FIPS Product: YES
FIPS Kernel: NO
FIPS Mode: NO
NSS DB directory: sql:/etc/ipsec.d
Initializing NSS
Opening NSS database "sql:/etc/ipsec.d" read-only
NSS initialized
NSS crypto library initialized
FIPS HMAC integrity support [enabled]
FIPS mode disabled for pluto daemon
FIPS HMAC integrity verification self-test FAILED
libcap-ng support [enabled]
Linux audit support [enabled]
Linux audit activated
Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:31988
core dump dir: /var/tmp
secrets file: /etc/ipsec.secrets
leak-detective enabled
NSS crypto [enabled]
XAUTH PAM support [enabled]
| libevent is using pluto's memory allocator
Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800)
| libevent_malloc: new ptr-libevent@0x55b737826868 size 40
| libevent_malloc: new ptr-libevent@0x55b737825cd8 size 40
| libevent_malloc: new ptr-libevent@0x55b737825dd8 size 40
| creating event base
| libevent_malloc: new ptr-libevent@0x55b7378aa2b8 size 56
| libevent_malloc: new ptr-libevent@0x55b73784ec28 size 664
| libevent_malloc: new ptr-libevent@0x55b7378aa328 size 24
| libevent_malloc: new ptr-libevent@0x55b7378aa378 size 384
| libevent_malloc: new ptr-libevent@0x55b7378aa278 size 16
| libevent_malloc: new ptr-libevent@0x55b737825908 size 40
| libevent_malloc: new ptr-libevent@0x55b737825d38 size 48
| libevent_realloc: new ptr-libevent@0x55b73784e8b8 size 256
| libevent_malloc: new ptr-libevent@0x55b7378aa528 size 16
| libevent_free: release ptr-libevent@0x55b7378aa2b8
| libevent initialized
| libevent_realloc: new ptr-libevent@0x55b7378aa2b8 size 64
| global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds
| init_nat_traversal() initialized with keep_alive=0s
NAT-Traversal support  [enabled]
| global one-shot timer EVENT_NAT_T_KEEPALIVE initialized
| global one-shot timer EVENT_FREE_ROOT_CERTS initialized
| global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds
| global one-shot timer EVENT_REVIVE_CONNS initialized
| global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds
| global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds
Encryption algorithms:
  AES_CCM_16              IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm, aes_ccm_c
  AES_CCM_12              IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm_b
  AES_CCM_8               IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm_a
  3DES_CBC                IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  [*192]  3des
  CAMELLIA_CTR            IKEv1:     ESP     IKEv2:     ESP           {256,192,*128}
  CAMELLIA_CBC            IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  camellia
  AES_GCM_16              IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm, aes_gcm_c
  AES_GCM_12              IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm_b
  AES_GCM_8               IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm_a
  AES_CTR                 IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aesctr
  AES_CBC                 IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes
  SERPENT_CBC             IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  serpent
  TWOFISH_CBC             IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  twofish
  TWOFISH_SSH             IKEv1: IKE         IKEv2: IKE ESP           {256,192,*128}  twofish_cbc_ssh
  NULL_AUTH_AES_GMAC      IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_gmac
  NULL                    IKEv1:     ESP     IKEv2:     ESP           []
  CHACHA20_POLY1305       IKEv1:             IKEv2: IKE ESP           [*256]  chacha20poly1305
Hash algorithms:
  MD5                     IKEv1: IKE         IKEv2:                 
  SHA1                    IKEv1: IKE         IKEv2:             FIPS  sha
  SHA2_256                IKEv1: IKE         IKEv2:             FIPS  sha2, sha256
  SHA2_384                IKEv1: IKE         IKEv2:             FIPS  sha384
  SHA2_512                IKEv1: IKE         IKEv2:             FIPS  sha512
PRF algorithms:
  HMAC_MD5                IKEv1: IKE         IKEv2: IKE               md5
  HMAC_SHA1               IKEv1: IKE         IKEv2: IKE         FIPS  sha, sha1
  HMAC_SHA2_256           IKEv1: IKE         IKEv2: IKE         FIPS  sha2, sha256, sha2_256
  HMAC_SHA2_384           IKEv1: IKE         IKEv2: IKE         FIPS  sha384, sha2_384
  HMAC_SHA2_512           IKEv1: IKE         IKEv2: IKE         FIPS  sha512, sha2_512
  AES_XCBC                IKEv1:             IKEv2: IKE               aes128_xcbc
Integrity algorithms:
  HMAC_MD5_96             IKEv1: IKE ESP AH  IKEv2: IKE ESP AH        md5, hmac_md5
  HMAC_SHA1_96            IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha, sha1, sha1_96, hmac_sha1
  HMAC_SHA2_512_256       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha512, sha2_512, sha2_512_256, hmac_sha2_512
  HMAC_SHA2_384_192       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha384, sha2_384, sha2_384_192, hmac_sha2_384
  HMAC_SHA2_256_128       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256
  HMAC_SHA2_256_TRUNCBUG  IKEv1:     ESP AH  IKEv2:         AH      
  AES_XCBC_96             IKEv1:     ESP AH  IKEv2: IKE ESP AH        aes_xcbc, aes128_xcbc, aes128_xcbc_96
  AES_CMAC_96             IKEv1:     ESP AH  IKEv2:     ESP AH  FIPS  aes_cmac
  NONE                    IKEv1:     ESP     IKEv2: IKE ESP     FIPS  null
DH algorithms:
  NONE                    IKEv1:             IKEv2: IKE ESP AH  FIPS  null, dh0
  MODP1536                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH        dh5
  MODP2048                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh14
  MODP3072                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh15
  MODP4096                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh16
  MODP6144                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh17
  MODP8192                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh18
  DH19                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_256, ecp256
  DH20                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_384, ecp384
  DH21                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_521, ecp521
  DH31                    IKEv1: IKE         IKEv2: IKE ESP AH        curve25519
testing CAMELLIA_CBC:
  Camellia: 16 bytes with 128-bit key
  Camellia: 16 bytes with 128-bit key
  Camellia: 16 bytes with 256-bit key
  Camellia: 16 bytes with 256-bit key
testing AES_GCM_16:
  empty string
  one block
  two blocks
  two blocks with associated data
testing AES_CTR:
  Encrypting 16 octets using AES-CTR with 128-bit key
  Encrypting 32 octets using AES-CTR with 128-bit key
  Encrypting 36 octets using AES-CTR with 128-bit key
  Encrypting 16 octets using AES-CTR with 192-bit key
  Encrypting 32 octets using AES-CTR with 192-bit key
  Encrypting 36 octets using AES-CTR with 192-bit key
  Encrypting 16 octets using AES-CTR with 256-bit key
  Encrypting 32 octets using AES-CTR with 256-bit key
  Encrypting 36 octets using AES-CTR with 256-bit key
testing AES_CBC:
  Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key
  Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key
  Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key
  Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key
testing AES_XCBC:
  RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input
  RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input
  RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input
  RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input
  RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input
  RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input
  RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input
  RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16)
  RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10)
  RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18)
testing HMAC_MD5:
  RFC 2104: MD5_HMAC test 1
  RFC 2104: MD5_HMAC test 2
  RFC 2104: MD5_HMAC test 3
8 CPU cores online
starting up 7 crypto helpers
started thread for crypto helper 0
started thread for crypto helper 1
started thread for crypto helper 2
started thread for crypto helper 3
started thread for crypto helper 4
started thread for crypto helper 5
started thread for crypto helper 6
| checking IKEv1 state table
|   MAIN_R0: category: half-open IKE SA flags: 0:
|     -> MAIN_R1 EVENT_SO_DISCARD
|   MAIN_I1: category: half-open IKE SA flags: 0:
|     -> MAIN_I2 EVENT_RETRANSMIT
|   MAIN_R1: category: open IKE SA flags: 200:
|     -> MAIN_R2 EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
|   MAIN_I2: category: open IKE SA flags: 0:
|     -> MAIN_I3 EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
|   MAIN_R2: category: open IKE SA flags: 0:
|     -> MAIN_R3 EVENT_SA_REPLACE
|     -> MAIN_R3 EVENT_SA_REPLACE
|     -> UNDEFINED EVENT_SA_REPLACE
|   MAIN_I3: category: open IKE SA flags: 0:
|     -> MAIN_I4 EVENT_SA_REPLACE
|     -> MAIN_I4 EVENT_SA_REPLACE
|     -> UNDEFINED EVENT_SA_REPLACE
|   MAIN_R3: category: established IKE SA flags: 200:
| starting up helper thread 2
|     -> UNDEFINED EVENT_NULL
| status value returned by setting the priority of this thread (crypto helper 2) 22
|   MAIN_I4: category: established IKE SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   AGGR_R0: category: half-open IKE SA flags: 0:
|     -> AGGR_R1 EVENT_SO_DISCARD
|   AGGR_I1: category: half-open IKE SA flags: 0:
|     -> AGGR_I2 EVENT_SA_REPLACE
|     -> AGGR_I2 EVENT_SA_REPLACE
|   AGGR_R1: category: open IKE SA flags: 200:
|     -> AGGR_R2 EVENT_SA_REPLACE
|     -> AGGR_R2 EVENT_SA_REPLACE
|   AGGR_I2: category: established IKE SA flags: 200:
|     -> UNDEFINED EVENT_NULL
|   AGGR_R2: category: established IKE SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   QUICK_R0: category: established CHILD SA flags: 0:
|     -> QUICK_R1 EVENT_RETRANSMIT
|   QUICK_I1: category: established CHILD SA flags: 0:
|     -> QUICK_I2 EVENT_SA_REPLACE
|   QUICK_R1: category: established CHILD SA flags: 0:
|     -> QUICK_R2 EVENT_SA_REPLACE
|   QUICK_I2: category: established CHILD SA flags: 200:
|     -> UNDEFINED EVENT_NULL
|   QUICK_R2: category: established CHILD SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   INFO: category: informational flags: 0:
|     -> UNDEFINED EVENT_NULL
|   INFO_PROTECTED: category: informational flags: 0:
|     -> UNDEFINED EVENT_NULL
|   XAUTH_R0: category: established IKE SA flags: 0:
|     -> XAUTH_R1 EVENT_NULL
|   XAUTH_R1: category: established IKE SA flags: 0:
|     -> MAIN_R3 EVENT_SA_REPLACE
|   MODE_CFG_R0: category: informational flags: 0:
|     -> MODE_CFG_R1 EVENT_SA_REPLACE
|   MODE_CFG_R1: category: established IKE SA flags: 0:
|     -> MODE_CFG_R2 EVENT_SA_REPLACE
|   MODE_CFG_R2: category: established IKE SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   MODE_CFG_I1: category: established IKE SA flags: 0:
|     -> MAIN_I4 EVENT_SA_REPLACE
|   XAUTH_I0: category: established IKE SA flags: 0:
|     -> XAUTH_I1 EVENT_RETRANSMIT
|   XAUTH_I1: category: established IKE SA flags: 0:
|     -> MAIN_I4 EVENT_RETRANSMIT
| checking IKEv2 state table
|   PARENT_I0: category: ignore flags: 0:
|     -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT)
|   PARENT_I1: category: half-open IKE SA flags: 0:
|     -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification)
|     -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH)
|   PARENT_I2: category: open IKE SA flags: 0:
|     -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification)
|     -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification)
|     -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification)
|     -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response)
|     -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification)
|   PARENT_I3: category: established IKE SA flags: 0:
|     -> PARENT_I3 EVENT_RETAIN (I3: Informational Request)
|     -> PARENT_I3 EVENT_RETAIN (I3: Informational Response)
|     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request)
|     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response)
|   PARENT_R0: category: half-open IKE SA flags: 0:
|     -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT)
|   PARENT_R1: category: half-open IKE SA flags: 0:
|     -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED))
|     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request)
|   PARENT_R2: category: established IKE SA flags: 0:
|     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request)
|     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response)
|     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request)
|     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response)
|   V2_CREATE_I0: category: established IKE SA flags: 0:
|     -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA)
|   V2_CREATE_I: category: established IKE SA flags: 0:
|     -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response)
|   V2_REKEY_IKE_I0: category: established IKE SA flags: 0:
|     -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey)
|   V2_REKEY_IKE_I: category: established IKE SA flags: 0:
|     -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response)
|   V2_REKEY_CHILD_I0: category: established IKE SA flags: 0:
|     -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA)
|   V2_REKEY_CHILD_I: category: established IKE SA flags: 0: <none>
| starting up helper thread 1
| starting up helper thread 0
|   V2_CREATE_R: category: established IKE SA flags: 0:
| status value returned by setting the priority of this thread (crypto helper 1) 22
| status value returned by setting the priority of this thread (crypto helper 0) 22
|     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request)
|   V2_REKEY_IKE_R: category: established IKE SA flags: 0:
|     -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey)
|   V2_REKEY_CHILD_R: category: established IKE SA flags: 0: <none>
|   V2_IPSEC_I: category: established CHILD SA flags: 0: <none>
|   V2_IPSEC_R: category: established CHILD SA flags: 0: <none>
|   IKESA_DEL: category: established IKE SA flags: 0:
|     -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL)
|   CHILDSA_DEL: category: informational flags: 0: <none>
Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64
| Hard-wiring algorithms
| adding AES_CCM_16 to kernel algorithm db
| adding AES_CCM_12 to kernel algorithm db
| adding AES_CCM_8 to kernel algorithm db
| adding 3DES_CBC to kernel algorithm db
| adding CAMELLIA_CBC to kernel algorithm db
| adding AES_GCM_16 to kernel algorithm db
| adding AES_GCM_12 to kernel algorithm db
| adding AES_GCM_8 to kernel algorithm db
| adding AES_CTR to kernel algorithm db
| adding AES_CBC to kernel algorithm db
| adding SERPENT_CBC to kernel algorithm db
| adding TWOFISH_CBC to kernel algorithm db
| adding NULL_AUTH_AES_GMAC to kernel algorithm db
| adding NULL to kernel algorithm db
| adding CHACHA20_POLY1305 to kernel algorithm db
| adding HMAC_MD5_96 to kernel algorithm db
| adding HMAC_SHA1_96 to kernel algorithm db
| adding HMAC_SHA2_512_256 to kernel algorithm db
| adding HMAC_SHA2_384_192 to kernel algorithm db
| adding HMAC_SHA2_256_128 to kernel algorithm db
| adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db
| adding AES_XCBC_96 to kernel algorithm db
| adding AES_CMAC_96 to kernel algorithm db
| starting up helper thread 5
| adding NONE to kernel algorithm db
| starting up helper thread 3
| status value returned by setting the priority of this thread (crypto helper 3) 22
| net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes
| global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds
| setup kernel fd callback
| add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x55b7378aef88
| libevent_malloc: new ptr-libevent@0x55b7378933e8 size 128
| libevent_malloc: new ptr-libevent@0x55b7378af098 size 16
| add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x55b7378afac8
| libevent_malloc: new ptr-libevent@0x55b737850078 size 128
| libevent_malloc: new ptr-libevent@0x55b7378afa88 size 16
| status value returned by setting the priority of this thread (crypto helper 5) 22
| starting up helper thread 4
| status value returned by setting the priority of this thread (crypto helper 4) 22
| starting up helper thread 6
| status value returned by setting the priority of this thread (crypto helper 6) 22
| crypto helper 2 waiting (nothing to do)
| crypto helper 1 waiting (nothing to do)
| crypto helper 0 waiting (nothing to do)
| crypto helper 3 waiting (nothing to do)
| global one-shot timer EVENT_CHECK_CRLS initialized
selinux support is enabled.
| crypto helper 5 waiting (nothing to do)
| unbound context created - setting debug level to 5
| /etc/hosts lookups activated
| /etc/resolv.conf usage activated
| outgoing-port-avoid set 0-65535
| outgoing-port-permit set 32768-60999
| Loading dnssec root key from:/var/lib/unbound/root.key
| No additional dnssec trust anchors defined via dnssec-trusted= option
| Setting up events, loop start
| add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x55b7378afb38
| libevent_malloc: new ptr-libevent@0x55b7378bbd48 size 128
| libevent_malloc: new ptr-libevent@0x55b7378c7018 size 16
| libevent_realloc: new ptr-libevent@0x55b7378c7058 size 256
| libevent_malloc: new ptr-libevent@0x55b7378c7188 size 8
| libevent_realloc: new ptr-libevent@0x55b7378c71c8 size 144
| libevent_malloc: new ptr-libevent@0x55b73784f788 size 152
| libevent_malloc: new ptr-libevent@0x55b7378c7288 size 16
| signal event handler PLUTO_SIGCHLD installed
| libevent_malloc: new ptr-libevent@0x55b7378c72c8 size 8
| libevent_malloc: new ptr-libevent@0x55b737852518 size 152
| signal event handler PLUTO_SIGTERM installed
| libevent_malloc: new ptr-libevent@0x55b7378c7308 size 8
| libevent_malloc: new ptr-libevent@0x55b7378c7348 size 152
| signal event handler PLUTO_SIGHUP installed
| libevent_malloc: new ptr-libevent@0x55b7378c7418 size 8
| libevent_realloc: release ptr-libevent@0x55b7378c71c8
| libevent_realloc: new ptr-libevent@0x55b7378c7458 size 256
| libevent_malloc: new ptr-libevent@0x55b7378c7588 size 152
| signal event handler PLUTO_SIGSYS installed
| crypto helper 4 waiting (nothing to do)
| crypto helper 6 waiting (nothing to do)
| created addconn helper (pid:32194) using fork+execve
| forked child 32194
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
listening for IKE messages
| Inspecting interface lo 
| found lo with address 127.0.0.1
| Inspecting interface eth0 
| found eth0 with address 192.0.2.254
| Inspecting interface eth1 
| found eth1 with address 192.1.2.23
Kernel supports NIC esp-hw-offload
adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.23:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
adding interface eth1/eth1 192.1.2.23:4500
adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.2.254:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
adding interface eth0/eth0 192.0.2.254:4500
adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
adding interface lo/lo 127.0.0.1:4500
| no interfaces to sort
| FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
| add_fd_read_event_handler: new ethX-pe@0x55b7378c7ad8
| libevent_malloc: new ptr-libevent@0x55b7378bbc98 size 128
| libevent_malloc: new ptr-libevent@0x55b7378c7b48 size 16
| setup callback for interface lo 127.0.0.1:4500 fd 22
| add_fd_read_event_handler: new ethX-pe@0x55b7378c7b88
| libevent_malloc: new ptr-libevent@0x55b7378518c8 size 128
| libevent_malloc: new ptr-libevent@0x55b7378c7bf8 size 16
| setup callback for interface lo 127.0.0.1:500 fd 21
| add_fd_read_event_handler: new ethX-pe@0x55b7378c7c38
| libevent_malloc: new ptr-libevent@0x55b737851818 size 128
| libevent_malloc: new ptr-libevent@0x55b7378c7ca8 size 16
| setup callback for interface eth0 192.0.2.254:4500 fd 20
| add_fd_read_event_handler: new ethX-pe@0x55b7378c7ce8
| libevent_malloc: new ptr-libevent@0x55b737852448 size 128
| libevent_malloc: new ptr-libevent@0x55b7378c7d58 size 16
| setup callback for interface eth0 192.0.2.254:500 fd 19
| add_fd_read_event_handler: new ethX-pe@0x55b7378c7d98
| libevent_malloc: new ptr-libevent@0x55b7378264e8 size 128
| libevent_malloc: new ptr-libevent@0x55b7378c7e08 size 16
| setup callback for interface eth1 192.1.2.23:4500 fd 18
| add_fd_read_event_handler: new ethX-pe@0x55b7378c7e48
| libevent_malloc: new ptr-libevent@0x55b7378261d8 size 128
| libevent_malloc: new ptr-libevent@0x55b7378c7eb8 size 16
| setup callback for interface eth1 192.1.2.23:500 fd 17
| certs and keys locked by 'free_preshared_secrets'
| certs and keys unlocked by 'free_preshared_secrets'
loading secrets from "/etc/ipsec.secrets"
| saving Modulus
| saving PublicExponent
| ignoring PrivateExponent
| ignoring Prime1
| ignoring Prime2
| ignoring Exponent1
| ignoring Exponent2
| ignoring Coefficient
| ignoring CKAIDNSS
| computed rsa CKAID  61 55 99 73  d3 ac ef 7d  3a 37 0e 3e  82 ad 92 c1
| computed rsa CKAID  8a 82 25 f1
loaded private key for keyid: PKK_RSA:AQO9bJbr3
| certs and keys locked by 'process_secret'
| certs and keys unlocked by 'process_secret'
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.691 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
listening for IKE messages
| Inspecting interface lo 
| found lo with address 127.0.0.1
| Inspecting interface eth0 
| found eth0 with address 192.0.2.254
| Inspecting interface eth1 
| found eth1 with address 192.1.2.23
| no interfaces to sort
| libevent_free: release ptr-libevent@0x55b7378bbc98
| free_event_entry: release EVENT_NULL-pe@0x55b7378c7ad8
| add_fd_read_event_handler: new ethX-pe@0x55b7378c7ad8
| libevent_malloc: new ptr-libevent@0x55b7378bbc98 size 128
| setup callback for interface lo 127.0.0.1:4500 fd 22
| libevent_free: release ptr-libevent@0x55b7378518c8
| free_event_entry: release EVENT_NULL-pe@0x55b7378c7b88
| add_fd_read_event_handler: new ethX-pe@0x55b7378c7b88
| libevent_malloc: new ptr-libevent@0x55b7378518c8 size 128
| setup callback for interface lo 127.0.0.1:500 fd 21
| libevent_free: release ptr-libevent@0x55b737851818
| free_event_entry: release EVENT_NULL-pe@0x55b7378c7c38
| add_fd_read_event_handler: new ethX-pe@0x55b7378c7c38
| libevent_malloc: new ptr-libevent@0x55b737851818 size 128
| setup callback for interface eth0 192.0.2.254:4500 fd 20
| libevent_free: release ptr-libevent@0x55b737852448
| free_event_entry: release EVENT_NULL-pe@0x55b7378c7ce8
| add_fd_read_event_handler: new ethX-pe@0x55b7378c7ce8
| libevent_malloc: new ptr-libevent@0x55b737852448 size 128
| setup callback for interface eth0 192.0.2.254:500 fd 19
| libevent_free: release ptr-libevent@0x55b7378264e8
| free_event_entry: release EVENT_NULL-pe@0x55b7378c7d98
| add_fd_read_event_handler: new ethX-pe@0x55b7378c7d98
| libevent_malloc: new ptr-libevent@0x55b7378264e8 size 128
| setup callback for interface eth1 192.1.2.23:4500 fd 18
| libevent_free: release ptr-libevent@0x55b7378261d8
| free_event_entry: release EVENT_NULL-pe@0x55b7378c7e48
| add_fd_read_event_handler: new ethX-pe@0x55b7378c7e48
| libevent_malloc: new ptr-libevent@0x55b7378261d8 size 128
| setup callback for interface eth1 192.1.2.23:500 fd 17
| certs and keys locked by 'free_preshared_secrets'
forgetting secrets
| certs and keys unlocked by 'free_preshared_secrets'
loading secrets from "/etc/ipsec.secrets"
| saving Modulus
| saving PublicExponent
| ignoring PrivateExponent
| ignoring Prime1
| ignoring Prime2
| ignoring Exponent1
| ignoring Exponent2
| ignoring Coefficient
| ignoring CKAIDNSS
| computed rsa CKAID  61 55 99 73  d3 ac ef 7d  3a 37 0e 3e  82 ad 92 c1
| computed rsa CKAID  8a 82 25 f1
loaded private key for keyid: PKK_RSA:AQO9bJbr3
| certs and keys locked by 'process_secret'
| certs and keys unlocked by 'process_secret'
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.268 milliseconds in whack
| processing signal PLUTO_SIGCHLD
| waitpid returned pid 32194 (exited with status 0)
| reaped addconn helper child (status 0)
| waitpid returned ECHILD (no child processes left)
| spent 0.0126 milliseconds in signal handler PLUTO_SIGCHLD
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| Added new connection west-east with policy ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
| No AUTH policy was set - defaulting to RSASIG
| counting wild cards for @west is 0
| counting wild cards for @east is 0
| connect_to_host_pair: 192.1.2.23:500 192.1.2.45:500 -> hp@(nil): none
| new hp@0x55b7378c8be8
added connection description "west-east"
| ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
| 192.1.2.23<192.1.2.23>[@east]...192.1.2.45<192.1.2.45>[@west]
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.0958 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
add keyid @west
| add pubkey  01 03 a6 f5  d6 3f e3 8f  6c 01 6a fc  7b 7c 6d 57
| add pubkey  8b 49 39 0d  77 f7 ac e2  85 f1 98 1e  4b 6d a5 3e
| add pubkey  b3 96 9a d1  99 5a bc 10  f2 97 de f2  28 f9 5f 92
| add pubkey  09 f0 c8 d4  12 e4 60 6e  9c 60 98 10  01 7d 26 b7
| add pubkey  8f 95 62 2d  87 dd cd de  f6 d3 8f 35  b0 50 d0 18
| add pubkey  f5 99 f8 04  f1 ff 61 5b  bc 7f 1f c0  04 d8 e4 8c
| add pubkey  ac 34 ad 7a  c1 da 3c 2d  8c 30 ae d6  3c 59 b1 3a
| add pubkey  94 d3 d5 2a  73 91 bd 59  5f 3e 72 bf  4a 1b 9d c5
| add pubkey  b2 2b 4d e7  0d 24 3e 77  f9 7f 2d d6  9d 29 ef 70
| add pubkey  7d 7a 6d a2  b8 61 0c 4b  09 4a 06 71  84 70 85 9a
| add pubkey  8f 52 a1 80  06 fd c6 fc  3e 27 fa 16  fa 32 83 a9
| add pubkey  ca 80 db 0f  4a bf f7 e9  55 8e bd 29  4d 23 a6 dc
| add pubkey  2a b3 5d 62  a9 21 1e be  83 d8 69 3c  03 0a 48 8e
| add pubkey  d3 3a 11 f2  86 5a d1 30  65 bd c8 f4  83 87 ff 04
| add pubkey  87 33 05 4f  e0 d8 8c fe  b3 19 4c dd  85 40 f3 4d
| add pubkey  6e e8 49 14  06 2c 1f 59  59 05 8f 20  b0 ca 46 3f
| add pubkey  c9 20 7e 04  30 7d 9a 80  6c 3f 0a 89  f7 d3 af d8
| add pubkey  15 04 37 f9
| computed rsa CKAID  b4 9f 1a ac  9e 45 6e 79  29 c8 81 97  3a 0c 6a d3
| computed rsa CKAID  7f 0f 03 50
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.0762 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
add keyid @east
| add pubkey  01 03 bd 6c  96 eb df 78  89 b3 ed 77  0d a1 7f 7b
| add pubkey  e5 16 c2 c9  e4 7d 92 0a  90 9d 55 43  b4 62 13 03
| add pubkey  85 7a e0 26  7b 54 1f ca  09 93 cf ff  25 c9 02 4c
| add pubkey  78 ca 94 e5  3e ac d1 f9  a8 e5 bb 7f  cc 20 84 e0
| add pubkey  21 c9 f0 0d  c5 44 ba f3  48 64 61 58  f6 0f 63 0d
| add pubkey  d2 67 1e 59  8b ec f3 50  39 71 fb 39  da 11 64 b6
| add pubkey  62 cd 5f d3  8d 2e c1 50  ed 9c 6e 22  0c 39 a7 ce
| add pubkey  62 b5 af 8a  80 0f 2e 4c  05 5c 82 c7  8d 29 02 2e
| add pubkey  bb 23 5f db  f2 9e b5 7d  e2 20 70 1a  63 f3 8e 5d
| add pubkey  ac 47 f0 5c  26 4e b1 d0  42 60 52 4a  b0 77 25 ce
| add pubkey  e0 98 2b 43  f4 c7 59 1a  64 01 83 ea  4e e3 1a 2a
| add pubkey  92 b8 55 ab  63 dd 4b 70  47 29 dc e9  b4 60 bf 43
| add pubkey  4d 58 8f 64  73 95 70 ac  35 89 b2 c2  9c d4 62 c0
| add pubkey  5f 56 5f ad  1b e5 dd 49  93 6a f5 23  82 ed d4 e7
| add pubkey  d5 f1 55 f2  2d a2 26 a6  36 53 2f 94  fb 99 22 5c
| add pubkey  47 cc 6d 80  30 88 96 38  0c f5 f2 ed  37 d0 09 d5
| add pubkey  07 8f 69 ef  a9 99 ce 4d  1a 77 9e 39  c4 38 f3 c5
| add pubkey  51 51 48 ef
| computed rsa CKAID  61 55 99 73  d3 ac ef 7d  3a 37 0e 3e  82 ad 92 c1
| computed rsa CKAID  8a 82 25 f1
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.066 milliseconds in whack
| spent 0.00262 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 792 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  00 00 00 00  00 00 00 00
|   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
|   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
|   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
|   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
|   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
|   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
|   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
|   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
|   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
|   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
|   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
|   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
|   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
|   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
|   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
|   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
|   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
|   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
|   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
|   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
|   7c fd b2 fc  68 b6 a4 48
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   00 00 00 00  00 00 00 00
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
|    length: 792 (0x318)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| State DB: IKEv1 state not found (find_state_ikev1_init)
| #null state always idle
| got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
| ***parse ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 644 (0x284)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 20 (0x14)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 20 (0x14)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 20 (0x14)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 20 (0x14)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 20 (0x14)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 20 (0x14)
| message 'main_inI1_outR1' HASH payload not checked early
| received Vendor ID payload [FRAGMENTATION]
| received Vendor ID payload [Dead Peer Detection]
|  quirks.qnat_traversal_vid set to=117 [RFC 3947]
| received Vendor ID payload [RFC 3947]
| Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
| ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
| Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
| ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
| Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
| ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
| in statetime_start() with no state
| find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
| find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
| find_next_host_connection policy=IKEV1_ALLOW
| found policy = RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (west-east)
| find_next_host_connection returns west-east
| find_next_host_connection policy=IKEV1_ALLOW
| find_next_host_connection returns empty
| creating state object #1 at 0x55b7378cb168
| State DB: adding IKEv1 state #1 in UNDEFINED
| pstats #1 ikev1.isakmp started
| #1 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
| parent state #1: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
| sender checking NAT-T: enabled; VID 117
| returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC
| enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
"west-east" #1: responding to Main Mode
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
| ***emit ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
| next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
| next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
| ****parse IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ****parse ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 632 (0x278)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_ISAKMP (0x1)
|    SPI size: 0 (0x0)
|    number of transforms: 18 (0x12)
| *****parse ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    length: 36 (0x24)
|    ISAKMP transform number: 0 (0x0)
|    ISAKMP transform ID: KEY_IKE (0x1)
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|    [1 is OAKLEY_LIFE_SECONDS]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|    [7 is OAKLEY_AES_CBC]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|    [4 is OAKLEY_SHA2_256]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|    [3 is OAKLEY_RSA_SIG]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|    [14 is OAKLEY_GROUP_MODP2048]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| OAKLEY proposal verified unconditionally; no alg_info to check against
| Oakley Transform 0 accepted
| ****emit IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ****emit ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_ISAKMP (0x1)
|    SPI size: 0 (0x0)
|    number of transforms: 1 (0x1)
| last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP transform number: 0 (0x0)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| emitting 28 raw bytes of attributes into ISAKMP Transform Payload (ISAKMP)
| attributes  80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
| attributes  80 03 00 03  80 04 00 0e  80 0e 01 00
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| emitting length of ISAKMP Proposal Payload: 44
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0
| emitting length of ISAKMP Security Association Payload: 56
| last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
| out_vid(): sending [FRAGMENTATION]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
| next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
| next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  40 48 b7 d5  6e bc e8 85  25 e7 de 7f  00 d6 c2 d3
| emitting length of ISAKMP Vendor ID Payload: 20
| out_vid(): sending [Dead Peer Detection]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  af ca d7 13  68 a1 f1 c9  6b 86 96 fc  77 57 01 00
| emitting length of ISAKMP Vendor ID Payload: 20
| out_vid(): sending [RFC 3947]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
| emitting length of ISAKMP Vendor ID Payload: 20
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 144
| complete v1 state transition with STF_OK
| [RE]START processing: state #1 connection "west-east" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
| #1 is idle
| doing_xauth:no, t_xauth_client_done:no
| peer supports fragmentation
| peer supports DPD
| DPD is configured locally
| IKEv1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
| parent state #1: MAIN_R0(half-open IKE SA) => MAIN_R1(open IKE SA)
| event_already_set, deleting event
| sending reply packet to 192.1.2.45:500 (from 192.1.2.23:500)
| sending 144 bytes for STATE_MAIN_R0 through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   01 10 02 00  00 00 00 00  00 00 00 90  0d 00 00 38
|   00 00 00 01  00 00 00 01  00 00 00 2c  00 01 00 01
|   00 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  0d 00 00 14  40 48 b7 d5  6e bc e8 85
|   25 e7 de 7f  00 d6 c2 d3  0d 00 00 14  af ca d7 13
|   68 a1 f1 c9  6b 86 96 fc  77 57 01 00  00 00 00 14
|   4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
| !event_already_set at reschedule
| event_schedule: new EVENT_SO_DISCARD-pe@0x55b7378c8cc8
| inserting event EVENT_SO_DISCARD, timeout in 60 seconds for #1
| libevent_malloc: new ptr-libevent@0x55b7378c9048 size 128
"west-east" #1: STATE_MAIN_R1: sent MR1, expecting MI2
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.588 milliseconds in comm_handle_cb() reading and processing packet
| spent 0.00327 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 396 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   04 10 02 00  00 00 00 00  00 00 01 8c  0a 00 01 04
|   6e ab a3 82  be 52 67 b5  cb 91 56 74  64 d6 7e 67
|   ae 50 0f 0a  f3 a5 c5 e9  41 8e 69 eb  c3 8f 63 25
|   d5 8b ff c3  8b eb a5 7c  6e 98 c1 6c  7d 87 50 32
|   bb 3d 09 20  48 b8 25 74  e6 6c 4e ab  2f 19 f8 71
|   48 f6 61 6b  0e 47 f1 91  b7 4f 6f 94  bb e7 89 a5
|   eb 87 55 aa  13 fb ae cc  1c ec bc 85  79 86 27 40
|   7e 5c d1 27  c0 d8 d7 cc  b8 1d 29 cc  da ef 19 fb
|   6d 33 60 57  da 65 86 32  4a 93 e5 37  7b e2 0c ae
|   62 4e fa 49  69 ef c8 a9  5b c8 69 8a  a3 fd b0 27
|   ea 90 43 d6  41 9c 92 c8  d8 62 00 31  43 b4 f9 d3
|   84 b9 3e ba  b2 33 50 db  ad 89 0d ff  12 4f c1 83
|   2d e3 a9 95  5a 17 f1 f2  b1 7d ab 9c  dd 0d 89 5e
|   76 3a 1a 3f  38 27 26 88  78 4e 6a f6  39 34 eb c9
|   20 27 e4 b1  b4 15 d0 ad  41 72 ea 8f  81 df a7 88
|   c7 46 78 c5  00 fe 55 84  6a c5 a3 09  73 26 f8 e5
|   44 4e f5 60  8c fa 0a 15  57 03 13 13  f3 07 3d 22
|   14 00 00 24  96 c1 0a 72  22 96 18 e0  34 be 39 8e
|   85 65 6f ec  fe 55 2c db  00 e5 35 ed  17 cc 97 6d
|   f4 3e aa 75  14 00 00 24  71 1a d1 7d  cc 57 e4 23
|   a3 65 cd 02  12 21 5d e5  28 82 e8 d1  6d f0 f2 db
|   ee e8 05 b5  bb 46 fb 29  00 00 00 24  53 a0 02 63
|   33 dd a1 86  7d 9f 0d 6c  6f aa 2e 1c  0c 08 34 78
|   17 42 05 b0  9b 71 2e f3  e9 7e db 48
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_KE (0x4)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
|    length: 396 (0x18c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| State DB: found IKEv1 state #1 in MAIN_R1 (find_state_ikev1)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1459)
| #1 is idle
| #1 idle
| got payload 0x10  (ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080
| ***parse ISAKMP Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_NONCE (0xa)
|    length: 260 (0x104)
| got payload 0x400  (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080
| ***parse ISAKMP Nonce Payload:
|    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
|    length: 36 (0x24)
| got payload 0x100000  (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080
| ***parse ISAKMP NAT-D Payload:
|    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
|    length: 36 (0x24)
| got payload 0x100000  (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080
| ***parse ISAKMP NAT-D Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 36 (0x24)
| message 'main_inI2_outR2' HASH payload not checked early
| init checking NAT-T: enabled; RFC 3947 (NAT-Traversal)
| natd_hash: hasher=0x55b736925ca0(32)
| natd_hash: icookie=  1a e1 f9 70  07 2e 22 db
| natd_hash: rcookie=  7a b3 f9 97  03 29 ec 24
| natd_hash: ip=  c0 01 02 17
| natd_hash: port=500
| natd_hash: hash=  71 1a d1 7d  cc 57 e4 23  a3 65 cd 02  12 21 5d e5
| natd_hash: hash=  28 82 e8 d1  6d f0 f2 db  ee e8 05 b5  bb 46 fb 29
| natd_hash: hasher=0x55b736925ca0(32)
| natd_hash: icookie=  1a e1 f9 70  07 2e 22 db
| natd_hash: rcookie=  7a b3 f9 97  03 29 ec 24
| natd_hash: ip=  c0 01 02 2d
| natd_hash: port=500
| natd_hash: hash=  53 a0 02 63  33 dd a1 86  7d 9f 0d 6c  6f aa 2e 1c
| natd_hash: hash=  0c 08 34 78  17 42 05 b0  9b 71 2e f3  e9 7e db 48
| expected NAT-D(me):  71 1a d1 7d  cc 57 e4 23  a3 65 cd 02  12 21 5d e5
| expected NAT-D(me):  28 82 e8 d1  6d f0 f2 db  ee e8 05 b5  bb 46 fb 29
| expected NAT-D(him):
|   53 a0 02 63  33 dd a1 86  7d 9f 0d 6c  6f aa 2e 1c
|   0c 08 34 78  17 42 05 b0  9b 71 2e f3  e9 7e db 48
| received NAT-D:  71 1a d1 7d  cc 57 e4 23  a3 65 cd 02  12 21 5d e5
| received NAT-D:  28 82 e8 d1  6d f0 f2 db  ee e8 05 b5  bb 46 fb 29
| received NAT-D:  53 a0 02 63  33 dd a1 86  7d 9f 0d 6c  6f aa 2e 1c
| received NAT-D:  0c 08 34 78  17 42 05 b0  9b 71 2e f3  e9 7e db 48
| NAT_TRAVERSAL encaps using auto-detect
| NAT_TRAVERSAL this end is NOT behind NAT
| NAT_TRAVERSAL that end is NOT behind NAT
| NAT_TRAVERSAL nat-keepalive enabled 192.1.2.45
| NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected
|  NAT_T_WITH_KA detected
| global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds
| adding inI2_outR2 KE work-order 1 for state #1
| state #1 requesting EVENT_SO_DISCARD to be deleted
| libevent_free: release ptr-libevent@0x55b7378c9048
| free_event_entry: release EVENT_SO_DISCARD-pe@0x55b7378c8cc8
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55b7378c8cc8
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1
| libevent_malloc: new ptr-libevent@0x55b7378c91f8 size 128
| complete v1 state transition with STF_SUSPEND
| [RE]START processing: state #1 connection "west-east" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2648)
| suspending state #1 and saving MD
| #1 is busy; has a suspended MD
| #1 spent 0.114 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.264 milliseconds in comm_handle_cb() reading and processing packet
| crypto helper 2 resuming
| crypto helper 2 starting work-order 1 for state #1
| crypto helper 2 doing build KE and nonce (inI2_outR2 KE); request ID 1
| crypto helper 2 finished build KE and nonce (inI2_outR2 KE); request ID 1 time elapsed 0.000998 seconds
| (#1) spent 0.992 milliseconds in crypto helper computing work-order 1: inI2_outR2 KE (pcr)
| crypto helper 2 sending results from work-order 1 for state #1 to event queue
| scheduling resume sending helper answer for #1
| libevent_malloc: new ptr-libevent@0x7f083c002888 size 128
| crypto helper 2 waiting (nothing to do)
| processing resume sending helper answer for #1
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in resume_handler() at server.c:797)
| crypto helper 2 replies to request ID 1
| calling continuation function 0x55b736850b50
| main_inI2_outR2_continue for #1: calculated ke+nonce, sending R2
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_NONCE (0xa)
| next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE)
| next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet'
| emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
| keyex value  25 4f 82 cd  63 6b c6 2b  f1 0c 2b 23  c8 19 98 f0
| keyex value  db 59 f8 74  61 57 3c 1a  d2 48 d9 17  45 d5 52 1d
| keyex value  f7 7a 8f 30  93 8e 82 f3  cc 85 a5 f2  8c dc 41 4a
| keyex value  bd cf d8 54  f8 33 10 73  73 c6 c1 e7  1c bb 21 ad
| keyex value  05 92 4e 84  ce 89 4b 5e  f6 09 50 1a  25 a0 02 86
| keyex value  63 49 0f 7a  ba df bd 64  c9 02 a2 e7  04 5b 97 70
| keyex value  34 ca 05 2d  3a 4a 24 7c  84 b8 13 99  24 8b 4d f8
| keyex value  9c 07 06 e3  e5 49 46 a5  a7 ca b4 c5  89 51 74 7b
| keyex value  09 49 ba e3  bd a8 0c 7a  4c f6 00 a3  ae 68 c9 ca
| keyex value  b3 b9 9d be  e2 3d 68 6d  43 b3 1a 3d  7a 11 20 a9
| keyex value  ee 31 cc 3d  7d 0b 3a dc  b8 20 42 00  56 75 ac 10
| keyex value  36 c9 6f 4d  bf cf 19 32  31 5b f1 ac  5d 1e e9 10
| keyex value  9a 70 a5 e3  b2 a1 92 c2  b4 2c 09 25  64 35 a7 68
| keyex value  25 dc df 45  dc 87 e1 b6  e6 e3 41 f5  a0 69 6e e7
| keyex value  7b 4b cb 97  fe 8e 2b a4  34 48 aa bd  07 fc 03 63
| keyex value  db bc 0a fb  af 57 d3 c6  93 de 9a 14  11 6d 49 60
| emitting length of ISAKMP Key Exchange Payload: 260
| ***emit ISAKMP Nonce Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE)
| next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of Nr into ISAKMP Nonce Payload
| Nr  8c 2a 10 75  31 ad c1 ef  d7 ea 46 f8  03 18 7e 7d
| Nr  90 b0 ce 52  57 a3 91 fa  7a 1f 7d dc  e8 31 50 59
| emitting length of ISAKMP Nonce Payload: 36
| sending NAT-D payloads
| natd_hash: hasher=0x55b736925ca0(32)
| natd_hash: icookie=  1a e1 f9 70  07 2e 22 db
| natd_hash: rcookie=  7a b3 f9 97  03 29 ec 24
| natd_hash: ip=  c0 01 02 2d
| natd_hash: port=500
| natd_hash: hash=  53 a0 02 63  33 dd a1 86  7d 9f 0d 6c  6f aa 2e 1c
| natd_hash: hash=  0c 08 34 78  17 42 05 b0  9b 71 2e f3  e9 7e db 48
| ***emit ISAKMP NAT-D Payload:
|    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
| next payload chain: ignoring supplied 'ISAKMP NAT-D Payload'.'next payload type' value 20:ISAKMP_NEXT_NATD_RFC
| next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC)
| next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload
| NAT-D  53 a0 02 63  33 dd a1 86  7d 9f 0d 6c  6f aa 2e 1c
| NAT-D  0c 08 34 78  17 42 05 b0  9b 71 2e f3  e9 7e db 48
| emitting length of ISAKMP NAT-D Payload: 36
| natd_hash: hasher=0x55b736925ca0(32)
| natd_hash: icookie=  1a e1 f9 70  07 2e 22 db
| natd_hash: rcookie=  7a b3 f9 97  03 29 ec 24
| natd_hash: ip=  c0 01 02 17
| natd_hash: port=500
| natd_hash: hash=  71 1a d1 7d  cc 57 e4 23  a3 65 cd 02  12 21 5d e5
| natd_hash: hash=  28 82 e8 d1  6d f0 f2 db  ee e8 05 b5  bb 46 fb 29
| ***emit ISAKMP NAT-D Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP NAT-D Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC)
| next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload
| NAT-D  71 1a d1 7d  cc 57 e4 23  a3 65 cd 02  12 21 5d e5
| NAT-D  28 82 e8 d1  6d f0 f2 db  ee e8 05 b5  bb 46 fb 29
| emitting length of ISAKMP NAT-D Payload: 36
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 396
| main inI2_outR2: starting async DH calculation (group=14)
| started looking for secret for @east->@west of kind PKK_PSK
| actually looking for secret for @east->@west of kind PKK_PSK
| line 1: key type PKK_PSK(@east) to type PKK_RSA
| concluding with best_match=000 best=(nil) (lineno=-1)
| no PreShared Key Found
| adding main_inI2_outR2_tail work-order 2 for state #1
| state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x55b7378c91f8
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55b7378c8cc8
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55b7378c8cc8
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1
| libevent_malloc: new ptr-libevent@0x55b7378c9048 size 128
| crypto helper 1 resuming
| crypto helper 1 starting work-order 2 for state #1
| crypto helper 1 doing compute dh+iv (V1 Phase 1) (main_inI2_outR2_tail); request ID 2
| crypto helper 1 finished compute dh+iv (V1 Phase 1) (main_inI2_outR2_tail); request ID 2 time elapsed 0.001144 seconds
| (#1) spent 1.15 milliseconds in crypto helper computing work-order 2: main_inI2_outR2_tail (pcr)
| crypto helper 1 sending results from work-order 2 for state #1 to event queue
| scheduling resume sending helper answer for #1
| libevent_malloc: new ptr-libevent@0x7f0834000f48 size 128
| crypto helper 1 waiting (nothing to do)
| #1 main_inI2_outR2_continue1_tail:1165 st->st_calculating = FALSE;
| complete v1 state transition with STF_OK
| [RE]START processing: state #1 connection "west-east" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
| #1 is idle; has background offloaded task
| doing_xauth:no, t_xauth_client_done:no
| IKEv1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
| parent state #1: MAIN_R1(open IKE SA) => MAIN_R2(open IKE SA)
| event_already_set, deleting event
| state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x55b7378c9048
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55b7378c8cc8
| sending reply packet to 192.1.2.45:500 (from 192.1.2.23:500)
| sending 396 bytes for STATE_MAIN_R1 through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   04 10 02 00  00 00 00 00  00 00 01 8c  0a 00 01 04
|   25 4f 82 cd  63 6b c6 2b  f1 0c 2b 23  c8 19 98 f0
|   db 59 f8 74  61 57 3c 1a  d2 48 d9 17  45 d5 52 1d
|   f7 7a 8f 30  93 8e 82 f3  cc 85 a5 f2  8c dc 41 4a
|   bd cf d8 54  f8 33 10 73  73 c6 c1 e7  1c bb 21 ad
|   05 92 4e 84  ce 89 4b 5e  f6 09 50 1a  25 a0 02 86
|   63 49 0f 7a  ba df bd 64  c9 02 a2 e7  04 5b 97 70
|   34 ca 05 2d  3a 4a 24 7c  84 b8 13 99  24 8b 4d f8
|   9c 07 06 e3  e5 49 46 a5  a7 ca b4 c5  89 51 74 7b
|   09 49 ba e3  bd a8 0c 7a  4c f6 00 a3  ae 68 c9 ca
|   b3 b9 9d be  e2 3d 68 6d  43 b3 1a 3d  7a 11 20 a9
|   ee 31 cc 3d  7d 0b 3a dc  b8 20 42 00  56 75 ac 10
|   36 c9 6f 4d  bf cf 19 32  31 5b f1 ac  5d 1e e9 10
|   9a 70 a5 e3  b2 a1 92 c2  b4 2c 09 25  64 35 a7 68
|   25 dc df 45  dc 87 e1 b6  e6 e3 41 f5  a0 69 6e e7
|   7b 4b cb 97  fe 8e 2b a4  34 48 aa bd  07 fc 03 63
|   db bc 0a fb  af 57 d3 c6  93 de 9a 14  11 6d 49 60
|   14 00 00 24  8c 2a 10 75  31 ad c1 ef  d7 ea 46 f8
|   03 18 7e 7d  90 b0 ce 52  57 a3 91 fa  7a 1f 7d dc
|   e8 31 50 59  14 00 00 24  53 a0 02 63  33 dd a1 86
|   7d 9f 0d 6c  6f aa 2e 1c  0c 08 34 78  17 42 05 b0
|   9b 71 2e f3  e9 7e db 48  00 00 00 24  71 1a d1 7d
|   cc 57 e4 23  a3 65 cd 02  12 21 5d e5  28 82 e8 d1
|   6d f0 f2 db  ee e8 05 b5  bb 46 fb 29
| !event_already_set at reschedule
| event_schedule: new EVENT_RETRANSMIT-pe@0x55b7378c8cc8
| inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1
| libevent_malloc: new ptr-libevent@0x55b7378c9048 size 128
| #1 STATE_MAIN_R2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29655.35385
"west-east" #1: STATE_MAIN_R2: sent MR2, expecting MI3
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| resume sending helper answer for #1 suppresed complete_v1_state_transition()
| #1 spent 0.319 milliseconds in resume sending helper answer
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7f083c002888
| processing resume sending helper answer for #1
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in resume_handler() at server.c:797)
| crypto helper 1 replies to request ID 2
| calling continuation function 0x55b736850b50
| main_inI2_outR2_calcdone for #1: calculate DH finished
| [RE]START processing: state #1 connection "west-east" from 192.1.2.45:500 (in main_inI2_outR2_continue2() at ikev1_main.c:1015)
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in main_inI2_outR2_continue2() at ikev1_main.c:1028)
| resume sending helper answer for #1 suppresed complete_v1_state_transition()
| #1 spent 0.0157 milliseconds in resume sending helper answer
| processing: STOP state #0 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7f0834000f48
| spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 332 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   05 10 02 01  00 00 00 00  00 00 01 4c  67 1b a3 ec
|   ec bb ea f8  8b 27 96 3b  24 7c 38 3d  65 ee 42 97
|   b5 f3 ea cd  33 0f 71 45  9f 6c 32 a1  00 fb 65 61
|   1b c2 46 1a  da 65 cc 3d  50 42 53 00  83 cf 07 f3
|   d3 68 3e 34  df 45 a5 c3  a9 bf d9 d7  ab 7a 29 a6
|   8f df ea a9  4a 84 32 9b  75 3f f3 62  d0 07 33 7e
|   74 34 bb 08  a0 93 0c 19  82 8a 14 fc  67 03 9f 10
|   f2 10 65 de  1b 9e 6f 31  e5 3c 2a e8  96 34 8b 45
|   2e a9 ab 61  72 01 1d 6f  c2 e3 27 38  ca d8 1a c4
|   ee 22 af ba  1c 02 29 b7  f0 b6 14 d3  0a 75 9f 85
|   b9 df 4f 47  eb 9f cc 9b  44 9f 5a b9  1f 7d 0b be
|   fe 31 a0 a1  de fa 15 c9  c2 1e f1 0c  f5 12 7d 07
|   7a 04 35 3e  47 95 d8 cb  66 36 33 8a  7c d6 07 3b
|   e1 20 ca c3  f4 e7 2b 68  f5 f2 95 b2  de 74 43 c0
|   59 da ec 43  95 f5 30 94  56 cc be c3  19 3c 21 c3
|   f1 d7 6b d6  98 e6 79 4f  e7 41 be 86  b6 da 16 19
|   16 15 fc 17  e4 8f 39 a2  54 0b d7 21  b3 7b 58 f9
|   91 f2 5b a5  fa 1b 92 be  98 e6 1e 2e  9b 03 15 7b
|   a9 91 44 9c  f1 bb 57 f4  99 5c 0f c5  5a d5 6b 57
|   d4 8b ff 49  45 80 0b 9f  30 53 79 a1
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_ID (0x5)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 0 (0x0)
|    length: 332 (0x14c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| State DB: found IKEv1 state #1 in MAIN_R2 (find_state_ikev1)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1459)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x220 opt: 0x20c0
| ***parse ISAKMP Identification Payload:
|    next payload type: ISAKMP_NEXT_SIG (0x9)
|    length: 12 (0xc)
|    ID type: ID_FQDN (0x2)
|    DOI specific A: 0 (0x0)
|    DOI specific B: 0 (0x0)
|      obj:   77 65 73 74
| got payload 0x200  (ISAKMP_NEXT_SIG) needed: 0x200 opt: 0x20c0
| ***parse ISAKMP Signature Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 278 (0x116)
| removing 14 bytes of padding
| message 'main_inI3_outR3' HASH payload not checked early
"west-east" #1: Peer ID is ID_FQDN: '@west'
| X509: no CERT payloads to process
| refine_host_connection for IKEv1: starting with "west-east"
|    match_id a=@west
|             b=@west
|    results  matched
| refine_host_connection: checking "west-east" against "west-east", best=(none) with match=1(id=1(0)/ca=1(0)/reqca=1(0))
| Warning: not switching back to template of current instance
| No IDr payload received from peer
| refine_host_connection: checked west-east against west-east, now for see if best
| started looking for secret for @east->@west of kind PKK_RSA
| actually looking for secret for @east->@west of kind PKK_RSA
| line 1: key type PKK_RSA(@east) to type PKK_RSA
| 1: compared key (none) to @east / @west -> 002
| 2: compared key (none) to @east / @west -> 002
| line 1: match=002
| match 002 beats previous best_match 000 match=0x55b737821b58 (line=1)
| concluding with best_match=002 best=0x55b737821b58 (lineno=1)
| returning because exact peer id match
| offered CA: '%none'
| required RSA CA is '%any'
| checking RSA keyid '@east' for match with '@west'
| checking RSA keyid '@west' for match with '@west'
| key issuer CA is '%any'
| an RSA Sig check passed with *AQOm9dY/4 [preloaded key]
|   #1 spent 0.0596 milliseconds in try_all_RSA_keys() trying a pubkey
"west-east" #1: Authenticated using RSA
| thinking about whether to send my certificate:
|   I have RSA key: OAKLEY_RSA_SIG cert.type: 0?? 
|   sendcert: CERT_ALWAYSSEND and I did not get a certificate request 
|   so do not send cert.
| I did not send a certificate because I do not have one.
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_ID (0x5)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 0 (0x0)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 5:ISAKMP_NEXT_ID
| ***emit ISAKMP Identification Payload (IPsec DOI):
|    next payload type: ISAKMP_NEXT_SIG (0x9)
|    ID type: ID_FQDN (0x2)
|    Protocol ID: 0 (0x0)
|    port: 0 (0x0)
| next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 9:ISAKMP_NEXT_SIG
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
| next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
| emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI)
| my identity  65 61 73 74
| emitting length of ISAKMP Identification Payload (IPsec DOI): 12
| started looking for secret for @east->@west of kind PKK_RSA
| actually looking for secret for @east->@west of kind PKK_RSA
| line 1: key type PKK_RSA(@east) to type PKK_RSA
| 1: compared key (none) to @east / @west -> 002
| 2: compared key (none) to @east / @west -> 002
| line 1: match=002
| match 002 beats previous best_match 000 match=0x55b737821b58 (line=1)
| concluding with best_match=002 best=0x55b737821b58 (lineno=1)
| ***emit ISAKMP Signature Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Signature Payload (9:ISAKMP_NEXT_SIG)
| next payload chain: saving location 'ISAKMP Signature Payload'.'next payload type' in 'reply packet'
| emitting 274 raw bytes of SIG_R into ISAKMP Signature Payload
| SIG_R  b0 da 1c 1c  dd 03 08 4e  73 81 71 08  81 6b f4 b1
| SIG_R  75 68 57 16  67 6d 68 4f  68 73 3f 82  73 68 d1 a1
| SIG_R  ba 91 ee 91  1a 39 11 9d  bd 51 5d 7c  42 c2 98 85
| SIG_R  a8 dc 11 65  b3 d7 fe 86  81 46 f4 c3  c6 d0 08 0e
| SIG_R  f4 c5 24 9e  d3 a7 de 19  e1 18 1b 0d  74 1e 9f 32
| SIG_R  ee 42 88 97  29 cc 7a 61  41 52 d2 19  27 35 6f 01
| SIG_R  be 45 35 ae  32 71 ad 05  f8 7b d2 80  b3 76 a9 13
| SIG_R  a9 5e 56 d3  7c 9b 17 39  7e c4 c1 1a  2d d0 23 78
| SIG_R  69 18 97 34  ed c0 c0 5d  ca 1b 71 0f  88 9d 2b b1
| SIG_R  c9 b5 cc b3  e7 0a bb 6d  28 3f ac 31  14 18 44 f4
| SIG_R  7b 54 9f 7b  23 52 0b a0  09 33 a3 f4  ed cc 8b 4f
| SIG_R  b1 4b 40 0d  f3 2a 1b e9  cc 53 1a 05  99 fd 0e cb
| SIG_R  50 43 eb 2f  b8 2c 87 da  9d 98 53 cc  f4 53 fc c9
| SIG_R  ee 50 48 4b  1e 1f aa d9  e6 11 7e 47  41 47 f4 c9
| SIG_R  aa 60 40 a3  8c 86 48 60  65 a9 19 9b  da 8e 6c d1
| SIG_R  a4 70 95 19  35 ec 13 09  4b 7c 3a b5  de 86 52 96
| SIG_R  67 a7 6a a4  d7 24 d6 e1  62 f3 18 bf  87 a8 79 5d
| SIG_R  1d bc
| emitting length of ISAKMP Signature Payload: 278
| emitting 14 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 332
| FOR_EACH_CONNECTION_... in ISAKMP_SA_established
| complete v1 state transition with STF_OK
| [RE]START processing: state #1 connection "west-east" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
| #1 is idle
| doing_xauth:no, t_xauth_client_done:no
| IKEv1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
| parent state #1: MAIN_R2(open IKE SA) => MAIN_R3(established IKE SA)
| event_already_set, deleting event
| state #1 requesting EVENT_RETRANSMIT to be deleted
| #1 STATE_MAIN_R3: retransmits: cleared
| libevent_free: release ptr-libevent@0x55b7378c9048
| free_event_entry: release EVENT_RETRANSMIT-pe@0x55b7378c8cc8
| sending reply packet to 192.1.2.45:500 (from 192.1.2.23:500)
| sending 332 bytes for STATE_MAIN_R2 through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   05 10 02 01  00 00 00 00  00 00 01 4c  0c ff 86 7c
|   15 c2 6e 72  23 d3 d5 7e  48 78 67 6f  37 ca 53 cc
|   f9 19 d7 20  71 52 85 69  53 2f 26 2a  93 3b 06 17
|   a1 ba d7 cf  00 3b 43 89  4c ce 80 c9  79 a0 ae f5
|   b2 59 51 d5  fb 9b bf 86  a5 02 ad ca  4a 34 b4 84
|   9b ca 14 71  48 9f ea 76  1c 48 e5 b6  86 bc d1 7a
|   18 74 93 36  99 b6 a1 f2  50 d5 b0 e5  fe 5b 8e bb
|   1d 97 ac f5  e8 68 47 b6  69 44 7e a0  6c fc 83 7e
|   43 5b 6b f1  07 9d 17 79  0e 9d 7f 99  bf f0 1d 4d
|   c5 09 bd 2e  c0 1c 4f 3a  fe 70 7d b7  97 5b 5b 7d
|   46 7c 94 0d  a7 b6 32 f1  05 14 eb f5  30 1a 26 b8
|   c5 a2 d0 56  81 6f d5 1a  79 90 4b a6  d5 59 d7 40
|   36 d5 15 6a  58 a0 ac 8c  5d 68 64 82  fb 30 8d 1f
|   f6 63 c3 87  55 56 38 8f  b8 89 2f c3  f5 24 b3 71
|   52 e3 01 0c  e1 88 e4 6d  20 2d 59 4a  b9 02 22 d5
|   a4 57 81 1e  f9 1d ed ae  bc 42 26 69  14 5a a3 54
|   ff 7d 79 6b  93 d1 dc 6f  4a 3d f6 8f  b2 36 4a 9e
|   d6 b2 9d 0b  f8 b1 c8 d2  6f 00 01 ae  55 0a ba f4
|   64 d4 eb 35  bc 4b 4d cf  c3 1e 89 84  e8 e1 94 38
|   db 14 a3 d6  9e a3 1f 4a  d4 54 b4 11
| !event_already_set at reschedule
| event_schedule: new EVENT_SA_REPLACE-pe@0x55b7378c8cc8
| inserting event EVENT_SA_REPLACE, timeout in 3330 seconds for #1
| libevent_malloc: new ptr-libevent@0x7f083c002888 size 128
| pstats #1 ikev1.isakmp established
"west-east" #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048}
| DPD: dpd_init() called on ISAKMP SA
| DPD: Peer supports Dead Peer Detection
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| unpending state #1
|   #1 spent 4.89 milliseconds
| #1 spent 5.04 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 5.2 milliseconds in comm_handle_cb() reading and processing packet
| spent 0.00321 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 444 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 20 01  b5 f6 02 37  00 00 01 bc  0a 52 d8 ba
|   5e 35 bb 96  89 07 dc 19  77 7d 5a e1  aa c6 a5 94
|   ff 07 dc 0d  d8 f0 ed 4c  53 1d df c0  9f 43 56 9e
|   7b dd ae b4  e5 85 42 dd  4e 35 7d db  6d a1 a9 e6
|   1c d7 c4 5d  c1 27 80 c3  3a 05 31 03  b2 f2 be ad
|   e0 07 83 34  77 05 cf ad  c3 c7 88 44  a5 8b c1 53
|   8c 66 18 ea  ab b1 d5 fa  34 28 56 95  bd 99 64 e1
|   1d 6e d8 68  18 ce 96 9d  ef a9 ec 01  8a 1a d3 d2
|   28 1a 37 74  c1 71 8c 9a  e8 a7 a3 94  a2 44 f5 90
|   53 0b c0 ee  7b da 77 5f  27 1d 19 94  29 23 1e 2d
|   db e2 07 36  cc 93 51 dd  bc 57 35 9b  71 cb 38 e4
|   f9 00 df aa  6f ce b1 d0  ab 39 64 02  70 5e c7 cb
|   3d ed 44 d0  33 67 78 da  86 d2 2c 77  a9 fa d9 93
|   36 d9 a5 4b  39 34 a8 30  2a f6 c6 20  26 e7 52 52
|   7b e4 f8 76  e0 d9 40 c8  f3 f7 2b 36  d6 0c a8 dd
|   16 c2 35 5b  a6 37 91 cf  ff bd c8 81  13 0d ea aa
|   f3 ea 14 73  bd ea 10 9e  13 89 5d 63  dc 54 9e b4
|   14 6a 6f df  d5 d2 3c 12  83 15 b4 71  7a e1 0d 80
|   d1 46 8a 4a  8d ce e3 67  90 a2 fe 85  51 ef 56 be
|   23 a7 fd 8e  50 95 72 fa  d2 8d ed 1d  b9 6d 7f c1
|   02 d3 b6 21  01 4b 62 8d  5a b9 76 63  d3 c5 1e 58
|   5d 92 72 a7  5d 60 69 0d  8a fe 94 15  ee 68 95 a5
|   1c 7d d5 73  79 49 3f 0d  5e 4f b3 40  0b 90 ca 5b
|   21 23 02 44  ae 33 52 ad  e5 de 38 f3  7b 7b 4f 2b
|   7a c2 aa 30  7f 77 99 49  39 b1 84 6e  e5 ec ce a6
|   a8 9f ea 77  98 1f c4 e5  ca 32 f2 7f  f2 bc ea 1d
|   56 76 51 fc  38 28 c6 53  03 0d 1d ac
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_QUICK (0x20)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 3052798519 (0xb5f60237)
|    length: 444 (0x1bc)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
| State DB: IKEv1 state not found (find_state_ikev1)
| State DB: found IKEv1 state #1 in MAIN_R3 (find_state_ikev1)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1607)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    length: 36 (0x24)
| got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030
| ***parse ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_NONCE (0xa)
|    length: 84 (0x54)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
| got payload 0x400  (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030
| ***parse ISAKMP Nonce Payload:
|    next payload type: ISAKMP_NEXT_KE (0x4)
|    length: 36 (0x24)
| got payload 0x10  (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030
| ***parse ISAKMP Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 260 (0x104)
| quick_inI1_outR1 HASH(1):
|   3f 20 f7 1c  85 fc b1 b2  73 2e d0 78  0a d9 b8 bc
|   d9 19 14 fb  41 6b ec 32  40 e4 54 0b  00 8e a6 24
| received 'quick_inI1_outR1' message HASH(1) data ok
"west-east" #1: the peer proposed: 192.1.2.23/32:0/0 -> 192.1.2.45/32:0/0
| find_client_connection starting with west-east
|   looking for 192.1.2.23/32:0/0 -> 192.1.2.45/32:0/0
|   concrete checking against sr#0 192.1.2.23/32 -> 192.1.2.45/32
|    match_id a=@west
|             b=@west
|    results  matched
|   fc_try trying west-east:192.1.2.23/32:0/0 -> 192.1.2.45/32:0/0 vs west-east:192.1.2.23/32:0/0 -> 192.1.2.45/32:0/0
|   fc_try concluding with west-east [129]
|   fc_try west-east gives west-east
|   concluding with d = west-east
| client wildcard: no  port wildcard: no  virtual: no
| creating state object #2 at 0x55b7378d4fe8
| State DB: adding IKEv1 state #2 in UNDEFINED
| pstats #2 ikev1.ipsec started
| duplicating state object #1 "west-east" as #2 for IPSEC SA
| #2 setting local endpoint to 192.1.2.23:500 from #1.st_localport (in duplicate_state() at state.c:1484)
| suspend processing: state #1 connection "west-east" from 192.1.2.45:500 (in quick_inI1_outR1_tail() at ikev1_quick.c:1295)
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in quick_inI1_outR1_tail() at ikev1_quick.c:1295)
| child state #2: UNDEFINED(ignore) => QUICK_R0(established CHILD SA)
| ****parse IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ****parse ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 72 (0x48)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_IPSEC_ESP (0x3)
|    SPI size: 4 (0x4)
|    number of transforms: 2 (0x2)
| parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
| SPI  73 bc 95 39
| *****parse ISAKMP Transform Payload (ESP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    length: 32 (0x20)
|    ESP transform number: 0 (0x0)
|    ESP transform ID: ESP_AES (0xc)
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+GROUP_DESCRIPTION (0x8003)
|    length/value: 14 (0xe)
|    [14 is OAKLEY_GROUP_MODP2048]
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+ENCAPSULATION_MODE (0x8004)
|    length/value: 1 (0x1)
|    [1 is ENCAPSULATION_MODE_TUNNEL]
| NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+SA_LIFE_TYPE (0x8001)
|    length/value: 1 (0x1)
|    [1 is SA_LIFE_TYPE_SECONDS]
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
|    length/value: 28800 (0x7080)
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+AUTH_ALGORITHM (0x8005)
|    length/value: 2 (0x2)
|    [2 is AUTH_ALGORITHM_HMAC_SHA1]
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+KEY_LENGTH (0x8006)
|    length/value: 128 (0x80)
| ESP IPsec Transform verified unconditionally; no alg_info to check against
| adding quick_outI1 KE work-order 3 for state #2
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f083c002b78
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2
| libevent_malloc: new ptr-libevent@0x55b7378c9048 size 128
| complete v1 state transition with STF_SUSPEND
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2648)
| suspending state #2 and saving MD
| #2 is busy; has a suspended MD
| crypto helper 0 resuming
| crypto helper 0 starting work-order 3 for state #2
| #1 spent 0.155 milliseconds in process_packet_tail()
| crypto helper 0 doing build KE and nonce (quick_outI1 KE); request ID 3
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.36 milliseconds in comm_handle_cb() reading and processing packet
| crypto helper 0 finished build KE and nonce (quick_outI1 KE); request ID 3 time elapsed 0.000629 seconds
| (#2) spent 0.623 milliseconds in crypto helper computing work-order 3: quick_outI1 KE (pcr)
| crypto helper 0 sending results from work-order 3 for state #2 to event queue
| scheduling resume sending helper answer for #2
| libevent_malloc: new ptr-libevent@0x7f0838003f28 size 128
| libevent_realloc: release ptr-libevent@0x55b7378aa2b8
| libevent_realloc: new ptr-libevent@0x7f0838003e78 size 128
| crypto helper 0 waiting (nothing to do)
| processing resume sending helper answer for #2
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in resume_handler() at server.c:797)
| crypto helper 0 replies to request ID 3
| calling continuation function 0x55b736850b50
| quick_inI1_outR1_cryptocontinue1 for #2: calculated ke+nonce, calculating DH
| started looking for secret for @east->@west of kind PKK_PSK
| actually looking for secret for @east->@west of kind PKK_PSK
| line 1: key type PKK_PSK(@east) to type PKK_RSA
| concluding with best_match=000 best=(nil) (lineno=-1)
| no PreShared Key Found
| adding quick outR1 DH work-order 4 for state #2
| state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x55b7378c9048
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f083c002b78
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f083c002b78
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2
| libevent_malloc: new ptr-libevent@0x55b7378c9048 size 128
| suspending state #2 and saving MD
| #2 is busy; has a suspended MD
| resume sending helper answer for #2 suppresed complete_v1_state_transition() and stole MD
| crypto helper 3 resuming
| crypto helper 3 starting work-order 4 for state #2
| #2 spent 0.0509 milliseconds in resume sending helper answer
| crypto helper 3 doing compute dh (V1 Phase 2 PFS) (quick outR1 DH); request ID 4
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7f0838003f28
| crypto helper 3 finished compute dh (V1 Phase 2 PFS) (quick outR1 DH); request ID 4 time elapsed 0.000827 seconds
| (#2) spent 0.817 milliseconds in crypto helper computing work-order 4: quick outR1 DH (pcr)
| crypto helper 3 sending results from work-order 4 for state #2 to event queue
| scheduling resume sending helper answer for #2
| libevent_malloc: new ptr-libevent@0x7f082c003618 size 128
| crypto helper 3 waiting (nothing to do)
| processing resume sending helper answer for #2
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in resume_handler() at server.c:797)
| crypto helper 3 replies to request ID 4
| calling continuation function 0x55b736850b50
| quick_inI1_outR1_cryptocontinue2 for #2: calculated DH, sending R1
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_QUICK (0x20)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 3052798519 (0xb5f60237)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_NONCE (0xa)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
| next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
| next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
| ****parse IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ****parse ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 72 (0x48)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_IPSEC_ESP (0x3)
|    SPI size: 4 (0x4)
|    number of transforms: 2 (0x2)
| parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
| SPI  73 bc 95 39
| *****parse ISAKMP Transform Payload (ESP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    length: 32 (0x20)
|    ESP transform number: 0 (0x0)
|    ESP transform ID: ESP_AES (0xc)
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+GROUP_DESCRIPTION (0x8003)
|    length/value: 14 (0xe)
|    [14 is OAKLEY_GROUP_MODP2048]
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+ENCAPSULATION_MODE (0x8004)
|    length/value: 1 (0x1)
|    [1 is ENCAPSULATION_MODE_TUNNEL]
| NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+SA_LIFE_TYPE (0x8001)
|    length/value: 1 (0x1)
|    [1 is SA_LIFE_TYPE_SECONDS]
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
|    length/value: 28800 (0x7080)
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+AUTH_ALGORITHM (0x8005)
|    length/value: 2 (0x2)
|    [2 is AUTH_ALGORITHM_HMAC_SHA1]
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+KEY_LENGTH (0x8006)
|    length/value: 128 (0x80)
| ESP IPsec Transform verified unconditionally; no alg_info to check against
| ****emit IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ****emit ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_IPSEC_ESP (0x3)
|    SPI size: 4 (0x4)
|    number of transforms: 1 (0x1)
| last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
| netlink_get_spi: allocated 0x57709f63 for esp.0@192.1.2.23
| emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
| SPI  57 70 9f 63
| *****emit ISAKMP Transform Payload (ESP):
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ESP transform number: 0 (0x0)
|    ESP transform ID: ESP_AES (0xc)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type'
| emitting 24 raw bytes of attributes into ISAKMP Transform Payload (ESP)
| attributes  80 03 00 0e  80 04 00 01  80 01 00 01  80 02 70 80
| attributes  80 05 00 02  80 06 00 80
| emitting length of ISAKMP Transform Payload (ESP): 32
| emitting length of ISAKMP Proposal Payload: 44
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0
| emitting length of ISAKMP Security Association Payload: 56
| last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
"west-east" #2: responding to Quick Mode proposal {msgid:b5f60237}
"west-east" #2:     us: 192.1.2.23<192.1.2.23>[@east]
"west-east" #2:   them: 192.1.2.45<192.1.2.45>[@west]
| ***emit ISAKMP Nonce Payload:
|    next payload type: ISAKMP_NEXT_KE (0x4)
| next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE
| next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE)
| next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of Nr into ISAKMP Nonce Payload
| Nr  8b 3e eb b4  1e 7d 83 70  05 dd 94 19  12 48 35 84
| Nr  27 2d 33 b4  16 e3 05 74  0e 1c 44 2a  fd cd af 2e
| emitting length of ISAKMP Nonce Payload: 36
| ***emit ISAKMP Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE)
| next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet'
| emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
| keyex value  ed d8 2f 48  9b c1 ed b9  6a 0c 8d 06  a0 ab e2 36
| keyex value  12 35 78 2a  a0 21 a5 66  81 a7 36 86  08 a8 2a 8b
| keyex value  2f cf 98 2a  6a ca 58 b7  76 53 5b d8  1f 1b aa 2c
| keyex value  3d fd 3a 0e  ff 89 7c 41  b9 50 0e cc  b3 0c 5d b3
| keyex value  8b 25 ae 35  49 f9 c3 98  f9 5b 95 fa  14 2f 36 0c
| keyex value  d5 2f 0c b9  85 10 06 6b  d0 48 2a cf  0b d5 69 86
| keyex value  77 e9 a2 cc  b3 a3 76 29  69 3c c9 7a  0e d8 57 6b
| keyex value  fe 77 8e 8a  84 da 19 77  72 41 47 c7  f7 25 5b ba
| keyex value  bf 22 a0 de  38 60 f0 ee  1f 53 f1 cd  99 88 ae 9b
| keyex value  de ce ea 6a  62 77 f9 99  f3 73 4f 2d  63 17 dc c9
| keyex value  08 f0 34 be  2e ea 9e 86  86 74 0e 92  8a 09 9c 34
| keyex value  36 6b 57 85  17 e5 e4 44  65 84 52 e7  6d d4 8b 81
| keyex value  9b 95 02 be  b8 35 12 b3  92 29 bf db  7d 55 2f 15
| keyex value  0b c5 70 06  bf 1d 53 ff  1e b4 fe 15  c4 bc 44 12
| keyex value  17 84 02 6d  f0 3a 3a cd  3c 66 31 70  ee 5e 1e b0
| keyex value  3a c0 3e ac  5c a5 b9 dd  e0 59 36 4a  29 78 a8 03
| emitting length of ISAKMP Key Exchange Payload: 260
| quick inR1 outI2 HASH(2):
|   b4 95 16 71  61 86 57 47  26 7f f1 e7  77 1a ea e6
|   0e 40 21 58  1f 90 90 eb  b3 6a e7 d0  15 dc bb f9
| compute_proto_keymat: needed_len (after ESP enc)=16
| compute_proto_keymat: needed_len (after ESP auth)=36
| install_inbound_ipsec_sa() checking if we can route
| could_route called for west-east (kind=CK_PERMANENT)
| FOR_EACH_CONNECTION_... in route_owner
|  conn west-east mark 0/00000000, 0/00000000 vs
|  conn west-east mark 0/00000000, 0/00000000
| route owner of "west-east" unrouted: NULL; eroute owner: NULL
|    routing is easy, or has resolvable near-conflict
| checking if this is a replacement state
|   st=0x55b7378d4fe8 ost=(nil) st->serialno=#2 ost->serialno=#0
| installing outgoing SA now as refhim=0
| looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96
| encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12
| st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20
| setting IPsec SA replay-window to 32
| NIC esp-hw-offload not for connection 'west-east' not available on interface eth1
| netlink: enabling tunnel mode
| netlink: setting IPsec SA replay-window to 32 using old-style req
| netlink: esp-hw-offload not set for IPsec SA
| netlink response for Add SA esp.73bc9539@192.1.2.45 included non-error error
| outgoing SA has refhim=0
| looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96
| encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12
| st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20
| setting IPsec SA replay-window to 32
| NIC esp-hw-offload not for connection 'west-east' not available on interface eth1
| netlink: enabling tunnel mode
| netlink: setting IPsec SA replay-window to 32 using old-style req
| netlink: esp-hw-offload not set for IPsec SA
| netlink response for Add SA esp.57709f63@192.1.2.23 included non-error error
| priority calculation of connection "west-east" is 0xfdfdf
| add inbound eroute 192.1.2.45/32:0 --0-> 192.1.2.23/32:0 => tun.10000@192.1.2.23 (raw_eroute)
| IPsec Sa SPD priority set to 1040351
| raw_eroute result=success
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 428
| finished processing quick inI1
| complete v1 state transition with STF_OK
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
| #2 is idle
| doing_xauth:no, t_xauth_client_done:no
| IKEv1: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
| child state #2: QUICK_R0(established CHILD SA) => QUICK_R1(established CHILD SA)
| event_already_set, deleting event
| state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x55b7378c9048
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f083c002b78
| sending reply packet to 192.1.2.45:500 (from 192.1.2.23:500)
| sending 428 bytes for STATE_QUICK_R0 through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #2)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 20 01  b5 f6 02 37  00 00 01 ac  82 56 14 c7
|   a6 95 cf f4  7d 2f 63 a2  46 1d 4c aa  1a e1 f7 14
|   d5 68 14 44  8c d1 ce 41  ff 86 e5 e9  e5 d0 d4 a2
|   3a d7 6d 96  23 5d 72 d1  f4 c0 85 9e  f0 30 27 5e
|   1d af 36 3b  6f 3c 82 10  cb b7 e5 70  61 5f 23 79
|   13 4f 1c 6c  ce 87 4b 4f  be 10 5e c8  e1 15 93 3a
|   3e 3f 0f e1  a4 47 44 f2  69 5d 38 40  4e d3 2b 12
|   5e aa d2 55  47 d0 a4 95  6c 3d 77 fc  d8 0f bb 8a
|   7a 87 6d 97  6c 43 05 47  b5 78 3b ae  a8 08 2a 1d
|   45 d2 bf 88  be cf 15 0b  6d 98 79 5f  81 19 99 bb
|   f5 c6 8d 6f  c7 fc 8e 8e  46 3a c0 e9  ac 3f d2 76
|   b9 4f 4d 18  76 70 0c 5b  81 1f e3 68  fd 17 fc 78
|   a9 d0 2c c9  1f 72 6e ef  6b 9a a5 96  1c 1c cb f5
|   67 11 45 38  37 94 fa a7  64 91 37 94  7b e8 d7 b0
|   5d b2 f1 74  15 b1 28 e9  37 a2 7e 59  99 15 1a bd
|   a6 70 ad 48  ea f9 47 b6  bb 0d 3b 02  70 eb 32 b3
|   a6 a6 0f 2c  0f da af 39  0b 57 bd e1  a3 7b 8d fb
|   76 8e a5 7b  6c 27 33 68  46 bb d3 6f  c2 40 7c 82
|   6f 76 d5 dc  3b 5f 36 ed  d4 bc 6d bd  0b a8 1f 02
|   a1 a5 fa fa  ca a8 5c 0b  9a 47 a8 0c  36 33 8b 24
|   9d 8f 38 94  7b 54 08 80  0e e6 10 d3  e4 84 b0 84
|   eb 30 7a bd  19 ae 5d e5  45 8a c2 a0  b6 9d 38 68
|   34 9f 0b 24  85 35 82 b7  10 82 a8 fa  01 c4 5e 06
|   66 1d 80 0f  a3 8a 9f 08  01 87 34 07  01 76 0d f6
|   2b cd 13 1b  51 c2 ba ae  0b bb b9 32  9b e7 1d 67
|   09 3c d5 88  1a bb 62 84  31 63 a5 bb
| !event_already_set at reschedule
| event_schedule: new EVENT_RETRANSMIT-pe@0x7f083c002b78
| inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #2
| libevent_malloc: new ptr-libevent@0x7f0838003f28 size 128
| #2 STATE_QUICK_R1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29655.371627
| pstats #2 ikev1.ipsec established
| NAT-T: encaps is 'auto'
"west-east" #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 tunnel mode {ESP=>0x73bc9539 <0x57709f63 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=active}
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| resume sending helper answer for #2 suppresed complete_v1_state_transition()
| #2 spent 0.814 milliseconds in resume sending helper answer
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7f082c003618
| spent 0.00366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 76 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 20 01  b5 f6 02 37  00 00 00 4c  ff 08 b4 c1
|   5a 03 01 11  b5 a8 4d ce  b6 f2 5d ed  33 86 a5 1f
|   0a 46 75 a7  bf 46 29 1d  db 4e d8 fb  94 86 d1 9c
|   f0 b6 72 35  e6 b9 67 c4  5d fd 8c b3
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_QUICK (0x20)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 3052798519 (0xb5f60237)
|    length: 76 (0x4c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
| State DB: found IKEv1 state #2 in QUICK_R1 (find_state_ikev1)
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1633)
| #2 is idle
| #2 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 36 (0x24)
| removing 12 bytes of padding
| quick_inI2 HASH(3):
|   68 fa 92 28  e5 fd fd 91  19 63 91 fa  cd 92 5e 34
|   51 1a 80 2b  a4 a8 b6 50  65 1f bf 96  8c c1 5a 06
| received 'quick_inI2' message HASH(3) data ok
| install_ipsec_sa() for #2: outbound only
| could_route called for west-east (kind=CK_PERMANENT)
| FOR_EACH_CONNECTION_... in route_owner
|  conn west-east mark 0/00000000, 0/00000000 vs
|  conn west-east mark 0/00000000, 0/00000000
| route owner of "west-east" unrouted: NULL; eroute owner: NULL
| sr for #2: unrouted
| route_and_eroute() for proto 0, and source port 0 dest port 0
| FOR_EACH_CONNECTION_... in route_owner
|  conn west-east mark 0/00000000, 0/00000000 vs
|  conn west-east mark 0/00000000, 0/00000000
| route owner of "west-east" unrouted: NULL; eroute owner: NULL
| route_and_eroute with c: west-east (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2
| priority calculation of connection "west-east" is 0xfdfdf
| eroute_connection add eroute 192.1.2.23/32:0 --0-> 192.1.2.45/32:0 => tun.0@192.1.2.45 (raw_eroute)
| IPsec Sa SPD priority set to 1040351
| raw_eroute result=success
| running updown command "ipsec _updown" for verb up 
| command executing up-host
| executing up-host: PLUTO_VERB='up-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.1.2.23/32' PLUTO_MY_CLIENT_NET='192.1.2.23' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PLUTO_PEER_CLIENT='192.1.2.45/32' PLUTO_PEER_CLIENT_NET='192.1.2.45' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x73bc9539 S
| popen cmd is 1034 chars long
| cmd(   0):PLUTO_VERB='up-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_INTE:
| cmd(  80):RFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@eas:
| cmd( 160):t' PLUTO_MY_CLIENT='192.1.2.23/32' PLUTO_MY_CLIENT_NET='192.1.2.23' PLUTO_MY_CLI:
| cmd( 240):ENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQI:
| cmd( 320):D='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PLUT:
| cmd( 400):O_PEER_CLIENT='192.1.2.45/32' PLUTO_PEER_CLIENT_NET='192.1.2.45' PLUTO_PEER_CLIE:
| cmd( 480):NT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER:
| cmd( 560):_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+:
| cmd( 640):TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PE:
| cmd( 720):RMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLU:
| cmd( 800):TO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SER:
| cmd( 880):VER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='n:
| cmd( 960):o' VTI_SHARED='no' SPI_IN=0x73bc9539 SPI_OUT=0x57709f63 ipsec _updown 2>&1:
| route_and_eroute: firewall_notified: true
| running updown command "ipsec _updown" for verb prepare 
| command executing prepare-host
| executing prepare-host: PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.1.2.23/32' PLUTO_MY_CLIENT_NET='192.1.2.23' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PLUTO_PEER_CLIENT='192.1.2.45/32' PLUTO_PEER_CLIENT_NET='192.1.2.45' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x
| popen cmd is 1039 chars long
| cmd(   0):PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO:
| cmd(  80):_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID=:
| cmd( 160):'@east' PLUTO_MY_CLIENT='192.1.2.23/32' PLUTO_MY_CLIENT_NET='192.1.2.23' PLUTO_M:
| cmd( 240):Y_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA:
| cmd( 320):_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west':
| cmd( 400): PLUTO_PEER_CLIENT='192.1.2.45/32' PLUTO_PEER_CLIENT_NET='192.1.2.45' PLUTO_PEER:
| cmd( 480):_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO:
| cmd( 560):_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENC:
| cmd( 640):RYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND=':
| cmd( 720):CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0:
| cmd( 800):' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CF:
| cmd( 880):G_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTI:
| cmd( 960):NG='no' VTI_SHARED='no' SPI_IN=0x73bc9539 SPI_OUT=0x57709f63 ipsec _updown 2>&1:
| running updown command "ipsec _updown" for verb route 
| command executing route-host
| executing route-host: PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.1.2.23/32' PLUTO_MY_CLIENT_NET='192.1.2.23' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PLUTO_PEER_CLIENT='192.1.2.45/32' PLUTO_PEER_CLIENT_NET='192.1.2.45' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x73bc
| popen cmd is 1037 chars long
| cmd(   0):PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_I:
| cmd(  80):NTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@:
| cmd( 160):east' PLUTO_MY_CLIENT='192.1.2.23/32' PLUTO_MY_CLIENT_NET='192.1.2.23' PLUTO_MY_:
| cmd( 240):CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_R:
| cmd( 320):EQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' P:
| cmd( 400):LUTO_PEER_CLIENT='192.1.2.45/32' PLUTO_PEER_CLIENT_NET='192.1.2.45' PLUTO_PEER_C:
| cmd( 480):LIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_P:
| cmd( 560):EER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRY:
| cmd( 640):PT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK:
| cmd( 720):_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' :
| cmd( 800):PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_:
| cmd( 880):SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING:
| cmd( 960):='no' VTI_SHARED='no' SPI_IN=0x73bc9539 SPI_OUT=0x57709f63 ipsec _updown 2>&1:
| route_and_eroute: instance "west-east", setting eroute_owner {spd=0x55b7378c8588,sr=0x55b7378c8588} to #2 (was #0) (newest_ipsec_sa=#0)
| #1 spent 1.48 milliseconds in install_ipsec_sa()
| inI2: instance west-east[0], setting IKEv1 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1
| DPD: dpd_init() called on IPsec SA
| State DB: found IKEv1 state #1 in MAIN_R3 (find_state_ikev1)
| event_schedule: new EVENT_DPD-pe@0x7f0838004218
| inserting event EVENT_DPD, timeout in 5 seconds for #2
| libevent_malloc: new ptr-libevent@0x7f082c003618 size 128
| complete v1 state transition with STF_OK
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
| #2 is idle
| doing_xauth:no, t_xauth_client_done:no
| IKEv1: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
| child state #2: QUICK_R1(established CHILD SA) => QUICK_R2(established CHILD SA)
| event_already_set, deleting event
| state #2 requesting EVENT_RETRANSMIT to be deleted
| #2 STATE_QUICK_R2: retransmits: cleared
| libevent_free: release ptr-libevent@0x7f0838003f28
| free_event_entry: release EVENT_RETRANSMIT-pe@0x7f083c002b78
| !event_already_set at reschedule
| event_schedule: new EVENT_SA_REPLACE-pe@0x7f083c002b78
| inserting event EVENT_SA_REPLACE, timeout in 28530 seconds for #2
| libevent_malloc: new ptr-libevent@0x7f0838003f28 size 128
| pstats #2 ikev1.ipsec established
| NAT-T: encaps is 'auto'
"west-east" #2: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0x73bc9539 <0x57709f63 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=active}
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| #2 spent 1.58 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 1.72 milliseconds in comm_handle_cb() reading and processing packet
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.0046 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.00367 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.00299 milliseconds in signal handler PLUTO_SIGCHLD
| timer_event_cb: processing event@0x7f0838004218
| handling event EVENT_DPD for child state #2
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:250)
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in dpd_event() at ikev1_dpd.c:360)
| FOR_EACH_STATE_... in find_phase1_state
| DPD: processing for state #2 ("west-east")
| get_sa_info esp.57709f63@192.1.2.23
| DPD: out event not sent, phase 2 active
| event_schedule: new EVENT_DPD-pe@0x55b7378c93a8
| inserting event EVENT_DPD, timeout in 5 seconds for #2
| libevent_malloc: new ptr-libevent@0x55b7378c8de8 size 128
| libevent_free: release ptr-libevent@0x7f082c003618
| free_event_entry: release EVENT_DPD-pe@0x7f0838004218
| #2 spent 0.0765 milliseconds in timer_event_cb() EVENT_DPD
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:557)
| timer_event_cb: processing event@0x55b7378c93a8
| handling event EVENT_DPD for child state #2
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:250)
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in dpd_event() at ikev1_dpd.c:360)
| FOR_EACH_STATE_... in find_phase1_state
| DPD: processing for state #2 ("west-east")
| get_sa_info esp.57709f63@192.1.2.23
| DPD: out event not sent, phase 2 active
| event_schedule: new EVENT_DPD-pe@0x7f0838004218
| inserting event EVENT_DPD, timeout in 5 seconds for #2
| libevent_malloc: new ptr-libevent@0x7f082c003618 size 128
| libevent_free: release ptr-libevent@0x55b7378c8de8
| free_event_entry: release EVENT_DPD-pe@0x55b7378c93a8
| #2 spent 0.0623 milliseconds in timer_event_cb() EVENT_DPD
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:557)
| processing global timer EVENT_SHUNT_SCAN
| expiring aged bare shunts from shunt table
| spent 0.00319 milliseconds in global timer EVENT_SHUNT_SCAN
| spent 0.00382 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 108 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  9d 89 9a 0e  00 00 00 6c  3b 66 8a 25
|   2e c7 ec ca  b6 99 c8 17  51 05 7b 4b  2d 35 8e be
|   35 1d 8f 92  44 d4 cc 28  fc e7 a6 10  7b ff f7 0e
|   31 07 03 81  0b b4 39 40  2d c0 f3 df  32 81 6c 56
|   dc 98 d8 35  f5 21 b9 82  20 b4 4e 2f  38 e9 bc 33
|   e5 2c 08 18  41 11 89 38  ed 5c 1d e4
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 2643040782 (0x9d899a0e)
|    length: 108 (0x6c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| peer and cookies match on #2; msgid=00000000 st_msgid=b5f60237 st_msgid_phase15=00000000
| peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
| p15 state object #1 found, in STATE_MAIN_R3
| State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1479)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_N (0xb)
|    length: 36 (0x24)
| got payload 0x800  (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
| ***parse ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 32 (0x20)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE (0x8d28)
| removing 12 bytes of padding
| informational HASH(1):
|   fa 93 bd b1  d6 d2 c8 c5  d5 9d 14 a1  0f 88 f0 bb
|   c3 1f 28 f6  37 e9 a8 70  89 51 11 a0  9e 4b 01 29
| received 'informational' message HASH(1) data ok
| info:  1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
| info:  00 00 20 55
| processing informational R_U_THERE (36136)
| pstats ikev1_recv_notifies_e 36136
| DPD: received R_U_THERE seq:8277 monotime:29667.387383 (state=#1 name="west-east")
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 187542042 (0xb2daa1a)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE_ACK (0x8d29)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
| next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify'
| emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
| notify icookie  1a e1 f9 70  07 2e 22 db
| emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
| notify rcookie  7a b3 f9 97  03 29 ec 24
| emitting 4 raw bytes of notify data into ISAKMP Notification Payload
| notify data  00 00 20 55
| emitting length of ISAKMP Notification Payload: 32
| notification HASH(1):
|   dd 30 b3 61  1b f8 9c 71  56 90 2f 90  09 ea e0 65
|   15 a6 42 00  b6 5d e4 47  d9 21 3d a8  13 8e 2a 9c
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 108
| sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  0b 2d aa 1a  00 00 00 6c  5f 15 7e 4b
|   e2 f4 42 cc  64 93 c3 de  f2 3e ea 1e  62 37 ac 3b
|   20 24 7f e1  12 66 a9 84  6c 57 8f 7c  79 09 d8 8e
|   86 0c 65 25  f9 98 87 bd  be 74 fb 35  b1 41 b4 f2
|   4c de c5 8a  ac c3 10 38  7a f0 97 4b  5b 36 6b 30
|   8b 31 23 05  ab 88 e8 5a  85 f9 d1 f3
| complete v1 state transition with STF_IGNORE
| #1 spent 0.113 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.323 milliseconds in comm_handle_cb() reading and processing packet
| spent 0.0034 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 108 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  49 b5 b6 5a  00 00 00 6c  e1 39 68 76
|   c2 12 aa 0a  d5 d5 b7 72  97 98 70 cd  62 64 c4 bd
|   c0 2a 5c bb  07 b3 c8 d6  d4 92 9c 78  7e 76 58 b2
|   f9 8d ac 2e  4b c0 37 44  f8 d4 a3 45  0a aa 9e e9
|   e7 2b de 07  ef 9e 55 af  b6 82 0c bf  9d f9 7c 1c
|   9b 06 8b 20  60 94 6b ce  8f 8d 76 40
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 1236645466 (0x49b5b65a)
|    length: 108 (0x6c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| peer and cookies match on #2; msgid=00000000 st_msgid=b5f60237 st_msgid_phase15=00000000
| peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
| p15 state object #1 found, in STATE_MAIN_R3
| State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1479)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_N (0xb)
|    length: 36 (0x24)
| got payload 0x800  (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
| ***parse ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 32 (0x20)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE (0x8d28)
| removing 12 bytes of padding
| informational HASH(1):
|   88 f4 d4 ca  cf d9 0b 68  9b a5 62 0f  ac 09 56 d7
|   d5 ed 97 0e  38 f1 c7 69  f2 83 28 0f  28 85 c6 cd
| received 'informational' message HASH(1) data ok
| info:  1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
| info:  00 00 20 56
| processing informational R_U_THERE (36136)
| pstats ikev1_recv_notifies_e 36136
| DPD: received R_U_THERE seq:8278 monotime:29670.390229 (state=#1 name="west-east")
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 2089493169 (0x7c8b22b1)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE_ACK (0x8d29)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
| next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify'
| emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
| notify icookie  1a e1 f9 70  07 2e 22 db
| emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
| notify rcookie  7a b3 f9 97  03 29 ec 24
| emitting 4 raw bytes of notify data into ISAKMP Notification Payload
| notify data  00 00 20 56
| emitting length of ISAKMP Notification Payload: 32
| notification HASH(1):
|   95 70 1a 7f  bd c3 83 5f  21 fc f0 92  ba 07 2a f5
|   a3 ee c3 c6  d6 77 15 54  ec d8 c3 2e  eb a0 fe 08
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 108
| sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  7c 8b 22 b1  00 00 00 6c  f0 9d 91 b8
|   a3 9b e5 07  62 50 7c 2b  d1 32 30 98  78 f5 7f 34
|   9c 5b 96 86  43 90 7d a9  16 95 5e 63  ee 4a 08 de
|   fa dc 37 35  c3 86 81 80  a8 f4 c6 2f  3d 30 69 bf
|   2e 3f 97 62  31 00 59 86  50 56 41 67  20 b4 9b 4c
|   42 7e cc 3a  7a 9e e7 42  e7 8b 4b 2d
| complete v1 state transition with STF_IGNORE
| #1 spent 0.138 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.322 milliseconds in comm_handle_cb() reading and processing packet
| timer_event_cb: processing event@0x7f0838004218
| handling event EVENT_DPD for child state #2
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:250)
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in dpd_event() at ikev1_dpd.c:360)
| FOR_EACH_STATE_... in find_phase1_state
| DPD: processing for state #2 ("west-east")
| DPD: not yet time for dpd event: 29670.429506 < 29675.390229
| event_schedule: new EVENT_DPD-pe@0x55b7378c93a8
| inserting event EVENT_DPD, timeout in 4.960723 seconds for #2
| libevent_malloc: new ptr-libevent@0x55b7378c9048 size 128
| libevent_free: release ptr-libevent@0x7f082c003618
| free_event_entry: release EVENT_DPD-pe@0x7f0838004218
| #2 spent 0.0648 milliseconds in timer_event_cb() EVENT_DPD
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:557)
| spent 0.00268 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 108 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  00 23 66 3d  00 00 00 6c  0f d6 43 eb
|   b0 04 78 80  c9 8f 33 59  29 a0 64 e7  d0 51 2c ef
|   11 9d 07 b2  51 ff b6 06  8d 4d f6 5f  60 f2 8f 28
|   60 7d 58 55  18 c6 ea 9b  7e d2 b6 d8  ac 66 fa da
|   d7 eb e0 cc  34 35 3b 9b  2d e8 3a 88  24 50 52 ac
|   5d 4b 36 32  7d 2e d0 f7  b8 f5 74 52
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 2319933 (0x23663d)
|    length: 108 (0x6c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| peer and cookies match on #2; msgid=00000000 st_msgid=b5f60237 st_msgid_phase15=00000000
| peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
| p15 state object #1 found, in STATE_MAIN_R3
| State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1479)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_N (0xb)
|    length: 36 (0x24)
| got payload 0x800  (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
| ***parse ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 32 (0x20)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE (0x8d28)
| removing 12 bytes of padding
| informational HASH(1):
|   a9 97 93 b8  f2 3b 8d 9a  42 a5 ea 30  d1 72 f8 7a
|   c6 9d 0b 80  c1 93 ad 74  ef 72 2b 79  31 58 b7 05
| received 'informational' message HASH(1) data ok
| info:  1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
| info:  00 00 20 57
| processing informational R_U_THERE (36136)
| pstats ikev1_recv_notifies_e 36136
| DPD: received R_U_THERE seq:8279 monotime:29673.392269 (state=#1 name="west-east")
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 2636957792 (0x9d2cc860)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE_ACK (0x8d29)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
| next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify'
| emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
| notify icookie  1a e1 f9 70  07 2e 22 db
| emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
| notify rcookie  7a b3 f9 97  03 29 ec 24
| emitting 4 raw bytes of notify data into ISAKMP Notification Payload
| notify data  00 00 20 57
| emitting length of ISAKMP Notification Payload: 32
| notification HASH(1):
|   bb d7 3a ca  aa a6 a5 c4  f3 da 42 c7  9c 23 3e 65
|   b3 ee 3f 13  a1 a8 ac 2d  26 68 74 e2  f6 ba 6b 02
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 108
| sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  9d 2c c8 60  00 00 00 6c  e5 2e 62 3e
|   6a 48 1f 23  3e 85 fc 6d  45 f6 38 e9  8f 00 0e 4d
|   18 7c 4d 69  4d 6f 2a 2c  20 8d ac 82  93 91 43 b5
|   c7 ff 1d 62  3a 38 0c 84  18 66 5e 6c  d1 8f fa f4
|   79 54 45 1f  44 51 4d 58  68 70 a1 cf  34 ae fc 12
|   c3 17 27 f6  74 05 53 24  a8 ac c6 79
| complete v1 state transition with STF_IGNORE
| #1 spent 0.0926 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.207 milliseconds in comm_handle_cb() reading and processing packet
| processing global timer EVENT_NAT_T_KEEPALIVE
| FOR_EACH_STATE_... in nat_traversal_ka_event (for_each_state)
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in for_each_state() at state.c:1575)
| not behind NAT: no NAT-T KEEP-ALIVE required for conn west-east
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in nat_traversal_send_ka() at nat_traversal.c:774)
| ka_event: send NAT-KA to 192.1.2.45:500 (state=#2)
| sending NAT-T Keep Alive
| sending 1 bytes for NAT-T Keep Alive through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #2)
|   ff
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in nat_traversal_send_ka() at nat_traversal.c:786)
| processing: STOP state #0 (in for_each_state() at state.c:1577)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in for_each_state() at state.c:1575)
| not behind NAT: no NAT-T KEEP-ALIVE required for conn west-east
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in for_each_state() at state.c:1577)
| global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds
| spent 0.0516 milliseconds in global timer EVENT_NAT_T_KEEPALIVE
| spent 0.00205 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| NAT-T keep-alive (bogus ?) should not reach this point. Ignored. Sender: 192.1.2.45:500
| spent 0.007 milliseconds in comm_handle_cb() reading and processing packet
| timer_event_cb: processing event@0x55b7378c93a8
| handling event EVENT_DPD for child state #2
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:250)
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in dpd_event() at ikev1_dpd.c:360)
| FOR_EACH_STATE_... in find_phase1_state
| DPD: processing for state #2 ("west-east")
| DPD: not yet time for dpd event: 29675.390493 < 29678.392269
| event_schedule: new EVENT_DPD-pe@0x7f0838004218
| inserting event EVENT_DPD, timeout in 3.001776 seconds for #2
| libevent_malloc: new ptr-libevent@0x7f082c003618 size 128
| libevent_free: release ptr-libevent@0x55b7378c9048
| free_event_entry: release EVENT_DPD-pe@0x55b7378c93a8
| #2 spent 0.066 milliseconds in timer_event_cb() EVENT_DPD
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:557)
| spent 0.00294 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 108 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  a9 8a 84 37  00 00 00 6c  25 61 6e 20
|   72 56 58 1c  a0 54 9d 8a  ba b4 ad 61  44 b4 13 18
|   81 87 fa 6f  4b 7b a8 78  e5 c8 da 59  7f 7b 02 88
|   80 1c 75 46  6a 77 a5 d5  2b 88 28 95  83 06 a4 0c
|   c6 6e 4f 82  dd ac ae 78  bc 7f 7b f7  99 71 ff 0b
|   68 23 fe 38  62 cf f8 1a  79 69 2c 12
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 2844427319 (0xa98a8437)
|    length: 108 (0x6c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| peer and cookies match on #2; msgid=00000000 st_msgid=b5f60237 st_msgid_phase15=00000000
| peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
| p15 state object #1 found, in STATE_MAIN_R3
| State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1479)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_N (0xb)
|    length: 36 (0x24)
| got payload 0x800  (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
| ***parse ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 32 (0x20)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE (0x8d28)
| removing 12 bytes of padding
| informational HASH(1):
|   eb bf 1c bb  95 56 10 8a  5a 72 64 1e  61 b0 a7 4e
|   e1 7a 37 85  8b f7 3c 59  f7 e7 9c 28  0c 19 b3 9b
| received 'informational' message HASH(1) data ok
| info:  1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
| info:  00 00 20 58
| processing informational R_U_THERE (36136)
| pstats ikev1_recv_notifies_e 36136
| DPD: received R_U_THERE seq:8280 monotime:29676.394282 (state=#1 name="west-east")
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 172498941 (0xa481ffd)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE_ACK (0x8d29)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
| next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify'
| emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
| notify icookie  1a e1 f9 70  07 2e 22 db
| emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
| notify rcookie  7a b3 f9 97  03 29 ec 24
| emitting 4 raw bytes of notify data into ISAKMP Notification Payload
| notify data  00 00 20 58
| emitting length of ISAKMP Notification Payload: 32
| notification HASH(1):
|   ef f3 b5 bd  43 79 4a ac  b0 c5 94 04  29 79 22 41
|   c5 12 4c 78  25 23 79 ad  13 58 73 af  cb fc aa 7b
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 108
| sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  0a 48 1f fd  00 00 00 6c  c2 11 fb 8f
|   4c 92 8e 78  45 b5 30 93  1c 3e 0e ca  8f 42 f8 92
|   32 9a ec 95  70 ba 8d 44  88 bb fb f6  03 bf 12 c8
|   45 af 5e 27  55 0e d0 48  b8 55 20 c7  4b 36 7e 15
|   66 5c a2 9d  f4 c2 5c fa  22 bf 5f 06  f6 1e 69 54
|   35 17 48 4a  8c 42 97 30  df ae 8e 3a
| complete v1 state transition with STF_IGNORE
| #1 spent 0.0919 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.206 milliseconds in comm_handle_cb() reading and processing packet
| timer_event_cb: processing event@0x7f0838004218
| handling event EVENT_DPD for child state #2
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:250)
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in dpd_event() at ikev1_dpd.c:360)
| FOR_EACH_STATE_... in find_phase1_state
| DPD: processing for state #2 ("west-east")
| DPD: not yet time for dpd event: 29678.394501 < 29681.394282
| event_schedule: new EVENT_DPD-pe@0x55b7378c93a8
| inserting event EVENT_DPD, timeout in 2.999781 seconds for #2
| libevent_malloc: new ptr-libevent@0x55b7378c9048 size 128
| libevent_free: release ptr-libevent@0x7f082c003618
| free_event_entry: release EVENT_DPD-pe@0x7f0838004218
| #2 spent 0.0875 milliseconds in timer_event_cb() EVENT_DPD
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:557)
| spent 0.00281 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 108 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  0a 7d e3 a2  00 00 00 6c  a1 6a 6a 7f
|   54 dd 25 a0  68 e4 e8 b1  05 0e 07 b4  0c d9 21 19
|   46 a5 fe 18  89 46 2a e8  17 ba 48 fc  fe 73 c0 10
|   aa 91 52 76  48 f5 f3 e6  b9 f9 c7 d4  a5 8d 9f 96
|   48 1b 91 5e  58 45 dd 16  31 08 97 be  04 16 cb a8
|   84 61 88 ad  80 a0 34 a3  f3 88 c5 12
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 176022434 (0xa7de3a2)
|    length: 108 (0x6c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| peer and cookies match on #2; msgid=00000000 st_msgid=b5f60237 st_msgid_phase15=00000000
| peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
| p15 state object #1 found, in STATE_MAIN_R3
| State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1479)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_N (0xb)
|    length: 36 (0x24)
| got payload 0x800  (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
| ***parse ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 32 (0x20)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE (0x8d28)
| removing 12 bytes of padding
| informational HASH(1):
|   d3 b7 d5 4d  3f 5e 7b b2  96 46 5a 95  40 ca 45 d9
|   c4 e6 dc 5b  08 b4 7e c9  7b 4b 77 c2  5d 0b fb 19
| received 'informational' message HASH(1) data ok
| info:  1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
| info:  00 00 20 59
| processing informational R_U_THERE (36136)
| pstats ikev1_recv_notifies_e 36136
| DPD: received R_U_THERE seq:8281 monotime:29679.397206 (state=#1 name="west-east")
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 561440894 (0x2176e87e)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE_ACK (0x8d29)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
| next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify'
| emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
| notify icookie  1a e1 f9 70  07 2e 22 db
| emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
| notify rcookie  7a b3 f9 97  03 29 ec 24
| emitting 4 raw bytes of notify data into ISAKMP Notification Payload
| notify data  00 00 20 59
| emitting length of ISAKMP Notification Payload: 32
| notification HASH(1):
|   90 af ef 59  88 db d2 8f  32 1c d2 1a  96 2b 70 aa
|   c7 b8 ef 9c  9f 84 4a db  5c 90 55 b6  7d 46 47 f0
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 108
| sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  21 76 e8 7e  00 00 00 6c  34 1e f1 e3
|   7b a0 c0 98  5d dc 66 2e  3c 66 da 00  3b 7e 3b 74
|   74 62 3d 47  d1 c3 42 60  f6 6d eb bb  80 4a c4 7e
|   b7 3c 9d 85  88 d7 69 2e  82 8b 0f e9  29 1e b5 2f
|   0d 79 07 df  9d df dd ff  47 33 5c 39  83 08 b4 d9
|   a0 a8 04 64  73 3c ab 72  c9 35 9e 13
| complete v1 state transition with STF_IGNORE
| #1 spent 0.133 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.29 milliseconds in comm_handle_cb() reading and processing packet
| timer_event_cb: processing event@0x55b7378c93a8
| handling event EVENT_DPD for child state #2
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:250)
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in dpd_event() at ikev1_dpd.c:360)
| FOR_EACH_STATE_... in find_phase1_state
| DPD: processing for state #2 ("west-east")
| DPD: not yet time for dpd event: 29681.395833 < 29684.397206
| event_schedule: new EVENT_DPD-pe@0x7f0838004218
| inserting event EVENT_DPD, timeout in 3.001373 seconds for #2
| libevent_malloc: new ptr-libevent@0x7f082c003618 size 128
| libevent_free: release ptr-libevent@0x55b7378c9048
| free_event_entry: release EVENT_DPD-pe@0x55b7378c93a8
| #2 spent 0.0488 milliseconds in timer_event_cb() EVENT_DPD
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:557)
| spent 0.0107 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 108 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  05 0b 17 6f  00 00 00 6c  d0 26 9b 02
|   fe 52 cf b5  20 5c 3b ab  1b e8 68 8a  54 64 a8 fd
|   3c 24 44 d4  4d 3a 6e f7  36 f7 67 cc  b5 a8 c8 e5
|   e4 75 bd 6e  67 19 14 72  c7 69 3b a8  32 14 d5 04
|   a3 ad bc 33  80 aa 89 4c  96 07 6a 3a  e8 a5 d8 ec
|   ab 64 e7 8e  26 2a 93 9d  c4 28 12 c9
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 84612975 (0x50b176f)
|    length: 108 (0x6c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| peer and cookies match on #2; msgid=00000000 st_msgid=b5f60237 st_msgid_phase15=00000000
| peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
| p15 state object #1 found, in STATE_MAIN_R3
| State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1479)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_N (0xb)
|    length: 36 (0x24)
| got payload 0x800  (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
| ***parse ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 32 (0x20)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE (0x8d28)
| removing 12 bytes of padding
| informational HASH(1):
|   f2 c1 3a 63  c9 0c 7d 5a  7b 8a 28 1e  e7 0f 63 30
|   c5 da d9 ae  d2 07 09 9a  fa 12 19 59  b3 97 04 27
| received 'informational' message HASH(1) data ok
| info:  1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
| info:  00 00 20 5a
| processing informational R_U_THERE (36136)
| pstats ikev1_recv_notifies_e 36136
| DPD: received R_U_THERE seq:8282 monotime:29682.402033 (state=#1 name="west-east")
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 3190405943 (0xbe29bb37)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE_ACK (0x8d29)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
| next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify'
| emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
| notify icookie  1a e1 f9 70  07 2e 22 db
| emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
| notify rcookie  7a b3 f9 97  03 29 ec 24
| emitting 4 raw bytes of notify data into ISAKMP Notification Payload
| notify data  00 00 20 5a
| emitting length of ISAKMP Notification Payload: 32
| notification HASH(1):
|   57 b6 11 d6  8a bc ec 82  57 ca ed 8d  be 2a 4f 51
|   9c 78 78 0e  b4 74 fa d5  7e fa 10 26  e9 1c c8 84
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 108
| sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  be 29 bb 37  00 00 00 6c  f8 b4 f7 42
|   bd af aa 88  5f c6 f2 9e  24 b6 fb 09  3a ad 51 fb
|   32 fb 98 38  94 0a ed cf  96 07 25 06  ff 06 1d 5c
|   d7 2f de 07  69 6a f4 91  24 e5 77 fd  b4 3d 25 61
|   3a 2c 27 8d  15 13 1a fd  96 a9 12 84  23 c9 a8 16
|   00 6e 46 f7  c0 e3 e2 db  b9 1d 78 22
| complete v1 state transition with STF_IGNORE
| #1 spent 0.462 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 1.02 milliseconds in comm_handle_cb() reading and processing packet
| timer_event_cb: processing event@0x7f0838004218
| handling event EVENT_DPD for child state #2
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:250)
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in dpd_event() at ikev1_dpd.c:360)
| FOR_EACH_STATE_... in find_phase1_state
| DPD: processing for state #2 ("west-east")
| DPD: not yet time for dpd event: 29684.400836 < 29687.402033
| event_schedule: new EVENT_DPD-pe@0x55b7378c93a8
| inserting event EVENT_DPD, timeout in 3.001197 seconds for #2
| libevent_malloc: new ptr-libevent@0x55b7378c9048 size 128
| libevent_free: release ptr-libevent@0x7f082c003618
| free_event_entry: release EVENT_DPD-pe@0x7f0838004218
| #2 spent 0.0456 milliseconds in timer_event_cb() EVENT_DPD
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:557)
| spent 0.00279 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 108 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  1f a0 e8 a9  00 00 00 6c  e0 47 4d 5a
|   0f 53 38 b8  d8 6c 42 b5  1f 68 bc 77  0c 1c de 07
|   c8 e7 06 2e  45 c1 9f 5b  dd 5a 3a bd  d5 e5 37 e3
|   cc 46 37 29  0b 63 0a 49  5b 21 3e fb  76 75 3f 24
|   39 46 2d c0  90 dd 72 fd  bc 19 79 80  a5 01 8c 0e
|   96 82 30 73  44 f3 ba ed  ab 41 96 f6
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 530639017 (0x1fa0e8a9)
|    length: 108 (0x6c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| peer and cookies match on #2; msgid=00000000 st_msgid=b5f60237 st_msgid_phase15=00000000
| peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
| p15 state object #1 found, in STATE_MAIN_R3
| State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1479)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_N (0xb)
|    length: 36 (0x24)
| got payload 0x800  (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
| ***parse ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 32 (0x20)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE (0x8d28)
| removing 12 bytes of padding
| informational HASH(1):
|   61 10 4e 07  03 ad 89 29  9a c9 52 53  9e d8 82 73
|   8e 38 87 40  d8 d3 98 e6  6a 72 cc dd  10 4a 10 63
| received 'informational' message HASH(1) data ok
| info:  1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
| info:  00 00 20 5b
| processing informational R_U_THERE (36136)
| pstats ikev1_recv_notifies_e 36136
| DPD: received R_U_THERE seq:8283 monotime:29685.404229 (state=#1 name="west-east")
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 2138841236 (0x7f7c2094)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE_ACK (0x8d29)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
| next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify'
| emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
| notify icookie  1a e1 f9 70  07 2e 22 db
| emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
| notify rcookie  7a b3 f9 97  03 29 ec 24
| emitting 4 raw bytes of notify data into ISAKMP Notification Payload
| notify data  00 00 20 5b
| emitting length of ISAKMP Notification Payload: 32
| notification HASH(1):
|   4a 14 a7 0e  e4 6f 17 cd  fd 15 83 24  87 f2 69 9d
|   43 54 4b 49  d5 eb 82 f0  4a 1c c8 0f  2c 86 6b 84
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 108
| sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  7f 7c 20 94  00 00 00 6c  4b b8 ee d7
|   44 5b 77 f3  9e 98 9e 4a  1f 21 36 a4  08 87 62 84
|   85 1b 42 dd  4a 87 72 6d  d4 84 58 87  99 3d 60 dd
|   b2 47 42 17  8e 3d 1e 49  fa d8 b9 51  91 90 05 4c
|   cb 8d df c5  3b cb 7e 8b  56 bf d2 3d  fd 3c 4e 32
|   4e 9f f1 ed  0b 90 cb 85  39 81 cb ed
| complete v1 state transition with STF_IGNORE
| #1 spent 0.144 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.274 milliseconds in comm_handle_cb() reading and processing packet
| processing global timer EVENT_SHUNT_SCAN
| expiring aged bare shunts from shunt table
| spent 0.00413 milliseconds in global timer EVENT_SHUNT_SCAN
| timer_event_cb: processing event@0x55b7378c93a8
| handling event EVENT_DPD for child state #2
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:250)
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in dpd_event() at ikev1_dpd.c:360)
| FOR_EACH_STATE_... in find_phase1_state
| DPD: processing for state #2 ("west-east")
| DPD: not yet time for dpd event: 29687.403642 < 29690.404229
| event_schedule: new EVENT_DPD-pe@0x7f0838004218
| inserting event EVENT_DPD, timeout in 3.000587 seconds for #2
| libevent_malloc: new ptr-libevent@0x7f082c003618 size 128
| libevent_free: release ptr-libevent@0x55b7378c9048
| free_event_entry: release EVENT_DPD-pe@0x55b7378c93a8
| #2 spent 0.0421 milliseconds in timer_event_cb() EVENT_DPD
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:557)
| spent 0.00278 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 108 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  0e 46 29 d3  00 00 00 6c  62 b2 ad 19
|   4b 10 ab fa  9f cd 8b 3b  b3 b4 a2 13  c0 63 f8 4c
|   d3 e8 2e 9c  40 5e 4a c9  55 35 00 3c  50 2c 82 72
|   1a d8 dd 5e  1d 08 e6 7a  76 00 81 fb  af 2e 46 ab
|   87 c2 42 9b  20 17 70 4f  04 22 72 c5  ae 5c a8 50
|   74 36 fc 06  f4 5a cc 65  a7 4d 81 bc
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 239479251 (0xe4629d3)
|    length: 108 (0x6c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| peer and cookies match on #2; msgid=00000000 st_msgid=b5f60237 st_msgid_phase15=00000000
| peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
| p15 state object #1 found, in STATE_MAIN_R3
| State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1479)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_N (0xb)
|    length: 36 (0x24)
| got payload 0x800  (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
| ***parse ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 32 (0x20)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE (0x8d28)
| removing 12 bytes of padding
| informational HASH(1):
|   d0 89 83 e8  df 83 ae d3  21 7d c6 5a  68 32 44 b2
|   72 8b 24 e4  a2 f5 ba f9  93 e5 32 a6  1f 70 93 2b
| received 'informational' message HASH(1) data ok
| info:  1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
| info:  00 00 20 5c
| processing informational R_U_THERE (36136)
| pstats ikev1_recv_notifies_e 36136
| DPD: received R_U_THERE seq:8284 monotime:29688.406208 (state=#1 name="west-east")
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 4011451850 (0xef19e5ca)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE_ACK (0x8d29)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
| next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify'
| emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
| notify icookie  1a e1 f9 70  07 2e 22 db
| emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
| notify rcookie  7a b3 f9 97  03 29 ec 24
| emitting 4 raw bytes of notify data into ISAKMP Notification Payload
| notify data  00 00 20 5c
| emitting length of ISAKMP Notification Payload: 32
| notification HASH(1):
|   1d d3 69 75  a4 bc ba 34  49 24 49 f3  69 4b 16 0b
|   70 e0 96 66  a4 58 6d 44  25 29 04 f1  4f 23 d8 16
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 108
| sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  ef 19 e5 ca  00 00 00 6c  87 17 d1 b9
|   e8 77 fb fe  52 75 d1 98  25 d6 3d 54  b8 f4 3d 68
|   45 02 be b6  fa d1 56 3a  be 8f 01 c5  9f 43 7c f4
|   49 e7 df 8e  74 56 4a b1  f2 05 3f 2f  43 d2 e6 f9
|   39 9c 1d b6  37 72 29 4b  c2 06 6c 62  90 49 7b cd
|   c5 d8 d0 77  2a fd 95 07  2d ed 6c 06
| complete v1 state transition with STF_IGNORE
| #1 spent 0.092 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.207 milliseconds in comm_handle_cb() reading and processing packet
| timer_event_cb: processing event@0x7f0838004218
| handling event EVENT_DPD for child state #2
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:250)
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in dpd_event() at ikev1_dpd.c:360)
| FOR_EACH_STATE_... in find_phase1_state
| DPD: processing for state #2 ("west-east")
| DPD: not yet time for dpd event: 29690.405829 < 29693.406208
| event_schedule: new EVENT_DPD-pe@0x55b7378c93a8
| inserting event EVENT_DPD, timeout in 3.000379 seconds for #2
| libevent_malloc: new ptr-libevent@0x55b7378c9048 size 128
| libevent_free: release ptr-libevent@0x7f082c003618
| free_event_entry: release EVENT_DPD-pe@0x7f0838004218
| #2 spent 0.0854 milliseconds in timer_event_cb() EVENT_DPD
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:557)
| spent 0.0104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 108 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  66 96 a0 e7  00 00 00 6c  f2 52 66 8f
|   41 a6 54 ac  0a c2 7e c3  f4 b6 3a ed  27 f4 f3 fb
|   bf 43 ab 08  3e fc e9 eb  30 d4 7d 8b  78 16 e0 cd
|   a0 d0 07 c2  03 86 66 6c  5c 62 a3 89  ad 20 10 df
|   c8 9d 01 cd  27 aa b4 50  84 f2 39 8c  1d 6b 97 46
|   6f 8f 1a e3  9c e6 03 72  45 4e 50 ba
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 1721147623 (0x6696a0e7)
|    length: 108 (0x6c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| peer and cookies match on #2; msgid=00000000 st_msgid=b5f60237 st_msgid_phase15=00000000
| peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
| p15 state object #1 found, in STATE_MAIN_R3
| State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1479)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_N (0xb)
|    length: 36 (0x24)
| got payload 0x800  (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
| ***parse ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 32 (0x20)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE (0x8d28)
| removing 12 bytes of padding
| informational HASH(1):
|   a8 f8 65 8a  bf a5 ef af  e0 4d cc e4  9c 27 0a 2a
|   a7 8e 39 c4  d4 9d f8 54  c6 e0 a4 8f  1f e7 3e 08
| received 'informational' message HASH(1) data ok
| info:  1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
| info:  00 00 20 5d
| processing informational R_U_THERE (36136)
| pstats ikev1_recv_notifies_e 36136
| DPD: received R_U_THERE seq:8285 monotime:29691.410569 (state=#1 name="west-east")
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 1584344146 (0x5e6f2c52)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE_ACK (0x8d29)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
| next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify'
| emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
| notify icookie  1a e1 f9 70  07 2e 22 db
| emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
| notify rcookie  7a b3 f9 97  03 29 ec 24
| emitting 4 raw bytes of notify data into ISAKMP Notification Payload
| notify data  00 00 20 5d
| emitting length of ISAKMP Notification Payload: 32
| notification HASH(1):
|   02 47 5d 9e  ba 36 9d ca  fa 32 cd 1c  cd 4f 73 41
|   50 12 6e 91  eb f8 48 ff  84 c6 6a 77  ef 56 73 f9
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 108
| sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  5e 6f 2c 52  00 00 00 6c  2d 33 1e a2
|   3a 09 a6 8f  aa 11 d4 96  52 82 59 17  98 cb b2 bf
|   fd 43 1d e8  81 ba 54 07  37 5c c3 1f  3e 8a 66 66
|   b2 fc de 1b  5d dc 58 57  3d 40 3a eb  0d 28 d5 b2
|   cb 9c cd 73  e1 95 53 5d  92 e3 b3 c2  9c 14 7f e5
|   a6 ec ea b8  ea 2a 13 ec  37 a1 81 c4
| complete v1 state transition with STF_IGNORE
| #1 spent 0.447 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.97 milliseconds in comm_handle_cb() reading and processing packet
| timer_event_cb: processing event@0x55b7378c93a8
| handling event EVENT_DPD for child state #2
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:250)
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in dpd_event() at ikev1_dpd.c:360)
| FOR_EACH_STATE_... in find_phase1_state
| DPD: processing for state #2 ("west-east")
| DPD: not yet time for dpd event: 29693.409845 < 29696.410569
| event_schedule: new EVENT_DPD-pe@0x7f0838004218
| inserting event EVENT_DPD, timeout in 3.000724 seconds for #2
| libevent_malloc: new ptr-libevent@0x7f082c003618 size 128
| libevent_free: release ptr-libevent@0x55b7378c9048
| free_event_entry: release EVENT_DPD-pe@0x55b7378c93a8
| #2 spent 0.0609 milliseconds in timer_event_cb() EVENT_DPD
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:557)
| spent 0.00278 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 108 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  b6 a8 bf 87  00 00 00 6c  8f fe ed bd
|   a3 e9 b6 6b  46 7e 9a 61  ce 50 a1 d8  b0 1e a4 42
|   02 f3 2b 68  84 f9 09 ec  7d 31 11 81  30 64 f2 85
|   75 65 fc b4  e7 88 37 06  b8 c3 ee ca  ef 24 13 a4
|   c2 87 03 8f  76 96 13 11  e2 77 01 97  7a 06 24 8f
|   75 ae ad d8  c0 2b f5 46  ee c2 e0 cd
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 3064512391 (0xb6a8bf87)
|    length: 108 (0x6c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| peer and cookies match on #2; msgid=00000000 st_msgid=b5f60237 st_msgid_phase15=00000000
| peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
| p15 state object #1 found, in STATE_MAIN_R3
| State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1479)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_N (0xb)
|    length: 36 (0x24)
| got payload 0x800  (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
| ***parse ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 32 (0x20)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE (0x8d28)
| removing 12 bytes of padding
| informational HASH(1):
|   5b f5 a2 c2  3d 22 cd be  b3 29 fd ed  9d 5b 59 36
|   0b 2c 32 67  b9 6b 6e 3b  2d 67 be 91  45 8d c2 79
| received 'informational' message HASH(1) data ok
| info:  1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
| info:  00 00 20 5e
| processing informational R_U_THERE (36136)
| pstats ikev1_recv_notifies_e 36136
| DPD: received R_U_THERE seq:8286 monotime:29694.411192 (state=#1 name="west-east")
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 3053950319 (0xb607956f)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    Notify Message Type: R_U_THERE_ACK (0x8d29)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
| next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify'
| emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
| notify icookie  1a e1 f9 70  07 2e 22 db
| emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
| notify rcookie  7a b3 f9 97  03 29 ec 24
| emitting 4 raw bytes of notify data into ISAKMP Notification Payload
| notify data  00 00 20 5e
| emitting length of ISAKMP Notification Payload: 32
| notification HASH(1):
|   b0 46 e5 16  de ba ff 74  59 10 af 41  83 9b 86 f4
|   27 18 87 ec  ed 15 45 c8  a1 34 58 b9  97 b2 b8 82
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 108
| sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  b6 07 95 6f  00 00 00 6c  96 79 84 e2
|   9e 31 ac c3  0b ca ad 8c  92 a8 2d 7d  fd cb fc 19
|   33 19 cc 7f  7b 07 1d 8f  fe 7f 0c 63  0b 33 30 88
|   29 b3 0a 70  69 99 6a 17  8b 4b 8e 74  ea 66 f8 35
|   fd 5a 2e 1e  04 26 94 cb  ca a5 ae 8d  ed d8 4e 0e
|   3e e2 23 2f  c8 29 9e 82  f3 ca a7 ae
| complete v1 state transition with STF_IGNORE
| #1 spent 0.0974 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.212 milliseconds in comm_handle_cb() reading and processing packet
| processing global timer EVENT_NAT_T_KEEPALIVE
| FOR_EACH_STATE_... in nat_traversal_ka_event (for_each_state)
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in for_each_state() at state.c:1575)
| not behind NAT: no NAT-T KEEP-ALIVE required for conn west-east
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in nat_traversal_send_ka() at nat_traversal.c:774)
| ka_event: send NAT-KA to 192.1.2.45:500 (state=#2)
| sending NAT-T Keep Alive
| sending 1 bytes for NAT-T Keep Alive through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #2)
|   ff
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in nat_traversal_send_ka() at nat_traversal.c:786)
| processing: STOP state #0 (in for_each_state() at state.c:1577)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in for_each_state() at state.c:1575)
| not behind NAT: no NAT-T KEEP-ALIVE required for conn west-east
| stop processing: state #1 connection "west-east" from 192.1.2.45:500 (in for_each_state() at state.c:1577)
| global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds
| spent 0.059 milliseconds in global timer EVENT_NAT_T_KEEPALIVE
| spent 0.0025 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| NAT-T keep-alive (bogus ?) should not reach this point. Ignored. Sender: 192.1.2.45:500
| spent 0.0101 milliseconds in comm_handle_cb() reading and processing packet
| timer_event_cb: processing event@0x7f0838004218
| handling event EVENT_DPD for child state #2
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:250)
| [RE]START processing: state #2 connection "west-east" from 192.1.2.45:500 (in dpd_event() at ikev1_dpd.c:360)
| FOR_EACH_STATE_... in find_phase1_state
| DPD: processing for state #2 ("west-east")
| DPD: not yet time for dpd event: 29696.410862 < 29699.411192
| event_schedule: new EVENT_DPD-pe@0x55b7378c93a8
| inserting event EVENT_DPD, timeout in 3.00033 seconds for #2
| libevent_malloc: new ptr-libevent@0x55b7378c9048 size 128
| libevent_free: release ptr-libevent@0x7f082c003618
| free_event_entry: release EVENT_DPD-pe@0x7f0838004218
| #2 spent 0.0602 milliseconds in timer_event_cb() EVENT_DPD
| stop processing: state #2 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:557)
| spent 0.0139 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 92 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  96 c5 b3 f9  00 00 00 5c  d5 12 47 15
|   54 08 4e df  fd a5 d9 84  0c e8 f4 85  02 3f 85 b8
|   a3 3e 1e f9  f6 9e 2e 65  09 2e fe 4c  f1 0d 12 7b
|   6e 63 ca 25  0f ef 7a 86  1d 82 91 a5  c2 d4 43 55
|   cf 70 15 f3  41 24 41 93  3d 81 eb 28
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 2529539065 (0x96c5b3f9)
|    length: 92 (0x5c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| peer and cookies match on #2; msgid=00000000 st_msgid=b5f60237 st_msgid_phase15=00000000
| peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
| p15 state object #1 found, in STATE_MAIN_R3
| State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state)
| start processing: state #1 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1479)
| #1 is idle
| #1 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_D (0xc)
|    length: 36 (0x24)
| got payload 0x1000  (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0
| ***parse ISAKMP Delete Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 16 (0x10)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 3 (0x3)
|    SPI size: 4 (0x4)
|    number of SPIs: 1 (0x1)
| removing 12 bytes of padding
| informational HASH(1):
|   c1 ff e6 d7  2d 07 e8 8f  f7 d8 99 e7  3e 70 11 5f
|   cc ca 07 16  c5 ef fb ea  37 6d 3e 62  9f 51 de e7
| received 'informational' message HASH(1) data ok
| parsing 4 raw bytes of ISAKMP Delete Payload into SPI
| SPI  73 bc 95 39
| FOR_EACH_STATE_... in find_phase2_state_to_delete
| start processing: connection "west-east" (BACKGROUND) (in accept_delete() at ikev1_main.c:2515)
"west-east" #1: received Delete SA(0x73bc9539) payload: deleting IPsec State #2
| pstats #2 ikev1.ipsec deleted completed
| suspend processing: state #1 connection "west-east" from 192.1.2.45:500 (in delete_state() at state.c:879)
| start processing: state #2 connection "west-east" from 192.1.2.45:500 (in delete_state() at state.c:879)
"west-east" #2: deleting other state #2 (STATE_QUICK_R2) aged 42.038s and sending notification
| child state #2: QUICK_R2(established CHILD SA) => delete
| get_sa_info esp.73bc9539@192.1.2.45
| get_sa_info esp.57709f63@192.1.2.23
"west-east" #2: ESP traffic information: in=672B out=672B
| state #2 requesting EVENT_DPD-pe@0x55b7378c93a8 be deleted
| libevent_free: release ptr-libevent@0x55b7378c9048
| free_event_entry: release EVENT_DPD-pe@0x55b7378c93a8
| #2 send IKEv1 delete notification for STATE_QUICK_R2
| FOR_EACH_STATE_... in find_phase1_state
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 2550265640 (0x9801f728)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Delete Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 3 (0x3)
|    SPI size: 4 (0x4)
|    number of SPIs: 1 (0x1)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D)
| next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg'
| emitting 4 raw bytes of delete payload into ISAKMP Delete Payload
| delete payload  57 70 9f 63
| emitting length of ISAKMP Delete Payload: 16
| send delete HASH(1):
|   ad 3c bd 72  66 fc 7f a1  55 8f c5 4c  a7 50 ee 63
|   44 62 ed f3  37 85 ab 67  29 74 00 68  83 3e 29 c6
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 92
| sending 92 bytes for delete notify through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  98 01 f7 28  00 00 00 5c  de 75 73 62
|   a2 08 9c 8d  b9 15 65 8f  f2 3d 24 fe  59 b2 8c 01
|   8d ff d2 ef  96 da 4f 1d  58 3a 78 f9  f6 51 85 2b
|   d9 e1 9f 71  31 89 9c 31  46 2a f8 4c  68 14 2e e0
|   7b a9 f6 bd  fc 64 b1 8c  0d 8e e5 b3
| state #2 requesting EVENT_SA_REPLACE to be deleted
| libevent_free: release ptr-libevent@0x7f0838003f28
| free_event_entry: release EVENT_SA_REPLACE-pe@0x7f083c002b78
| running updown command "ipsec _updown" for verb down 
| command executing down-host
| executing down-host: PLUTO_VERB='down-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.1.2.23/32' PLUTO_MY_CLIENT_NET='192.1.2.23' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PLUTO_PEER_CLIENT='192.1.2.45/32' PLUTO_PEER_CLIENT_NET='192.1.2.45' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844369' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN
| popen cmd is 1045 chars long
| cmd(   0):PLUTO_VERB='down-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_IN:
| cmd(  80):TERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@e:
| cmd( 160):ast' PLUTO_MY_CLIENT='192.1.2.23/32' PLUTO_MY_CLIENT_NET='192.1.2.23' PLUTO_MY_C:
| cmd( 240):LIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_RE:
| cmd( 320):QID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PL:
| cmd( 400):UTO_PEER_CLIENT='192.1.2.45/32' PLUTO_PEER_CLIENT_NET='192.1.2.45' PLUTO_PEER_CL:
| cmd( 480):IENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PE:
| cmd( 560):ER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844369' PLUTO_CONN_POLICY='RSAS:
| cmd( 640):IG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_:
| cmd( 720):KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CI:
| cmd( 800):SCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PL:
| cmd( 880):UTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI:
| cmd( 960):_ROUTING='no' VTI_SHARED='no' SPI_IN=0x73bc9539 SPI_OUT=0x57709f63 ipsec _updown:
| cmd(1040): 2>&1:
| shunt_eroute() called for connection 'west-east' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "west-east" is 0xfdfdf
| IPsec Sa SPD priority set to 1040351
| delete esp.73bc9539@192.1.2.45
| netlink response for Del SA esp.73bc9539@192.1.2.45 included non-error error
| priority calculation of connection "west-east" is 0xfdfdf
| delete inbound eroute 192.1.2.45/32:0 --0-> 192.1.2.23/32:0 => unk255.10000@192.1.2.23 (raw_eroute)
| raw_eroute result=success
| delete esp.57709f63@192.1.2.23
| netlink response for Del SA esp.57709f63@192.1.2.23 included non-error error
| stop processing: connection "west-east" (BACKGROUND) (in update_state_connection() at connections.c:4076)
| start processing: connection NULL (in update_state_connection() at connections.c:4077)
| in connection_discard for connection west-east
| State DB: deleting IKEv1 state #2 in QUICK_R2
| child state #2: QUICK_R2(established CHILD SA) => UNDEFINED(ignore)
| stop processing: state #2 from 192.1.2.45:500 (in delete_state() at state.c:1143)
| resume processing: state #1 connection "west-east" from 192.1.2.45:500 (in delete_state() at state.c:1143)
| connection 'west-east' -POLICY_UP
| FOR_EACH_STATE_... in shared_phase1_connection
| Deleting states for connection - not including other IPsec SA's
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| state #1
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| state #1
| [RE]START processing: state #1 connection "west-east" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
| pstats #1 ikev1.isakmp deleted completed
| [RE]START processing: state #1 connection "west-east" from 192.1.2.45:500 (in delete_state() at state.c:879)
"west-east" #1: deleting state (STATE_MAIN_R3) aged 42.091s and sending notification
| parent state #1: MAIN_R3(established IKE SA) => delete
| #1 send IKEv1 delete notification for STATE_MAIN_R3
| **emit ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 1163762853 (0x455d9ca5)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Delete Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    number of SPIs: 1 (0x1)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D)
| next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg'
| emitting 8 raw bytes of initiator SPI into ISAKMP Delete Payload
| initiator SPI  1a e1 f9 70  07 2e 22 db
| emitting 8 raw bytes of responder SPI into ISAKMP Delete Payload
| responder SPI  7a b3 f9 97  03 29 ec 24
| emitting length of ISAKMP Delete Payload: 28
| send delete HASH(1):
|   ce f9 69 33  d8 1f fc c4  48 4b a8 55  15 4a 87 64
|   04 7d 38 7a  79 09 86 6d  20 f3 6f 5a  dd 58 d9 05
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 92
| sending 92 bytes for delete notify through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  45 5d 9c a5  00 00 00 5c  b2 89 ba 6b
|   84 42 46 2e  3a 3e e3 85  52 12 04 20  bb 03 7e 07
|   cb d5 54 80  a1 7f 62 2f  54 05 6a 25  01 47 87 6b
|   2f 6c 2d e9  2e 8b e2 26  f4 75 5b c7  41 06 68 7e
|   fd fb 9d 44  f6 60 18 d9  ba d6 79 1a
| state #1 requesting EVENT_SA_REPLACE to be deleted
| libevent_free: release ptr-libevent@0x7f083c002888
| free_event_entry: release EVENT_SA_REPLACE-pe@0x55b7378c8cc8
| State DB: IKEv1 state not found (flush_incomplete_children)
| in connection_discard for connection west-east
| State DB: deleting IKEv1 state #1 in MAIN_R3
| parent state #1: MAIN_R3(established IKE SA) => UNDEFINED(ignore)
| unreference key: 0x55b737821c48 @west cnt 2--
| stop processing: state #1 from 192.1.2.45:500 (in delete_state() at state.c:1143)
| processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
| processing: STOP connection NULL (in accept_delete() at ikev1_main.c:2556)
| processing: STOP connection NULL (in accept_delete() at ikev1_main.c:2559)
| del:
| in statetime_start() with no state
| complete v1 state transition with STF_IGNORE
| stop processing: from 192.1.2.45:500 (in process_md() at demux.c:380)
| processing: STOP state #0 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 3.72 milliseconds in comm_handle_cb() reading and processing packet
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.00772 milliseconds in signal handler PLUTO_SIGCHLD
| spent 0.0046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 92 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   1a e1 f9 70  07 2e 22 db  7a b3 f9 97  03 29 ec 24
|   08 10 05 01  40 49 03 9c  00 00 00 5c  70 32 57 7a
|   6e e2 5b fb  d1 e5 ac 69  58 ee 8b d7  2e 30 05 fe
|   6a be 7a 4f  4c 4b f0 54  8a 92 04 54  80 01 16 3e
|   4a 5b 63 1b  99 f7 fd cc  64 a1 5f a2  62 71 63 51
|   fc 8e 12 d5  aa 38 e8 68  3b 21 58 2f
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   1a e1 f9 70  07 2e 22 db
|    responder cookie:
|   7a b3 f9 97  03 29 ec 24
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 1078526876 (0x4049039c)
|    length: 92 (0x5c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| State DB: IKEv1 state not found (find_v1_info_state)
| State DB: IKEv1 state not found (find_state_ikev1_init)
| Informational Exchange is for an unknown (expired?) SA with MSGID:0x4049039c
| - unknown SA's md->hdr.isa_ike_initiator_spi.bytes:
|   1a e1 f9 70  07 2e 22 db
| - unknown SA's md->hdr.isa_ike_responder_spi.bytes:
|   7a b3 f9 97  03 29 ec 24
| stop processing: from 192.1.2.45:500 (in process_md() at demux.c:380)
| processing: STOP state #0 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.163 milliseconds in comm_handle_cb() reading and processing packet
| spent 0.00526 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 792 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   2e f4 52 7d  b6 ae 8d 4d  00 00 00 00  00 00 00 00
|   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
|   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
|   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
|   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
|   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
|   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
|   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
|   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
|   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
|   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
|   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
|   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
|   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
|   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
|   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
|   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
|   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
|   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
|   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
|   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
|   7c fd b2 fc  68 b6 a4 48
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   00 00 00 00  00 00 00 00
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
|    length: 792 (0x318)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| State DB: IKEv1 state not found (find_state_ikev1_init)
| #null state always idle
| got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
| ***parse ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 644 (0x284)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 20 (0x14)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 20 (0x14)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 20 (0x14)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 20 (0x14)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    length: 20 (0x14)
| got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
| ***parse ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 20 (0x14)
| message 'main_inI1_outR1' HASH payload not checked early
| received Vendor ID payload [FRAGMENTATION]
| received Vendor ID payload [Dead Peer Detection]
|  quirks.qnat_traversal_vid set to=117 [RFC 3947]
| received Vendor ID payload [RFC 3947]
| Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
| ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
| Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
| ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
| Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
| ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
| in statetime_start() with no state
| find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
| find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
| find_next_host_connection policy=IKEV1_ALLOW
| found policy = RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (west-east)
| find_next_host_connection returns west-east
| find_next_host_connection policy=IKEV1_ALLOW
| find_next_host_connection returns empty
| creating state object #3 at 0x55b7378cb038
| State DB: adding IKEv1 state #3 in UNDEFINED
| pstats #3 ikev1.isakmp started
| #3 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
| start processing: state #3 connection "west-east" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
| parent state #3: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
| sender checking NAT-T: enabled; VID 117
| returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC
| enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
"west-east" #3: responding to Main Mode
| **emit ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   dc 41 49 c4  69 c3 03 ac
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
| ***emit ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
| next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
| next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
| ****parse IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ****parse ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 632 (0x278)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_ISAKMP (0x1)
|    SPI size: 0 (0x0)
|    number of transforms: 18 (0x12)
| *****parse ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    length: 36 (0x24)
|    ISAKMP transform number: 0 (0x0)
|    ISAKMP transform ID: KEY_IKE (0x1)
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
|    length/value: 1 (0x1)
|    [1 is OAKLEY_LIFE_SECONDS]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
|    length/value: 3600 (0xe10)
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
|    length/value: 7 (0x7)
|    [7 is OAKLEY_AES_CBC]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
|    length/value: 4 (0x4)
|    [4 is OAKLEY_SHA2_256]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
|    length/value: 3 (0x3)
|    [3 is OAKLEY_RSA_SIG]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
|    length/value: 14 (0xe)
|    [14 is OAKLEY_GROUP_MODP2048]
| ******parse ISAKMP Oakley attribute:
|    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| OAKLEY proposal verified unconditionally; no alg_info to check against
| Oakley Transform 0 accepted
| ****emit IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ****emit ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_ISAKMP (0x1)
|    SPI size: 0 (0x0)
|    number of transforms: 1 (0x1)
| last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
| *****emit ISAKMP Transform Payload (ISAKMP):
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP transform number: 0 (0x0)
|    ISAKMP transform ID: KEY_IKE (0x1)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
| emitting 28 raw bytes of attributes into ISAKMP Transform Payload (ISAKMP)
| attributes  80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
| attributes  80 03 00 03  80 04 00 0e  80 0e 01 00
| emitting length of ISAKMP Transform Payload (ISAKMP): 36
| emitting length of ISAKMP Proposal Payload: 44
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0
| emitting length of ISAKMP Security Association Payload: 56
| last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
| out_vid(): sending [FRAGMENTATION]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_VID (0xd)
| next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
| next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  40 48 b7 d5  6e bc e8 85  25 e7 de 7f  00 d6 c2 d3
| emitting length of ISAKMP Vendor ID Payload: 20
| out_vid(): sending [Dead Peer Detection]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  af ca d7 13  68 a1 f1 c9  6b 86 96 fc  77 57 01 00
| emitting length of ISAKMP Vendor ID Payload: 20
| out_vid(): sending [RFC 3947]
| ***emit ISAKMP Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
| next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID  4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
| emitting length of ISAKMP Vendor ID Payload: 20
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 144
| complete v1 state transition with STF_OK
| [RE]START processing: state #3 connection "west-east" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
| #3 is idle
| doing_xauth:no, t_xauth_client_done:no
| peer supports fragmentation
| peer supports DPD
| DPD is configured locally
| IKEv1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
| parent state #3: MAIN_R0(half-open IKE SA) => MAIN_R1(open IKE SA)
| event_already_set, deleting event
| sending reply packet to 192.1.2.45:500 (from 192.1.2.23:500)
| sending 144 bytes for STATE_MAIN_R0 through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   01 10 02 00  00 00 00 00  00 00 00 90  0d 00 00 38
|   00 00 00 01  00 00 00 01  00 00 00 2c  00 01 00 01
|   00 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  0d 00 00 14  40 48 b7 d5  6e bc e8 85
|   25 e7 de 7f  00 d6 c2 d3  0d 00 00 14  af ca d7 13
|   68 a1 f1 c9  6b 86 96 fc  77 57 01 00  00 00 00 14
|   4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
| !event_already_set at reschedule
| event_schedule: new EVENT_SO_DISCARD-pe@0x55b7378c8cc8
| inserting event EVENT_SO_DISCARD, timeout in 60 seconds for #3
| libevent_malloc: new ptr-libevent@0x7f082c003618 size 128
"west-east" #3: STATE_MAIN_R1: sent MR1, expecting MI2
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.995 milliseconds in comm_handle_cb() reading and processing packet
| spent 0.00989 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 792 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   2e f4 52 7d  b6 ae 8d 4d  00 00 00 00  00 00 00 00
|   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
|   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
|   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
|   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
|   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
|   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
|   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
|   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
|   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
|   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
|   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
|   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
|   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
|   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
|   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
|   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
|   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
|   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
|   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
|   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
|   7c fd b2 fc  68 b6 a4 48
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   00 00 00 00  00 00 00 00
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
|    length: 792 (0x318)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| State DB: found IKEv1 state #3 in MAIN_R1 (find_state_ikev1_init)
| start processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1416)
"west-east" #3: retransmitting in response to duplicate packet; already STATE_MAIN_R1
| sending 144 bytes for retransmit in response to duplicate through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   01 10 02 00  00 00 00 00  00 00 00 90  0d 00 00 38
|   00 00 00 01  00 00 00 01  00 00 00 2c  00 01 00 01
|   00 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  0d 00 00 14  40 48 b7 d5  6e bc e8 85
|   25 e7 de 7f  00 d6 c2 d3  0d 00 00 14  af ca d7 13
|   68 a1 f1 c9  6b 86 96 fc  77 57 01 00  00 00 00 14
|   4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
| stop processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1429)
| stop processing: from 192.1.2.45:500 (in process_md() at demux.c:380)
| processing: STOP state #0 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.494 milliseconds in comm_handle_cb() reading and processing packet
| spent 0.00286 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 792 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   2e f4 52 7d  b6 ae 8d 4d  00 00 00 00  00 00 00 00
|   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
|   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
|   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
|   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
|   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
|   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
|   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
|   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
|   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
|   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
|   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
|   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
|   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
|   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
|   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
|   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
|   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
|   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
|   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
|   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
|   7c fd b2 fc  68 b6 a4 48
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   00 00 00 00  00 00 00 00
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
|    length: 792 (0x318)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| State DB: found IKEv1 state #3 in MAIN_R1 (find_state_ikev1_init)
| start processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1416)
"west-east" #3: retransmitting in response to duplicate packet; already STATE_MAIN_R1
| sending 144 bytes for retransmit in response to duplicate through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   01 10 02 00  00 00 00 00  00 00 00 90  0d 00 00 38
|   00 00 00 01  00 00 00 01  00 00 00 2c  00 01 00 01
|   00 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  0d 00 00 14  40 48 b7 d5  6e bc e8 85
|   25 e7 de 7f  00 d6 c2 d3  0d 00 00 14  af ca d7 13
|   68 a1 f1 c9  6b 86 96 fc  77 57 01 00  00 00 00 14
|   4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
| stop processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1429)
| stop processing: from 192.1.2.45:500 (in process_md() at demux.c:380)
| processing: STOP state #0 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.128 milliseconds in comm_handle_cb() reading and processing packet
| spent 0.00962 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 792 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   2e f4 52 7d  b6 ae 8d 4d  00 00 00 00  00 00 00 00
|   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
|   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
|   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
|   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
|   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
|   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
|   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
|   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
|   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
|   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
|   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
|   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
|   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
|   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
|   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
|   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
|   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
|   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
|   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
|   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
|   7c fd b2 fc  68 b6 a4 48
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   00 00 00 00  00 00 00 00
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
|    length: 792 (0x318)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| State DB: found IKEv1 state #3 in MAIN_R1 (find_state_ikev1_init)
| start processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1416)
"west-east" #3: retransmitting in response to duplicate packet; already STATE_MAIN_R1
| sending 144 bytes for retransmit in response to duplicate through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   01 10 02 00  00 00 00 00  00 00 00 90  0d 00 00 38
|   00 00 00 01  00 00 00 01  00 00 00 2c  00 01 00 01
|   00 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  0d 00 00 14  40 48 b7 d5  6e bc e8 85
|   25 e7 de 7f  00 d6 c2 d3  0d 00 00 14  af ca d7 13
|   68 a1 f1 c9  6b 86 96 fc  77 57 01 00  00 00 00 14
|   4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
| stop processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1429)
| stop processing: from 192.1.2.45:500 (in process_md() at demux.c:380)
| processing: STOP state #0 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.584 milliseconds in comm_handle_cb() reading and processing packet
| spent 0.00302 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 792 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   2e f4 52 7d  b6 ae 8d 4d  00 00 00 00  00 00 00 00
|   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
|   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
|   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
|   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
|   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
|   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
|   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
|   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
|   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
|   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
|   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
|   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
|   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
|   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
|   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
|   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
|   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
|   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
|   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
|   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
|   7c fd b2 fc  68 b6 a4 48
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   00 00 00 00  00 00 00 00
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
|    length: 792 (0x318)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| State DB: found IKEv1 state #3 in MAIN_R1 (find_state_ikev1_init)
| start processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1416)
"west-east" #3: retransmitting in response to duplicate packet; already STATE_MAIN_R1
| sending 144 bytes for retransmit in response to duplicate through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   01 10 02 00  00 00 00 00  00 00 00 90  0d 00 00 38
|   00 00 00 01  00 00 00 01  00 00 00 2c  00 01 00 01
|   00 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  0d 00 00 14  40 48 b7 d5  6e bc e8 85
|   25 e7 de 7f  00 d6 c2 d3  0d 00 00 14  af ca d7 13
|   68 a1 f1 c9  6b 86 96 fc  77 57 01 00  00 00 00 14
|   4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
| stop processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1429)
| stop processing: from 192.1.2.45:500 (in process_md() at demux.c:380)
| processing: STOP state #0 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.123 milliseconds in comm_handle_cb() reading and processing packet
| spent 0.00334 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 792 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   2e f4 52 7d  b6 ae 8d 4d  00 00 00 00  00 00 00 00
|   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
|   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
|   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
|   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
|   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
|   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
|   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
|   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
|   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
|   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
|   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
|   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
|   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
|   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
|   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
|   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
|   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
|   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
|   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
|   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
|   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
|   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
|   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
|   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
|   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
|   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
|   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
|   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
|   7c fd b2 fc  68 b6 a4 48
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   00 00 00 00  00 00 00 00
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
|    length: 792 (0x318)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| State DB: found IKEv1 state #3 in MAIN_R1 (find_state_ikev1_init)
| start processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1416)
"west-east" #3: retransmitting in response to duplicate packet; already STATE_MAIN_R1
| sending 144 bytes for retransmit in response to duplicate through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   01 10 02 00  00 00 00 00  00 00 00 90  0d 00 00 38
|   00 00 00 01  00 00 00 01  00 00 00 2c  00 01 00 01
|   00 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
|   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
|   80 0e 01 00  0d 00 00 14  40 48 b7 d5  6e bc e8 85
|   25 e7 de 7f  00 d6 c2 d3  0d 00 00 14  af ca d7 13
|   68 a1 f1 c9  6b 86 96 fc  77 57 01 00  00 00 00 14
|   4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
| stop processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1429)
| stop processing: from 192.1.2.45:500 (in process_md() at demux.c:380)
| processing: STOP state #0 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.202 milliseconds in comm_handle_cb() reading and processing packet
| spent 0.00234 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 396 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   04 10 02 00  00 00 00 00  00 00 01 8c  0a 00 01 04
|   77 8d 98 8c  aa e3 a5 dd  52 3f 74 55  eb d3 5f 51
|   cd ae 9c 05  ec fe c9 7a  a2 7c 1d 65  1c 06 d7 96
|   fc ca a8 4d  c0 2a a2 11  c9 8b 2c 6a  2d e8 71 36
|   6c b9 c6 03  af bb fe a7  43 9b ca 22  8a fa 99 98
|   8e 5d 84 46  cc 40 3b a0  a1 4c 58 c2  3c 24 6b aa
|   2c a4 25 d2  6f e7 42 39  3f 79 96 8c  f2 6e b9 89
|   28 c7 e8 16  a8 7d 33 52  50 b7 97 ce  25 c2 15 e1
|   a2 ef db 3a  9d 5c 55 9b  f1 4d 38 1e  62 62 86 bc
|   6d 35 fc b5  ab af 0e fd  fa 53 6b 5a  fe 60 0a 3e
|   5c b9 b3 01  c9 12 74 b4  17 fe a7 2c  d6 ca ee 4f
|   fa 0e 1d c5  3d af f3 44  52 e4 cd 06  16 c3 30 90
|   4d f0 d9 ad  4d b6 c4 9c  ec 48 b7 bb  21 f6 f0 6c
|   ed 7c a3 21  94 56 e5 01  80 25 d0 b8  05 f7 48 77
|   06 62 44 52  ab b2 cd 1f  b7 45 e4 90  6b 29 49 02
|   0d 2b 24 fb  62 30 96 78  03 cb a1 5d  52 dd fd 24
|   c0 26 01 e5  47 4a 75 00  f6 53 89 83  d0 db 03 ea
|   14 00 00 24  09 80 14 d4  75 bc 03 53  3d fb 66 8b
|   e6 60 09 82  0f db d0 74  c6 87 52 7f  db 02 6c e3
|   0a b9 5f 3f  14 00 00 24  01 66 a0 09  f4 cd ed e9
|   af 4c 4d 8e  ab 44 be b6  72 4d 66 aa  04 91 8d fb
|   cd b4 8c 65  9e 50 22 ad  00 00 00 24  e4 b8 78 e8
|   04 da 93 ba  52 71 66 eb  c3 60 55 b1  a7 3e 77 80
|   31 30 e7 a1  54 52 12 66  00 89 e6 3a
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   dc 41 49 c4  69 c3 03 ac
|    next payload type: ISAKMP_NEXT_KE (0x4)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
|    length: 396 (0x18c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| State DB: found IKEv1 state #3 in MAIN_R1 (find_state_ikev1)
| start processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1459)
| #3 is idle
| #3 idle
| got payload 0x10  (ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080
| ***parse ISAKMP Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_NONCE (0xa)
|    length: 260 (0x104)
| got payload 0x400  (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080
| ***parse ISAKMP Nonce Payload:
|    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
|    length: 36 (0x24)
| got payload 0x100000  (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080
| ***parse ISAKMP NAT-D Payload:
|    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
|    length: 36 (0x24)
| got payload 0x100000  (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080
| ***parse ISAKMP NAT-D Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 36 (0x24)
| message 'main_inI2_outR2' HASH payload not checked early
| init checking NAT-T: enabled; RFC 3947 (NAT-Traversal)
| natd_hash: hasher=0x55b736925ca0(32)
| natd_hash: icookie=  2e f4 52 7d  b6 ae 8d 4d
| natd_hash: rcookie=  dc 41 49 c4  69 c3 03 ac
| natd_hash: ip=  c0 01 02 17
| natd_hash: port=500
| natd_hash: hash=  01 66 a0 09  f4 cd ed e9  af 4c 4d 8e  ab 44 be b6
| natd_hash: hash=  72 4d 66 aa  04 91 8d fb  cd b4 8c 65  9e 50 22 ad
| natd_hash: hasher=0x55b736925ca0(32)
| natd_hash: icookie=  2e f4 52 7d  b6 ae 8d 4d
| natd_hash: rcookie=  dc 41 49 c4  69 c3 03 ac
| natd_hash: ip=  c0 01 02 2d
| natd_hash: port=500
| natd_hash: hash=  e4 b8 78 e8  04 da 93 ba  52 71 66 eb  c3 60 55 b1
| natd_hash: hash=  a7 3e 77 80  31 30 e7 a1  54 52 12 66  00 89 e6 3a
| expected NAT-D(me):  01 66 a0 09  f4 cd ed e9  af 4c 4d 8e  ab 44 be b6
| expected NAT-D(me):  72 4d 66 aa  04 91 8d fb  cd b4 8c 65  9e 50 22 ad
| expected NAT-D(him):
|   e4 b8 78 e8  04 da 93 ba  52 71 66 eb  c3 60 55 b1
|   a7 3e 77 80  31 30 e7 a1  54 52 12 66  00 89 e6 3a
| received NAT-D:  01 66 a0 09  f4 cd ed e9  af 4c 4d 8e  ab 44 be b6
| received NAT-D:  72 4d 66 aa  04 91 8d fb  cd b4 8c 65  9e 50 22 ad
| received NAT-D:  e4 b8 78 e8  04 da 93 ba  52 71 66 eb  c3 60 55 b1
| received NAT-D:  a7 3e 77 80  31 30 e7 a1  54 52 12 66  00 89 e6 3a
| NAT_TRAVERSAL encaps using auto-detect
| NAT_TRAVERSAL this end is NOT behind NAT
| NAT_TRAVERSAL that end is NOT behind NAT
| NAT_TRAVERSAL nat-keepalive enabled 192.1.2.45
| NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected
|  NAT_T_WITH_KA detected
| adding inI2_outR2 KE work-order 5 for state #3
| state #3 requesting EVENT_SO_DISCARD to be deleted
| libevent_free: release ptr-libevent@0x7f082c003618
| free_event_entry: release EVENT_SO_DISCARD-pe@0x55b7378c8cc8
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55b7378c8cc8
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3
| libevent_malloc: new ptr-libevent@0x55b7378cd0f8 size 128
| complete v1 state transition with STF_SUSPEND
| [RE]START processing: state #3 connection "west-east" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2648)
| suspending state #3 and saving MD
| #3 is busy; has a suspended MD
| #3 spent 0.0793 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.181 milliseconds in comm_handle_cb() reading and processing packet
| crypto helper 5 resuming
| crypto helper 5 starting work-order 5 for state #3
| crypto helper 5 doing build KE and nonce (inI2_outR2 KE); request ID 5
| crypto helper 5 finished build KE and nonce (inI2_outR2 KE); request ID 5 time elapsed 0.000573 seconds
| (#3) spent 0.577 milliseconds in crypto helper computing work-order 5: inI2_outR2 KE (pcr)
| crypto helper 5 sending results from work-order 5 for state #3 to event queue
| scheduling resume sending helper answer for #3
| libevent_malloc: new ptr-libevent@0x7f0830002888 size 128
| crypto helper 5 waiting (nothing to do)
| processing resume sending helper answer for #3
| start processing: state #3 connection "west-east" from 192.1.2.45:500 (in resume_handler() at server.c:797)
| crypto helper 5 replies to request ID 5
| calling continuation function 0x55b736850b50
| main_inI2_outR2_continue for #3: calculated ke+nonce, sending R2
| **emit ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   dc 41 49 c4  69 c3 03 ac
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_NONCE (0xa)
| next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE)
| next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet'
| emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
| keyex value  02 e6 93 4c  a7 69 c5 5d  4f 7b 48 2a  0b f5 68 f8
| keyex value  32 66 0e c1  36 ea ef 6d  66 f0 aa ae  44 2a b6 4b
| keyex value  00 bf 46 ed  c6 0a 84 dd  87 8f 3a 54  eb cc c1 d2
| keyex value  f6 5f 1a a5  f7 1c 94 d7  98 f9 fb 5c  45 e4 32 55
| keyex value  5e a7 86 e4  96 59 fd 37  19 28 10 ce  ea 45 9d 4a
| keyex value  4b ef 56 fa  0b 6e 29 31  0c 97 15 0b  58 ad c4 f0
| keyex value  30 c9 52 f5  2c f6 fd ea  ed 9a bd f4  92 83 98 e6
| keyex value  a4 55 ae 29  87 8a dc 3c  5c d4 fa 19  26 58 c2 46
| keyex value  f7 74 38 13  41 9a 55 15  8c 9a 86 a5  b0 7c c3 7b
| keyex value  b7 2a 67 85  02 0a 1d 9f  66 04 fc 76  3c 01 4c 6b
| keyex value  8c 69 6e 7c  1f d4 43 f0  30 03 97 cd  64 9b e2 4a
| keyex value  90 1a 91 b6  fd 06 c9 58  b8 69 ed 70  dd 3c e0 ba
| keyex value  c6 e7 3e c6  d4 c9 cf 6a  55 17 b5 77  42 a0 f4 e1
| keyex value  45 48 f2 d3  1a ad 1f fd  bc 8e c1 8b  40 4f 19 21
| keyex value  8c b6 2c a8  12 73 91 43  9b d6 7a 35  bf 8b e4 05
| keyex value  0f cf fc f3  7f 0f d7 2a  36 30 b2 bd  36 bc 7d 18
| emitting length of ISAKMP Key Exchange Payload: 260
| ***emit ISAKMP Nonce Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE)
| next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of Nr into ISAKMP Nonce Payload
| Nr  72 8f 6f 8e  06 41 91 25  57 4b f5 22  41 58 1f 8e
| Nr  bc 3d d7 a3  f1 84 1f 3b  3e 60 ae fe  8e 73 5f 02
| emitting length of ISAKMP Nonce Payload: 36
| sending NAT-D payloads
| natd_hash: hasher=0x55b736925ca0(32)
| natd_hash: icookie=  2e f4 52 7d  b6 ae 8d 4d
| natd_hash: rcookie=  dc 41 49 c4  69 c3 03 ac
| natd_hash: ip=  c0 01 02 2d
| natd_hash: port=500
| natd_hash: hash=  e4 b8 78 e8  04 da 93 ba  52 71 66 eb  c3 60 55 b1
| natd_hash: hash=  a7 3e 77 80  31 30 e7 a1  54 52 12 66  00 89 e6 3a
| ***emit ISAKMP NAT-D Payload:
|    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
| next payload chain: ignoring supplied 'ISAKMP NAT-D Payload'.'next payload type' value 20:ISAKMP_NEXT_NATD_RFC
| next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC)
| next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload
| NAT-D  e4 b8 78 e8  04 da 93 ba  52 71 66 eb  c3 60 55 b1
| NAT-D  a7 3e 77 80  31 30 e7 a1  54 52 12 66  00 89 e6 3a
| emitting length of ISAKMP NAT-D Payload: 36
| natd_hash: hasher=0x55b736925ca0(32)
| natd_hash: icookie=  2e f4 52 7d  b6 ae 8d 4d
| natd_hash: rcookie=  dc 41 49 c4  69 c3 03 ac
| natd_hash: ip=  c0 01 02 17
| natd_hash: port=500
| natd_hash: hash=  01 66 a0 09  f4 cd ed e9  af 4c 4d 8e  ab 44 be b6
| natd_hash: hash=  72 4d 66 aa  04 91 8d fb  cd b4 8c 65  9e 50 22 ad
| ***emit ISAKMP NAT-D Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP NAT-D Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC)
| next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload
| NAT-D  01 66 a0 09  f4 cd ed e9  af 4c 4d 8e  ab 44 be b6
| NAT-D  72 4d 66 aa  04 91 8d fb  cd b4 8c 65  9e 50 22 ad
| emitting length of ISAKMP NAT-D Payload: 36
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 396
| main inI2_outR2: starting async DH calculation (group=14)
| started looking for secret for @east->@west of kind PKK_PSK
| actually looking for secret for @east->@west of kind PKK_PSK
| line 1: key type PKK_PSK(@east) to type PKK_RSA
| concluding with best_match=000 best=(nil) (lineno=-1)
| no PreShared Key Found
| adding main_inI2_outR2_tail work-order 6 for state #3
| state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x55b7378cd0f8
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55b7378c8cc8
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55b7378c8cc8
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3
| libevent_malloc: new ptr-libevent@0x55b7378c9048 size 128
| #3 main_inI2_outR2_continue1_tail:1165 st->st_calculating = FALSE;
| complete v1 state transition with STF_OK
| [RE]START processing: state #3 connection "west-east" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
| crypto helper 4 resuming
| #3 is idle; has background offloaded task
| doing_xauth:no, t_xauth_client_done:no
| IKEv1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
| parent state #3: MAIN_R1(open IKE SA) => MAIN_R2(open IKE SA)
| event_already_set, deleting event
| state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x55b7378c9048
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55b7378c8cc8
| crypto helper 4 starting work-order 6 for state #3
| sending reply packet to 192.1.2.45:500 (from 192.1.2.23:500)
| crypto helper 4 doing compute dh+iv (V1 Phase 1) (main_inI2_outR2_tail); request ID 6
| sending 396 bytes for STATE_MAIN_R1 through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   04 10 02 00  00 00 00 00  00 00 01 8c  0a 00 01 04
|   02 e6 93 4c  a7 69 c5 5d  4f 7b 48 2a  0b f5 68 f8
|   32 66 0e c1  36 ea ef 6d  66 f0 aa ae  44 2a b6 4b
|   00 bf 46 ed  c6 0a 84 dd  87 8f 3a 54  eb cc c1 d2
|   f6 5f 1a a5  f7 1c 94 d7  98 f9 fb 5c  45 e4 32 55
|   5e a7 86 e4  96 59 fd 37  19 28 10 ce  ea 45 9d 4a
|   4b ef 56 fa  0b 6e 29 31  0c 97 15 0b  58 ad c4 f0
|   30 c9 52 f5  2c f6 fd ea  ed 9a bd f4  92 83 98 e6
|   a4 55 ae 29  87 8a dc 3c  5c d4 fa 19  26 58 c2 46
|   f7 74 38 13  41 9a 55 15  8c 9a 86 a5  b0 7c c3 7b
|   b7 2a 67 85  02 0a 1d 9f  66 04 fc 76  3c 01 4c 6b
|   8c 69 6e 7c  1f d4 43 f0  30 03 97 cd  64 9b e2 4a
|   90 1a 91 b6  fd 06 c9 58  b8 69 ed 70  dd 3c e0 ba
|   c6 e7 3e c6  d4 c9 cf 6a  55 17 b5 77  42 a0 f4 e1
|   45 48 f2 d3  1a ad 1f fd  bc 8e c1 8b  40 4f 19 21
|   8c b6 2c a8  12 73 91 43  9b d6 7a 35  bf 8b e4 05
|   0f cf fc f3  7f 0f d7 2a  36 30 b2 bd  36 bc 7d 18
|   14 00 00 24  72 8f 6f 8e  06 41 91 25  57 4b f5 22
|   41 58 1f 8e  bc 3d d7 a3  f1 84 1f 3b  3e 60 ae fe
|   8e 73 5f 02  14 00 00 24  e4 b8 78 e8  04 da 93 ba
|   52 71 66 eb  c3 60 55 b1  a7 3e 77 80  31 30 e7 a1
|   54 52 12 66  00 89 e6 3a  00 00 00 24  01 66 a0 09
|   f4 cd ed e9  af 4c 4d 8e  ab 44 be b6  72 4d 66 aa
|   04 91 8d fb  cd b4 8c 65  9e 50 22 ad
| !event_already_set at reschedule
| event_schedule: new EVENT_RETRANSMIT-pe@0x55b7378c8cc8
| inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3
| libevent_malloc: new ptr-libevent@0x55b7378c9048 size 128
| #3 STATE_MAIN_R2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29705.455016
"west-east" #3: STATE_MAIN_R2: sent MR2, expecting MI3
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| resume sending helper answer for #3 suppresed complete_v1_state_transition()
| #3 spent 0.289 milliseconds in resume sending helper answer
| stop processing: state #3 connection "west-east" from 192.1.2.45:500 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7f0830002888
| crypto helper 4 finished compute dh+iv (V1 Phase 1) (main_inI2_outR2_tail); request ID 6 time elapsed 0.000741 seconds
| (#3) spent 0.745 milliseconds in crypto helper computing work-order 6: main_inI2_outR2_tail (pcr)
| crypto helper 4 sending results from work-order 6 for state #3 to event queue
| scheduling resume sending helper answer for #3
| libevent_malloc: new ptr-libevent@0x7f0824000f48 size 128
| crypto helper 4 waiting (nothing to do)
| processing resume sending helper answer for #3
| start processing: state #3 connection "west-east" from 192.1.2.45:500 (in resume_handler() at server.c:797)
| crypto helper 4 replies to request ID 6
| calling continuation function 0x55b736850b50
| main_inI2_outR2_calcdone for #3: calculate DH finished
| [RE]START processing: state #3 connection "west-east" from 192.1.2.45:500 (in main_inI2_outR2_continue2() at ikev1_main.c:1015)
| stop processing: state #3 connection "west-east" from 192.1.2.45:500 (in main_inI2_outR2_continue2() at ikev1_main.c:1028)
| resume sending helper answer for #3 suppresed complete_v1_state_transition()
| #3 spent 0.0125 milliseconds in resume sending helper answer
| processing: STOP state #0 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7f0824000f48
| spent 0.00254 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 332 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   05 10 02 01  00 00 00 00  00 00 01 4c  6d 30 13 d3
|   88 ff 2e e8  5d 5b 27 03  a3 4e 52 e5  63 7c 62 be
|   2e 6b d3 55  0f 6a d4 88  14 de fd c5  e1 fe 62 c0
|   f5 02 dd 32  c2 6e 55 32  2e e9 34 1a  02 e5 b1 9e
|   20 3b 3a b4  7a 56 31 51  73 ac 15 57  0d 03 4e fe
|   6d 98 a9 5c  a5 26 82 9e  13 ec 18 2b  3b ea b3 ae
|   98 ba ad 3b  cd 60 89 08  4a 82 bc f0  5b b8 ea 33
|   24 fd 1f e0  ec f7 52 13  92 9e 6e 18  11 e2 8a 52
|   a0 3f 28 bb  36 5a af d3  01 a6 78 a4  a3 41 d9 99
|   23 7a a5 7a  4a fa 43 92  b0 97 9c 84  d5 49 ad 1f
|   2c 98 a2 1b  d8 94 d7 d1  af ec a1 20  88 dd d9 89
|   68 44 4c 43  1d fa b8 2f  11 d6 58 47  8e db b6 b0
|   c3 3b 13 39  76 56 99 77  4b 35 ce dc  b4 d4 e0 82
|   6e 03 8d f0  24 a0 19 7c  01 eb b1 7f  06 67 14 0d
|   20 fe ce 70  73 a1 2b c5  ff 35 dd 38  6c bf c9 fc
|   d5 87 84 46  78 2b 8b 27  b6 d5 e2 aa  28 56 5b b1
|   e0 d6 33 1c  4c a7 ea 66  c2 90 f7 60  11 35 54 01
|   bb d4 a8 14  cb 78 f0 36  60 7e f6 ba  2c 48 91 57
|   6f d4 cc bd  56 ee ab ea  c1 32 64 56  7b 46 77 71
|   4e 0a b5 71  c9 7f ee 35  13 79 43 5f
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   dc 41 49 c4  69 c3 03 ac
|    next payload type: ISAKMP_NEXT_ID (0x5)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 0 (0x0)
|    length: 332 (0x14c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
| State DB: found IKEv1 state #3 in MAIN_R2 (find_state_ikev1)
| start processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1459)
| #3 is idle
| #3 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x220 opt: 0x20c0
| ***parse ISAKMP Identification Payload:
|    next payload type: ISAKMP_NEXT_SIG (0x9)
|    length: 12 (0xc)
|    ID type: ID_FQDN (0x2)
|    DOI specific A: 0 (0x0)
|    DOI specific B: 0 (0x0)
|      obj:   77 65 73 74
| got payload 0x200  (ISAKMP_NEXT_SIG) needed: 0x200 opt: 0x20c0
| ***parse ISAKMP Signature Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 278 (0x116)
| removing 14 bytes of padding
| message 'main_inI3_outR3' HASH payload not checked early
"west-east" #3: Peer ID is ID_FQDN: '@west'
| X509: no CERT payloads to process
| refine_host_connection for IKEv1: starting with "west-east"
|    match_id a=@west
|             b=@west
|    results  matched
| refine_host_connection: checking "west-east" against "west-east", best=(none) with match=1(id=1(0)/ca=1(0)/reqca=1(0))
| Warning: not switching back to template of current instance
| No IDr payload received from peer
| refine_host_connection: checked west-east against west-east, now for see if best
| started looking for secret for @east->@west of kind PKK_RSA
| actually looking for secret for @east->@west of kind PKK_RSA
| line 1: key type PKK_RSA(@east) to type PKK_RSA
| 1: compared key (none) to @east / @west -> 002
| 2: compared key (none) to @east / @west -> 002
| line 1: match=002
| match 002 beats previous best_match 000 match=0x55b737821b58 (line=1)
| concluding with best_match=002 best=0x55b737821b58 (lineno=1)
| returning because exact peer id match
| offered CA: '%none'
| required RSA CA is '%any'
| checking RSA keyid '@east' for match with '@west'
| checking RSA keyid '@west' for match with '@west'
| key issuer CA is '%any'
| an RSA Sig check passed with *AQOm9dY/4 [preloaded key]
|   #3 spent 0.0452 milliseconds in try_all_RSA_keys() trying a pubkey
"west-east" #3: Authenticated using RSA
| thinking about whether to send my certificate:
|   I have RSA key: OAKLEY_RSA_SIG cert.type: 0?? 
|   sendcert: CERT_ALWAYSSEND and I did not get a certificate request 
|   so do not send cert.
| I did not send a certificate because I do not have one.
| **emit ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   dc 41 49 c4  69 c3 03 ac
|    next payload type: ISAKMP_NEXT_ID (0x5)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_IDPROT (0x2)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 0 (0x0)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 5:ISAKMP_NEXT_ID
| ***emit ISAKMP Identification Payload (IPsec DOI):
|    next payload type: ISAKMP_NEXT_SIG (0x9)
|    ID type: ID_FQDN (0x2)
|    Protocol ID: 0 (0x0)
|    port: 0 (0x0)
| next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 9:ISAKMP_NEXT_SIG
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
| next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
| emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI)
| my identity  65 61 73 74
| emitting length of ISAKMP Identification Payload (IPsec DOI): 12
| started looking for secret for @east->@west of kind PKK_RSA
| actually looking for secret for @east->@west of kind PKK_RSA
| line 1: key type PKK_RSA(@east) to type PKK_RSA
| 1: compared key (none) to @east / @west -> 002
| 2: compared key (none) to @east / @west -> 002
| line 1: match=002
| match 002 beats previous best_match 000 match=0x55b737821b58 (line=1)
| concluding with best_match=002 best=0x55b737821b58 (lineno=1)
| ***emit ISAKMP Signature Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Signature Payload (9:ISAKMP_NEXT_SIG)
| next payload chain: saving location 'ISAKMP Signature Payload'.'next payload type' in 'reply packet'
| emitting 274 raw bytes of SIG_R into ISAKMP Signature Payload
| SIG_R  bc b4 64 50  e7 4b 51 3c  32 f6 c2 4e  3c 93 24 3c
| SIG_R  2e 10 35 18  98 28 42 9c  0b e3 39 97  64 5f 77 23
| SIG_R  ba 9d db 9e  f6 05 97 dd  7b e1 55 c0  05 3c e2 85
| SIG_R  eb 0c 37 23  57 9e fb 88  b7 a6 4b f6  95 6a a5 07
| SIG_R  a1 16 9b 53  aa 89 ee b4  c4 77 8d 85  7b c1 c9 02
| SIG_R  39 fb 42 79  b2 8f d1 3e  37 51 1b 69  f4 b5 07 25
| SIG_R  90 89 7c ee  50 91 b8 23  79 5b 4d ff  59 72 08 12
| SIG_R  b7 bc 83 d2  06 43 cd 61  25 61 6c 2a  22 0f fe 3c
| SIG_R  e5 f1 0d 27  08 c4 da ba  cd 68 c2 30  1a 39 0f fd
| SIG_R  b4 7f c7 3c  13 56 18 05  29 4a 05 73  fc 20 ee a9
| SIG_R  31 79 06 f7  36 98 cd c4  df aa d0 7b  b9 75 0a 61
| SIG_R  69 45 78 c7  2d b5 c1 cd  f4 7c 00 be  ae ac b9 b5
| SIG_R  c9 c2 6d 25  a6 43 2e 2b  bc f3 91 a9  78 e4 2c 8a
| SIG_R  e5 58 05 d8  4d 16 73 be  8e f1 3c 65  79 b9 e3 68
| SIG_R  46 5c d8 b1  28 d1 29 96  1b 06 b4 03  01 1f 29 ea
| SIG_R  af e8 c2 64  9c 15 3f 6b  8e 4b 7f ee  b7 29 bb 11
| SIG_R  3b 25 e5 bc  38 6c 06 98  92 66 50 0b  ea af 35 16
| SIG_R  e9 21
| emitting length of ISAKMP Signature Payload: 278
| emitting 14 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 332
| FOR_EACH_CONNECTION_... in ISAKMP_SA_established
| complete v1 state transition with STF_OK
| [RE]START processing: state #3 connection "west-east" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
| #3 is idle
| doing_xauth:no, t_xauth_client_done:no
| IKEv1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
| parent state #3: MAIN_R2(open IKE SA) => MAIN_R3(established IKE SA)
| event_already_set, deleting event
| state #3 requesting EVENT_RETRANSMIT to be deleted
| #3 STATE_MAIN_R3: retransmits: cleared
| libevent_free: release ptr-libevent@0x55b7378c9048
| free_event_entry: release EVENT_RETRANSMIT-pe@0x55b7378c8cc8
| sending reply packet to 192.1.2.45:500 (from 192.1.2.23:500)
| sending 332 bytes for STATE_MAIN_R2 through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   05 10 02 01  00 00 00 00  00 00 01 4c  f5 9c 66 f8
|   05 96 01 01  eb 37 7f 98  3c 89 14 f1  93 82 77 d5
|   67 fc 75 54  db 8a 19 f5  c6 23 33 75  df ab d4 d6
|   04 23 f8 d3  a0 20 66 9c  53 d1 2c 39  b7 2c ce 59
|   c4 4c 17 7a  f0 05 a1 4b  bf bc 3e 33  b3 b1 1a 47
|   a0 29 93 c5  94 9d 61 b0  92 8c a3 00  5d 31 16 bc
|   f0 4e c6 a7  32 f9 49 56  50 fe 1c 6b  3f a4 37 54
|   9e 7e fb 80  58 a4 a8 87  65 42 6c 35  66 13 0e 73
|   60 3d 8a b5  b4 17 44 7d  04 27 27 7b  d3 48 cc 42
|   8d ac e2 09  62 58 95 3c  56 f5 2e 76  99 02 f2 db
|   6b 04 8d af  c5 21 87 a4  4a 71 03 c5  ec 5c 0b 96
|   3c 6d b8 b1  70 a0 0f e1  21 f3 55 38  29 70 6e 78
|   59 de d1 5f  5f d7 79 c3  82 81 8e 19  46 76 ee ca
|   6f 8e d6 12  86 db c9 ac  5a b8 5e 5a  7e af 8d fa
|   87 f0 0c 49  20 e8 3d fb  1e 8f 97 dd  68 ab 3d 95
|   a6 a2 bb f7  e7 92 cb 5c  ef c6 a2 17  b0 7d 5e 7c
|   72 77 c9 f7  74 e7 c3 0c  c1 de 22 64  e9 94 51 a2
|   af 2d 7b f2  a8 b3 5b 87  6f cc b9 03  bb f2 a4 13
|   19 8f 5b 5a  ca 73 21 24  d2 0d b9 63  51 e2 b5 62
|   77 e5 2d 7a  01 83 4f c8  2e ce ef e2
| !event_already_set at reschedule
| event_schedule: new EVENT_SA_REPLACE-pe@0x55b7378c8cc8
| inserting event EVENT_SA_REPLACE, timeout in 3330 seconds for #3
| libevent_malloc: new ptr-libevent@0x7f0830002888 size 128
| pstats #3 ikev1.isakmp established
"west-east" #3: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048}
| DPD: dpd_init() called on ISAKMP SA
| DPD: Peer supports Dead Peer Detection
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| unpending state #3
|   #3 spent 3.22 milliseconds
| #3 spent 3.32 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 3.44 milliseconds in comm_handle_cb() reading and processing packet
| spent 0.0023 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 444 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   08 10 20 01  d2 4e e2 72  00 00 01 bc  20 7b d7 7f
|   1b 34 93 ab  d6 11 06 96  5b 8c e2 98  5e e7 d7 9f
|   16 f5 05 34  4a f5 0a 88  d5 69 2f 0c  59 e1 df e6
|   9a 45 ef 5a  54 89 45 a6  18 b5 64 cb  74 77 5d 02
|   32 00 6a d7  99 b1 8b 74  ae ce 10 32  f6 2b d0 54
|   c6 d8 b8 fc  a9 ed f1 1a  b2 4e 03 44  75 c9 71 0a
|   e5 4f 40 7f  7d 2b 56 a4  7b 0c 08 b8  94 d5 01 9b
|   2d f2 9f e9  07 ea d6 f4  59 4b 59 37  12 73 4a f2
|   ef 0a 6b 5a  1a 35 bf e8  46 d4 c7 1c  ac 38 08 26
|   98 47 2d 77  3c 46 3a cc  46 69 80 d0  e5 85 91 30
|   56 83 ec f8  44 4d 56 24  38 ae 9b ae  af 9e 93 65
|   8c 6f 0a 67  47 61 82 75  2e 76 7f 3f  8e e8 90 22
|   4a 63 81 36  16 15 22 41  5e 12 a1 e7  63 eb ec 91
|   2f 15 a1 02  e0 08 43 67  2f dd 5f fa  06 55 d5 9a
|   b0 08 8c 0b  af 29 0c 9d  6f 22 c5 ea  bd ec 59 b8
|   02 bf 46 f4  9a f1 77 62  2c fd 52 88  a5 d0 f6 96
|   63 26 20 df  55 d6 cc 3a  62 d4 42 b0  1a fc 58 bd
|   37 9e 7e 5f  c2 a0 99 05  c7 8a 85 29  0e dd d4 30
|   dd c8 bf a5  57 98 f7 83  94 61 9b f5  cd 84 48 e6
|   e9 48 37 32  17 8b dd fc  74 51 c4 bb  c8 a1 e0 7a
|   91 52 43 41  b5 60 c2 0c  70 65 20 82  f4 94 19 61
|   b5 19 d5 45  aa ba bb 03  0c ab 41 be  f6 d0 40 36
|   57 fc 68 57  11 99 94 13  bb dc 92 94  2e 3f 7b ea
|   ba 3c 05 3a  01 b1 2b 94  b3 21 24 c0  bd de 2c 51
|   1a 72 d0 2e  d0 64 95 b1  87 1e 51 95  f7 4f cf ef
|   53 3b 68 0a  b4 cf f5 1d  04 b9 fc ad  c5 63 af 20
|   ec f5 c3 a8  57 db e9 5f  23 14 97 34
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   dc 41 49 c4  69 c3 03 ac
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_QUICK (0x20)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 3528385138 (0xd24ee272)
|    length: 444 (0x1bc)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
| State DB: IKEv1 state not found (find_state_ikev1)
| State DB: found IKEv1 state #3 in MAIN_R3 (find_state_ikev1)
| start processing: state #3 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1607)
| #3 is idle
| #3 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_SA (0x1)
|    length: 36 (0x24)
| got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030
| ***parse ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_NONCE (0xa)
|    length: 84 (0x54)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
| got payload 0x400  (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030
| ***parse ISAKMP Nonce Payload:
|    next payload type: ISAKMP_NEXT_KE (0x4)
|    length: 36 (0x24)
| got payload 0x10  (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030
| ***parse ISAKMP Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 260 (0x104)
| quick_inI1_outR1 HASH(1):
|   f5 68 61 37  00 54 91 5b  5e ef e9 a0  96 2c 0f 05
|   31 11 22 29  d8 1e 57 b8  b0 a6 4f 5d  7c 9e bf b0
| received 'quick_inI1_outR1' message HASH(1) data ok
"west-east" #3: the peer proposed: 192.1.2.23/32:0/0 -> 192.1.2.45/32:0/0
| find_client_connection starting with west-east
|   looking for 192.1.2.23/32:0/0 -> 192.1.2.45/32:0/0
|   concrete checking against sr#0 192.1.2.23/32 -> 192.1.2.45/32
| client wildcard: no  port wildcard: no  virtual: no
| creating state object #4 at 0x55b7378d4fe8
| State DB: adding IKEv1 state #4 in UNDEFINED
| pstats #4 ikev1.ipsec started
| duplicating state object #3 "west-east" as #4 for IPSEC SA
| #4 setting local endpoint to 192.1.2.23:500 from #3.st_localport (in duplicate_state() at state.c:1484)
| suspend processing: state #3 connection "west-east" from 192.1.2.45:500 (in quick_inI1_outR1_tail() at ikev1_quick.c:1295)
| start processing: state #4 connection "west-east" from 192.1.2.45:500 (in quick_inI1_outR1_tail() at ikev1_quick.c:1295)
| child state #4: UNDEFINED(ignore) => QUICK_R0(established CHILD SA)
| ****parse IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ****parse ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 72 (0x48)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_IPSEC_ESP (0x3)
|    SPI size: 4 (0x4)
|    number of transforms: 2 (0x2)
| parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
| SPI  6f 0f d8 2e
| *****parse ISAKMP Transform Payload (ESP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    length: 32 (0x20)
|    ESP transform number: 0 (0x0)
|    ESP transform ID: ESP_AES (0xc)
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+GROUP_DESCRIPTION (0x8003)
|    length/value: 14 (0xe)
|    [14 is OAKLEY_GROUP_MODP2048]
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+ENCAPSULATION_MODE (0x8004)
|    length/value: 1 (0x1)
|    [1 is ENCAPSULATION_MODE_TUNNEL]
| NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+SA_LIFE_TYPE (0x8001)
|    length/value: 1 (0x1)
|    [1 is SA_LIFE_TYPE_SECONDS]
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
|    length/value: 28800 (0x7080)
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+AUTH_ALGORITHM (0x8005)
|    length/value: 2 (0x2)
|    [2 is AUTH_ALGORITHM_HMAC_SHA1]
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+KEY_LENGTH (0x8006)
|    length/value: 128 (0x80)
| ESP IPsec Transform verified unconditionally; no alg_info to check against
| adding quick_outI1 KE work-order 7 for state #4
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f0830002b78
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #4
| libevent_malloc: new ptr-libevent@0x55b7378d2d28 size 128
| complete v1 state transition with STF_SUSPEND
| [RE]START processing: state #4 connection "west-east" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2648)
| suspending state #4 and saving MD
| crypto helper 6 resuming
| #4 is busy; has a suspended MD
| crypto helper 6 starting work-order 7 for state #4
| #3 spent 0.124 milliseconds in process_packet_tail()
| crypto helper 6 doing build KE and nonce (quick_outI1 KE); request ID 7
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #4 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.27 milliseconds in comm_handle_cb() reading and processing packet
| crypto helper 6 finished build KE and nonce (quick_outI1 KE); request ID 7 time elapsed 0.000578 seconds
| (#4) spent 0.582 milliseconds in crypto helper computing work-order 7: quick_outI1 KE (pcr)
| crypto helper 6 sending results from work-order 7 for state #4 to event queue
| scheduling resume sending helper answer for #4
| libevent_malloc: new ptr-libevent@0x7f0828002888 size 128
| crypto helper 6 waiting (nothing to do)
| processing resume sending helper answer for #4
| start processing: state #4 connection "west-east" from 192.1.2.45:500 (in resume_handler() at server.c:797)
| crypto helper 6 replies to request ID 7
| calling continuation function 0x55b736850b50
| quick_inI1_outR1_cryptocontinue1 for #4: calculated ke+nonce, calculating DH
| started looking for secret for @east->@west of kind PKK_PSK
| actually looking for secret for @east->@west of kind PKK_PSK
| line 1: key type PKK_PSK(@east) to type PKK_RSA
| concluding with best_match=000 best=(nil) (lineno=-1)
| no PreShared Key Found
| adding quick outR1 DH work-order 8 for state #4
| state #4 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x55b7378d2d28
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f0830002b78
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f0830002b78
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #4
| libevent_malloc: new ptr-libevent@0x55b7378d2d28 size 128
| suspending state #4 and saving MD
| #4 is busy; has a suspended MD
| resume sending helper answer for #4 suppresed complete_v1_state_transition() and stole MD
| crypto helper 2 resuming
| #4 spent 0.0364 milliseconds in resume sending helper answer
| crypto helper 2 starting work-order 8 for state #4
| stop processing: state #4 connection "west-east" from 192.1.2.45:500 (in resume_handler() at server.c:833)
| crypto helper 2 doing compute dh (V1 Phase 2 PFS) (quick outR1 DH); request ID 8
| libevent_free: release ptr-libevent@0x7f0828002888
| crypto helper 2 finished compute dh (V1 Phase 2 PFS) (quick outR1 DH); request ID 8 time elapsed 0.000553 seconds
| (#4) spent 0.551 milliseconds in crypto helper computing work-order 8: quick outR1 DH (pcr)
| crypto helper 2 sending results from work-order 8 for state #4 to event queue
| scheduling resume sending helper answer for #4
| libevent_malloc: new ptr-libevent@0x7f083c0027d8 size 128
| crypto helper 2 waiting (nothing to do)
| processing resume sending helper answer for #4
| start processing: state #4 connection "west-east" from 192.1.2.45:500 (in resume_handler() at server.c:797)
| crypto helper 2 replies to request ID 8
| calling continuation function 0x55b736850b50
| quick_inI1_outR1_cryptocontinue2 for #4: calculated DH, sending R1
| **emit ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   dc 41 49 c4  69 c3 03 ac
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_QUICK (0x20)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 3528385138 (0xd24ee272)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Security Association Payload:
|    next payload type: ISAKMP_NEXT_NONCE (0xa)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
| next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
| next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
| ****parse IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ****parse ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 72 (0x48)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_IPSEC_ESP (0x3)
|    SPI size: 4 (0x4)
|    number of transforms: 2 (0x2)
| parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
| SPI  6f 0f d8 2e
| *****parse ISAKMP Transform Payload (ESP):
|    next payload type: ISAKMP_NEXT_T (0x3)
|    length: 32 (0x20)
|    ESP transform number: 0 (0x0)
|    ESP transform ID: ESP_AES (0xc)
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+GROUP_DESCRIPTION (0x8003)
|    length/value: 14 (0xe)
|    [14 is OAKLEY_GROUP_MODP2048]
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+ENCAPSULATION_MODE (0x8004)
|    length/value: 1 (0x1)
|    [1 is ENCAPSULATION_MODE_TUNNEL]
| NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+SA_LIFE_TYPE (0x8001)
|    length/value: 1 (0x1)
|    [1 is SA_LIFE_TYPE_SECONDS]
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
|    length/value: 28800 (0x7080)
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+AUTH_ALGORITHM (0x8005)
|    length/value: 2 (0x2)
|    [2 is AUTH_ALGORITHM_HMAC_SHA1]
| ******parse ISAKMP IPsec DOI attribute:
|    af+type: AF+KEY_LENGTH (0x8006)
|    length/value: 128 (0x80)
| ESP IPsec Transform verified unconditionally; no alg_info to check against
| ****emit IPsec DOI SIT:
|    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ****emit ISAKMP Proposal Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    proposal number: 0 (0x0)
|    protocol ID: PROTO_IPSEC_ESP (0x3)
|    SPI size: 4 (0x4)
|    number of transforms: 1 (0x1)
| last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
| netlink_get_spi: allocated 0x22268a80 for esp.0@192.1.2.23
| emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
| SPI  22 26 8a 80
| *****emit ISAKMP Transform Payload (ESP):
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ESP transform number: 0 (0x0)
|    ESP transform ID: ESP_AES (0xc)
| last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type'
| emitting 24 raw bytes of attributes into ISAKMP Transform Payload (ESP)
| attributes  80 03 00 0e  80 04 00 01  80 01 00 01  80 02 70 80
| attributes  80 05 00 02  80 06 00 80
| emitting length of ISAKMP Transform Payload (ESP): 32
| emitting length of ISAKMP Proposal Payload: 44
| last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0
| emitting length of ISAKMP Security Association Payload: 56
| last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
"west-east" #4: responding to Quick Mode proposal {msgid:d24ee272}
"west-east" #4:     us: 192.1.2.23<192.1.2.23>[@east]
"west-east" #4:   them: 192.1.2.45<192.1.2.45>[@west]
| ***emit ISAKMP Nonce Payload:
|    next payload type: ISAKMP_NEXT_KE (0x4)
| next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE
| next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE)
| next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of Nr into ISAKMP Nonce Payload
| Nr  32 ab 39 e8  8f d6 59 95  15 85 ba a6  c8 8c c9 f7
| Nr  ea e1 9d a6  2e 99 13 61  38 f7 0f 52  43 06 9c 2e
| emitting length of ISAKMP Nonce Payload: 36
| ***emit ISAKMP Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE)
| next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet'
| emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
| keyex value  ce 72 48 1d  7d 9b 09 e8  86 99 6d 64  40 43 16 f1
| keyex value  41 86 86 f1  51 f7 a6 93  32 37 5d a0  9d ac 33 00
| keyex value  89 69 2e 77  f8 a1 5b 46  3b 64 3b 3d  73 4c fe c7
| keyex value  0f ec 39 b1  bd 6f 1e f7  f5 e3 13 be  ae 75 70 e1
| keyex value  51 07 27 37  ce 10 8b 0c  7e 00 cf f6  a9 f5 47 0e
| keyex value  65 de 10 de  d6 08 c7 96  8e 10 f5 0e  f8 14 39 bf
| keyex value  02 d1 3f c7  64 01 d7 41  c9 b7 e9 c6  54 77 b9 e5
| keyex value  ff 8f 04 be  1f b3 aa 73  0e aa e0 6c  9d 95 43 fa
| keyex value  14 9a 84 14  4b 58 25 ba  be 0c c1 55  ba d3 60 9e
| keyex value  b8 71 cd 7b  7d c6 8d 63  7b af 4f 8d  0f c6 65 21
| keyex value  bb b6 c8 69  63 1f e5 d4  00 44 ef 26  da 0c b0 36
| keyex value  2c 3a a2 8b  a3 f9 c5 79  b9 e7 0e 8b  b5 fe 53 3d
| keyex value  de e8 0c 70  d2 05 d0 7b  92 f4 4e 45  a2 99 e7 55
| keyex value  8f cc b7 7c  d8 40 30 d6  c3 73 cd e0  f8 76 48 f4
| keyex value  4f 3a 5f b4  30 0d 0d ad  92 37 fb 08  a4 b4 63 e9
| keyex value  d3 a0 05 88  0b 4b 04 59  c3 0c b3 37  5c ef de c9
| emitting length of ISAKMP Key Exchange Payload: 260
| quick inR1 outI2 HASH(2):
|   ec a4 53 22  42 ba 28 15  07 d0 88 8d  cd da 72 d8
|   ee 0a 7f 66  7d 7d ef 13  55 b2 ea c4  6f 3b f0 d3
| compute_proto_keymat: needed_len (after ESP enc)=16
| compute_proto_keymat: needed_len (after ESP auth)=36
| install_inbound_ipsec_sa() checking if we can route
| could_route called for west-east (kind=CK_PERMANENT)
| FOR_EACH_CONNECTION_... in route_owner
|  conn west-east mark 0/00000000, 0/00000000 vs
|  conn west-east mark 0/00000000, 0/00000000
| route owner of "west-east" prospective erouted: self; eroute owner: self
|    routing is easy, or has resolvable near-conflict
| checking if this is a replacement state
|   st=0x55b7378d4fe8 ost=(nil) st->serialno=#4 ost->serialno=#0
| installing outgoing SA now as refhim=0
| looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96
| encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12
| st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20
| setting IPsec SA replay-window to 32
| NIC esp-hw-offload not for connection 'west-east' not available on interface eth1
| netlink: enabling tunnel mode
| netlink: setting IPsec SA replay-window to 32 using old-style req
| netlink: esp-hw-offload not set for IPsec SA
| netlink response for Add SA esp.6f0fd82e@192.1.2.45 included non-error error
| outgoing SA has refhim=0
| looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96
| encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12
| st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20
| setting IPsec SA replay-window to 32
| NIC esp-hw-offload not for connection 'west-east' not available on interface eth1
| netlink: enabling tunnel mode
| netlink: setting IPsec SA replay-window to 32 using old-style req
| netlink: esp-hw-offload not set for IPsec SA
| netlink response for Add SA esp.22268a80@192.1.2.23 included non-error error
| priority calculation of connection "west-east" is 0xfdfdf
| add inbound eroute 192.1.2.45/32:0 --0-> 192.1.2.23/32:0 => tun.10000@192.1.2.23 (raw_eroute)
| IPsec Sa SPD priority set to 1040351
| raw_eroute result=success
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 428
| finished processing quick inI1
| complete v1 state transition with STF_OK
| [RE]START processing: state #4 connection "west-east" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
| #4 is idle
| doing_xauth:no, t_xauth_client_done:no
| IKEv1: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
| child state #4: QUICK_R0(established CHILD SA) => QUICK_R1(established CHILD SA)
| event_already_set, deleting event
| state #4 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x55b7378d2d28
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f0830002b78
| sending reply packet to 192.1.2.45:500 (from 192.1.2.23:500)
| sending 428 bytes for STATE_QUICK_R0 through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #4)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   08 10 20 01  d2 4e e2 72  00 00 01 ac  17 bf 73 13
|   eb 6c a3 9c  b7 5c 18 aa  17 83 09 88  72 ab 3d 65
|   b9 3b e8 71  7a b3 fe 38  23 96 cd f2  6b ce 95 e2
|   c4 68 f9 2c  5a 9b c6 b9  0b 1c b3 d0  f8 21 92 e5
|   ea fa 8d 64  4d 5f a4 89  3f 53 65 a9  fc db e5 f0
|   20 82 38 ac  27 c1 4c 9e  b6 b7 38 56  95 5a 01 1b
|   75 85 dd 61  ec 17 50 f1  af 9d 8c 8c  c2 d5 5f 40
|   0c 73 2b 99  c0 ea 17 9f  b4 8d cd 3e  db 81 cc 81
|   92 54 0b 45  83 ce e2 39  52 0c f5 68  de a3 6a 80
|   d5 87 d0 78  68 f3 35 e6  91 cb 13 c0  42 b5 ad 03
|   96 ce 2f c7  9b 14 7a cb  64 a1 65 b8  1e ec e3 f3
|   6d 0c 62 ae  bf e8 a7 e7  9a d8 bf 4a  61 5b f8 0b
|   e5 2e 9f 60  4c d7 7a d7  63 67 79 67  53 45 d0 d4
|   91 b0 d3 66  b0 38 a7 45  36 57 db 8f  4f 9e 90 0b
|   07 50 b3 86  04 09 39 f6  de fe 12 a7  de 27 f8 fb
|   0f e9 7a 6b  8a d6 66 4d  88 ef 85 6b  2a 3e 87 ea
|   c6 01 d7 a5  32 1f a0 3f  00 f5 46 a6  79 a4 69 2b
|   5f 51 83 a4  91 51 dc 2f  00 c9 09 05  29 44 a8 eb
|   22 70 24 63  dc 71 20 26  34 77 d4 64  a3 bc 70 3a
|   bb 36 b0 d9  b7 fe 62 af  a8 76 ac a4  41 15 da 16
|   c9 70 36 94  2e 40 68 60  45 13 24 c4  57 44 85 44
|   17 a0 c7 04  2e fd 7f 95  42 c2 1c 44  cd f0 e2 bb
|   db 1b 3a a8  b8 04 d3 2d  87 73 c8 4e  a7 5d cd 11
|   9b 51 11 dc  a8 d8 fd 29  df 70 8c 60  63 f5 38 5d
|   5a 29 59 36  fe 6e 55 ab  b6 34 7a a3  ed 56 de 46
|   92 8b 6f 0b  36 60 50 8f  17 46 c7 d4
| !event_already_set at reschedule
| event_schedule: new EVENT_RETRANSMIT-pe@0x7f0830002b78
| inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #4
| libevent_malloc: new ptr-libevent@0x7f0828002888 size 128
| #4 STATE_QUICK_R1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29705.466498
| pstats #4 ikev1.ipsec established
| NAT-T: encaps is 'auto'
"west-east" #4: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 tunnel mode {ESP=>0x6f0fd82e <0x22268a80 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=active}
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| resume sending helper answer for #4 suppresed complete_v1_state_transition()
| #4 spent 0.606 milliseconds in resume sending helper answer
| stop processing: state #4 connection "west-east" from 192.1.2.45:500 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7f083c0027d8
| spent 0.00265 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 76 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   08 10 20 01  d2 4e e2 72  00 00 00 4c  c4 6e 25 78
|   d4 d6 d4 99  61 81 e6 f9  6f 3e 95 05  a8 9a 36 be
|   7b bf e4 87  33 7a 6d 8d  a8 62 3e 9a  c2 f5 a3 91
|   36 c8 80 36  bd 47 05 2a  64 0f 2b 16
| start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   dc 41 49 c4  69 c3 03 ac
|    next payload type: ISAKMP_NEXT_HASH (0x8)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_QUICK (0x20)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 3528385138 (0xd24ee272)
|    length: 76 (0x4c)
|  processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
| State DB: found IKEv1 state #4 in QUICK_R1 (find_state_ikev1)
| start processing: state #4 connection "west-east" from 192.1.2.45:500 (in process_v1_packet() at ikev1.c:1633)
| #4 is idle
| #4 idle
| received encrypted packet from 192.1.2.45:500
| got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    length: 36 (0x24)
| removing 12 bytes of padding
| quick_inI2 HASH(3):
|   a3 1b fa ec  23 10 58 6c  c0 1c c6 19  8e 8d 1b 1f
|   9d f6 72 f0  a3 9f 99 7e  77 75 08 f8  d3 d8 8c 00
| received 'quick_inI2' message HASH(3) data ok
| install_ipsec_sa() for #4: outbound only
| could_route called for west-east (kind=CK_PERMANENT)
| FOR_EACH_CONNECTION_... in route_owner
|  conn west-east mark 0/00000000, 0/00000000 vs
|  conn west-east mark 0/00000000, 0/00000000
| route owner of "west-east" prospective erouted: self; eroute owner: self
| sr for #4: prospective erouted
| route_and_eroute() for proto 0, and source port 0 dest port 0
| FOR_EACH_CONNECTION_... in route_owner
|  conn west-east mark 0/00000000, 0/00000000 vs
|  conn west-east mark 0/00000000, 0/00000000
| route owner of "west-east" prospective erouted: self; eroute owner: self
| route_and_eroute with c: west-east (next: none) ero:west-east esr:{(nil)} ro:west-east rosr:{(nil)} and state: #4
| priority calculation of connection "west-east" is 0xfdfdf
| eroute_connection replace eroute 192.1.2.23/32:0 --0-> 192.1.2.45/32:0 => tun.0@192.1.2.45>tun.0@192.1.2.45 (raw_eroute)
| IPsec Sa SPD priority set to 1040351
| raw_eroute result=success
| running updown command "ipsec _updown" for verb up 
| command executing up-host
| executing up-host: PLUTO_VERB='up-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.1.2.23/32' PLUTO_MY_CLIENT_NET='192.1.2.23' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PLUTO_PEER_CLIENT='192.1.2.45/32' PLUTO_PEER_CLIENT_NET='192.1.2.45' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x6f0fd82e S
| popen cmd is 1034 chars long
| cmd(   0):PLUTO_VERB='up-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_INTE:
| cmd(  80):RFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@eas:
| cmd( 160):t' PLUTO_MY_CLIENT='192.1.2.23/32' PLUTO_MY_CLIENT_NET='192.1.2.23' PLUTO_MY_CLI:
| cmd( 240):ENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQI:
| cmd( 320):D='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PLUT:
| cmd( 400):O_PEER_CLIENT='192.1.2.45/32' PLUTO_PEER_CLIENT_NET='192.1.2.45' PLUTO_PEER_CLIE:
| cmd( 480):NT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER:
| cmd( 560):_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+:
| cmd( 640):TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PE:
| cmd( 720):RMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLU:
| cmd( 800):TO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SER:
| cmd( 880):VER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='n:
| cmd( 960):o' VTI_SHARED='no' SPI_IN=0x6f0fd82e SPI_OUT=0x22268a80 ipsec _updown 2>&1:
| route_and_eroute: firewall_notified: true
| route_and_eroute: instance "west-east", setting eroute_owner {spd=0x55b7378c8588,sr=0x55b7378c8588} to #4 (was #0) (newest_ipsec_sa=#0)
| #3 spent 0.5 milliseconds in install_ipsec_sa()
| inI2: instance west-east[0], setting IKEv1 newest_ipsec_sa to #4 (was #0) (spd.eroute=#4) cloned from #3
| DPD: dpd_init() called on IPsec SA
| State DB: found IKEv1 state #3 in MAIN_R3 (find_state_ikev1)
| event_schedule: new EVENT_DPD-pe@0x7f0828002b78
| inserting event EVENT_DPD, timeout in 5 seconds for #4
| libevent_malloc: new ptr-libevent@0x7f083c0027d8 size 128
| complete v1 state transition with STF_OK
| [RE]START processing: state #4 connection "west-east" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
| #4 is idle
| doing_xauth:no, t_xauth_client_done:no
| IKEv1: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
| child state #4: QUICK_R1(established CHILD SA) => QUICK_R2(established CHILD SA)
| event_already_set, deleting event
| state #4 requesting EVENT_RETRANSMIT to be deleted
| #4 STATE_QUICK_R2: retransmits: cleared
| libevent_free: release ptr-libevent@0x7f0828002888
| free_event_entry: release EVENT_RETRANSMIT-pe@0x7f0830002b78
| !event_already_set at reschedule
| event_schedule: new EVENT_SA_REPLACE-pe@0x7f0830002b78
| inserting event EVENT_SA_REPLACE, timeout in 28530 seconds for #4
| libevent_malloc: new ptr-libevent@0x7f0828002888 size 128
| pstats #4 ikev1.ipsec established
| NAT-T: encaps is 'auto'
"west-east" #4: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0x6f0fd82e <0x22268a80 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=active}
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| #4 spent 0.573 milliseconds in process_packet_tail()
| stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
| stop processing: state #4 connection "west-east" from 192.1.2.45:500 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.669 milliseconds in comm_handle_cb() reading and processing packet
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.00348 milliseconds in signal handler PLUTO_SIGCHLD
| processing global timer EVENT_PENDING_DDNS
| FOR_EACH_CONNECTION_... in connection_check_ddns
| FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
| elapsed time in connection_check_ddns for hostname lookup 0.000017
| spent 0.0341 milliseconds in global timer EVENT_PENDING_DDNS
| processing global timer EVENT_SHUNT_SCAN
| expiring aged bare shunts from shunt table
| spent 0.0127 milliseconds in global timer EVENT_SHUNT_SCAN
| timer_event_cb: processing event@0x7f0828002b78
| handling event EVENT_DPD for child state #4
| start processing: state #4 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:250)
| [RE]START processing: state #4 connection "west-east" from 192.1.2.45:500 (in dpd_event() at ikev1_dpd.c:360)
| FOR_EACH_STATE_... in find_phase1_state
| DPD: processing for state #4 ("west-east")
| get_sa_info esp.22268a80@192.1.2.23
| DPD: out event not sent, phase 2 active
| event_schedule: new EVENT_DPD-pe@0x55b73784efa8
| inserting event EVENT_DPD, timeout in 5 seconds for #4
| libevent_malloc: new ptr-libevent@0x55b7378c8de8 size 128
| libevent_free: release ptr-libevent@0x7f083c0027d8
| free_event_entry: release EVENT_DPD-pe@0x7f0828002b78
| #4 spent 0.0757 milliseconds in timer_event_cb() EVENT_DPD
| stop processing: state #4 connection "west-east" from 192.1.2.45:500 (in timer_event_cb() at timer.c:557)
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in show_connections_status
| FOR_EACH_CONNECTION_... in show_connections_status
| FOR_EACH_STATE_... in show_states_status (sort_states)
| FOR_EACH_STATE_... in sort_states
| get_sa_info esp.22268a80@192.1.2.23
| get_sa_info esp.6f0fd82e@192.1.2.45
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.4 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
shutting down
| processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825)
| certs and keys locked by 'free_preshared_secrets'
forgetting secrets
| certs and keys unlocked by 'free_preshared_secrets'
| unreference key: 0x55b7378c8f58 @east cnt 1--
| unreference key: 0x55b737821c48 @west cnt 2--
| start processing: connection "west-east" (in delete_connection() at connections.c:189)
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| state #4
| suspend processing: connection "west-east" (in foreach_state_by_connection_func_delete() at state.c:1310)
| start processing: state #4 connection "west-east" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
| pstats #4 ikev1.ipsec deleted completed
| [RE]START processing: state #4 connection "west-east" from 192.1.2.45:500 (in delete_state() at state.c:879)
"west-east" #4: deleting state (STATE_QUICK_R2) aged 7.874s and sending notification
| child state #4: QUICK_R2(established CHILD SA) => delete
| get_sa_info esp.6f0fd82e@192.1.2.45
| get_sa_info esp.22268a80@192.1.2.23
"west-east" #4: ESP traffic information: in=504B out=504B
| state #4 requesting EVENT_DPD-pe@0x55b73784efa8 be deleted
| libevent_free: release ptr-libevent@0x55b7378c8de8
| free_event_entry: release EVENT_DPD-pe@0x55b73784efa8
| #4 send IKEv1 delete notification for STATE_QUICK_R2
| FOR_EACH_STATE_... in find_phase1_state
| **emit ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   dc 41 49 c4  69 c3 03 ac
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 1629960487 (0x61273927)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Delete Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 3 (0x3)
|    SPI size: 4 (0x4)
|    number of SPIs: 1 (0x1)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D)
| next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg'
| emitting 4 raw bytes of delete payload into ISAKMP Delete Payload
| delete payload  22 26 8a 80
| emitting length of ISAKMP Delete Payload: 16
| send delete HASH(1):
|   f1 75 3d c4  4d b4 63 92  9b 04 a5 1c  7b bc be eb
|   ad 5b 66 9e  cd 9e f3 d5  6a 0f a1 1e  4f d2 0f 9e
| emitting 12 zero bytes of encryption padding into ISAKMP Message
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 92
| sending 92 bytes for delete notify through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   08 10 05 01  61 27 39 27  00 00 00 5c  bd 57 ba 66
|   e3 46 6a 9a  56 f4 d9 8f  63 51 49 d3  e7 a9 2c 81
|   0e aa 9e ed  ca ee 15 cc  53 41 9f d4  48 59 cd 3c
|   01 19 f9 79  d2 83 2a c6  04 92 95 0f  71 b7 70 e4
|   83 3c d0 5a  ad 31 34 0d  14 7b 6f 3f
| state #4 requesting EVENT_SA_REPLACE to be deleted
| libevent_free: release ptr-libevent@0x7f0828002888
| free_event_entry: release EVENT_SA_REPLACE-pe@0x7f0830002b78
| running updown command "ipsec _updown" for verb down 
| command executing down-host
| executing down-host: PLUTO_VERB='down-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.1.2.23/32' PLUTO_MY_CLIENT_NET='192.1.2.23' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PLUTO_PEER_CLIENT='192.1.2.45/32' PLUTO_PEER_CLIENT_NET='192.1.2.45' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844419' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN
| popen cmd is 1045 chars long
| cmd(   0):PLUTO_VERB='down-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_IN:
| cmd(  80):TERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@e:
| cmd( 160):ast' PLUTO_MY_CLIENT='192.1.2.23/32' PLUTO_MY_CLIENT_NET='192.1.2.23' PLUTO_MY_C:
| cmd( 240):LIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_RE:
| cmd( 320):QID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PL:
| cmd( 400):UTO_PEER_CLIENT='192.1.2.45/32' PLUTO_PEER_CLIENT_NET='192.1.2.45' PLUTO_PEER_CL:
| cmd( 480):IENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PE:
| cmd( 560):ER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844419' PLUTO_CONN_POLICY='RSAS:
| cmd( 640):IG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_:
| cmd( 720):KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CI:
| cmd( 800):SCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PL:
| cmd( 880):UTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI:
| cmd( 960):_ROUTING='no' VTI_SHARED='no' SPI_IN=0x6f0fd82e SPI_OUT=0x22268a80 ipsec _updown:
| cmd(1040): 2>&1:
| shunt_eroute() called for connection 'west-east' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "west-east" is 0xfdfdf
| IPsec Sa SPD priority set to 1040351
| delete esp.6f0fd82e@192.1.2.45
| netlink response for Del SA esp.6f0fd82e@192.1.2.45 included non-error error
| priority calculation of connection "west-east" is 0xfdfdf
| delete inbound eroute 192.1.2.45/32:0 --0-> 192.1.2.23/32:0 => unk255.10000@192.1.2.23 (raw_eroute)
| raw_eroute result=success
| delete esp.22268a80@192.1.2.23
| netlink response for Del SA esp.22268a80@192.1.2.23 included non-error error
| stop processing: connection "west-east" (BACKGROUND) (in update_state_connection() at connections.c:4076)
| start processing: connection NULL (in update_state_connection() at connections.c:4077)
| in connection_discard for connection west-east
| State DB: deleting IKEv1 state #4 in QUICK_R2
| child state #4: QUICK_R2(established CHILD SA) => UNDEFINED(ignore)
| stop processing: state #4 from 192.1.2.45:500 (in delete_state() at state.c:1143)
| processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
| state #3
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| state #3
| start processing: state #3 connection "west-east" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
| pstats #3 ikev1.isakmp deleted completed
| [RE]START processing: state #3 connection "west-east" from 192.1.2.45:500 (in delete_state() at state.c:879)
"west-east" #3: deleting state (STATE_MAIN_R3) aged 15.905s and sending notification
| parent state #3: MAIN_R3(established IKE SA) => delete
| #3 send IKEv1 delete notification for STATE_MAIN_R3
| **emit ISAKMP Message:
|    initiator cookie:
|   2e f4 52 7d  b6 ae 8d 4d
|    responder cookie:
|   dc 41 49 c4  69 c3 03 ac
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
|    exchange type: ISAKMP_XCHG_INFO (0x5)
|    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
|    Message ID: 2542388311 (0x9789c457)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
| next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg'
| emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
| emitting length of ISAKMP Hash Payload: 36
| ***emit ISAKMP Delete Payload:
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    DOI: ISAKMP_DOI_IPSEC (0x1)
|    protocol ID: 1 (0x1)
|    SPI size: 16 (0x10)
|    number of SPIs: 1 (0x1)
| next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D)
| next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg'
| emitting 8 raw bytes of initiator SPI into ISAKMP Delete Payload
| initiator SPI  2e f4 52 7d  b6 ae 8d 4d
| emitting 8 raw bytes of responder SPI into ISAKMP Delete Payload
| responder SPI  dc 41 49 c4  69 c3 03 ac
| emitting length of ISAKMP Delete Payload: 28
| send delete HASH(1):
|   8b 05 ee 52  ec c6 7f 55  f4 26 ef 40  d5 dc e1 40
|   e2 49 13 7e  15 35 8a 61  e7 59 50 9b  a9 1f 11 6e
| no IKEv1 message padding required
| emitting length of ISAKMP Message: 92
| sending 92 bytes for delete notify through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3)
|   2e f4 52 7d  b6 ae 8d 4d  dc 41 49 c4  69 c3 03 ac
|   08 10 05 01  97 89 c4 57  00 00 00 5c  6f b5 70 44
|   fa b4 4b 0b  b8 f3 3c 2d  f3 15 2f 6a  7b b5 9c 13
|   0d e3 43 a8  2a b7 60 e9  ce 2c b6 b6  22 79 d7 96
|   4d 22 a8 51  68 15 fc c9  a5 85 1c 4e  dd 3f e4 cd
|   74 ac 0a 6d  8c f8 22 a6  6b aa f8 58
| state #3 requesting EVENT_SA_REPLACE to be deleted
| libevent_free: release ptr-libevent@0x7f0830002888
| free_event_entry: release EVENT_SA_REPLACE-pe@0x55b7378c8cc8
| State DB: IKEv1 state not found (flush_incomplete_children)
| in connection_discard for connection west-east
| State DB: deleting IKEv1 state #3 in MAIN_R3
| parent state #3: MAIN_R3(established IKE SA) => UNDEFINED(ignore)
| unreference key: 0x55b737821c48 @west cnt 1--
| stop processing: state #3 from 192.1.2.45:500 (in delete_state() at state.c:1143)
| processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
| shunt_eroute() called for connection 'west-east' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "west-east" is 0xfdfdf
| priority calculation of connection "west-east" is 0xfdfdf
| FOR_EACH_CONNECTION_... in route_owner
|  conn west-east mark 0/00000000, 0/00000000 vs
|  conn west-east mark 0/00000000, 0/00000000
| route owner of "west-east" unrouted: NULL
| running updown command "ipsec _updown" for verb unroute 
| command executing unroute-host
| executing unroute-host: PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.1.2.23/32' PLUTO_MY_CLIENT_NET='192.1.2.23' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west' PLUTO_PEER_CLIENT='192.1.2.45/32' PLUTO_PEER_CLIENT_NET='192.1.2.45' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0
| popen cmd is 1026 chars long
| cmd(   0):PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO:
| cmd(  80):_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID=:
| cmd( 160):'@east' PLUTO_MY_CLIENT='192.1.2.23/32' PLUTO_MY_CLIENT_NET='192.1.2.23' PLUTO_M:
| cmd( 240):Y_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA:
| cmd( 320):_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.45' PLUTO_PEER_ID='@west:
| cmd( 400):' PLUTO_PEER_CLIENT='192.1.2.45/32' PLUTO_PEER_CLIENT_NET='192.1.2.45' PLUTO_PEE:
| cmd( 480):R_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUT:
| cmd( 560):O_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+EN:
| cmd( 640):CRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND=:
| cmd( 720):'CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO=':
| cmd( 800):0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_C:
| cmd( 880):FG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUT:
| cmd( 960):ING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
unroute-host output: Error: Peer netns reference is invalid.
| free hp@0x55b7378c8be8
| flush revival: connection 'west-east' wasn't on the list
| processing: STOP connection NULL (in discard_connection() at connections.c:249)
| crl fetch request list locked by 'free_crl_fetch'
| crl fetch request list unlocked by 'free_crl_fetch'
shutting down interface lo/lo 127.0.0.1:4500
shutting down interface lo/lo 127.0.0.1:500
shutting down interface eth0/eth0 192.0.2.254:4500
shutting down interface eth0/eth0 192.0.2.254:500
shutting down interface eth1/eth1 192.1.2.23:4500
shutting down interface eth1/eth1 192.1.2.23:500
| FOR_EACH_STATE_... in delete_states_dead_interfaces
| libevent_free: release ptr-libevent@0x55b7378bbc98
| free_event_entry: release EVENT_NULL-pe@0x55b7378c7ad8
| libevent_free: release ptr-libevent@0x55b7378518c8
| free_event_entry: release EVENT_NULL-pe@0x55b7378c7b88
| libevent_free: release ptr-libevent@0x55b737851818
| free_event_entry: release EVENT_NULL-pe@0x55b7378c7c38
| libevent_free: release ptr-libevent@0x55b737852448
| free_event_entry: release EVENT_NULL-pe@0x55b7378c7ce8
| libevent_free: release ptr-libevent@0x55b7378264e8
| free_event_entry: release EVENT_NULL-pe@0x55b7378c7d98
| libevent_free: release ptr-libevent@0x55b7378261d8
| free_event_entry: release EVENT_NULL-pe@0x55b7378c7e48
| FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
| libevent_free: release ptr-libevent@0x55b7378bbd48
| free_event_entry: release EVENT_NULL-pe@0x55b7378afb38
| libevent_free: release ptr-libevent@0x55b737850078
| free_event_entry: release EVENT_NULL-pe@0x55b7378afac8
| libevent_free: release ptr-libevent@0x55b7378933e8
| free_event_entry: release EVENT_NULL-pe@0x55b7378aef88
| global timer EVENT_REINIT_SECRET uninitialized
| global timer EVENT_SHUNT_SCAN uninitialized
| global timer EVENT_PENDING_DDNS uninitialized
| global timer EVENT_PENDING_PHASE2 uninitialized
| global timer EVENT_CHECK_CRLS uninitialized
| global timer EVENT_REVIVE_CONNS uninitialized
| global timer EVENT_FREE_ROOT_CERTS uninitialized
| global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized
| global timer EVENT_NAT_T_KEEPALIVE uninitialized
| libevent_free: release ptr-libevent@0x55b73784f788
| signal event handler PLUTO_SIGCHLD uninstalled
| libevent_free: release ptr-libevent@0x55b737852518
| signal event handler PLUTO_SIGTERM uninstalled
| libevent_free: release ptr-libevent@0x55b7378c7348
| signal event handler PLUTO_SIGHUP uninstalled
| libevent_free: release ptr-libevent@0x55b7378c7588
| signal event handler PLUTO_SIGSYS uninstalled
| releasing event base
| libevent_free: release ptr-libevent@0x55b7378c7458
| libevent_free: release ptr-libevent@0x55b7378aa378
| libevent_free: release ptr-libevent@0x55b7378aa328
| libevent_free: release ptr-libevent@0x7f0838003e78
| libevent_free: release ptr-libevent@0x55b7378aa278
| libevent_free: release ptr-libevent@0x55b7378c7018
| libevent_free: release ptr-libevent@0x55b7378c7288
| libevent_free: release ptr-libevent@0x55b7378aa528
| libevent_free: release ptr-libevent@0x55b7378af098
| libevent_free: release ptr-libevent@0x55b7378afa88
| libevent_free: release ptr-libevent@0x55b7378c7eb8
| libevent_free: release ptr-libevent@0x55b7378c7e08
| libevent_free: release ptr-libevent@0x55b7378c7d58
| libevent_free: release ptr-libevent@0x55b7378c7ca8
| libevent_free: release ptr-libevent@0x55b7378c7bf8
| libevent_free: release ptr-libevent@0x55b7378c7b48
| libevent_free: release ptr-libevent@0x55b73784e8b8
| libevent_free: release ptr-libevent@0x55b7378c7308
| libevent_free: release ptr-libevent@0x55b7378c72c8
| libevent_free: release ptr-libevent@0x55b7378c7188
| libevent_free: release ptr-libevent@0x55b7378c7418
| libevent_free: release ptr-libevent@0x55b7378c7058
| libevent_free: release ptr-libevent@0x55b737825908
| libevent_free: release ptr-libevent@0x55b737825d38
| libevent_free: release ptr-libevent@0x55b73784ec28
| releasing global libevent data
| libevent_free: release ptr-libevent@0x55b737826868
| libevent_free: release ptr-libevent@0x55b737825cd8
| libevent_free: release ptr-libevent@0x55b737825dd8
leak detective found no leaks