1 89 2e  00 00 00 5c  99 bf 40 20
|   d8 e3 92 f8  12 9c d3 81  2b 84 35 07  bb 64 37 59
|   ec e7 13 b5  20 59 d4 84  6e af 55 57  b9 eb e0 cf
|   65 d8 d4 fe  f6 b9 c4 58  c7 d6 5a 1a  04 ec 39 4a
|   a7 fc 18 f1  fd 76 de 35  78 b6 ed b7
| start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   4f fe ff bb  08 e5 c2 f7
|    responder cookie:
|   f3 71 17 f7  62 65 9f 92
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 2834401582 (0xa8f1892e)
|    length: 92 (0x5c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| peer and cookies match on #3; msgid=00000000 st_msgid=ee1e5f7e st_msgid_phase15=00000000
| peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
| p15 state object #1 found, in STATE_MAIN_I4
| State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state)
| start processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.23:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_D (0xc)
|    length: 36 (0x24)
| got payload 0x1000  (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0
| ***parse ISAKMP Delete Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 28 (0x1c)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    number of SPIs: 1 (0x1)
| informational HASH(1):
|   3c d6 15 84  ae 21 c3 77  4f 61 83 60  b6 60 a2 d6
|   ab 0c 0d 69  eb b9 32 18  ac 8e cc 8a  79 67 d0 4e
| received 'informational' message HASH(1) data ok
| parsing 8 raw bytes of ISAKMP Delete Payload into iCookie
| iCookie  4f fe ff bb  08 e5 c2 f7
| parsing 8 raw bytes of ISAKMP Delete Payload into rCookie
| rCookie  f3 71 17 f7  62 65 9f 92
| State DB: found IKEv1 state #1 in MAIN_I4 (find_state_ikev1)
| del:
"westnet-eastnet-ah" #1: received Delete SA payload: self-deleting ISAKMP State #1
| pstats #1 ikev1.isakmp deleted completed
| [RE]START processing: state #1 connection "westnet-eastnet-ah" from 192.1.2.23 (in delete_state() at state.c:879)
"westnet-eastnet-ah" #1: deleting state (STATE_MAIN_I4) aged 5.129s and sending notification
| parent state #1: MAIN_I4(established IKE SA) => delete
| #1 send IKEv1 delete notification for STATE_MAIN_I4
| **emit ISAKMP Message:
|    initiator cookie:
|   4f fe ff bb  08 e5 c2 f7
|    responder cookie:
|   f3 71 17 f7  62 65 9f 92
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 3335055348 (0xc6c8e7f4)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Delete Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    number of SPIs: 1 (0x1)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D)
| next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg'
| emitting 8 raw bytes of initiator SPI into ISAKMP Delete Payload
| initiator SPI  4f fe ff bb  08 e5 c2 f7
| emitting 8 raw bytes of responder SPI into ISAKMP Delete Payload
| responder SPI  f3 71 17 f7  62 65 9f 92
| emitting length of ISAKMP Delete Payload: 28
| send delete HASH(1):
|   81 05 51 36  39 86 af 96  90 4f 57 a6  70 9b d0 51
|   4e be 2c 3d  5e 65 1d 57  fe 8d f4 39  51 b8 ce f7
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 92
| sending 92 bytes for delete notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1)
|   4f fe ff bb  08 e5 c2 f7  f3 71 17 f7  62 65 9f 92
|   08 10 05 01  c6 c8 e7 f4  00 00 00 5c  76 ef 8d 89
|   7e e2 cc ee  32 b5 12 3d  53 c3 d6 a8  5f c9 13 0a
|   15 25 4b be  86 26 2a b2  63 e2 23 a1  69 69 ce d2
|   3e 16 0c 6b  52 cf 6e 9b  4e 9b a6 02  ec 49 05 37
|   f2 d7 b1 b1  fc f1 ff 0d  57 7e 4d b1
| state #1 requesting EVENT_SA_REPLACE to be deleted
| libevent_free: release ptr-libevent@0x7f0c88000f48
| free_event_entry: release EVENT_SA_REPLACE-pe@0x55ffe5782eb8
"westnet-eastnet-ah" #1: reschedule pending child #3 STATE_QUICK_I1 of connection "westnet-eastnet-ah" - the parent is going away
| state #3 requesting EVENT_RETRANSMIT to be deleted
| #3 STATE_QUICK_I1: retransmits: cleared
| libevent_free: release ptr-libevent@0x55ffe57851a8
| free_event_entry: release EVENT_RETRANSMIT-pe@0x55ffe5786708
| event_schedule: new EVENT_SA_REPLACE-pe@0x55ffe5786708
| inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #3
| libevent_malloc: new ptr-libevent@0x7f0c84002888 size 128
| State DB: IKEv1 state not found (flush_incomplete_children)
| picked newest_isakmp_sa #0 for #1
"westnet-eastnet-ah" #1: deleting IKE SA for connection 'westnet-eastnet-ah' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS
| add revival: connection 'westnet-eastnet-ah' added to the list and scheduled for 0 seconds
| global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds
| in connection_discard for connection westnet-eastnet-ah
| State DB: deleting IKEv1 state #1 in MAIN_I4
| parent state #1: MAIN_I4(established IKE SA) => UNDEFINED(ignore)
| unreference key: 0x55ffe5783148 @east cnt 2--
| stop processing: state #1 from 192.1.2.23 (in delete_state() at state.c:1143)
| in statetime_start() with no state
| complete v1 state transition with STF_IGNORE
| stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380)
| processing: STOP state #0 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.469 milliseconds in comm_handle_cb() reading and processing packet
| timer_event_cb: processing event@0x55ffe5786708
| handling event EVENT_SA_REPLACE for child state #3
| start processing: state #3 connection "westnet-eastnet-ah" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
| picked newest_ipsec_sa #0 for #3
| replacing stale IPsec SA
| dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351)
| FOR_EACH_STATE_... in find_phase1_state
| creating state object #4 at 0x55ffe57838a8
| State DB: adding IKEv1 state #4 in UNDEFINED
| pstats #4 ikev1.isakmp started
| suspend processing: state #3 connection "westnet-eastnet-ah" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118)
| start processing: state #4 connection "westnet-eastnet-ah" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118)
| parent state #4: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA)
| dup_any(fd@-1) -> fd@-1 (in main_outI1() at ikev1_main.c:123)
| Queuing pending IPsec SA negotiating with 192.1.2.23 "westnet-eastnet-ah" IKE SA #4 "westnet-eastnet-ah"
"westnet-eastnet-ah" #4: initiating Main Mode
| **emit ISAKMP Message:
|    initiator cookie:
|   6a 31 88 66  00 f2 a0 0c
|    responder cookie:
|   00 00 00 00  00 00 00 00
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
| no specific IKE algorithms specified - using defaults
| oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0
| oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0
| oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0
| oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0
| oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0
| oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0
| oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0
| oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0
| oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0
| oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0
| oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0
| oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0
| oakley_alg_makedb() returning 0x55ffe5795c38
| ***emit ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
| next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
| next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
| ****emit IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ikev1_out_sa pcn: 0 has 1 valid proposals
| ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18
| ****emit ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_ISAKMP (0x1)
|    SPI size: 0 (0x0)
|    number of transforms: 18 (0x12)
| last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 0 (0x0)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|     [4 is OAKLEY_SHA2_256]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 1 (0x1)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|     [4 is OAKLEY_SHA2_256]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 2 (0x2)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 6 (0x6)
|     [6 is OAKLEY_SHA2_512]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 3 (0x3)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 6 (0x6)
|     [6 is OAKLEY_SHA2_512]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 4 (0x4)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 2 (0x2)
|     [2 is OAKLEY_SHA1]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 5 (0x5)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 2 (0x2)
|     [2 is OAKLEY_SHA1]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 6 (0x6)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|     [4 is OAKLEY_SHA2_256]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 7 (0x7)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|     [4 is OAKLEY_SHA2_256]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 8 (0x8)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 6 (0x6)
|     [6 is OAKLEY_SHA2_512]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 9 (0x9)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 6 (0x6)
|     [6 is OAKLEY_SHA2_512]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 10 (0xa)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 2 (0x2)
|     [2 is OAKLEY_SHA1]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 11 (0xb)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|     [7 is OAKLEY_AES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 2 (0x2)
|     [2 is OAKLEY_SHA1]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 12 (0xc)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|     [4 is OAKLEY_SHA2_256]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 13 (0xd)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 6 (0x6)
|     [6 is OAKLEY_SHA2_512]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 14 (0xe)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 2 (0x2)
|     [2 is OAKLEY_SHA1]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|     [14 is OAKLEY_GROUP_MODP2048]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 15 (0xf)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|     [4 is OAKLEY_SHA2_256]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    ISAKMP transform number: 16 (0x10)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 6 (0x6)
|     [6 is OAKLEY_SHA2_512]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP transform number: 17 (0x11)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|     [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 2 (0x2)
|     [2 is OAKLEY_SHA1]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|     [3 is OAKLEY_RSA_SIG]
| ******emit ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 5 (0x5)
|     [5 is OAKLEY_GROUP_MODP1536]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| emitting length of ISAKMP Proposal Payload: 632
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0
| emitting length of ISAKMP Security Association Payload: 644
| last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
| out_vid(): sending [FRAGMENTATION]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
| next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
| next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  40 48 b7 d5  6e bc e8 85  25 e7 de 7f  00 d6 c2 d3
| emitting length of ISAKMP Vendor ID Payload: 20
| out_vid(): sending [Dead Peer Detection]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  af ca d7 13  68 a1 f1 c9  6b 86 96 fc  77 57 01 00
| emitting length of ISAKMP Vendor ID Payload: 20
| nat add vid
| sending draft and RFC NATT VIDs
| out_vid(): sending [RFC 3947]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
| next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
| next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
| emitting length of ISAKMP Vendor ID Payload: 20
| skipping VID_NATT_RFC
| out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
| next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
| next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
| emitting length of ISAKMP Vendor ID Payload: 20
| out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
| next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
| next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  90 cb 80 91  3e bb 69 6e  08 63 81 b5  ec 42 7b 1f
| emitting length of ISAKMP Vendor ID Payload: 20
| out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  cd 60 46 43  35 df 21 f8  7c fd b2 fc  68 b6 a4 48
| emitting length of ISAKMP Vendor ID Payload: 20
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 792
| sending 792 bytes for reply packet for main_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #4)
|   6a 31 88 66  00 f2 a0 0c  00 00 00 00  00 00 00 00
|   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
|   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
|   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
|   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
|   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
|   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
|   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
|   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
|   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
|   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
|   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
|   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
|   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
|   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
|   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
|   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
|   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
|   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
|   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
|   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
|   7c fd b2 fc  68 b6 a4 48
"westnet-eastnet-ah" #4: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds
| event_schedule: new EVENT_RETRANSMIT-pe@0x55ffe5782eb8
| inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #4
| libevent_malloc: new ptr-libevent@0x7f0c90003878 size 128
| #4 STATE_MAIN_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29900.60192
| #4 spent 1.81 milliseconds in main_outI1()
| stop processing: state #4 connection "westnet-eastnet-ah" from 192.1.2.23 (in main_outI1() at ikev1_main.c:228)
| event_schedule: new EVENT_SA_EXPIRE-pe@0x7f0c84002b78
| inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #3
| libevent_malloc: new ptr-libevent@0x55ffe578b6f8 size 128
| libevent_free: release ptr-libevent@0x7f0c84002888
| free_event_entry: release EVENT_SA_REPLACE-pe@0x55ffe5786708
| #3 spent 1.85 milliseconds in timer_event_cb() EVENT_SA_REPLACE
| processing: STOP state #0 (in timer_event_cb() at timer.c:557)
| processing global timer EVENT_REVIVE_CONNS
Initiating connection westnet-eastnet-ah which received a Delete/Notify but must remain up per local policy
| FOR_EACH_CONNECTION_... in conn_by_name
| start processing: connection "westnet-eastnet-ah" (in initiate_a_connection() at initiate.c:186)
| kernel_alg_db_new() initial trans_cnt=9
| adding proposal: AES_XCBC_96
| kernel_alg_db_new() will return p_new->protoid=2, p_new->trans_cnt=1
| kernel_alg_db_new()     trans[0]: transid=9, attr_cnt=1, attrs[0].type=5, attrs[0].val=9
| returning new proposal from esp_info
| connection 'westnet-eastnet-ah' +POLICY_UP
| dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342)
| FOR_EACH_STATE_... in find_phase1_state
| Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "westnet-eastnet-ah"
| stop processing: connection "westnet-eastnet-ah" (in initiate_a_connection() at initiate.c:349)
| spent 0.0423 milliseconds in global timer EVENT_REVIVE_CONNS
| timer_event_cb: processing event@0x7f0c84002b78
| handling event EVENT_SA_EXPIRE for child state #3
| start processing: state #3 connection "westnet-eastnet-ah" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
| picked newest_ipsec_sa #0 for #3
| un-established partial CHILD SA timeout (SA expired)
| pstats #3 ikev1.ipsec failed exchange-timeout
| pstats #3 ikev1.ipsec deleted exchange-timeout
| [RE]START processing: state #3 connection "westnet-eastnet-ah" from 192.1.2.23 (in delete_state() at state.c:879)
"westnet-eastnet-ah" #3: deleting state (STATE_QUICK_I1) aged 0.016s and NOT sending notification
| child state #3: QUICK_I1(established CHILD SA) => delete
| child state #3: QUICK_I1(established CHILD SA) => CHILDSA_DEL(informational)
| priority calculation of connection "westnet-eastnet-ah" is 0xfe7e7
| delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => unk255.10000@192.1.2.45 (raw_eroute)
| raw_eroute result=success
| in connection_discard for connection westnet-eastnet-ah
| State DB: deleting IKEv1 state #3 in CHILDSA_DEL
| child state #3: CHILDSA_DEL(informational) => UNDEFINED(ignore)
| stop processing: state #3 from 192.1.2.23 (in delete_state() at state.c:1143)
| libevent_free: release ptr-libevent@0x55ffe578b6f8
| free_event_entry: release EVENT_SA_EXPIRE-pe@0x7f0c84002b78
| in statetime_stop() and could not find #3
| processing: STOP state #0 (in timer_event_cb() at timer.c:557)
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
shutting down
| processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825)
| certs and keys locked by 'free_preshared_secrets'
forgetting secrets
| certs and keys unlocked by 'free_preshared_secrets'
| unreference key: 0x55ffe5783148 @east cnt 1--
| unreference key: 0x55ffe56dbc48 @west cnt 1--
| start processing: connection "westnet-eastnet-ah" (in delete_connection() at connections.c:189)
| removing pending policy for no connection {0x55ffe57752c8}
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| state #4
| suspend processing: connection "westnet-eastnet-ah" (in foreach_state_by_connection_func_delete() at state.c:1310)
| start processing: state #4 connection "westnet-eastnet-ah" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310)
| pstats #4 ikev1.isakmp deleted other
| [RE]START processing: state #4 connection "westnet-eastnet-ah" from 192.1.2.23 (in delete_state() at state.c:879)
"westnet-eastnet-ah" #4: deleting state (STATE_MAIN_I1) aged 0.963s and NOT sending notification
| parent state #4: MAIN_I1(half-open IKE SA) => delete
| state #4 requesting EVENT_RETRANSMIT to be deleted
| #4 STATE_MAIN_I1: retransmits: cleared
| libevent_free: release ptr-libevent@0x7f0c90003878
| free_event_entry: release EVENT_RETRANSMIT-pe@0x55ffe5782eb8
| State DB: IKEv1 state not found (flush_incomplete_children)
| picked newest_isakmp_sa #0 for #4
"westnet-eastnet-ah" #4: deleting IKE SA for connection 'westnet-eastnet-ah' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS
| add revival: connection 'westnet-eastnet-ah' added to the list and scheduled for 5 seconds
| global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds
| stop processing: connection "westnet-eastnet-ah" (BACKGROUND) (in update_state_connection() at connections.c:4076)
| start processing: connection NULL (in update_state_connection() at connections.c:4077)
| in connection_discard for connection westnet-eastnet-ah
| State DB: deleting IKEv1 state #4 in MAIN_I1
| parent state #4: MAIN_I1(half-open IKE SA) => UNDEFINED(ignore)
| stop processing: state #4 from 192.1.2.23 (in delete_state() at state.c:1143)
| processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| shunt_eroute() called for connection 'westnet-eastnet-ah' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "westnet-eastnet-ah" is 0xfe7e7
| priority calculation of connection "westnet-eastnet-ah" is 0xfe7e7
| FOR_EACH_CONNECTION_... in route_owner
|  conn westnet-eastnet-ah mark 0/00000000, 0/00000000 vs
|  conn westnet-eastnet-ah mark 0/00000000, 0/00000000
| route owner of "westnet-eastnet-ah" unrouted: NULL
| running updown command "ipsec _updown" for verb unroute 
| command executing unroute-client
| executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ah' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+AUTHENTICATE+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED=
| popen cmd is 1037 chars long
| cmd(   0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastne:
| cmd(  80):t-ah' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' P:
| cmd( 160):LUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0:
| cmd( 240):' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' P:
| cmd( 320):LUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID:
| cmd( 400):='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUT:
| cmd( 480):O_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' P:
| cmd( 560):LUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG:
| cmd( 640):+AUTHENTICATE+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO:
| cmd( 720):_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_P:
| cmd( 800):EER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER:
| cmd( 880):='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE=:
| cmd( 960):'' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
| free hp@0x55ffe5782dd8
| flush revival: connection 'westnet-eastnet-ah' revival flushed
| processing: STOP connection NULL (in discard_connection() at connections.c:249)
| crl fetch request list locked by 'free_crl_fetch'
| crl fetch request list unlocked by 'free_crl_fetch'
shutting down interface lo/lo 127.0.0.1:4500
shutting down interface lo/lo 127.0.0.1:500
shutting down interface eth0/eth0 192.0.1.254:4500
shutting down interface eth0/eth0 192.0.1.254:500
shutting down interface eth1/eth1 192.1.2.45:4500
shutting down interface eth1/eth1 192.1.2.45:500
| FOR_EACH_STATE_... in delete_states_dead_interfaces
| libevent_free: release ptr-libevent@0x55ffe5775e38
| free_event_entry: release EVENT_NULL-pe@0x55ffe5781928
| libevent_free: release ptr-libevent@0x55ffe570b8a8
| free_event_entry: release EVENT_NULL-pe@0x55ffe57819d8
| libevent_free: release ptr-libevent@0x55ffe570c328
| free_event_entry: release EVENT_NULL-pe@0x55ffe5781a88
| libevent_free: release ptr-libevent@0x55ffe570c568
| free_event_entry: release EVENT_NULL-pe@0x55ffe5781b38
| libevent_free: release ptr-libevent@0x55ffe56e04e8
| free_event_entry: release EVENT_NULL-pe@0x55ffe5781be8
| libevent_free: release ptr-libevent@0x55ffe56e01d8
| free_event_entry: release EVENT_NULL-pe@0x55ffe5781c98
| FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
| libevent_free: release ptr-libevent@0x55ffe5775ee8
| free_event_entry: release EVENT_NULL-pe@0x55ffe5769cd8
| libevent_free: release ptr-libevent@0x55ffe570bbb8
| free_event_entry: release EVENT_NULL-pe@0x55ffe5769c68
| libevent_free: release ptr-libevent@0x55ffe574d4f8
| free_event_entry: release EVENT_NULL-pe@0x55ffe5769128
| global timer EVENT_REINIT_SECRET uninitialized
| global timer EVENT_SHUNT_SCAN uninitialized
| global timer EVENT_PENDING_DDNS uninitialized
| global timer EVENT_PENDING_PHASE2 uninitialized
| global timer EVENT_CHECK_CRLS uninitialized
| global timer EVENT_REVIVE_CONNS uninitialized
| global timer EVENT_FREE_ROOT_CERTS uninitialized
| global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized
| global timer EVENT_NAT_T_KEEPALIVE uninitialized
| libevent_free: release ptr-libevent@0x55ffe5709818
| signal event handler PLUTO_SIGCHLD uninstalled
| libevent_free: release ptr-libevent@0x55ffe5714808
| signal event handler PLUTO_SIGTERM uninstalled
| libevent_free: release ptr-libevent@0x55ffe570c638
| signal event handler PLUTO_SIGHUP uninstalled
| libevent_free: release ptr-libevent@0x55ffe5781528
| signal event handler PLUTO_SIGSYS uninstalled
| releasing event base
| libevent_free: release ptr-libevent@0x55ffe57813f8
| libevent_free: release ptr-libevent@0x55ffe5764518
| libevent_free: release ptr-libevent@0x55ffe57644c8
| libevent_free: release ptr-libevent@0x7f0c8c003e78
| libevent_free: release ptr-libevent@0x55ffe5764418
| libevent_free: release ptr-libevent@0x55ffe57811b8
| libevent_free: release ptr-libevent@0x55ffe57812f8
| libevent_free: release ptr-libevent@0x55ffe57646c8
| libevent_free: release ptr-libevent@0x55ffe5769238
| libevent_free: release ptr-libevent@0x55ffe5769c28
| libevent_free: release ptr-libevent@0x55ffe5781d08
| libevent_free: release ptr-libevent@0x55ffe5781c58
| libevent_free: release ptr-libevent@0x55ffe5781ba8
| libevent_free: release ptr-libevent@0x55ffe5781af8
| libevent_free: release ptr-libevent@0x55ffe5781a48
| libevent_free: release ptr-libevent@0x55ffe5781998
| libevent_free: release ptr-libevent@0x55ffe570a3f8
| libevent_free: release ptr-libevent@0x55ffe5781378
| libevent_free: release ptr-libevent@0x55ffe5781338
| libevent_free: release ptr-libevent@0x55ffe57811f8
| libevent_free: release ptr-libevent@0x55ffe57813b8
| libevent_free: release ptr-libevent@0x55ffe5708948
| libevent_free: release ptr-libevent@0x55ffe56df908
| libevent_free: release ptr-libevent@0x55ffe56dfd38
| libevent_free: release ptr-libevent@0x55ffe5708cb8
| releasing global libevent data
| libevent_free: release ptr-libevent@0x55ffe56dfba8
| libevent_free: release ptr-libevent@0x55ffe56dfcd8
| libevent_free: release ptr-libevent@0x55ffe56dfdd8
leak detective found no leaks