FIPS Product: YES
FIPS Kernel: NO
FIPS Mode: NO
NSS DB directory: sql:/etc/ipsec.d
Initializing NSS
Opening NSS database "sql:/etc/ipsec.d" read-only
NSS initialized
NSS crypto library initialized
FIPS HMAC integrity support [enabled]
FIPS mode disabled for pluto daemon
FIPS HMAC integrity verification self-test FAILED
libcap-ng support [enabled]
Linux audit support [enabled]
Linux audit activated
Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:22797
core dump dir: /tmp
secrets file: /etc/ipsec.secrets
leak-detective enabled
NSS crypto [enabled]
XAUTH PAM support [enabled]
| libevent is using pluto's memory allocator
Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800)
| libevent_malloc: new ptr-libevent@0x558aaa3ed888 size 40
| libevent_malloc: new ptr-libevent@0x558aaa3eccd8 size 40
| libevent_malloc: new ptr-libevent@0x558aaa3ecdd8 size 40
| creating event base
| libevent_malloc: new ptr-libevent@0x558aaa471308 size 56
| libevent_malloc: new ptr-libevent@0x558aaa415c28 size 664
| libevent_malloc: new ptr-libevent@0x558aaa471378 size 24
| libevent_malloc: new ptr-libevent@0x558aaa4713c8 size 384
| libevent_malloc: new ptr-libevent@0x558aaa4712c8 size 16
| libevent_malloc: new ptr-libevent@0x558aaa3ec908 size 40
| libevent_malloc: new ptr-libevent@0x558aaa3ecd38 size 48
| libevent_realloc: new ptr-libevent@0x558aaa4158b8 size 256
| libevent_malloc: new ptr-libevent@0x558aaa471578 size 16
| libevent_free: release ptr-libevent@0x558aaa471308
| libevent initialized
| libevent_realloc: new ptr-libevent@0x558aaa471308 size 64
| global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds
| init_nat_traversal() initialized with keep_alive=0s
NAT-Traversal support  [enabled]
| global one-shot timer EVENT_NAT_T_KEEPALIVE initialized
| global one-shot timer EVENT_FREE_ROOT_CERTS initialized
| global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds
| global one-shot timer EVENT_REVIVE_CONNS initialized
| global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds
| global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds
Encryption algorithms:
  AES_CCM_16              IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm, aes_ccm_c
  AES_CCM_12              IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm_b
  AES_CCM_8               IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm_a
  3DES_CBC                IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  [*192]  3des
  CAMELLIA_CTR            IKEv1:     ESP     IKEv2:     ESP           {256,192,*128}
  CAMELLIA_CBC            IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  camellia
  AES_GCM_16              IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm, aes_gcm_c
  AES_GCM_12              IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm_b
  AES_GCM_8               IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm_a
  AES_CTR                 IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aesctr
  AES_CBC                 IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes
  SERPENT_CBC             IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  serpent
  TWOFISH_CBC             IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  twofish
  TWOFISH_SSH             IKEv1: IKE         IKEv2: IKE ESP           {256,192,*128}  twofish_cbc_ssh
  NULL_AUTH_AES_GMAC      IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_gmac
  NULL                    IKEv1:     ESP     IKEv2:     ESP           []
  CHACHA20_POLY1305       IKEv1:             IKEv2: IKE ESP           [*256]  chacha20poly1305
Hash algorithms:
  MD5                     IKEv1: IKE         IKEv2:                 
  SHA1                    IKEv1: IKE         IKEv2:             FIPS  sha
  SHA2_256                IKEv1: IKE         IKEv2:             FIPS  sha2, sha256
  SHA2_384                IKEv1: IKE         IKEv2:             FIPS  sha384
  SHA2_512                IKEv1: IKE         IKEv2:             FIPS  sha512
PRF algorithms:
  HMAC_MD5                IKEv1: IKE         IKEv2: IKE               md5
  HMAC_SHA1               IKEv1: IKE         IKEv2: IKE         FIPS  sha, sha1
  HMAC_SHA2_256           IKEv1: IKE         IKEv2: IKE         FIPS  sha2, sha256, sha2_256
  HMAC_SHA2_384           IKEv1: IKE         IKEv2: IKE         FIPS  sha384, sha2_384
  HMAC_SHA2_512           IKEv1: IKE         IKEv2: IKE         FIPS  sha512, sha2_512
  AES_XCBC                IKEv1:             IKEv2: IKE               aes128_xcbc
Integrity algorithms:
  HMAC_MD5_96             IKEv1: IKE ESP AH  IKEv2: IKE ESP AH        md5, hmac_md5
  HMAC_SHA1_96            IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha, sha1, sha1_96, hmac_sha1
  HMAC_SHA2_512_256       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha512, sha2_512, sha2_512_256, hmac_sha2_512
  HMAC_SHA2_384_192       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha384, sha2_384, sha2_384_192, hmac_sha2_384
  HMAC_SHA2_256_128       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256
  HMAC_SHA2_256_TRUNCBUG  IKEv1:     ESP AH  IKEv2:         AH      
  AES_XCBC_96             IKEv1:     ESP AH  IKEv2: IKE ESP AH        aes_xcbc, aes128_xcbc, aes128_xcbc_96
  AES_CMAC_96             IKEv1:     ESP AH  IKEv2:     ESP AH  FIPS  aes_cmac
  NONE                    IKEv1:     ESP     IKEv2: IKE ESP     FIPS  null
DH algorithms:
  NONE                    IKEv1:             IKEv2: IKE ESP AH  FIPS  null, dh0
  MODP1536                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH        dh5
  MODP2048                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh14
  MODP3072                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh15
  MODP4096                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh16
  MODP6144                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh17
  MODP8192                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh18
  DH19                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_256, ecp256
  DH20                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_384, ecp384
  DH21                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_521, ecp521
  DH31                    IKEv1: IKE         IKEv2: IKE ESP AH        curve25519
testing CAMELLIA_CBC:
  Camellia: 16 bytes with 128-bit key
  Camellia: 16 bytes with 128-bit key
  Camellia: 16 bytes with 256-bit key
  Camellia: 16 bytes with 256-bit key
testing AES_GCM_16:
  empty string
  one block
  two blocks
  two blocks with associated data
testing AES_CTR:
  Encrypting 16 octets using AES-CTR with 128-bit key
  Encrypting 32 octets using AES-CTR with 128-bit key
  Encrypting 36 octets using AES-CTR with 128-bit key
  Encrypting 16 octets using AES-CTR with 192-bit key
  Encrypting 32 octets using AES-CTR with 192-bit key
  Encrypting 36 octets using AES-CTR with 192-bit key
  Encrypting 16 octets using AES-CTR with 256-bit key
  Encrypting 32 octets using AES-CTR with 256-bit key
  Encrypting 36 octets using AES-CTR with 256-bit key
testing AES_CBC:
  Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key
  Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key
  Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key
  Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key
testing AES_XCBC:
  RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input
  RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input
  RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input
  RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input
  RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input
  RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input
  RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input
  RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16)
  RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10)
  RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18)
testing HMAC_MD5:
  RFC 2104: MD5_HMAC test 1
  RFC 2104: MD5_HMAC test 2
  RFC 2104: MD5_HMAC test 3
8 CPU cores online
starting up 7 crypto helpers
started thread for crypto helper 0
started thread for crypto helper 1
started thread for crypto helper 2
started thread for crypto helper 3
| starting up helper thread 2
| status value returned by setting the priority of this thread (crypto helper 2) 22
started thread for crypto helper 4
| crypto helper 2 waiting (nothing to do)
| starting up helper thread 4
| starting up helper thread 3
started thread for crypto helper 5
| status value returned by setting the priority of this thread (crypto helper 3) 22
| crypto helper 3 waiting (nothing to do)
| status value returned by setting the priority of this thread (crypto helper 4) 22
| starting up helper thread 5
| crypto helper 4 waiting (nothing to do)
| status value returned by setting the priority of this thread (crypto helper 5) 22
| crypto helper 5 waiting (nothing to do)
started thread for crypto helper 6
| starting up helper thread 6
| checking IKEv1 state table
| status value returned by setting the priority of this thread (crypto helper 6) 22
| crypto helper 6 waiting (nothing to do)
|   MAIN_R0: category: half-open IKE SA flags: 0:
|     -> MAIN_R1 EVENT_SO_DISCARD
| starting up helper thread 0
|   MAIN_I1: category: half-open IKE SA flags: 0:
|     -> MAIN_I2 EVENT_RETRANSMIT
|   MAIN_R1: category: open IKE SA flags: 200:
|     -> MAIN_R2 EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
| starting up helper thread 1
| status value returned by setting the priority of this thread (crypto helper 1) 22
| crypto helper 1 waiting (nothing to do)
| status value returned by setting the priority of this thread (crypto helper 0) 22
| crypto helper 0 waiting (nothing to do)
|   MAIN_I2: category: open IKE SA flags: 0:
|     -> MAIN_I3 EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
|   MAIN_R2: category: open IKE SA flags: 0:
|     -> MAIN_R3 EVENT_SA_REPLACE
|     -> MAIN_R3 EVENT_SA_REPLACE
|     -> UNDEFINED EVENT_SA_REPLACE
|   MAIN_I3: category: open IKE SA flags: 0:
|     -> MAIN_I4 EVENT_SA_REPLACE
|     -> MAIN_I4 EVENT_SA_REPLACE
|     -> UNDEFINED EVENT_SA_REPLACE
|   MAIN_R3: category: established IKE SA flags: 200:
|     -> UNDEFINED EVENT_NULL
|   MAIN_I4: category: established IKE SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   AGGR_R0: category: half-open IKE SA flags: 0:
|     -> AGGR_R1 EVENT_SO_DISCARD
|   AGGR_I1: category: half-open IKE SA flags: 0:
|     -> AGGR_I2 EVENT_SA_REPLACE
|     -> AGGR_I2 EVENT_SA_REPLACE
|   AGGR_R1: category: open IKE SA flags: 200:
|     -> AGGR_R2 EVENT_SA_REPLACE
|     -> AGGR_R2 EVENT_SA_REPLACE
|   AGGR_I2: category: established IKE SA flags: 200:
|     -> UNDEFINED EVENT_NULL
|   AGGR_R2: category: established IKE SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   QUICK_R0: category: established CHILD SA flags: 0:
|     -> QUICK_R1 EVENT_RETRANSMIT
|   QUICK_I1: category: established CHILD SA flags: 0:
|     -> QUICK_I2 EVENT_SA_REPLACE
|   QUICK_R1: category: established CHILD SA flags: 0:
|     -> QUICK_R2 EVENT_SA_REPLACE
|   QUICK_I2: category: established CHILD SA flags: 200:
|     -> UNDEFINED EVENT_NULL
|   QUICK_R2: category: established CHILD SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   INFO: category: informational flags: 0:
|     -> UNDEFINED EVENT_NULL
|   INFO_PROTECTED: category: informational flags: 0:
|     -> UNDEFINED EVENT_NULL
|   XAUTH_R0: category: established IKE SA flags: 0:
|     -> XAUTH_R1 EVENT_NULL
|   XAUTH_R1: category: established IKE SA flags: 0:
|     -> MAIN_R3 EVENT_SA_REPLACE
|   MODE_CFG_R0: category: informational flags: 0:
|     -> MODE_CFG_R1 EVENT_SA_REPLACE
|   MODE_CFG_R1: category: established IKE SA flags: 0:
|     -> MODE_CFG_R2 EVENT_SA_REPLACE
|   MODE_CFG_R2: category: established IKE SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   MODE_CFG_I1: category: established IKE SA flags: 0:
|     -> MAIN_I4 EVENT_SA_REPLACE
|   XAUTH_I0: category: established IKE SA flags: 0:
|     -> XAUTH_I1 EVENT_RETRANSMIT
|   XAUTH_I1: category: established IKE SA flags: 0:
|     -> MAIN_I4 EVENT_RETRANSMIT
| checking IKEv2 state table
|   PARENT_I0: category: ignore flags: 0:
|     -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT)
|   PARENT_I1: category: half-open IKE SA flags: 0:
|     -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification)
|     -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH)
|   PARENT_I2: category: open IKE SA flags: 0:
|     -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification)
|     -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification)
|     -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification)
|     -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response)
|     -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification)
|   PARENT_I3: category: established IKE SA flags: 0:
|     -> PARENT_I3 EVENT_RETAIN (I3: Informational Request)
|     -> PARENT_I3 EVENT_RETAIN (I3: Informational Response)
|     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request)
|     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response)
|   PARENT_R0: category: half-open IKE SA flags: 0:
|     -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT)
|   PARENT_R1: category: half-open IKE SA flags: 0:
|     -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED))
|     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request)
|   PARENT_R2: category: established IKE SA flags: 0:
|     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request)
|     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response)
|     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request)
|     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response)
|   V2_CREATE_I0: category: established IKE SA flags: 0:
|     -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA)
|   V2_CREATE_I: category: established IKE SA flags: 0:
|     -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response)
|   V2_REKEY_IKE_I0: category: established IKE SA flags: 0:
|     -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey)
|   V2_REKEY_IKE_I: category: established IKE SA flags: 0:
|     -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response)
|   V2_REKEY_CHILD_I0: category: established IKE SA flags: 0:
|     -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA)
|   V2_REKEY_CHILD_I: category: established IKE SA flags: 0: <none>
|   V2_CREATE_R: category: established IKE SA flags: 0:
|     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request)
|   V2_REKEY_IKE_R: category: established IKE SA flags: 0:
|     -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey)
|   V2_REKEY_CHILD_R: category: established IKE SA flags: 0: <none>
|   V2_IPSEC_I: category: established CHILD SA flags: 0: <none>
|   V2_IPSEC_R: category: established CHILD SA flags: 0: <none>
|   IKESA_DEL: category: established IKE SA flags: 0:
|     -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL)
|   CHILDSA_DEL: category: informational flags: 0: <none>
Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64
| Hard-wiring algorithms
| adding AES_CCM_16 to kernel algorithm db
| adding AES_CCM_12 to kernel algorithm db
| adding AES_CCM_8 to kernel algorithm db
| adding 3DES_CBC to kernel algorithm db
| adding CAMELLIA_CBC to kernel algorithm db
| adding AES_GCM_16 to kernel algorithm db
| adding AES_GCM_12 to kernel algorithm db
| adding AES_GCM_8 to kernel algorithm db
| adding AES_CTR to kernel algorithm db
| adding AES_CBC to kernel algorithm db
| adding SERPENT_CBC to kernel algorithm db
| adding TWOFISH_CBC to kernel algorithm db
| adding NULL_AUTH_AES_GMAC to kernel algorithm db
| adding NULL to kernel algorithm db
| adding CHACHA20_POLY1305 to kernel algorithm db
| adding HMAC_MD5_96 to kernel algorithm db
| adding HMAC_SHA1_96 to kernel algorithm db
| adding HMAC_SHA2_512_256 to kernel algorithm db
| adding HMAC_SHA2_384_192 to kernel algorithm db
| adding HMAC_SHA2_256_128 to kernel algorithm db
| adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db
| adding AES_XCBC_96 to kernel algorithm db
| adding AES_CMAC_96 to kernel algorithm db
| adding NONE to kernel algorithm db
| net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes
| global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds
| setup kernel fd callback
| add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x558aaa475fd8
| libevent_malloc: new ptr-libevent@0x558aaa45a3e8 size 128
| libevent_malloc: new ptr-libevent@0x558aaa4760e8 size 16
| add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x558aaa476b18
| libevent_malloc: new ptr-libevent@0x558aaa417128 size 128
| libevent_malloc: new ptr-libevent@0x558aaa476ad8 size 16
| global one-shot timer EVENT_CHECK_CRLS initialized
selinux support is enabled.
| unbound context created - setting debug level to 5
| /etc/hosts lookups activated
| /etc/resolv.conf usage activated
| outgoing-port-avoid set 0-65535
| outgoing-port-permit set 32768-60999
| Loading dnssec root key from:/var/lib/unbound/root.key
| No additional dnssec trust anchors defined via dnssec-trusted= option
| Setting up events, loop start
| add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x558aaa476b88
| libevent_malloc: new ptr-libevent@0x558aaa482d98 size 128
| libevent_malloc: new ptr-libevent@0x558aaa48e068 size 16
| libevent_realloc: new ptr-libevent@0x558aaa48e0a8 size 256
| libevent_malloc: new ptr-libevent@0x558aaa48e1d8 size 8
| libevent_realloc: new ptr-libevent@0x558aaa3e8918 size 144
| libevent_malloc: new ptr-libevent@0x558aaa416788 size 152
| libevent_malloc: new ptr-libevent@0x558aaa48e218 size 16
| signal event handler PLUTO_SIGCHLD installed
| libevent_malloc: new ptr-libevent@0x558aaa48e258 size 8
| libevent_malloc: new ptr-libevent@0x558aaa419af8 size 152
| signal event handler PLUTO_SIGTERM installed
| libevent_malloc: new ptr-libevent@0x558aaa48e298 size 8
| libevent_malloc: new ptr-libevent@0x558aaa48e2d8 size 152
| signal event handler PLUTO_SIGHUP installed
| libevent_malloc: new ptr-libevent@0x558aaa48e3a8 size 8
| libevent_realloc: release ptr-libevent@0x558aaa3e8918
| libevent_realloc: new ptr-libevent@0x558aaa48e3e8 size 256
| libevent_malloc: new ptr-libevent@0x558aaa48e518 size 152
| signal event handler PLUTO_SIGSYS installed
| created addconn helper (pid:22906) using fork+execve
| forked child 22906
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
listening for IKE messages
| Inspecting interface lo 
| found lo with address 127.0.0.1
| Inspecting interface eth0 
| found eth0 with address 192.0.2.254
| Inspecting interface eth1 
| found eth1 with address 192.1.2.23
Kernel supports NIC esp-hw-offload
adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.23:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
adding interface eth1/eth1 192.1.2.23:4500
adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.2.254:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
adding interface eth0/eth0 192.0.2.254:4500
adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
adding interface lo/lo 127.0.0.1:4500
| no interfaces to sort
| FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
| add_fd_read_event_handler: new ethX-pe@0x558aaa48e9e8
| libevent_malloc: new ptr-libevent@0x558aaa482ce8 size 128
| libevent_malloc: new ptr-libevent@0x558aaa48ea58 size 16
| setup callback for interface lo 127.0.0.1:4500 fd 22
| add_fd_read_event_handler: new ethX-pe@0x558aaa48ea98
| libevent_malloc: new ptr-libevent@0x558aaa417078 size 128
| libevent_malloc: new ptr-libevent@0x558aaa48eb08 size 16
| setup callback for interface lo 127.0.0.1:500 fd 21
| add_fd_read_event_handler: new ethX-pe@0x558aaa48eb48
| libevent_malloc: new ptr-libevent@0x558aaa418868 size 128
| libevent_malloc: new ptr-libevent@0x558aaa48ebb8 size 16
| setup callback for interface eth0 192.0.2.254:4500 fd 20
| add_fd_read_event_handler: new ethX-pe@0x558aaa48ebf8
| libevent_malloc: new ptr-libevent@0x558aaa419668 size 128
| libevent_malloc: new ptr-libevent@0x558aaa48ec68 size 16
| setup callback for interface eth0 192.0.2.254:500 fd 19
| add_fd_read_event_handler: new ethX-pe@0x558aaa48eca8
| libevent_malloc: new ptr-libevent@0x558aaa3ed4e8 size 128
| libevent_malloc: new ptr-libevent@0x558aaa48ed18 size 16
| setup callback for interface eth1 192.1.2.23:4500 fd 18
| add_fd_read_event_handler: new ethX-pe@0x558aaa48ed58
| libevent_malloc: new ptr-libevent@0x558aaa3ed1d8 size 128
| libevent_malloc: new ptr-libevent@0x558aaa48edc8 size 16
| setup callback for interface eth1 192.1.2.23:500 fd 17
| certs and keys locked by 'free_preshared_secrets'
| certs and keys unlocked by 'free_preshared_secrets'
loading secrets from "/etc/ipsec.secrets"
| saving Modulus
| saving PublicExponent
| ignoring PrivateExponent
| ignoring Prime1
| ignoring Prime2
| ignoring Exponent1
| ignoring Exponent2
| ignoring Coefficient
| ignoring CKAIDNSS
| computed rsa CKAID  61 55 99 73  d3 ac ef 7d  3a 37 0e 3e  82 ad 92 c1
| computed rsa CKAID  8a 82 25 f1
loaded private key for keyid: PKK_RSA:AQO9bJbr3
| certs and keys locked by 'process_secret'
| certs and keys unlocked by 'process_secret'
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 1.44 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
listening for IKE messages
| Inspecting interface lo 
| found lo with address 127.0.0.1
| Inspecting interface eth0 
| found eth0 with address 192.0.2.254
| Inspecting interface eth1 
| found eth1 with address 192.1.2.23
| no interfaces to sort
| libevent_free: release ptr-libevent@0x558aaa482ce8
| free_event_entry: release EVENT_NULL-pe@0x558aaa48e9e8
| add_fd_read_event_handler: new ethX-pe@0x558aaa48e9e8
| libevent_malloc: new ptr-libevent@0x558aaa482ce8 size 128
| setup callback for interface lo 127.0.0.1:4500 fd 22
| libevent_free: release ptr-libevent@0x558aaa417078
| free_event_entry: release EVENT_NULL-pe@0x558aaa48ea98
| add_fd_read_event_handler: new ethX-pe@0x558aaa48ea98
| libevent_malloc: new ptr-libevent@0x558aaa417078 size 128
| setup callback for interface lo 127.0.0.1:500 fd 21
| libevent_free: release ptr-libevent@0x558aaa418868
| free_event_entry: release EVENT_NULL-pe@0x558aaa48eb48
| add_fd_read_event_handler: new ethX-pe@0x558aaa48eb48
| libevent_malloc: new ptr-libevent@0x558aaa418868 size 128
| setup callback for interface eth0 192.0.2.254:4500 fd 20
| libevent_free: release ptr-libevent@0x558aaa419668
| free_event_entry: release EVENT_NULL-pe@0x558aaa48ebf8
| add_fd_read_event_handler: new ethX-pe@0x558aaa48ebf8
| libevent_malloc: new ptr-libevent@0x558aaa419668 size 128
| setup callback for interface eth0 192.0.2.254:500 fd 19
| libevent_free: release ptr-libevent@0x558aaa3ed4e8
| free_event_entry: release EVENT_NULL-pe@0x558aaa48eca8
| add_fd_read_event_handler: new ethX-pe@0x558aaa48eca8
| libevent_malloc: new ptr-libevent@0x558aaa3ed4e8 size 128
| setup callback for interface eth1 192.1.2.23:4500 fd 18
| libevent_free: release ptr-libevent@0x558aaa3ed1d8
| free_event_entry: release EVENT_NULL-pe@0x558aaa48ed58
| add_fd_read_event_handler: new ethX-pe@0x558aaa48ed58
| libevent_malloc: new ptr-libevent@0x558aaa3ed1d8 size 128
| setup callback for interface eth1 192.1.2.23:500 fd 17
| certs and keys locked by 'free_preshared_secrets'
forgetting secrets
| certs and keys unlocked by 'free_preshared_secrets'
loading secrets from "/etc/ipsec.secrets"
| saving Modulus
| saving PublicExponent
| ignoring PrivateExponent
| ignoring Prime1
| ignoring Prime2
| ignoring Exponent1
| ignoring Exponent2
| ignoring Coefficient
| ignoring CKAIDNSS
| computed rsa CKAID  61 55 99 73  d3 ac ef 7d  3a 37 0e 3e  82 ad 92 c1
| computed rsa CKAID  8a 82 25 f1
loaded private key for keyid: PKK_RSA:AQO9bJbr3
| certs and keys locked by 'process_secret'
| certs and keys unlocked by 'process_secret'
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.343 milliseconds in whack
| processing signal PLUTO_SIGCHLD
| waitpid returned pid 22906 (exited with status 0)
| reaped addconn helper child (status 0)
| waitpid returned ECHILD (no child processes left)
| spent 0.018 milliseconds in signal handler PLUTO_SIGCHLD
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| Added new connection westnet-eastnet-dh19 with policy ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
| No AUTH policy was set - defaulting to RSASIG
| ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-DH19
| from whack: got --esp=aes-sha1;dh19
| ESP/AH string values: AES_CBC-HMAC_SHA1_96-DH19
| counting wild cards for @west is 0
| counting wild cards for @east is 0
| connect_to_host_pair: 192.1.2.23:500 192.1.2.45:500 -> hp@(nil): none
| new hp@0x558aaa48ff28
added connection description "westnet-eastnet-dh19"
| ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
| 192.0.2.0/24===192.1.2.23<192.1.2.23>[@east]...192.1.2.45<192.1.2.45>[@west]===192.0.1.0/24
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.112 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
add keyid @west
| add pubkey  01 03 a6 f5  d6 3f e3 8f  6c 01 6a fc  7b 7c 6d 57
| add pubkey  8b 49 39 0d  77 f7 ac e2  85 f1 98 1e  4b 6d a5 3e
| add pubkey  b3 96 9a d1  99 5a bc 10  f2 97 de f2  28 f9 5f 92
| add pubkey  09 f0 c8 d4  12 e4 60 6e  9c 60 98 10  01 7d 26 b7
| add pubkey  8f 95 62 2d  87 dd cd de  f6 d3 8f 35  b0 50 d0 18
| add pubkey  f5 99 f8 04  f1 ff 61 5b  bc 7f 1f c0  04 d8 e4 8c
| add pubkey  ac 34 ad 7a  c1 da 3c 2d  8c 30 ae d6  3c 59 b1 3a
| add pubkey  94 d3 d5 2a  73 91 bd 59  5f 3e 72 bf  4a 1b 9d c5
| add pubkey  b2 2b 4d e7  0d 24 3e 77  f9 7f 2d d6  9d 29 ef 70
| add pubkey  7d 7a 6d a2  b8 61 0c 4b  09 4a 06 71  84 70 85 9a
| add pubkey  8f 52 a1 80  06 fd c6 fc  3e 27 fa 16  fa 32 83 a9
| add pubkey  ca 80 db 0f  4a bf f7 e9  55 8e bd 29  4d 23 a6 dc
| add pubkey  2a b3 5d 62  a9 21 1e be  83 d8 69 3c  03 0a 48 8e
| add pubkey  d3 3a 11 f2  86 5a d1 30  65 bd c8 f4  83 87 ff 04
| add pubkey  87 33 05 4f  e0 d8 8c fe  b3 19 4c dd  85 40 f3 4d
| add pubkey  6e e8 49 14  06 2c 1f 59  59 05 8f 20  b0 ca 46 3f
| add pubkey  c9 20 7e 04  30 7d 9a 80  6c 3f 0a 89  f7 d3 af d8
| add pubkey  15 04 37 f9
| computed rsa CKAID  b4 9f 1a ac  9e 45 6e 79  29 c8 81 97  3a 0c 6a d3
| computed rsa CKAID  7f 0f 03 50
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.0741 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
add keyid @east
| add pubkey  01 03 bd 6c  96 eb df 78  89 b3 ed 77  0d a1 7f 7b
| add pubkey  e5 16 c2 c9  e4 7d 92 0a  90 9d 55 43  b4 62 13 03
| add pubkey  85 7a e0 26  7b 54 1f ca  09 93 cf ff  25 c9 02 4c
| add pubkey  78 ca 94 e5  3e ac d1 f9  a8 e5 bb 7f  cc 20 84 e0
| add pubkey  21 c9 f0 0d  c5 44 ba f3  48 64 61 58  f6 0f 63 0d
| add pubkey  d2 67 1e 59  8b ec f3 50  39 71 fb 39  da 11 64 b6
| add pubkey  62 cd 5f d3  8d 2e c1 50  ed 9c 6e 22  0c 39 a7 ce
| add pubkey  62 b5 af 8a  80 0f 2e 4c  05 5c 82 c7  8d 29 02 2e
| add pubkey  bb 23 5f db  f2 9e b5 7d  e2 20 70 1a  63 f3 8e 5d
| add pubkey  ac 47 f0 5c  26 4e b1 d0  42 60 52 4a  b0 77 25 ce
| add pubkey  e0 98 2b 43  f4 c7 59 1a  64 01 83 ea  4e e3 1a 2a
| add pubkey  92 b8 55 ab  63 dd 4b 70  47 29 dc e9  b4 60 bf 43
| add pubkey  4d 58 8f 64  73 95 70 ac  35 89 b2 c2  9c d4 62 c0
| add pubkey  5f 56 5f ad  1b e5 dd 49  93 6a f5 23  82 ed d4 e7
| add pubkey  d5 f1 55 f2  2d a2 26 a6  36 53 2f 94  fb 99 22 5c
| add pubkey  47 cc 6d 80  30 88 96 38  0c f5 f2 ed  37 d0 09 d5
| add pubkey  07 8f 69 ef  a9 99 ce 4d  1a 77 9e 39  c4 38 f3 c5
| add pubkey  51 51 48 ef
| computed rsa CKAID  61 55 99 73  d3 ac ef 7d  3a 37 0e 3e  82 ad 92 c1
| computed rsa CKAID  8a 82 25 f1
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.0654 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in show_connections_status
| FOR_EACH_CONNECTION_... in show_connections_status
| FOR_EACH_STATE_... in show_states_status (sort_states)
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.356 milliseconds in whack
| spent 0.00437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 260 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   2f 10 85 f4  bd 49 7c 59  00 00 00 00  00 00 00 00
|   21 20 22 08  00 00 00 00  00 00 01 04  22 00 00 3c
|   00 00 00 38  01 01 00 05  03 00 00 0c  01 00 00 0c
|   80 0e 01 00  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  02 00 00 02  03 00 00 08  03 00 00 02
|   00 00 00 08  04 00 00 13  28 00 00 48  00 13 00 00
|   31 fa 31 f6  f3 ec 62 d2  a1 5a 3c 2f  f7 27 cd 40
|   9e 40 14 b7  af 1b b5 bf  44 73 8e c0  e3 f6 ea 84
|   71 3b 69 1f  0e b0 6c 43  c0 3a e0 ce  35 3c c7 bd
|   87 69 75 6d  26 cf 84 ff  03 80 29 e3  1d e6 0f b5
|   29 00 00 24  74 14 16 ed  c4 67 49 a7  7a 54 9a 4b
|   62 b9 b3 7a  77 f9 50 27  9f 1f d7 f6  73 e9 d4 1e
|   69 62 5c 04  29 00 00 08  00 00 40 2e  29 00 00 1c
|   00 00 40 04  a9 16 93 62  a2 20 53 84  2c 9c 19 99
|   56 90 75 90  fe 7b 42 e5  00 00 00 1c  00 00 40 05
|   08 d4 dd 28  0f 3a 7f 42  f4 8a 6c e3  fb 16 7e 6d
|   ff fb cd d1
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   2f 10 85 f4  bd 49 7c 59
|    responder cookie:
|   00 00 00 00  00 00 00 00
|    next payload type: ISAKMP_NEXT_v2SA (0x21)
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
|    exchange type: ISAKMP_v2_IKE_SA_INIT (0x22)
|    flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
|    Message ID: 0 (0x0)
|    length: 260 (0x104)
|  processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34)
| I am the IKE SA Original Responder receiving an IKEv2 IKE_SA_INIT request 
| State DB: IKEv2 state not found (find_v2_ike_sa_by_initiator_spi)
| Now let's proceed with payload (ISAKMP_NEXT_v2SA)
| ***parse IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2KE (0x22)
|    flags: none (0x0)
|    length: 60 (0x3c)
| processing payload: ISAKMP_NEXT_v2SA (len=56)
| Now let's proceed with payload (ISAKMP_NEXT_v2KE)
| ***parse IKEv2 Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_v2Ni (0x28)
|    flags: none (0x0)
|    length: 72 (0x48)
|    DH group: OAKLEY_GROUP_ECP_256 (0x13)
| processing payload: ISAKMP_NEXT_v2KE (len=64)
| Now let's proceed with payload (ISAKMP_NEXT_v2Ni)
| ***parse IKEv2 Nonce Payload:
|    next payload type: ISAKMP_NEXT_v2N (0x29)
|    flags: none (0x0)
|    length: 36 (0x24)
| processing payload: ISAKMP_NEXT_v2Ni (len=32)
| Now let's proceed with payload (ISAKMP_NEXT_v2N)
| ***parse IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_v2N (0x29)
|    flags: none (0x0)
|    length: 8 (0x8)
|    Protocol ID: PROTO_v2_RESERVED (0x0)
|    SPI size: 0 (0x0)
|    Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e)
| processing payload: ISAKMP_NEXT_v2N (len=0)
| Now let's proceed with payload (ISAKMP_NEXT_v2N)
| ***parse IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_v2N (0x29)
|    flags: none (0x0)
|    length: 28 (0x1c)
|    Protocol ID: PROTO_v2_RESERVED (0x0)
|    SPI size: 0 (0x0)
|    Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004)
| processing payload: ISAKMP_NEXT_v2N (len=20)
| Now let's proceed with payload (ISAKMP_NEXT_v2N)
| ***parse IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    length: 28 (0x1c)
|    Protocol ID: PROTO_v2_RESERVED (0x0)
|    SPI size: 0 (0x0)
|    Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005)
| processing payload: ISAKMP_NEXT_v2N (len=20)
| DDOS disabled and no cookie sent, continuing
| find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=ECDSA+IKEV2_ALLOW but ignoring ports
| find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
| find_next_host_connection policy=ECDSA+IKEV2_ALLOW
| found policy = RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (westnet-eastnet-dh19)
| find_next_host_connection returns empty
| find_host_connection local=192.1.2.23:500 remote=<none:> policy=ECDSA+IKEV2_ALLOW but ignoring ports
| find_next_host_connection policy=ECDSA+IKEV2_ALLOW
| find_next_host_connection returns empty
| initial parent SA message received on 192.1.2.23:500 but no connection has been authorized with policy ECDSA+IKEV2_ALLOW
| find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=RSASIG+IKEV2_ALLOW but ignoring ports
| find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
| find_next_host_connection policy=RSASIG+IKEV2_ALLOW
| found policy = RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (westnet-eastnet-dh19)
| find_next_host_connection returns westnet-eastnet-dh19
| find_next_host_connection policy=RSASIG+IKEV2_ALLOW
| find_next_host_connection returns empty
| found connection: westnet-eastnet-dh19 with policy RSASIG+IKEV2_ALLOW
| creating state object #1 at 0x558aaa492028
| State DB: adding IKEv2 state #1 in UNDEFINED
| pstats #1 ikev2.ike started
| Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0
| parent state #1: UNDEFINED(ignore) => PARENT_R0(half-open IKE SA)
| Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1
| start processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45 (in ikev2_process_packet() at ikev2.c:2016)
| State DB: IKEv2 state not found (find_v2_sa_by_responder_wip)
| [RE]START processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45 (in ike_process_packet() at ikev2.c:2064)
| #1 st.st_msgid_lastrecv -1 md.hdr.isa_msgid 00000000
| Message ID: #1 not a duplicate - message is new; initiator.sent=-1 initiator.recv=-1 responder.sent=-1 responder.recv=-1
| Message ID: start-responder #1 request 0; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1->0
| #1 in state PARENT_R0: processing SA_INIT request
| selected state microcode Respond to IKE_SA_INIT
| Now let's proceed with state specific processing
| calling processor Respond to IKE_SA_INIT
| #1 updating local interface from 192.1.2.23:500 to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
| constructing local IKE proposals for westnet-eastnet-dh19 (IKE SA responder matching remote proposals)
| converting ike_info AES_CBC-HMAC_SHA1-DH19 to ikev2 ...
| forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128
| ...  ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=ECP_256
"westnet-eastnet-dh19": constructed local IKE proposals for westnet-eastnet-dh19 (IKE SA responder matching remote proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=ECP_256
| Comparing remote proposals against IKE responder 1 local proposals
| local proposal 1 type ENCR has 2 transforms
| local proposal 1 type PRF has 1 transforms
| local proposal 1 type INTEG has 1 transforms
| local proposal 1 type DH has 1 transforms
| local proposal 1 type ESN has 0 transforms
| local proposal 1 transforms: required: ENCR+PRF+INTEG+DH; optional: none
| ****parse IKEv2 Proposal Substructure Payload:
|    last proposal: v2_PROPOSAL_LAST (0x0)
|    length: 56 (0x38)
|    prop #: 1 (0x1)
|    proto ID: IKEv2_SEC_PROTO_IKE (0x1)
|    spi size: 0 (0x0)
|    # transforms: 5 (0x5)
| Comparing remote proposal 1 containing 5 transforms against local proposal [1..1] of 1 local proposals
| *****parse IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    length: 12 (0xc)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_CBC (0xc)
| ******parse IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 1 type 1 (ENCR) transform 0
| *****parse IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    length: 12 (0xc)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_CBC (0xc)
| ******parse IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| *****parse IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    length: 8 (0x8)
|    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
|    IKEv2 transform ID: PRF_HMAC_SHA1 (0x2)
| remote proposal 1 transform 2 (PRF=HMAC_SHA1) matches local proposal 1 type 2 (PRF) transform 0
| *****parse IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    length: 8 (0x8)
|    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
|    IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2)
| remote proposal 1 transform 3 (INTEG=HMAC_SHA1_96) matches local proposal 1 type 3 (INTEG) transform 0
| *****parse IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_LAST (0x0)
|    length: 8 (0x8)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13)
| remote proposal 1 transform 4 (DH=ECP_256) matches local proposal 1 type 4 (DH) transform 0
| remote proposal 1 proposed transforms: ENCR+PRF+INTEG+DH; matched: ENCR+PRF+INTEG+DH; unmatched: none
| comparing remote proposal 1 containing ENCR+PRF+INTEG+DH transforms to local proposal 1; required: ENCR+PRF+INTEG+DH; optional: none; matched: ENCR+PRF+INTEG+DH
| remote proposal 1 matches local proposal 1
"westnet-eastnet-dh19" #1: proposal 1:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=ECP_256 chosen from remote proposals 1:IKE:ENCR=AES_CBC_256;ENCR=AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=ECP_256[first-match]
| accepted IKE proposal ikev2_proposal: 1:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=ECP_256
| converting proposal to internal trans attrs
| natd_hash: rcookie is zero
| natd_hash: hasher=0x558aa9400800(20)
| natd_hash: icookie=  2f 10 85 f4  bd 49 7c 59
| natd_hash: rcookie=  00 00 00 00  00 00 00 00
| natd_hash: ip=  c0 01 02 17
| natd_hash: port=500
| natd_hash: hash=  08 d4 dd 28  0f 3a 7f 42  f4 8a 6c e3  fb 16 7e 6d
| natd_hash: hash=  ff fb cd d1
| natd_hash: rcookie is zero
| natd_hash: hasher=0x558aa9400800(20)
| natd_hash: icookie=  2f 10 85 f4  bd 49 7c 59
| natd_hash: rcookie=  00 00 00 00  00 00 00 00
| natd_hash: ip=  c0 01 02 2d
| natd_hash: port=500
| natd_hash: hash=  a9 16 93 62  a2 20 53 84  2c 9c 19 99  56 90 75 90
| natd_hash: hash=  fe 7b 42 e5
| NAT_TRAVERSAL encaps using auto-detect
| NAT_TRAVERSAL this end is NOT behind NAT
| NAT_TRAVERSAL that end is NOT behind NAT
| NAT_TRAVERSAL nat-keepalive enabled 192.1.2.45
| adding ikev2_inI1outR1 KE work-order 1 for state #1
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x558aaa491d48
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1
| libevent_malloc: new ptr-libevent@0x558aaa490388 size 128
|   #1 spent 0.224 milliseconds in processing: Respond to IKE_SA_INIT in ikev2_process_state_packet()
| [RE]START processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in complete_v2_state_transition() at ikev2.c:3379)
| #1 complete_v2_state_transition() PARENT_R0->PARENT_R1 with status STF_SUSPEND
| suspending state #1 and saving MD
| #1 is busy; has a suspended MD
| [RE]START processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in log_stf_suspend() at ikev2.c:3269)
| "westnet-eastnet-dh19" #1 complete v2 state STATE_PARENT_R0 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451
| stop processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in ikev2_process_packet() at ikev2.c:2018)
| #1 spent 0.577 milliseconds in ikev2_process_packet()
| stop processing: from 192.1.2.45:500 (in process_md() at demux.c:380)
| processing: STOP state #0 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| crypto helper 2 resuming
| crypto helper 2 starting work-order 1 for state #1
| crypto helper 2 doing build KE and nonce (ikev2_inI1outR1 KE); request ID 1
| spent 0.588 milliseconds in comm_handle_cb() reading and processing packet
| crypto helper 2 finished build KE and nonce (ikev2_inI1outR1 KE); request ID 1 time elapsed 0.00093 seconds
| (#1) spent 0.928 milliseconds in crypto helper computing work-order 1: ikev2_inI1outR1 KE (pcr)
| crypto helper 2 sending results from work-order 1 for state #1 to event queue
| scheduling resume sending helper answer for #1
| libevent_malloc: new ptr-libevent@0x7fb8f8001358 size 128
| crypto helper 2 waiting (nothing to do)
| processing resume sending helper answer for #1
| start processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in resume_handler() at server.c:797)
| crypto helper 2 replies to request ID 1
| calling continuation function 0x558aa932bb50
| ikev2_parent_inI1outR1_continue for #1: calculated ke+nonce, sending R1
| **emit ISAKMP Message:
|    initiator cookie:
|   2f 10 85 f4  bd 49 7c 59
|    responder cookie:
|   99 8b 38 83  18 c2 ee eb
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
|    exchange type: ISAKMP_v2_IKE_SA_INIT (0x22)
|    flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
|    Message ID: 0 (0x0)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| Emitting ikev2_proposal ...
| ***emit IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA)
| next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet'
| ****emit IKEv2 Proposal Substructure Payload:
|    last proposal: v2_PROPOSAL_LAST (0x0)
|    prop #: 1 (0x1)
|    proto ID: IKEv2_SEC_PROTO_IKE (0x1)
|    spi size: 0 (0x0)
|    # transforms: 4 (0x4)
| last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_CBC (0xc)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| ******emit IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of IKEv2 Transform Substructure Payload: 12
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
|    IKEv2 transform ID: PRF_HMAC_SHA1 (0x2)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
|    IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_LAST (0x0)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 44
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
| emitting length of IKEv2 Security Association Payload: 48
| last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0
| ***emit IKEv2 Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    DH group: OAKLEY_GROUP_ECP_256 (0x13)
| next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE)
| next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet'
| emitting 64 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload
| ikev2 g^x  09 66 fc 47  52 04 f0 bf  93 a6 a2 a2  05 61 9a 8b
| ikev2 g^x  08 74 d6 8e  f8 09 ac a4  d2 af 81 72  12 78 65 ea
| ikev2 g^x  f9 18 35 a8  06 ff 68 6d  55 ae c1 ab  bb c3 1f 68
| ikev2 g^x  88 6a 09 81  36 1f 77 b1  38 50 e6 05  9f 74 e6 52
| emitting length of IKEv2 Key Exchange Payload: 72
| ***emit IKEv2 Nonce Payload:
|    next payload type: ISAKMP_NEXT_v2N (0x29)
|    flags: none (0x0)
| next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N
| next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni)
| next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload
| IKEv2 nonce  f9 b0 1c e8  23 7b 77 2d  5f 00 9a cf  c5 78 72 06
| IKEv2 nonce  53 eb 07 55  7e 2a 4b 2d  cf 9f e7 76  cc ee 14 76
| emitting length of IKEv2 Nonce Payload: 36
| Adding a v2N Payload
| ***emit IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    Protocol ID: PROTO_v2_RESERVED (0x0)
|    SPI size: 0 (0x0)
|    Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e)
| next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N)
| next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet'
| emitting length of IKEv2 Notify Payload: 8
|  NAT-Traversal support  [enabled] add v2N payloads.
| natd_hash: hasher=0x558aa9400800(20)
| natd_hash: icookie=  2f 10 85 f4  bd 49 7c 59
| natd_hash: rcookie=  99 8b 38 83  18 c2 ee eb
| natd_hash: ip=  c0 01 02 17
| natd_hash: port=500
| natd_hash: hash=  51 1f 49 d3  86 87 5d e3  15 3f 25 38  d7 c9 b0 50
| natd_hash: hash=  02 2b 62 26
| Adding a v2N Payload
| ***emit IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    Protocol ID: PROTO_v2_RESERVED (0x0)
|    SPI size: 0 (0x0)
|    Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004)
| next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N)
| next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet'
| emitting 20 raw bytes of Notify data into IKEv2 Notify Payload
| Notify data  51 1f 49 d3  86 87 5d e3  15 3f 25 38  d7 c9 b0 50
| Notify data  02 2b 62 26
| emitting length of IKEv2 Notify Payload: 28
| natd_hash: hasher=0x558aa9400800(20)
| natd_hash: icookie=  2f 10 85 f4  bd 49 7c 59
| natd_hash: rcookie=  99 8b 38 83  18 c2 ee eb
| natd_hash: ip=  c0 01 02 2d
| natd_hash: port=500
| natd_hash: hash=  7e 80 17 4f  60 8a 55 a0  8a d0 3b 03  f1 7e 02 e5
| natd_hash: hash=  ec 96 7f c5
| Adding a v2N Payload
| ***emit IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    Protocol ID: PROTO_v2_RESERVED (0x0)
|    SPI size: 0 (0x0)
|    Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005)
| next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N)
| next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet'
| emitting 20 raw bytes of Notify data into IKEv2 Notify Payload
| Notify data  7e 80 17 4f  60 8a 55 a0  8a d0 3b 03  f1 7e 02 e5
| Notify data  ec 96 7f c5
| emitting length of IKEv2 Notify Payload: 28
| emitting length of ISAKMP Message: 248
| [RE]START processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in complete_v2_state_transition() at ikev2.c:3379)
| #1 complete_v2_state_transition() PARENT_R0->PARENT_R1 with status STF_OK
| IKEv2: transition from state STATE_PARENT_R0 to state STATE_PARENT_R1
| parent state #1: PARENT_R0(half-open IKE SA) => PARENT_R1(half-open IKE SA)
| Message ID: updating counters for #1 to 0 after switching state
| Message ID: recv #1 request 0; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=-1 responder.recv=-1->0 wip.initiator=-1 wip.responder=0->-1
| Message ID: sent #1 response 0; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=-1->0 responder.recv=0 wip.initiator=-1 wip.responder=-1
"westnet-eastnet-dh19" #1: STATE_PARENT_R1: received v2I1, sent v2R1 {auth=IKEv2 cipher=AES_CBC_256 integ=HMAC_SHA1_96 prf=HMAC_SHA1 group=DH19}
| sending V2 new request packet to 192.1.2.45:500 (from 192.1.2.23:500)
| sending 248 bytes for STATE_PARENT_R0 through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   2f 10 85 f4  bd 49 7c 59  99 8b 38 83  18 c2 ee eb
|   21 20 22 20  00 00 00 00  00 00 00 f8  22 00 00 30
|   00 00 00 2c  01 01 00 04  03 00 00 0c  01 00 00 0c
|   80 0e 01 00  03 00 00 08  02 00 00 02  03 00 00 08
|   03 00 00 02  00 00 00 08  04 00 00 13  28 00 00 48
|   00 13 00 00  09 66 fc 47  52 04 f0 bf  93 a6 a2 a2
|   05 61 9a 8b  08 74 d6 8e  f8 09 ac a4  d2 af 81 72
|   12 78 65 ea  f9 18 35 a8  06 ff 68 6d  55 ae c1 ab
|   bb c3 1f 68  88 6a 09 81  36 1f 77 b1  38 50 e6 05
|   9f 74 e6 52  29 00 00 24  f9 b0 1c e8  23 7b 77 2d
|   5f 00 9a cf  c5 78 72 06  53 eb 07 55  7e 2a 4b 2d
|   cf 9f e7 76  cc ee 14 76  29 00 00 08  00 00 40 2e
|   29 00 00 1c  00 00 40 04  51 1f 49 d3  86 87 5d e3
|   15 3f 25 38  d7 c9 b0 50  02 2b 62 26  00 00 00 1c
|   00 00 40 05  7e 80 17 4f  60 8a 55 a0  8a d0 3b 03
|   f1 7e 02 e5  ec 96 7f c5
| state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x558aaa490388
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x558aaa491d48
| event_schedule: new EVENT_SO_DISCARD-pe@0x558aaa491d48
| inserting event EVENT_SO_DISCARD, timeout in 200 seconds for #1
| libevent_malloc: new ptr-libevent@0x558aaa491db8 size 128
| resume sending helper answer for #1 suppresed complete_v2_state_transition()
| #1 spent 0.449 milliseconds in resume sending helper answer
| stop processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7fb8f8001358
| spent 0.00403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 476 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   2f 10 85 f4  bd 49 7c 59  99 8b 38 83  18 c2 ee eb
|   2e 20 23 08  00 00 00 01  00 00 01 dc  23 00 01 c0
|   0d 86 53 00  af 85 f0 78  25 de 78 e0  bd 56 f4 12
|   c7 b6 3e ce  35 20 b1 78  b8 3d c8 b0  f5 ae 5d ca
|   35 65 68 37  14 68 5d ac  55 b2 10 5c  50 90 00 17
|   f4 68 c1 33  67 98 5a 7a  88 2d 0d 47  00 4a c8 33
|   63 2f 25 45  59 d6 f0 ed  c9 4d cd 37  de 42 45 43
|   10 07 c2 2b  89 5f 48 5b  ec 02 8b 85  7a c6 bb cd
|   83 aa 12 3e  99 77 34 34  83 cd de 00  92 69 dd c2
|   07 a6 f3 3b  16 5b ea 74  da 9b 83 9e  4c 00 9b 4e
|   3f 0a 53 ff  7f e4 b3 06  a3 44 92 f3  6f 5f 00 59
|   8f 60 da 37  d6 11 ba 97  8b 84 6f ee  98 a2 5b 2a
|   0e e0 26 e6  25 44 3a 99  ce db e8 e4  9d c3 0f 24
|   3d 56 fe d6  ff d8 c2 f1  68 d9 ba 8a  5a 9e 30 ae
|   7d b1 64 fd  41 e1 5a db  d1 d5 67 19  81 31 1b 6e
|   28 c9 1f 04  f7 bb 3e f9  11 49 a2 d5  7b cd 5e e4
|   0f 23 48 a4  3a 17 9a 1b  29 a8 69 53  0a ee 50 2e
|   fa 63 21 4d  7d d1 fa 2a  03 de f6 7b  cb fd 4a 47
|   1f 4a a9 49  7b 4f b3 ef  ed 10 14 39  d6 e8 83 32
|   53 98 94 34  14 d3 af 3a  a9 e4 2b 03  62 a3 9b 2c
|   37 fc c9 7c  84 af be e4  47 45 4c 58  6a 57 fa d1
|   18 08 ac e0  ca 95 24 c7  d3 1a be 17  5b c3 61 38
|   3d 4d 89 1b  a1 55 9f c8  f0 d2 7c d3  7b ae 64 52
|   00 be 29 72  bf 15 43 4e  4a 96 54 b9  f2 50 d5 25
|   7c 28 ec d9  d0 97 2c d0  22 ce 8c ba  24 52 96 2c
|   ba 65 1d 09  9d 0d 97 a8  37 43 58 10  34 4e 57 3e
|   2c 98 2d b7  e1 6f 23 75  69 bf 10 c5  4c 6f b7 3c
|   18 45 a4 17  68 d8 48 b6  5b c8 d0 7e  fb ae 5f 95
|   9b 18 87 04  10 53 31 22  23 35 10 e8  2b 16 53 4a
|   23 6c 97 12  0d c8 87 cb  fa ec ba f4
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   2f 10 85 f4  bd 49 7c 59
|    responder cookie:
|   99 8b 38 83  18 c2 ee eb
|    next payload type: ISAKMP_NEXT_v2SK (0x2e)
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
|    exchange type: ISAKMP_v2_IKE_AUTH (0x23)
|    flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
|    Message ID: 1 (0x1)
|    length: 476 (0x1dc)
|  processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35)
| I am the IKE SA Original Responder receiving an IKEv2 IKE_AUTH request 
| State DB: found IKEv2 state #1 in PARENT_R1 (find_v2_ike_sa)
| start processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in ikev2_process_packet() at ikev2.c:2016)
| State DB: IKEv2 state not found (find_v2_sa_by_responder_wip)
| [RE]START processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in ike_process_packet() at ikev2.c:2064)
| #1 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001
| Message ID: #1 not a duplicate - message is new; initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0
| unpacking clear payload
| Now let's proceed with payload (ISAKMP_NEXT_v2SK)
| ***parse IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2IDi (0x23)
|    flags: none (0x0)
|    length: 448 (0x1c0)
| processing payload: ISAKMP_NEXT_v2SK (len=444)
| Message ID: start-responder #1 request 1; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=-1->1
| #1 in state PARENT_R1: received v2I1, sent v2R1
| selected state microcode Responder: process IKE_AUTH request (no SKEYSEED)
| Now let's proceed with state specific processing
| calling processor Responder: process IKE_AUTH request (no SKEYSEED)
| ikev2 parent inI2outR2: calculating g^{xy} in order to decrypt I2
| offloading IKEv2 SKEYSEED using prf=HMAC_SHA1 integ=HMAC_SHA1_96 cipherkey=AES_CBC
| adding ikev2_inI2outR2 KE work-order 2 for state #1
| state #1 requesting EVENT_SO_DISCARD to be deleted
| libevent_free: release ptr-libevent@0x558aaa491db8
| free_event_entry: release EVENT_SO_DISCARD-pe@0x558aaa491d48
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x558aaa491d48
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1
| libevent_malloc: new ptr-libevent@0x7fb8f8001358 size 128
|   #1 spent 0.0367 milliseconds in processing: Responder: process IKE_AUTH request (no SKEYSEED) in ikev2_process_state_packet()
| [RE]START processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in complete_v2_state_transition() at ikev2.c:3379)
| #1 complete_v2_state_transition() PARENT_R1->PARENT_R1 with status STF_SUSPEND
| crypto helper 3 resuming
| suspending state #1 and saving MD
| crypto helper 3 starting work-order 2 for state #1
| #1 is busy; has a suspended MD
| crypto helper 3 doing compute dh (V2) (ikev2_inI2outR2 KE); request ID 2
| [RE]START processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in log_stf_suspend() at ikev2.c:3269)
| "westnet-eastnet-dh19" #1 complete v2 state STATE_PARENT_R1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451
| stop processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in ikev2_process_packet() at ikev2.c:2018)
| #1 spent 0.267 milliseconds in ikev2_process_packet()
| stop processing: from 192.1.2.45:500 (in process_md() at demux.c:380)
| processing: STOP state #0 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.284 milliseconds in comm_handle_cb() reading and processing packet
| calculating skeyseed using prf=sha integ=sha cipherkey-size=32 salt-size=0
| crypto helper 3 finished compute dh (V2) (ikev2_inI2outR2 KE); request ID 2 time elapsed 0.001758 seconds
| (#1) spent 1.74 milliseconds in crypto helper computing work-order 2: ikev2_inI2outR2 KE (pcr)
| crypto helper 3 sending results from work-order 2 for state #1 to event queue
| scheduling resume sending helper answer for #1
| libevent_malloc: new ptr-libevent@0x7fb8f0008a18 size 128
| crypto helper 3 waiting (nothing to do)
| processing resume sending helper answer for #1
| start processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in resume_handler() at server.c:797)
| crypto helper 3 replies to request ID 2
| calling continuation function 0x558aa932bb50
| ikev2_parent_inI2outR2_continue for #1: calculating g^{xy}, sending R2
| #1 in state PARENT_R1: received v2I1, sent v2R1
| data for hmac:  2f 10 85 f4  bd 49 7c 59  99 8b 38 83  18 c2 ee eb
| data for hmac:  2e 20 23 08  00 00 00 01  00 00 01 dc  23 00 01 c0
| data for hmac:  0d 86 53 00  af 85 f0 78  25 de 78 e0  bd 56 f4 12
| data for hmac:  c7 b6 3e ce  35 20 b1 78  b8 3d c8 b0  f5 ae 5d ca
| data for hmac:  35 65 68 37  14 68 5d ac  55 b2 10 5c  50 90 00 17
| data for hmac:  f4 68 c1 33  67 98 5a 7a  88 2d 0d 47  00 4a c8 33
| data for hmac:  63 2f 25 45  59 d6 f0 ed  c9 4d cd 37  de 42 45 43
| data for hmac:  10 07 c2 2b  89 5f 48 5b  ec 02 8b 85  7a c6 bb cd
| data for hmac:  83 aa 12 3e  99 77 34 34  83 cd de 00  92 69 dd c2
| data for hmac:  07 a6 f3 3b  16 5b ea 74  da 9b 83 9e  4c 00 9b 4e
| data for hmac:  3f 0a 53 ff  7f e4 b3 06  a3 44 92 f3  6f 5f 00 59
| data for hmac:  8f 60 da 37  d6 11 ba 97  8b 84 6f ee  98 a2 5b 2a
| data for hmac:  0e e0 26 e6  25 44 3a 99  ce db e8 e4  9d c3 0f 24
| data for hmac:  3d 56 fe d6  ff d8 c2 f1  68 d9 ba 8a  5a 9e 30 ae
| data for hmac:  7d b1 64 fd  41 e1 5a db  d1 d5 67 19  81 31 1b 6e
| data for hmac:  28 c9 1f 04  f7 bb 3e f9  11 49 a2 d5  7b cd 5e e4
| data for hmac:  0f 23 48 a4  3a 17 9a 1b  29 a8 69 53  0a ee 50 2e
| data for hmac:  fa 63 21 4d  7d d1 fa 2a  03 de f6 7b  cb fd 4a 47
| data for hmac:  1f 4a a9 49  7b 4f b3 ef  ed 10 14 39  d6 e8 83 32
| data for hmac:  53 98 94 34  14 d3 af 3a  a9 e4 2b 03  62 a3 9b 2c
| data for hmac:  37 fc c9 7c  84 af be e4  47 45 4c 58  6a 57 fa d1
| data for hmac:  18 08 ac e0  ca 95 24 c7  d3 1a be 17  5b c3 61 38
| data for hmac:  3d 4d 89 1b  a1 55 9f c8  f0 d2 7c d3  7b ae 64 52
| data for hmac:  00 be 29 72  bf 15 43 4e  4a 96 54 b9  f2 50 d5 25
| data for hmac:  7c 28 ec d9  d0 97 2c d0  22 ce 8c ba  24 52 96 2c
| data for hmac:  ba 65 1d 09  9d 0d 97 a8  37 43 58 10  34 4e 57 3e
| data for hmac:  2c 98 2d b7  e1 6f 23 75  69 bf 10 c5  4c 6f b7 3c
| data for hmac:  18 45 a4 17  68 d8 48 b6  5b c8 d0 7e  fb ae 5f 95
| data for hmac:  9b 18 87 04  10 53 31 22  23 35 10 e8  2b 16 53 4a
| calculated auth:  23 6c 97 12  0d c8 87 cb  fa ec ba f4
|   provided auth:  23 6c 97 12  0d c8 87 cb  fa ec ba f4
| authenticator matched
| #1 ikev2 ISAKMP_v2_IKE_AUTH decrypt success
| Now let's proceed with payload (ISAKMP_NEXT_v2IDi)
| **parse IKEv2 Identification - Initiator - Payload:
|    next payload type: ISAKMP_NEXT_v2IDr (0x24)
|    flags: none (0x0)
|    length: 12 (0xc)
|    ID type: ID_FQDN (0x2)
| processing payload: ISAKMP_NEXT_v2IDi (len=4)
| Now let's proceed with payload (ISAKMP_NEXT_v2IDr)
| **parse IKEv2 Identification - Responder - Payload:
|    next payload type: ISAKMP_NEXT_v2AUTH (0x27)
|    flags: none (0x0)
|    length: 12 (0xc)
|    ID type: ID_FQDN (0x2)
| processing payload: ISAKMP_NEXT_v2IDr (len=4)
| Now let's proceed with payload (ISAKMP_NEXT_v2AUTH)
| **parse IKEv2 Authentication Payload:
|    next payload type: ISAKMP_NEXT_v2SA (0x21)
|    flags: none (0x0)
|    length: 282 (0x11a)
|    auth method: IKEv2_AUTH_RSA (0x1)
| processing payload: ISAKMP_NEXT_v2AUTH (len=274)
| Now let's proceed with payload (ISAKMP_NEXT_v2SA)
| **parse IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2TSi (0x2c)
|    flags: none (0x0)
|    length: 56 (0x38)
| processing payload: ISAKMP_NEXT_v2SA (len=52)
| Now let's proceed with payload (ISAKMP_NEXT_v2TSi)
| **parse IKEv2 Traffic Selector - Initiator - Payload:
|    next payload type: ISAKMP_NEXT_v2TSr (0x2d)
|    flags: none (0x0)
|    length: 24 (0x18)
|    number of TS: 1 (0x1)
| processing payload: ISAKMP_NEXT_v2TSi (len=16)
| Now let's proceed with payload (ISAKMP_NEXT_v2TSr)
| **parse IKEv2 Traffic Selector - Responder - Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    length: 24 (0x18)
|    number of TS: 1 (0x1)
| processing payload: ISAKMP_NEXT_v2TSr (len=16)
| selected state microcode Responder: process IKE_AUTH request
| Now let's proceed with state specific processing
| calling processor Responder: process IKE_AUTH request
"westnet-eastnet-dh19" #1: processing decrypted IKE_AUTH request: SK{IDi,IDr,AUTH,SA,TSi,TSr}
| #1 updating local interface from 192.1.2.23:500 to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
| received IDr payload - extracting our alleged ID
| refine_host_connection for IKEv2: starting with "westnet-eastnet-dh19"
|    match_id a=@west
|             b=@west
|    results  matched
| refine_host_connection: checking "westnet-eastnet-dh19" against "westnet-eastnet-dh19", best=(none) with match=1(id=1(0)/ca=1(0)/reqca=1(0))
| Warning: not switching back to template of current instance
| Peer expects us to be @east (ID_FQDN) according to its IDr payload
| This connection's local id is @east (ID_FQDN)
| refine_host_connection: checked westnet-eastnet-dh19 against westnet-eastnet-dh19, now for see if best
| started looking for secret for @east->@west of kind PKK_RSA
| actually looking for secret for @east->@west of kind PKK_RSA
| line 1: key type PKK_RSA(@east) to type PKK_RSA
| 1: compared key (none) to @east / @west -> 002
| 2: compared key (none) to @east / @west -> 002
| line 1: match=002
| match 002 beats previous best_match 000 match=0x558aaa3e8b58 (line=1)
| concluding with best_match=002 best=0x558aaa3e8b58 (lineno=1)
| returning because exact peer id match
| offered CA: '%none'
"westnet-eastnet-dh19" #1: IKEv2 mode peer ID is ID_FQDN: '@west'
| verifying AUTH payload
| required RSA CA is '%any'
| checking RSA keyid '@east' for match with '@west'
| checking RSA keyid '@west' for match with '@west'
| key issuer CA is '%any'
| an RSA Sig check passed with *AQOm9dY/4 [preloaded key]
|       #1 spent 0.0689 milliseconds in try_all_RSA_keys() trying a pubkey
"westnet-eastnet-dh19" #1: Authenticated using RSA
|     #1 spent 0.093 milliseconds in ikev2_verify_rsa_hash()
| parent state #1: PARENT_R1(half-open IKE SA) => PARENT_R2(established IKE SA)
| #1 will start re-keying in 3330 seconds with margin of 270 seconds (attempting re-key)
| state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x7fb8f8001358
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x558aaa491d48
| event_schedule: new EVENT_SA_REKEY-pe@0x558aaa491d48
| inserting event EVENT_SA_REKEY, timeout in 3330 seconds for #1
| libevent_malloc: new ptr-libevent@0x558aaa490388 size 128
| pstats #1 ikev2.ike established
| **emit ISAKMP Message:
|    initiator cookie:
|   2f 10 85 f4  bd 49 7c 59
|    responder cookie:
|   99 8b 38 83  18 c2 ee eb
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
|    exchange type: ISAKMP_v2_IKE_AUTH (0x23)
|    flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
|    Message ID: 1 (0x1)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| IKEv2 CERT: send a certificate?
| IKEv2 CERT: no certificate to send
| ***emit IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK)
| next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet'
| emitting 16 zero bytes of IV into IKEv2 Encryption Payload
| Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED
| ****emit IKEv2 Identification - Responder - Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    ID type: ID_FQDN (0x2)
| next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Responder - Payload (36:ISAKMP_NEXT_v2IDr)
| next payload chain: saving location 'IKEv2 Identification - Responder - Payload'.'next payload type' in 'reply packet'
| emitting 4 raw bytes of my identity into IKEv2 Identification - Responder - Payload
| my identity  65 61 73 74
| emitting length of IKEv2 Identification - Responder - Payload: 12
| assembled IDr payload
| CHILD SA proposals received
| going to assemble AUTH payload
| ****emit IKEv2 Authentication Payload:
|    next payload type: ISAKMP_NEXT_v2SA (0x21)
|    flags: none (0x0)
|    auth method: IKEv2_AUTH_RSA (0x1)
| next payload chain: ignoring supplied 'IKEv2 Authentication Payload'.'next payload type' value 33:ISAKMP_NEXT_v2SA
| next payload chain: setting previous 'IKEv2 Identification - Responder - Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH)
| next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet'
| started looking for secret for @east->@west of kind PKK_RSA
| actually looking for secret for @east->@west of kind PKK_RSA
| line 1: key type PKK_RSA(@east) to type PKK_RSA
| 1: compared key (none) to @east / @west -> 002
| 2: compared key (none) to @east / @west -> 002
| line 1: match=002
| match 002 beats previous best_match 000 match=0x558aaa3e8b58 (line=1)
| concluding with best_match=002 best=0x558aaa3e8b58 (lineno=1)
|       #1 spent 8.18 milliseconds in ikev2_calculate_rsa_hash() calling sign_hash_RSA()
| emitting 274 raw bytes of rsa signature into IKEv2 Authentication Payload
| rsa signature  21 53 8f df  13 49 0c 9e  a8 61 20 08  bd 94 fe 1f
| rsa signature  a7 ed 8b 14  67 7f f6 a9  f7 e1 55 72  67 ab f5 97
| rsa signature  8f 70 73 f0  24 1b 06 56  73 66 35 5e  c9 a4 3d d4
| rsa signature  c5 e0 fa fc  f9 de 12 b0  db 4e 3d 17  e2 66 df 9a
| rsa signature  d7 d5 da e6  fb 0d 5d 6e  03 87 d0 ee  dd 9d 8f b5
| rsa signature  d4 2a 8f 17  ad 45 2f b8  80 dd 6d 82  c8 6c e2 be
| rsa signature  87 14 a5 fa  66 70 4f da  2a 48 ba 96  29 2f 18 c3
| rsa signature  57 49 98 f8  0c 9c e3 21  bf 5b a8 ad  f9 c1 aa 62
| rsa signature  79 76 18 ed  d5 24 e7 f0  61 f0 34 b9  85 89 08 8d
| rsa signature  c9 53 db cc  04 a1 a1 ee  a2 aa 79 ae  c6 de 35 5a
| rsa signature  e9 9b 43 5b  2e ad 86 d1  3f a2 5b 72  b8 ce a2 2f
| rsa signature  df ae 1a 1e  84 99 a7 9e  a6 ee bd 72  37 7f 82 f8
| rsa signature  a8 0f 88 14  01 a6 fa 3e  5d 4e 6d 8e  67 9e bb 46
| rsa signature  40 ed 88 06  fc ef d1 a5  77 86 d0 a4  16 0b 9e ef
| rsa signature  18 b6 21 d4  09 3f 7e cf  74 fe 30 9a  5c bc 74 f9
| rsa signature  da 95 e2 6b  f2 ba 61 c3  a1 6a 84 14  24 08 9b 5f
| rsa signature  96 c8 28 75  33 90 bf 1a  c7 4e 1d c5  82 58 db 5b
| rsa signature  6e c4
|     #1 spent 8.29 milliseconds in ikev2_calculate_rsa_hash()
| emitting length of IKEv2 Authentication Payload: 282
| creating state object #2 at 0x558aaa497318
| State DB: adding IKEv2 state #2 in UNDEFINED
| pstats #2 ikev2.child started
| duplicating state object #1 "westnet-eastnet-dh19" as #2 for IPSEC SA
| #2 setting local endpoint to 192.1.2.23:500 from #1.st_localport (in duplicate_state() at state.c:1484)
| Message ID: init_child #1.#2; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0; child: wip.initiator=0->-1 wip.responder=0->-1
| Message ID: switch-from #1 request 1; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=1->-1
| Message ID: switch-to #1.#2 request 1; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0; child: wip.initiator=-1 wip.responder=-1->1
| Child SA TS Request has ike->sa == md->st; so using parent connection
| TSi: parsing 1 traffic selectors
| ***parse IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7)
|    IP Protocol ID: 0 (0x0)
|    length: 16 (0x10)
|    start port: 0 (0x0)
|    end port: 65535 (0xffff)
| parsing 4 raw bytes of IKEv2 Traffic Selector into TS low
| TS low  c0 00 01 00
| parsing 4 raw bytes of IKEv2 Traffic Selector into TS high
| TS high  c0 00 01 ff
| TSi: parsed 1 traffic selectors
| TSr: parsing 1 traffic selectors
| ***parse IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7)
|    IP Protocol ID: 0 (0x0)
|    length: 16 (0x10)
|    start port: 0 (0x0)
|    end port: 65535 (0xffff)
| parsing 4 raw bytes of IKEv2 Traffic Selector into TS low
| TS low  c0 00 02 00
| parsing 4 raw bytes of IKEv2 Traffic Selector into TS high
| TS high  c0 00 02 ff
| TSr: parsed 1 traffic selectors
| looking for best SPD in current connection
| evaluating our conn="westnet-eastnet-dh19" I=192.0.1.0/24:0/0 R=192.0.2.0/24:0/0 to their:
|     TSi[0] .net=192.0.1.0-192.0.1.255 .iporotoid=0 .{start,end}port=0..65535
|         match address end->client=192.0.1.0/24 == TSi[0]net=192.0.1.0-192.0.1.255: YES fitness 32
|         narrow port end=0..65535 == TSi[0]=0..65535: 0
|           TSi[0] port match: YES fitness 65536
|         narrow protocol end=*0 == TSi[0]=*0: 0
|         match end->protocol=*0 == TSi[0].ipprotoid=*0: YES fitness 255
|     TSr[0] .net=192.0.2.0-192.0.2.255 .iporotoid=0 .{start,end}port=0..65535
|         match address end->client=192.0.2.0/24 == TSr[0]net=192.0.2.0-192.0.2.255: YES fitness 32
|         narrow port end=0..65535 == TSr[0]=0..65535: 0
|           TSr[0] port match: YES fitness 65536
|         narrow protocol end=*0 == TSr[0]=*0: 0
|         match end->protocol=*0 == TSr[0].ipprotoid=*0: YES fitness 255
| best fit so far: TSi[0] TSr[0]
|     found better spd route for TSi[0],TSr[0]
| looking for better host pair
| find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
|   checking hostpair 192.0.2.0/24 -> 192.0.1.0/24 is found
|   investigating connection "westnet-eastnet-dh19" as a better match
|    match_id a=@west
|             b=@west
|    results  matched
| evaluating our conn="westnet-eastnet-dh19" I=192.0.1.0/24:0/0 R=192.0.2.0/24:0/0 to their:
|     TSi[0] .net=192.0.1.0-192.0.1.255 .iporotoid=0 .{start,end}port=0..65535
|         match address end->client=192.0.1.0/24 == TSi[0]net=192.0.1.0-192.0.1.255: YES fitness 32
|         narrow port end=0..65535 == TSi[0]=0..65535: 0
|           TSi[0] port match: YES fitness 65536
|         narrow protocol end=*0 == TSi[0]=*0: 0
|         match end->protocol=*0 == TSi[0].ipprotoid=*0: YES fitness 255
|     TSr[0] .net=192.0.2.0-192.0.2.255 .iporotoid=0 .{start,end}port=0..65535
|         match address end->client=192.0.2.0/24 == TSr[0]net=192.0.2.0-192.0.2.255: YES fitness 32
|         narrow port end=0..65535 == TSr[0]=0..65535: 0
|           TSr[0] port match: YES fitness 65536
|         narrow protocol end=*0 == TSr[0]=*0: 0
|         match end->protocol=*0 == TSr[0].ipprotoid=*0: YES fitness 255
| best fit so far: TSi[0] TSr[0]
|   did not find a better connection using host pair
| printing contents struct traffic_selector
|   ts_type: IKEv2_TS_IPV4_ADDR_RANGE
|   ipprotoid: 0
|   port range: 0-65535
|   ip range: 192.0.2.0-192.0.2.255
| printing contents struct traffic_selector
|   ts_type: IKEv2_TS_IPV4_ADDR_RANGE
|   ipprotoid: 0
|   port range: 0-65535
|   ip range: 192.0.1.0-192.0.1.255
| constructing ESP/AH proposals with all DH removed  for westnet-eastnet-dh19 (IKE_AUTH responder matching remote ESP/AH proposals)
| converting proposal AES_CBC-HMAC_SHA1_96-DH19 to ikev2 ...
| forcing IKEv2 PROTO_v2_ESP aes ENCRYPT transform low-to-high key lengths: 128 256
| ...  ikev2_proposal: 1:ESP:ENCR=AES_CBC_128,AES_CBC_256;INTEG=HMAC_SHA1_96;DH=NONE;ESN=DISABLED
"westnet-eastnet-dh19": constructed local ESP/AH proposals for westnet-eastnet-dh19 (IKE_AUTH responder matching remote ESP/AH proposals): 1:ESP:ENCR=AES_CBC_128,AES_CBC_256;INTEG=HMAC_SHA1_96;DH=NONE;ESN=DISABLED
| Comparing remote proposals against IKE_AUTH responder matching remote ESP/AH proposals 1 local proposals
| local proposal 1 type ENCR has 2 transforms
| local proposal 1 type PRF has 0 transforms
| local proposal 1 type INTEG has 1 transforms
| local proposal 1 type DH has 1 transforms
| local proposal 1 type ESN has 1 transforms
| local proposal 1 transforms: required: ENCR+INTEG+ESN; optional: DH
| ***parse IKEv2 Proposal Substructure Payload:
|    last proposal: v2_PROPOSAL_LAST (0x0)
|    length: 52 (0x34)
|    prop #: 1 (0x1)
|    proto ID: IKEv2_SEC_PROTO_ESP (0x3)
|    spi size: 4 (0x4)
|    # transforms: 4 (0x4)
| parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI
| remote SPI  23 81 3f 56
| Comparing remote proposal 1 containing 4 transforms against local proposal [1..1] of 1 local proposals
| ****parse IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    length: 12 (0xc)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_CBC (0xc)
| *****parse IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| remote proposal 1 transform 0 (ENCR=AES_CBC_128) matches local proposal 1 type 1 (ENCR) transform 0
| ****parse IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    length: 12 (0xc)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_CBC (0xc)
| *****parse IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| ****parse IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    length: 8 (0x8)
|    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
|    IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2)
| remote proposal 1 transform 2 (INTEG=HMAC_SHA1_96) matches local proposal 1 type 3 (INTEG) transform 0
| ****parse IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_LAST (0x0)
|    length: 8 (0x8)
|    IKEv2 transform type: TRANS_TYPE_ESN (0x5)
|    IKEv2 transform ID: ESN_DISABLED (0x0)
| remote proposal 1 transform 3 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0
| remote proposal 1 proposed transforms: ENCR+INTEG+ESN; matched: ENCR+INTEG+ESN; unmatched: none
| comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 1; required: ENCR+INTEG+ESN; optional: DH; matched: ENCR+INTEG+ESN
| remote proposal 1 matches local proposal 1
"westnet-eastnet-dh19" #1: proposal 1:ESP:SPI=23813f56;ENCR=AES_CBC_128;INTEG=HMAC_SHA1_96;ESN=DISABLED chosen from remote proposals 1:ESP:ENCR=AES_CBC_128;ENCR=AES_CBC_256;INTEG=HMAC_SHA1_96;ESN=DISABLED[first-match]
| IKE_AUTH responder matching remote ESP/AH proposals ikev2_proposal: 1:ESP:SPI=23813f56;ENCR=AES_CBC_128;INTEG=HMAC_SHA1_96;ESN=DISABLED
| converting proposal to internal trans attrs
| netlink_get_spi: allocated 0x45facbc0 for esp.0@192.1.2.23
| Emitting ikev2_proposal ...
| ****emit IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
| next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA)
| next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet'
| *****emit IKEv2 Proposal Substructure Payload:
|    last proposal: v2_PROPOSAL_LAST (0x0)
|    prop #: 1 (0x1)
|    proto ID: IKEv2_SEC_PROTO_ESP (0x3)
|    spi size: 4 (0x4)
|    # transforms: 3 (0x3)
| last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  45 fa cb c0
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_CBC (0xc)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| *******emit IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of IKEv2 Transform Substructure Payload: 12
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
|    IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_LAST (0x0)
|    IKEv2 transform type: TRANS_TYPE_ESN (0x5)
|    IKEv2 transform ID: ESN_DISABLED (0x0)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 40
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
| emitting length of IKEv2 Security Association Payload: 44
| last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0
| ****emit IKEv2 Traffic Selector - Initiator - Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    number of TS: 1 (0x1)
| next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi)
| next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet'
| *****emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7)
|    IP Protocol ID: 0 (0x0)
|    start port: 0 (0x0)
|    end port: 65535 (0xffff)
| emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector
| ipv4 start  c0 00 01 00
| emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector
| ipv4 end  c0 00 01 ff
| emitting length of IKEv2 Traffic Selector: 16
| emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24
| ****emit IKEv2 Traffic Selector - Responder - Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    number of TS: 1 (0x1)
| next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr)
| next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet'
| *****emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7)
|    IP Protocol ID: 0 (0x0)
|    start port: 0 (0x0)
|    end port: 65535 (0xffff)
| emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector
| ipv4 start  c0 00 02 00
| emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector
| ipv4 end  c0 00 02 ff
| emitting length of IKEv2 Traffic Selector: 16
| emitting length of IKEv2 Traffic Selector - Responder - Payload: 24
| Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED
| integ=sha: .key_size=20 encrypt=aes: .key_size=16 .salt_size=0 keymat_len=36
| FOR_EACH_CONNECTION_... in ISAKMP_SA_established
| install_ipsec_sa() for #2: inbound and outbound
| could_route called for westnet-eastnet-dh19 (kind=CK_PERMANENT)
| FOR_EACH_CONNECTION_... in route_owner
|  conn westnet-eastnet-dh19 mark 0/00000000, 0/00000000 vs
|  conn westnet-eastnet-dh19 mark 0/00000000, 0/00000000
| route owner of "westnet-eastnet-dh19" unrouted: NULL; eroute owner: NULL
| looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96
| encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12
| st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20
| setting IPsec SA replay-window to 32
| NIC esp-hw-offload not for connection 'westnet-eastnet-dh19' not available on interface eth1
| netlink: enabling tunnel mode
| netlink: setting IPsec SA replay-window to 32 using old-style req
| netlink: esp-hw-offload not set for IPsec SA
| netlink response for Add SA esp.23813f56@192.1.2.45 included non-error error
| set up outgoing SA, ref=0/0
| looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96
| encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12
| st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20
| setting IPsec SA replay-window to 32
| NIC esp-hw-offload not for connection 'westnet-eastnet-dh19' not available on interface eth1
| netlink: enabling tunnel mode
| netlink: setting IPsec SA replay-window to 32 using old-style req
| netlink: esp-hw-offload not set for IPsec SA
| netlink response for Add SA esp.45facbc0@192.1.2.23 included non-error error
| priority calculation of connection "westnet-eastnet-dh19" is 0xfe7e7
| add inbound eroute 192.0.1.0/24:0 --0-> 192.0.2.0/24:0 => tun.10000@192.1.2.23 (raw_eroute)
| IPsec Sa SPD priority set to 1042407
| raw_eroute result=success
| set up incoming SA, ref=0/0
| sr for #2: unrouted
| route_and_eroute() for proto 0, and source port 0 dest port 0
| FOR_EACH_CONNECTION_... in route_owner
|  conn westnet-eastnet-dh19 mark 0/00000000, 0/00000000 vs
|  conn westnet-eastnet-dh19 mark 0/00000000, 0/00000000
| route owner of "westnet-eastnet-dh19" unrouted: NULL; eroute owner: NULL
| route_and_eroute with c: westnet-eastnet-dh19 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2
| priority calculation of connection "westnet-eastnet-dh19" is 0xfe7e7
| eroute_connection add eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => tun.0@192.1.2.45 (raw_eroute)
| IPsec Sa SPD priority set to 1042407
| raw_eroute result=success
| running updown command "ipsec _updown" for verb up 
| command executing up-client
| executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-dh19' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PLUTO_PEER_CLIENT='192.0.1.0/24' PLUTO_PEER_CLIENT_NET='192.0.1.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x238
| popen cmd is 1039 chars long
| cmd(   0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-dh1:
| cmd(  80):9' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUT:
| cmd( 160):O_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' P:
| cmd( 240):LUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUT:
| cmd( 320):O_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@w:
| cmd( 400):est' PLUTO_PEER_CLIENT='192.0.1.0/24' PLUTO_PEER_CLIENT_NET='192.0.1.0' PLUTO_PE:
| cmd( 480):ER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO:
| cmd( 560):_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENC:
| cmd( 640):RYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND=':
| cmd( 720):CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0:
| cmd( 800):' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CF:
| cmd( 880):G_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTI:
| cmd( 960):NG='no' VTI_SHARED='no' SPI_IN=0x23813f56 SPI_OUT=0x45facbc0 ipsec _updown 2>&1:
| route_and_eroute: firewall_notified: true
| running updown command "ipsec _updown" for verb prepare 
| command executing prepare-client
| executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-dh19' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PLUTO_PEER_CLIENT='192.0.1.0/24' PLUTO_PEER_CLIENT_NET='192.0.1.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SP
| popen cmd is 1044 chars long
| cmd(   0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastne:
| cmd(  80):t-dh19' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23':
| cmd( 160): PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2:
| cmd( 240):.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0':
| cmd( 320): PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_I:
| cmd( 400):D='@west' PLUTO_PEER_CLIENT='192.0.1.0/24' PLUTO_PEER_CLIENT_NET='192.0.1.0' PLU:
| cmd( 480):TO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' :
| cmd( 560):PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASI:
| cmd( 640):G+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_K:
| cmd( 720):IND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CIS:
| cmd( 800):CO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLU:
| cmd( 880):TO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_:
| cmd( 960):ROUTING='no' VTI_SHARED='no' SPI_IN=0x23813f56 SPI_OUT=0x45facbc0 ipsec _updown :
| cmd(1040):2>&1:
| running updown command "ipsec _updown" for verb route 
| command executing route-client
| executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-dh19' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PLUTO_PEER_CLIENT='192.0.1.0/24' PLUTO_PEER_CLIENT_NET='192.0.1.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN
| popen cmd is 1042 chars long
| cmd(   0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-:
| cmd(  80):dh19' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' P:
| cmd( 160):LUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0:
| cmd( 240):' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' P:
| cmd( 320):LUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID=:
| cmd( 400):'@west' PLUTO_PEER_CLIENT='192.0.1.0/24' PLUTO_PEER_CLIENT_NET='192.0.1.0' PLUTO:
| cmd( 480):_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PL:
| cmd( 560):UTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+:
| cmd( 640):ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIN:
| cmd( 720):D='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO:
| cmd( 800):='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO:
| cmd( 880):_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_RO:
| cmd( 960):UTING='no' VTI_SHARED='no' SPI_IN=0x23813f56 SPI_OUT=0x45facbc0 ipsec _updown 2>:
| cmd(1040):&1:
| route_and_eroute: instance "westnet-eastnet-dh19", setting eroute_owner {spd=0x558aaa48f658,sr=0x558aaa48f658} to #2 (was #0) (newest_ipsec_sa=#0)
|     #1 spent 2.27 milliseconds in install_ipsec_sa()
| ISAKMP_v2_IKE_AUTH: instance westnet-eastnet-dh19[0], setting IKEv2 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1
| adding 14 bytes of padding (including 1 byte padding-length)
| emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x02 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x03 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x04 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x05 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x06 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x07 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x08 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x09 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x0a repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x0b repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x0c repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x0d repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 12 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 432
| emitting length of ISAKMP Message: 460
| data being hmac:  2f 10 85 f4  bd 49 7c 59  99 8b 38 83  18 c2 ee eb
| data being hmac:  2e 20 23 20  00 00 00 01  00 00 01 cc  24 00 01 b0
| data being hmac:  3c b9 98 c0  e3 64 50 b1  bc 30 4d ca  8f 09 05 e1
| data being hmac:  ed fe 18 f0  ed 25 bb 42  61 cc 99 f3  9a 72 6f 0c
| data being hmac:  74 b1 1a 0d  c9 d0 ce a0  ab b7 6d 93  2b f2 66 67
| data being hmac:  79 4c cf c2  7a d0 67 cf  aa 96 c6 67  28 58 81 11
| data being hmac:  89 1a 94 de  d0 a7 a9 fb  0e 2b 35 4b  77 9c 85 9a
| data being hmac:  30 9d ee b3  86 48 29 52  fd 5a 3c 7f  32 d2 af 5e
| data being hmac:  09 8a 85 ff  9c 6e b0 6c  fa ca 83 37  05 cc 9c 4d
| data being hmac:  fc ea 33 2f  8f 4a 94 62  76 e9 05 63  7b 24 44 5e
| data being hmac:  3e 16 a3 98  65 85 cc 59  58 3c 56 dd  58 b2 dd 50
| data being hmac:  0b 55 86 86  65 3e f4 d8  42 35 b3 d2  ed e0 e4 5a
| data being hmac:  62 5c 0b 4e  c8 e9 63 c6  75 b2 08 36  9b d9 55 f2
| data being hmac:  4b 09 f9 dd  a5 12 8e ad  76 97 85 05  bd c6 47 c8
| data being hmac:  3b 76 6a 36  2b 84 b6 5f  92 28 90 5b  07 aa 9f 68
| data being hmac:  33 64 63 a5  83 12 0e 34  f4 74 97 c3  ae 6e 9d 28
| data being hmac:  95 08 32 bf  0d e1 b5 74  80 b0 da 33  31 06 ce 83
| data being hmac:  56 3f ad 29  43 d5 6f 5f  28 40 c7 17  04 6b 91 0c
| data being hmac:  ba de 85 0f  8e 32 04 c4  f6 4b 9d 89  3e ac 33 58
| data being hmac:  5e fa 8c e4  9e 2d 57 4b  c6 e4 90 ab  80 24 09 53
| data being hmac:  06 2c 72 f8  fb 56 ed 7d  8f 03 fc 39  91 12 0b 92
| data being hmac:  68 f2 b5 51  24 d5 41 11  22 28 bd e6  32 ff 58 71
| data being hmac:  37 47 36 64  32 c3 a1 de  cc 9f 07 5f  c9 c9 fc 94
| data being hmac:  49 aa 58 5c  33 90 53 34  c3 a6 5f 58  d6 3e 06 d2
| data being hmac:  fb 27 b9 dc  ce 47 36 75  a9 e5 7d e1  8c 90 b1 5a
| data being hmac:  0c 27 41 c1  c2 21 74 cb  dd af 2d 8e  b0 59 99 ce
| data being hmac:  44 6b 2b 25  5d f2 95 6c  f3 30 eb 3f  f6 87 15 a3
| data being hmac:  d1 dc e9 75  7f 3f f2 68  3d 84 f7 47  b2 0e 65 50
| out calculated auth:
|   74 b7 43 69  64 a6 47 34  4f da 10 15
| ikev2_parent_inI2outR2_continue_tail returned STF_OK
|   #1 spent 12.7 milliseconds in processing: Responder: process IKE_AUTH request in ikev2_process_state_packet()
| suspend processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in complete_v2_state_transition() at ikev2.c:3379)
| start processing: state #2 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in complete_v2_state_transition() at ikev2.c:3379)
| #2 complete_v2_state_transition() md.from_state=PARENT_R1 md.svm.state[from]=PARENT_R1 UNDEFINED->V2_IPSEC_R with status STF_OK
| IKEv2: transition from state STATE_PARENT_R1 to state STATE_V2_IPSEC_R
| child state #2: UNDEFINED(ignore) => V2_IPSEC_R(established CHILD SA)
| Message ID: updating counters for #2 to 1 after switching state
| Message ID: recv #1.#2 request 1; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0->1; child: wip.initiator=-1 wip.responder=1->-1
| Message ID: sent #1.#2 response 1; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=0->1 responder.recv=1; child: wip.initiator=-1 wip.responder=-1
| pstats #2 ikev2.child established
"westnet-eastnet-dh19" #2: negotiated connection [192.0.2.0-192.0.2.255:0-65535 0] -> [192.0.1.0-192.0.1.255:0-65535 0]
| NAT-T: encaps is 'auto'
"westnet-eastnet-dh19" #2: STATE_V2_IPSEC_R: IPsec SA established tunnel mode {ESP=>0x23813f56 <0x45facbc0 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=passive}
| sending V2 new request packet to 192.1.2.45:500 (from 192.1.2.23:500)
| sending 460 bytes for STATE_PARENT_R1 through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   2f 10 85 f4  bd 49 7c 59  99 8b 38 83  18 c2 ee eb
|   2e 20 23 20  00 00 00 01  00 00 01 cc  24 00 01 b0
|   3c b9 98 c0  e3 64 50 b1  bc 30 4d ca  8f 09 05 e1
|   ed fe 18 f0  ed 25 bb 42  61 cc 99 f3  9a 72 6f 0c
|   74 b1 1a 0d  c9 d0 ce a0  ab b7 6d 93  2b f2 66 67
|   79 4c cf c2  7a d0 67 cf  aa 96 c6 67  28 58 81 11
|   89 1a 94 de  d0 a7 a9 fb  0e 2b 35 4b  77 9c 85 9a
|   30 9d ee b3  86 48 29 52  fd 5a 3c 7f  32 d2 af 5e
|   09 8a 85 ff  9c 6e b0 6c  fa ca 83 37  05 cc 9c 4d
|   fc ea 33 2f  8f 4a 94 62  76 e9 05 63  7b 24 44 5e
|   3e 16 a3 98  65 85 cc 59  58 3c 56 dd  58 b2 dd 50
|   0b 55 86 86  65 3e f4 d8  42 35 b3 d2  ed e0 e4 5a
|   62 5c 0b 4e  c8 e9 63 c6  75 b2 08 36  9b d9 55 f2
|   4b 09 f9 dd  a5 12 8e ad  76 97 85 05  bd c6 47 c8
|   3b 76 6a 36  2b 84 b6 5f  92 28 90 5b  07 aa 9f 68
|   33 64 63 a5  83 12 0e 34  f4 74 97 c3  ae 6e 9d 28
|   95 08 32 bf  0d e1 b5 74  80 b0 da 33  31 06 ce 83
|   56 3f ad 29  43 d5 6f 5f  28 40 c7 17  04 6b 91 0c
|   ba de 85 0f  8e 32 04 c4  f6 4b 9d 89  3e ac 33 58
|   5e fa 8c e4  9e 2d 57 4b  c6 e4 90 ab  80 24 09 53
|   06 2c 72 f8  fb 56 ed 7d  8f 03 fc 39  91 12 0b 92
|   68 f2 b5 51  24 d5 41 11  22 28 bd e6  32 ff 58 71
|   37 47 36 64  32 c3 a1 de  cc 9f 07 5f  c9 c9 fc 94
|   49 aa 58 5c  33 90 53 34  c3 a6 5f 58  d6 3e 06 d2
|   fb 27 b9 dc  ce 47 36 75  a9 e5 7d e1  8c 90 b1 5a
|   0c 27 41 c1  c2 21 74 cb  dd af 2d 8e  b0 59 99 ce
|   44 6b 2b 25  5d f2 95 6c  f3 30 eb 3f  f6 87 15 a3
|   d1 dc e9 75  7f 3f f2 68  3d 84 f7 47  b2 0e 65 50
|   74 b7 43 69  64 a6 47 34  4f da 10 15
| releasing whack for #2 (sock=fd@-1)
| releasing whack and unpending for parent #1
| unpending state #1 connection "westnet-eastnet-dh19"
| #2 will start re-keying in 28530 seconds with margin of 270 seconds (attempting re-key)
| event_schedule: new EVENT_SA_REKEY-pe@0x558aaa493508
| inserting event EVENT_SA_REKEY, timeout in 28530 seconds for #2
| libevent_malloc: new ptr-libevent@0x558aaa4964d8 size 128
| resume sending helper answer for #1 suppresed complete_v2_state_transition()
| #1 spent 13.1 milliseconds in resume sending helper answer
| stop processing: state #2 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7fb8f0008a18
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.0047 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.00315 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.00303 milliseconds in signal handler PLUTO_SIGCHLD
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in show_connections_status
| FOR_EACH_CONNECTION_... in show_connections_status
| FOR_EACH_STATE_... in show_states_status (sort_states)
| FOR_EACH_STATE_... in sort_states
| get_sa_info esp.45facbc0@192.1.2.23
| get_sa_info esp.23813f56@192.1.2.45
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.297 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
shutting down
| processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825)
| certs and keys locked by 'free_preshared_secrets'
forgetting secrets
| certs and keys unlocked by 'free_preshared_secrets'
| unreference key: 0x558aaa490298 @east cnt 1--
| unreference key: 0x558aaa3e8c48 @west cnt 2--
| start processing: connection "westnet-eastnet-dh19" (in delete_connection() at connections.c:189)
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| state #2
| suspend processing: connection "westnet-eastnet-dh19" (in foreach_state_by_connection_func_delete() at state.c:1310)
| start processing: state #2 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
| pstats #2 ikev2.child deleted completed
| [RE]START processing: state #2 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in delete_state() at state.c:879)
"westnet-eastnet-dh19" #2: deleting state (STATE_V2_IPSEC_R) aged 4.597s and sending notification
| child state #2: V2_IPSEC_R(established CHILD SA) => delete
| get_sa_info esp.23813f56@192.1.2.45
| get_sa_info esp.45facbc0@192.1.2.23
"westnet-eastnet-dh19" #2: ESP traffic information: in=336B out=336B
| #2 send IKEv2 delete notification for STATE_V2_IPSEC_R
| Opening output PBS informational exchange delete request
| **emit ISAKMP Message:
|    initiator cookie:
|   2f 10 85 f4  bd 49 7c 59
|    responder cookie:
|   99 8b 38 83  18 c2 ee eb
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
|    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK)
| next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'informational exchange delete request'
| emitting 16 zero bytes of IV into IKEv2 Encryption Payload
| ****emit IKEv2 Delete Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    protocol ID: PROTO_v2_ESP (0x3)
|    SPI size: 4 (0x4)
|    number of SPIs: 1 (0x1)
| next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Delete Payload (42:ISAKMP_NEXT_v2D)
| next payload chain: saving location 'IKEv2 Delete Payload'.'next payload type' in 'informational exchange delete request'
| emitting 4 raw bytes of local spis into IKEv2 Delete Payload
| local spis  45 fa cb c0
| emitting length of IKEv2 Delete Payload: 12
| adding 4 bytes of padding (including 1 byte padding-length)
| emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x02 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x03 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 12 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 48
| emitting length of ISAKMP Message: 76
| data being hmac:  2f 10 85 f4  bd 49 7c 59  99 8b 38 83  18 c2 ee eb
| data being hmac:  2e 20 25 00  00 00 00 00  00 00 00 4c  2a 00 00 30
| data being hmac:  5b a2 d6 1b  82 20 d4 bc  c3 78 cc 5d  74 08 e9 a4
| data being hmac:  99 5f 57 58  b0 63 77 d2  69 07 01 00  ec b2 06 c4
| out calculated auth:
|   aa d8 f7 cb  b2 8b f1 d0  61 eb e2 47
| sending 76 bytes for delete notification through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #2)
|   2f 10 85 f4  bd 49 7c 59  99 8b 38 83  18 c2 ee eb
|   2e 20 25 00  00 00 00 00  00 00 00 4c  2a 00 00 30
|   5b a2 d6 1b  82 20 d4 bc  c3 78 cc 5d  74 08 e9 a4
|   99 5f 57 58  b0 63 77 d2  69 07 01 00  ec b2 06 c4
|   aa d8 f7 cb  b2 8b f1 d0  61 eb e2 47
| Message ID: IKE #1 sender #2 in send_delete record 'n' sending delete request so forcing IKE nextuse=0->1 and sender msgid=0->0
| Message ID: IKE #1 sender #2 in send_delete hacking around record ' send
| Message ID: sent #1 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=1 responder.recv=1 wip.initiator=-1->0 wip.responder=-1
| state #2 requesting EVENT_SA_REKEY to be deleted
| libevent_free: release ptr-libevent@0x558aaa4964d8
| free_event_entry: release EVENT_SA_REKEY-pe@0x558aaa493508
| running updown command "ipsec _updown" for verb down 
| command executing down-client
| executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-dh19' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PLUTO_PEER_CLIENT='192.0.1.0/24' PLUTO_PEER_CLIENT_NET='192.0.1.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844595' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no'
| popen cmd is 1050 chars long
| cmd(   0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-d:
| cmd(  80):h19' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PL:
| cmd( 160):UTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0':
| cmd( 240): PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PL:
| cmd( 320):UTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID=':
| cmd( 400):@west' PLUTO_PEER_CLIENT='192.0.1.0/24' PLUTO_PEER_CLIENT_NET='192.0.1.0' PLUTO_:
| cmd( 480):PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLU:
| cmd( 560):TO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844595' PLUTO_CONN_POLICY=:
| cmd( 640):'RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_:
| cmd( 720):CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PE:
| cmd( 800):ER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER=:
| cmd( 880):'' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE=':
| cmd( 960):' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x23813f56 SPI_OUT=0x45facbc0 ipsec _u:
| cmd(1040):pdown 2>&1:
| shunt_eroute() called for connection 'westnet-eastnet-dh19' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "westnet-eastnet-dh19" is 0xfe7e7
| IPsec Sa SPD priority set to 1042407
| delete esp.23813f56@192.1.2.45
| netlink response for Del SA esp.23813f56@192.1.2.45 included non-error error
| priority calculation of connection "westnet-eastnet-dh19" is 0xfe7e7
| delete inbound eroute 192.0.1.0/24:0 --0-> 192.0.2.0/24:0 => unk255.10000@192.1.2.23 (raw_eroute)
| raw_eroute result=success
| delete esp.45facbc0@192.1.2.23
| netlink response for Del SA esp.45facbc0@192.1.2.23 included non-error error
| stop processing: connection "westnet-eastnet-dh19" (BACKGROUND) (in update_state_connection() at connections.c:4076)
| start processing: connection NULL (in update_state_connection() at connections.c:4077)
| in connection_discard for connection westnet-eastnet-dh19
| State DB: deleting IKEv2 state #2 in V2_IPSEC_R
| child state #2: V2_IPSEC_R(established CHILD SA) => UNDEFINED(ignore)
| stop processing: state #2 from 192.1.2.45:500 (in delete_state() at state.c:1143)
| processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
| state #1
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| state #1
| start processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
| pstats #1 ikev2.ike deleted completed
| #1 spent 17 milliseconds in total
| [RE]START processing: state #1 connection "westnet-eastnet-dh19" from 192.1.2.45:500 (in delete_state() at state.c:879)
"westnet-eastnet-dh19" #1: deleting state (STATE_PARENT_R2) aged 4.629s and sending notification
| parent state #1: PARENT_R2(established IKE SA) => delete
| #1 send IKEv2 delete notification for STATE_PARENT_R2
| Opening output PBS informational exchange delete request
| **emit ISAKMP Message:
|    initiator cookie:
|   2f 10 85 f4  bd 49 7c 59
|    responder cookie:
|   99 8b 38 83  18 c2 ee eb
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
|    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
|    flags: none (0x0)
|    Message ID: 1 (0x1)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK)
| next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'informational exchange delete request'
| emitting 16 zero bytes of IV into IKEv2 Encryption Payload
| ****emit IKEv2 Delete Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    protocol ID: PROTO_v2_IKE (0x1)
|    SPI size: 0 (0x0)
|    number of SPIs: 0 (0x0)
| next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Delete Payload (42:ISAKMP_NEXT_v2D)
| next payload chain: saving location 'IKEv2 Delete Payload'.'next payload type' in 'informational exchange delete request'
| emitting length of IKEv2 Delete Payload: 8
| adding 8 bytes of padding (including 1 byte padding-length)
| emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x02 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x03 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x04 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x05 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x06 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 1 0x07 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 12 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 48
| emitting length of ISAKMP Message: 76
| data being hmac:  2f 10 85 f4  bd 49 7c 59  99 8b 38 83  18 c2 ee eb
| data being hmac:  2e 20 25 00  00 00 00 01  00 00 00 4c  2a 00 00 30
| data being hmac:  42 f1 c2 40  19 d5 f9 e5  68 f3 7a 90  bc bf fb eb
| data being hmac:  03 5e 7f 05  c1 b2 87 6f  6b 81 14 e1  b5 6f 48 f4
| out calculated auth:
|   da e0 57 83  5d a9 91 b9  f8 2c ac c6
| sending 76 bytes for delete notification through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   2f 10 85 f4  bd 49 7c 59  99 8b 38 83  18 c2 ee eb
|   2e 20 25 00  00 00 00 01  00 00 00 4c  2a 00 00 30
|   42 f1 c2 40  19 d5 f9 e5  68 f3 7a 90  bc bf fb eb
|   03 5e 7f 05  c1 b2 87 6f  6b 81 14 e1  b5 6f 48 f4
|   da e0 57 83  5d a9 91 b9  f8 2c ac c6
| Message ID: IKE #1 sender #1 in send_delete record 'n' sending delete request so forcing IKE nextuse=1->2 and sender msgid=0->1
| Message ID: IKE #1 sender #1 in send_delete hacking around record ' send
| Message ID: #1 XXX: expecting sender.wip.initiator 0 == -1 - suspect record'n'send out-of-order?); initiator.sent=1 initiator.recv=-1 responder.sent=1 responder.recv=1 wip.initiator=1 wip.responder=-1
| Message ID: sent #1 request 1; ike: initiator.sent=0->1 initiator.recv=-1 responder.sent=1 responder.recv=1 wip.initiator=0->1 wip.responder=-1
| state #1 requesting EVENT_SA_REKEY to be deleted
| libevent_free: release ptr-libevent@0x558aaa490388
| free_event_entry: release EVENT_SA_REKEY-pe@0x558aaa491d48
| State DB: IKEv2 state not found (flush_incomplete_children)
| in connection_discard for connection westnet-eastnet-dh19
| State DB: deleting IKEv2 state #1 in PARENT_R2
| parent state #1: PARENT_R2(established IKE SA) => UNDEFINED(ignore)
| unreference key: 0x558aaa3e8c48 @west cnt 1--
| stop processing: state #1 from 192.1.2.45:500 (in delete_state() at state.c:1143)
| processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
| shunt_eroute() called for connection 'westnet-eastnet-dh19' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "westnet-eastnet-dh19" is 0xfe7e7
| priority calculation of connection "westnet-eastnet-dh19" is 0xfe7e7
| FOR_EACH_CONNECTION_... in route_owner
|  conn westnet-eastnet-dh19 mark 0/00000000, 0/00000000 vs
|  conn westnet-eastnet-dh19 mark 0/00000000, 0/00000000
| route owner of "westnet-eastnet-dh19" unrouted: NULL
| running updown command "ipsec _updown" for verb unroute 
| command executing unroute-client
| executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-dh19' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PLUTO_PEER_CLIENT='192.0.1.0/24' PLUTO_PEER_CLIENT_NET='192.0.1.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' S
| popen cmd is 1031 chars long
| cmd(   0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastne:
| cmd(  80):t-dh19' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23':
| cmd( 160): PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2:
| cmd( 240):.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0':
| cmd( 320): PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.45' PLUTO_PEER_:
| cmd( 400):ID='@west' PLUTO_PEER_CLIENT='192.0.1.0/24' PLUTO_PEER_CLIENT_NET='192.0.1.0' PL:
| cmd( 480):UTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0':
| cmd( 560): PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSAS:
| cmd( 640):IG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_:
| cmd( 720):KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CI:
| cmd( 800):SCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PL:
| cmd( 880):UTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI:
| cmd( 960):_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
unroute-client output: Error: Peer netns reference is invalid.
| free hp@0x558aaa48ff28
| flush revival: connection 'westnet-eastnet-dh19' wasn't on the list
| processing: STOP connection NULL (in discard_connection() at connections.c:249)
| crl fetch request list locked by 'free_crl_fetch'
| crl fetch request list unlocked by 'free_crl_fetch'
shutting down interface lo/lo 127.0.0.1:4500
shutting down interface lo/lo 127.0.0.1:500
shutting down interface eth0/eth0 192.0.2.254:4500
shutting down interface eth0/eth0 192.0.2.254:500
shutting down interface eth1/eth1 192.1.2.23:4500
shutting down interface eth1/eth1 192.1.2.23:500
| FOR_EACH_STATE_... in delete_states_dead_interfaces
| libevent_free: release ptr-libevent@0x558aaa482ce8
| free_event_entry: release EVENT_NULL-pe@0x558aaa48e9e8
| libevent_free: release ptr-libevent@0x558aaa417078
| free_event_entry: release EVENT_NULL-pe@0x558aaa48ea98
| libevent_free: release ptr-libevent@0x558aaa418868
| free_event_entry: release EVENT_NULL-pe@0x558aaa48eb48
| libevent_free: release ptr-libevent@0x558aaa419668
| free_event_entry: release EVENT_NULL-pe@0x558aaa48ebf8
| libevent_free: release ptr-libevent@0x558aaa3ed4e8
| free_event_entry: release EVENT_NULL-pe@0x558aaa48eca8
| libevent_free: release ptr-libevent@0x558aaa3ed1d8
| free_event_entry: release EVENT_NULL-pe@0x558aaa48ed58
| FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
| libevent_free: release ptr-libevent@0x558aaa482d98
| free_event_entry: release EVENT_NULL-pe@0x558aaa476b88
| libevent_free: release ptr-libevent@0x558aaa417128
| free_event_entry: release EVENT_NULL-pe@0x558aaa476b18
| libevent_free: release ptr-libevent@0x558aaa45a3e8
| free_event_entry: release EVENT_NULL-pe@0x558aaa475fd8
| global timer EVENT_REINIT_SECRET uninitialized
| global timer EVENT_SHUNT_SCAN uninitialized
| global timer EVENT_PENDING_DDNS uninitialized
| global timer EVENT_PENDING_PHASE2 uninitialized
| global timer EVENT_CHECK_CRLS uninitialized
| global timer EVENT_REVIVE_CONNS uninitialized
| global timer EVENT_FREE_ROOT_CERTS uninitialized
| global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized
| global timer EVENT_NAT_T_KEEPALIVE uninitialized
| libevent_free: release ptr-libevent@0x558aaa416788
| signal event handler PLUTO_SIGCHLD uninstalled
| libevent_free: release ptr-libevent@0x558aaa419af8
| signal event handler PLUTO_SIGTERM uninstalled
| libevent_free: release ptr-libevent@0x558aaa48e2d8
| signal event handler PLUTO_SIGHUP uninstalled
| libevent_free: release ptr-libevent@0x558aaa48e518
| signal event handler PLUTO_SIGSYS uninstalled
| releasing event base
| libevent_free: release ptr-libevent@0x558aaa48e3e8
| libevent_free: release ptr-libevent@0x558aaa4713c8
| libevent_free: release ptr-libevent@0x558aaa471378
| libevent_free: release ptr-libevent@0x558aaa471308
| libevent_free: release ptr-libevent@0x558aaa4712c8
| libevent_free: release ptr-libevent@0x558aaa48e068
| libevent_free: release ptr-libevent@0x558aaa48e218
| libevent_free: release ptr-libevent@0x558aaa471578
| libevent_free: release ptr-libevent@0x558aaa4760e8
| libevent_free: release ptr-libevent@0x558aaa476ad8
| libevent_free: release ptr-libevent@0x558aaa48edc8
| libevent_free: release ptr-libevent@0x558aaa48ed18
| libevent_free: release ptr-libevent@0x558aaa48ec68
| libevent_free: release ptr-libevent@0x558aaa48ebb8
| libevent_free: release ptr-libevent@0x558aaa48eb08
| libevent_free: release ptr-libevent@0x558aaa48ea58
| libevent_free: release ptr-libevent@0x558aaa4158b8
| libevent_free: release ptr-libevent@0x558aaa48e298
| libevent_free: release ptr-libevent@0x558aaa48e258
| libevent_free: release ptr-libevent@0x558aaa48e1d8
| libevent_free: release ptr-libevent@0x558aaa48e3a8
| libevent_free: release ptr-libevent@0x558aaa48e0a8
| libevent_free: release ptr-libevent@0x558aaa3ec908
| libevent_free: release ptr-libevent@0x558aaa3ecd38
| libevent_free: release ptr-libevent@0x558aaa415c28
| releasing global libevent data
| libevent_free: release ptr-libevent@0x558aaa3ed888
| libevent_free: release ptr-libevent@0x558aaa3eccd8
| libevent_free: release ptr-libevent@0x558aaa3ecdd8
leak detective found no leaks