FIPS Product: YES FIPS Kernel: NO FIPS Mode: NO NSS DB directory: sql:/etc/ipsec.d Initializing NSS Opening NSS database "sql:/etc/ipsec.d" read-only NSS initialized NSS crypto library initialized FIPS HMAC integrity support [enabled] FIPS mode disabled for pluto daemon FIPS HMAC integrity verification self-test FAILED libcap-ng support [enabled] Linux audit support [enabled] Linux audit activated Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:10833 core dump dir: /var/tmp secrets file: /etc/ipsec.secrets leak-detective enabled NSS crypto [enabled] XAUTH PAM support [enabled] | libevent is using pluto's memory allocator Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) | libevent_malloc: new ptr-libevent@0x55667936a8b8 size 40 | libevent_malloc: new ptr-libevent@0x556679365cd8 size 40 | libevent_malloc: new ptr-libevent@0x556679365dd8 size 40 | creating event base | libevent_malloc: new ptr-libevent@0x5566793ea5d8 size 56 | libevent_malloc: new ptr-libevent@0x55667938ee38 size 664 | libevent_malloc: new ptr-libevent@0x5566793ea648 size 24 | libevent_malloc: new ptr-libevent@0x5566793ea698 size 384 | libevent_malloc: new ptr-libevent@0x5566793ea598 size 16 | libevent_malloc: new ptr-libevent@0x556679365908 size 40 | libevent_malloc: new ptr-libevent@0x556679365d38 size 48 | libevent_realloc: new ptr-libevent@0x55667938eac8 size 256 | libevent_malloc: new ptr-libevent@0x5566793ea848 size 16 | libevent_free: release ptr-libevent@0x5566793ea5d8 | libevent initialized | libevent_realloc: new ptr-libevent@0x5566793ea5d8 size 64 | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds | init_nat_traversal() initialized with keep_alive=0s NAT-Traversal support [enabled] | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized | global one-shot timer EVENT_FREE_ROOT_CERTS initialized | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds | global one-shot timer EVENT_REVIVE_CONNS initialized | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Encryption algorithms: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac NULL IKEv1: ESP IKEv2: ESP [] CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Hash algorithms: MD5 IKEv1: IKE IKEv2: SHA1 IKEv1: IKE IKEv2: FIPS sha SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 PRF algorithms: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Integrity algorithms: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac NONE IKEv1: ESP IKEv2: IKE ESP FIPS null DH algorithms: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 testing CAMELLIA_CBC: Camellia: 16 bytes with 128-bit key Camellia: 16 bytes with 128-bit key Camellia: 16 bytes with 256-bit key Camellia: 16 bytes with 256-bit key testing AES_GCM_16: empty string one block two blocks two blocks with associated data testing AES_CTR: Encrypting 16 octets using AES-CTR with 128-bit key Encrypting 32 octets using AES-CTR with 128-bit key Encrypting 36 octets using AES-CTR with 128-bit key Encrypting 16 octets using AES-CTR with 192-bit key Encrypting 32 octets using AES-CTR with 192-bit key Encrypting 36 octets using AES-CTR with 192-bit key Encrypting 16 octets using AES-CTR with 256-bit key Encrypting 32 octets using AES-CTR with 256-bit key Encrypting 36 octets using AES-CTR with 256-bit key testing AES_CBC: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key testing AES_XCBC: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) testing HMAC_MD5: RFC 2104: MD5_HMAC test 1 RFC 2104: MD5_HMAC test 2 RFC 2104: MD5_HMAC test 3 8 CPU cores online starting up 7 crypto helpers started thread for crypto helper 0 | starting up helper thread 0 | status value returned by setting the priority of this thread (crypto helper 0) 22 | crypto helper 0 waiting (nothing to do) started thread for crypto helper 1 | starting up helper thread 1 | status value returned by setting the priority of this thread (crypto helper 1) 22 | crypto helper 1 waiting (nothing to do) started thread for crypto helper 2 started thread for crypto helper 3 started thread for crypto helper 4 | starting up helper thread 4 | status value returned by setting the priority of this thread (crypto helper 4) 22 | crypto helper 4 waiting (nothing to do) started thread for crypto helper 5 | starting up helper thread 5 | status value returned by setting the priority of this thread (crypto helper 5) 22 | crypto helper 5 waiting (nothing to do) started thread for crypto helper 6 | checking IKEv1 state table | MAIN_R0: category: half-open IKE SA flags: 0: | -> MAIN_R1 EVENT_SO_DISCARD | starting up helper thread 3 | MAIN_I1: category: half-open IKE SA flags: 0: | status value returned by setting the priority of this thread (crypto helper 3) 22 | crypto helper 3 waiting (nothing to do) | -> MAIN_I2 EVENT_RETRANSMIT | MAIN_R1: category: open IKE SA flags: 200: | -> MAIN_R2 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_I2: category: open IKE SA flags: 0: | -> MAIN_I3 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_R2: category: open IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | -> MAIN_R3 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_I3: category: open IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | -> MAIN_I4 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_R3: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | MAIN_I4: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | AGGR_R0: category: half-open IKE SA flags: 0: | -> AGGR_R1 EVENT_SO_DISCARD | AGGR_I1: category: half-open IKE SA flags: 0: | -> AGGR_I2 EVENT_SA_REPLACE | -> AGGR_I2 EVENT_SA_REPLACE | AGGR_R1: category: open IKE SA flags: 200: | -> AGGR_R2 EVENT_SA_REPLACE | -> AGGR_R2 EVENT_SA_REPLACE | AGGR_I2: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | AGGR_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | QUICK_R0: category: established CHILD SA flags: 0: | -> QUICK_R1 EVENT_RETRANSMIT | QUICK_I1: category: established CHILD SA flags: 0: | -> QUICK_I2 EVENT_SA_REPLACE | QUICK_R1: category: established CHILD SA flags: 0: | -> QUICK_R2 EVENT_SA_REPLACE | QUICK_I2: category: established CHILD SA flags: 200: | -> UNDEFINED EVENT_NULL | QUICK_R2: category: established CHILD SA flags: 0: | -> UNDEFINED EVENT_NULL | INFO: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | INFO_PROTECTED: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | XAUTH_R0: category: established IKE SA flags: 0: | -> XAUTH_R1 EVENT_NULL | XAUTH_R1: category: established IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | MODE_CFG_R0: category: informational flags: 0: | -> MODE_CFG_R1 EVENT_SA_REPLACE | MODE_CFG_R1: category: established IKE SA flags: 0: | -> MODE_CFG_R2 EVENT_SA_REPLACE | MODE_CFG_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | MODE_CFG_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | XAUTH_I0: category: established IKE SA flags: 0: | -> XAUTH_I1 EVENT_RETRANSMIT | XAUTH_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_RETRANSMIT | checking IKEv2 state table | PARENT_I0: category: ignore flags: 0: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) | PARENT_I1: category: half-open IKE SA flags: 0: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) | PARENT_I2: category: open IKE SA flags: 0: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) | PARENT_I3: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) | PARENT_R0: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) | PARENT_R1: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) | PARENT_R2: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) | starting up helper thread 2 | V2_CREATE_I0: category: established IKE SA flags: 0: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) | V2_CREATE_I: category: established IKE SA flags: 0: | status value returned by setting the priority of this thread (crypto helper 2) 22 | crypto helper 2 waiting (nothing to do) | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) | V2_REKEY_IKE_I: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: | V2_CREATE_R: category: established IKE SA flags: 0: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) | V2_REKEY_IKE_R: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: | V2_IPSEC_I: category: established CHILD SA flags: 0: | V2_IPSEC_R: category: established CHILD SA flags: 0: | IKESA_DEL: category: established IKE SA flags: 0: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) | CHILDSA_DEL: category: informational flags: 0: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 | Hard-wiring algorithms | adding AES_CCM_16 to kernel algorithm db | adding AES_CCM_12 to kernel algorithm db | adding AES_CCM_8 to kernel algorithm db | adding 3DES_CBC to kernel algorithm db | adding CAMELLIA_CBC to kernel algorithm db | adding AES_GCM_16 to kernel algorithm db | adding AES_GCM_12 to kernel algorithm db | adding AES_GCM_8 to kernel algorithm db | adding AES_CTR to kernel algorithm db | adding AES_CBC to kernel algorithm db | adding SERPENT_CBC to kernel algorithm db | adding TWOFISH_CBC to kernel algorithm db | adding NULL_AUTH_AES_GMAC to kernel algorithm db | adding NULL to kernel algorithm db | adding CHACHA20_POLY1305 to kernel algorithm db | adding HMAC_MD5_96 to kernel algorithm db | adding HMAC_SHA1_96 to kernel algorithm db | adding HMAC_SHA2_512_256 to kernel algorithm db | adding HMAC_SHA2_384_192 to kernel algorithm db | adding HMAC_SHA2_256_128 to kernel algorithm db | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db | adding AES_XCBC_96 to kernel algorithm db | adding AES_CMAC_96 to kernel algorithm db | adding NONE to kernel algorithm db | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds | setup kernel fd callback | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x5566793ef2a8 | libevent_malloc: new ptr-libevent@0x5566793d3678 size 128 | libevent_malloc: new ptr-libevent@0x5566793ef3b8 size 16 | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x5566793efde8 | libevent_malloc: new ptr-libevent@0x556679391bd8 size 128 | libevent_malloc: new ptr-libevent@0x5566793efda8 size 16 | global one-shot timer EVENT_CHECK_CRLS initialized selinux support is enabled. | starting up helper thread 6 | status value returned by setting the priority of this thread (crypto helper 6) 22 | crypto helper 6 waiting (nothing to do) | unbound context created - setting debug level to 5 | /etc/hosts lookups activated | /etc/resolv.conf usage activated | outgoing-port-avoid set 0-65535 | outgoing-port-permit set 32768-60999 | Loading dnssec root key from:/var/lib/unbound/root.key | No additional dnssec trust anchors defined via dnssec-trusted= option | Setting up events, loop start | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x5566793efe58 | libevent_malloc: new ptr-libevent@0x5566793fc068 size 128 | libevent_malloc: new ptr-libevent@0x556679407338 size 16 | libevent_realloc: new ptr-libevent@0x556679407378 size 256 | libevent_malloc: new ptr-libevent@0x5566794074a8 size 8 | libevent_realloc: new ptr-libevent@0x556679361918 size 144 | libevent_malloc: new ptr-libevent@0x55667939a718 size 152 | libevent_malloc: new ptr-libevent@0x5566794074e8 size 16 | signal event handler PLUTO_SIGCHLD installed | libevent_malloc: new ptr-libevent@0x556679407528 size 8 | libevent_malloc: new ptr-libevent@0x556679392578 size 152 | signal event handler PLUTO_SIGTERM installed | libevent_malloc: new ptr-libevent@0x556679407568 size 8 | libevent_malloc: new ptr-libevent@0x5566794075a8 size 152 | signal event handler PLUTO_SIGHUP installed | libevent_malloc: new ptr-libevent@0x556679407678 size 8 | libevent_realloc: release ptr-libevent@0x556679361918 | libevent_realloc: new ptr-libevent@0x5566794076b8 size 256 | libevent_malloc: new ptr-libevent@0x5566794077e8 size 152 | signal event handler PLUTO_SIGSYS installed | created addconn helper (pid:11015) using fork+execve | forked child 11015 | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.0.1.254 | Inspecting interface eth1 | found eth1 with address 192.1.2.45 Kernel supports NIC esp-hw-offload adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.45:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth1/eth1 192.1.2.45:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.1.254:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.0.1.254:4500 adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface lo/lo 127.0.0.1:4500 | no interfaces to sort | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | add_fd_read_event_handler: new ethX-pe@0x556679407cb8 | libevent_malloc: new ptr-libevent@0x5566793fbfb8 size 128 | libevent_malloc: new ptr-libevent@0x556679407d28 size 16 | setup callback for interface lo 127.0.0.1:4500 fd 22 | add_fd_read_event_handler: new ethX-pe@0x556679407d68 | libevent_malloc: new ptr-libevent@0x55667938f278 size 128 | libevent_malloc: new ptr-libevent@0x556679407dd8 size 16 | setup callback for interface lo 127.0.0.1:500 fd 21 | add_fd_read_event_handler: new ethX-pe@0x556679407e18 | libevent_malloc: new ptr-libevent@0x556679392298 size 128 | libevent_malloc: new ptr-libevent@0x556679407e88 size 16 | setup callback for interface eth0 192.0.1.254:4500 fd 20 | add_fd_read_event_handler: new ethX-pe@0x556679407ec8 | libevent_malloc: new ptr-libevent@0x5566793924a8 size 128 | libevent_malloc: new ptr-libevent@0x556679407f38 size 16 | setup callback for interface eth0 192.0.1.254:500 fd 19 | add_fd_read_event_handler: new ethX-pe@0x556679407f78 | libevent_malloc: new ptr-libevent@0x5566793664e8 size 128 | libevent_malloc: new ptr-libevent@0x556679407fe8 size 16 | setup callback for interface eth1 192.1.2.45:4500 fd 18 | add_fd_read_event_handler: new ethX-pe@0x556679408028 | libevent_malloc: new ptr-libevent@0x5566793661d8 size 128 | libevent_malloc: new ptr-libevent@0x556679408098 size 16 | setup callback for interface eth1 192.1.2.45:500 fd 17 | certs and keys locked by 'free_preshared_secrets' | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | saving Modulus | saving PublicExponent | ignoring PrivateExponent | ignoring Prime1 | ignoring Prime2 | ignoring Exponent1 | ignoring Exponent2 | ignoring Coefficient | ignoring CKAIDNSS | computed rsa CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 | computed rsa CKAID 7f 0f 03 50 loaded private key for keyid: PKK_RSA:AQOm9dY/4 | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.733 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.0.1.254 | Inspecting interface eth1 | found eth1 with address 192.1.2.45 | no interfaces to sort | libevent_free: release ptr-libevent@0x5566793fbfb8 | free_event_entry: release EVENT_NULL-pe@0x556679407cb8 | add_fd_read_event_handler: new ethX-pe@0x556679407cb8 | libevent_malloc: new ptr-libevent@0x5566793fbfb8 size 128 | setup callback for interface lo 127.0.0.1:4500 fd 22 | libevent_free: release ptr-libevent@0x55667938f278 | free_event_entry: release EVENT_NULL-pe@0x556679407d68 | add_fd_read_event_handler: new ethX-pe@0x556679407d68 | libevent_malloc: new ptr-libevent@0x55667938f278 size 128 | setup callback for interface lo 127.0.0.1:500 fd 21 | libevent_free: release ptr-libevent@0x556679392298 | free_event_entry: release EVENT_NULL-pe@0x556679407e18 | add_fd_read_event_handler: new ethX-pe@0x556679407e18 | libevent_malloc: new ptr-libevent@0x556679392298 size 128 | setup callback for interface eth0 192.0.1.254:4500 fd 20 | libevent_free: release ptr-libevent@0x5566793924a8 | free_event_entry: release EVENT_NULL-pe@0x556679407ec8 | add_fd_read_event_handler: new ethX-pe@0x556679407ec8 | libevent_malloc: new ptr-libevent@0x5566793924a8 size 128 | setup callback for interface eth0 192.0.1.254:500 fd 19 | libevent_free: release ptr-libevent@0x5566793664e8 | free_event_entry: release EVENT_NULL-pe@0x556679407f78 | add_fd_read_event_handler: new ethX-pe@0x556679407f78 | libevent_malloc: new ptr-libevent@0x5566793664e8 size 128 | setup callback for interface eth1 192.1.2.45:4500 fd 18 | libevent_free: release ptr-libevent@0x5566793661d8 | free_event_entry: release EVENT_NULL-pe@0x556679408028 | add_fd_read_event_handler: new ethX-pe@0x556679408028 | libevent_malloc: new ptr-libevent@0x5566793661d8 size 128 | setup callback for interface eth1 192.1.2.45:500 fd 17 | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | saving Modulus | saving PublicExponent | ignoring PrivateExponent | ignoring Prime1 | ignoring Prime2 | ignoring Exponent1 | ignoring Exponent2 | ignoring Coefficient | ignoring CKAIDNSS | computed rsa CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 | computed rsa CKAID 7f 0f 03 50 loaded private key for keyid: PKK_RSA:AQOm9dY/4 | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.312 milliseconds in whack | processing signal PLUTO_SIGCHLD | waitpid returned pid 11015 (exited with status 0) | reaped addconn helper child (status 0) | waitpid returned ECHILD (no child processes left) | spent 0.0132 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection west-east with policy ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | No AUTH policy was set - defaulting to RSASIG | counting wild cards for @west is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.2.45:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x556679408f88 added connection description "west-east" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.2.45<192.1.2.45>[@west]...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0762 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) add keyid @west | add pubkey 01 03 a6 f5 d6 3f e3 8f 6c 01 6a fc 7b 7c 6d 57 | add pubkey 8b 49 39 0d 77 f7 ac e2 85 f1 98 1e 4b 6d a5 3e | add pubkey b3 96 9a d1 99 5a bc 10 f2 97 de f2 28 f9 5f 92 | add pubkey 09 f0 c8 d4 12 e4 60 6e 9c 60 98 10 01 7d 26 b7 | add pubkey 8f 95 62 2d 87 dd cd de f6 d3 8f 35 b0 50 d0 18 | add pubkey f5 99 f8 04 f1 ff 61 5b bc 7f 1f c0 04 d8 e4 8c | add pubkey ac 34 ad 7a c1 da 3c 2d 8c 30 ae d6 3c 59 b1 3a | add pubkey 94 d3 d5 2a 73 91 bd 59 5f 3e 72 bf 4a 1b 9d c5 | add pubkey b2 2b 4d e7 0d 24 3e 77 f9 7f 2d d6 9d 29 ef 70 | add pubkey 7d 7a 6d a2 b8 61 0c 4b 09 4a 06 71 84 70 85 9a | add pubkey 8f 52 a1 80 06 fd c6 fc 3e 27 fa 16 fa 32 83 a9 | add pubkey ca 80 db 0f 4a bf f7 e9 55 8e bd 29 4d 23 a6 dc | add pubkey 2a b3 5d 62 a9 21 1e be 83 d8 69 3c 03 0a 48 8e | add pubkey d3 3a 11 f2 86 5a d1 30 65 bd c8 f4 83 87 ff 04 | add pubkey 87 33 05 4f e0 d8 8c fe b3 19 4c dd 85 40 f3 4d | add pubkey 6e e8 49 14 06 2c 1f 59 59 05 8f 20 b0 ca 46 3f | add pubkey c9 20 7e 04 30 7d 9a 80 6c 3f 0a 89 f7 d3 af d8 | add pubkey 15 04 37 f9 | computed rsa CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 | computed rsa CKAID 7f 0f 03 50 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.081 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) add keyid @east | add pubkey 01 03 bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b | add pubkey e5 16 c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 | add pubkey 85 7a e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c | add pubkey 78 ca 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 | add pubkey 21 c9 f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d | add pubkey d2 67 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 | add pubkey 62 cd 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce | add pubkey 62 b5 af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e | add pubkey bb 23 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d | add pubkey ac 47 f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce | add pubkey e0 98 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a | add pubkey 92 b8 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 | add pubkey 4d 58 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 | add pubkey 5f 56 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 | add pubkey d5 f1 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c | add pubkey 47 cc 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 | add pubkey 07 8f 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 | add pubkey 51 51 48 ef | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 | computed rsa CKAID 8a 82 25 f1 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0582 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | dup_any(fd@16) -> fd@23 (in whack_process() at rcv_whack.c:590) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "west-east" (in initiate_a_connection() at initiate.c:186) | empty esp_info, returning defaults for ENCRYPT | connection 'west-east' +POLICY_UP | dup_any(fd@23) -> fd@24 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #1 at 0x556679409b38 | State DB: adding IKEv1 state #1 in UNDEFINED | pstats #1 ikev1.isakmp started | suspend processing: connection "west-east" (in main_outI1() at ikev1_main.c:118) | start processing: state #1 connection "west-east" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118) | parent state #1: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA) | dup_any(fd@24) -> fd@25 (in main_outI1() at ikev1_main.c:123) | Queuing pending IPsec SA negotiating with 192.1.2.23 "west-east" IKE SA #1 "west-east" "west-east" #1: initiating Main Mode | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_SA (0x1) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA | no specific IKE algorithms specified - using defaults | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() returning 0x55667940c8e8 | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ikev1_out_sa pcn: 0 has 1 valid proposals | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 18 (0x12) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 1 (0x1) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 2 (0x2) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 3 (0x3) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 4 (0x4) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 5 (0x5) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 6 (0x6) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 7 (0x7) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 8 (0x8) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 9 (0x9) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 10 (0xa) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 11 (0xb) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 12 (0xc) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 13 (0xd) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 14 (0xe) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 15 (0xf) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 16 (0x10) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP transform number: 17 (0x11) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | emitting length of ISAKMP Proposal Payload: 632 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 644 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | out_vid(): sending [FRAGMENTATION] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [Dead Peer Detection] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 | emitting length of ISAKMP Vendor ID Payload: 20 | nat add vid | sending draft and RFC NATT VIDs | out_vid(): sending [RFC 3947] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | emitting length of ISAKMP Vendor ID Payload: 20 | skipping VID_NATT_RFC | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 | emitting length of ISAKMP Vendor ID Payload: 20 | no IKEv1 message padding required | emitting length of ISAKMP Message: 792 | sending 792 bytes for reply packet for main_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 00 00 00 00 00 00 00 00 | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 | 7c fd b2 fc 68 b6 a4 48 | event_schedule: new EVENT_RETRANSMIT-pe@0x556679409068 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 | libevent_malloc: new ptr-libevent@0x5566794093e8 size 128 | #1 STATE_MAIN_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29656.876375 | #1 spent 1.55 milliseconds in main_outI1() | stop processing: state #1 connection "west-east" from 192.1.2.23 (in main_outI1() at ikev1_main.c:228) | resume processing: connection "west-east" (in main_outI1() at ikev1_main.c:228) | stop processing: connection "west-east" (in initiate_a_connection() at initiate.c:349) | close_any(fd@23) (in initiate_connection() at initiate.c:372) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 1.61 milliseconds in whack | spent 0.00239 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 144 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 01 10 02 00 00 00 00 00 00 00 00 90 0d 00 00 38 | 00 00 00 01 00 00 00 01 00 00 00 2c 00 01 00 01 | 00 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e | 80 0e 01 00 0d 00 00 14 40 48 b7 d5 6e bc e8 85 | 25 e7 de 7f 00 d6 c2 d3 0d 00 00 14 af ca d7 13 | 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 00 00 00 14 | 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_SA (0x1) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | length: 144 (0x90) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) | State DB: IKEv1 state not found (find_state_ikev1) | State DB: found IKEv1 state #1 in MAIN_I1 (find_state_ikev1_init) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) | #1 is idle | #1 idle | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 56 (0x38) | DOI: ISAKMP_DOI_IPSEC (0x1) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 20 (0x14) | message 'main_inR1_outI2' HASH payload not checked early | received Vendor ID payload [FRAGMENTATION] | received Vendor ID payload [Dead Peer Detection] | quirks.qnat_traversal_vid set to=117 [RFC 3947] | received Vendor ID payload [RFC 3947] | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 44 (0x2c) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 1 (0x1) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 36 (0x24) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | OAKLEY proposal verified unconditionally; no alg_info to check against | Oakley Transform 0 accepted | sender checking NAT-T: enabled; VID 117 | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) | adding outI2 KE work-order 1 for state #1 | state #1 requesting EVENT_RETRANSMIT to be deleted | #1 STATE_MAIN_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x5566794093e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x556679409068 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x556679409068 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x5566794093e8 size 128 | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #1 connection "west-east" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) | suspending state #1 and saving MD | crypto helper 0 resuming | #1 is busy; has a suspended MD | crypto helper 0 starting work-order 1 for state #1 | #1 spent 0.132 milliseconds in process_packet_tail() | crypto helper 0 doing build KE and nonce (outI2 KE); request ID 1 | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.261 milliseconds in comm_handle_cb() reading and processing packet | crypto helper 0 finished build KE and nonce (outI2 KE); request ID 1 time elapsed 0.00072 seconds | (#1) spent 0.718 milliseconds in crypto helper computing work-order 1: outI2 KE (pcr) | crypto helper 0 sending results from work-order 1 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7f6504002888 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "west-east" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 1 | calling continuation function 0x5566786aeb50 | main_inR1_outI2_continue for #1: calculated ke+nonce, sending I2 | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value c6 91 a4 ca 38 8a bf 34 6d b1 96 f8 cf 0c be a4 | keyex value da 39 7d 76 a5 d8 04 74 00 6b f7 65 b3 25 e3 ed | keyex value 6f 4b b8 1e 5d ae f0 04 f0 7a e0 4f 47 13 ba d4 | keyex value 1c 6f ef 3f 71 b4 13 00 9d c8 6c d0 51 4c fa b2 | keyex value 4b de 13 ef 90 db 09 21 d5 1f b4 82 4c ce e3 83 | keyex value a1 94 97 73 cf b3 35 82 33 9f 29 36 f3 35 4e 9d | keyex value 42 18 89 0b 29 7d 4b c2 88 de f7 f3 e0 80 f6 10 | keyex value 7c 68 49 64 a9 20 eb 6a 18 f0 63 8b 0a c4 0f b3 | keyex value b6 03 12 cf 5f 64 22 36 2e 16 e9 6a ef 7d ab 65 | keyex value 36 cb 8d a0 39 c1 f9 77 64 bf af 5c 30 95 8b 22 | keyex value 10 fc 2f 0b d1 00 73 2c 67 72 0c da 1c 0f 4e ce | keyex value 82 73 8a e6 da bb b4 e7 09 ed 34 19 4f 44 db 0f | keyex value a0 e5 c4 f2 45 ed 0e ef 20 08 f6 73 37 b7 44 91 | keyex value 0f 28 e2 3b e3 70 ac f0 e7 9c a3 51 3d 7d 91 3c | keyex value 91 19 ba 79 6f 1d 03 14 2a ab b8 2b 9e 40 be 40 | keyex value 09 14 6a 66 c7 cf 24 46 21 2e 33 71 83 ce b9 9c | emitting length of ISAKMP Key Exchange Payload: 260 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload | Ni 58 31 0d 8b f8 09 95 97 75 45 03 4c 8b a6 b9 af | Ni ee 05 84 e3 06 e0 a2 30 f0 87 a4 36 ae 00 39 0b | emitting length of ISAKMP Nonce Payload: 36 | NAT-T checking st_nat_traversal | NAT-T found (implies NAT_T_WITH_NATD) | sending NAT-D payloads | natd_hash: hasher=0x556678783ca0(32) | natd_hash: icookie= 06 16 40 37 9b bb 54 13 | natd_hash: rcookie= 3c 56 34 2e a2 ef 88 8f | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d4 e8 18 e3 4f 50 79 2b 30 6e 06 9e b4 32 5c c9 | natd_hash: hash= 4c 6f d1 ee 7d 85 a5 32 64 ee b1 b0 6a 5f 81 9b | ***emit ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | next payload chain: ignoring supplied 'ISAKMP NAT-D Payload'.'next payload type' value 20:ISAKMP_NEXT_NATD_RFC | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload | NAT-D d4 e8 18 e3 4f 50 79 2b 30 6e 06 9e b4 32 5c c9 | NAT-D 4c 6f d1 ee 7d 85 a5 32 64 ee b1 b0 6a 5f 81 9b | emitting length of ISAKMP NAT-D Payload: 36 | natd_hash: hasher=0x556678783ca0(32) | natd_hash: icookie= 06 16 40 37 9b bb 54 13 | natd_hash: rcookie= 3c 56 34 2e a2 ef 88 8f | natd_hash: ip= c0 01 02 2d | natd_hash: port=500 | natd_hash: hash= af 4b 2a 6d 1e f0 5a 67 73 7d 35 c4 43 a3 8b a2 | natd_hash: hash= 82 5f 9e 3e f8 83 4e e1 a2 06 62 f1 87 4c 17 c2 | ***emit ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP NAT-D Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload | NAT-D af 4b 2a 6d 1e f0 5a 67 73 7d 35 c4 43 a3 8b a2 | NAT-D 82 5f 9e 3e f8 83 4e e1 a2 06 62 f1 87 4c 17 c2 | emitting length of ISAKMP NAT-D Payload: 36 | no IKEv1 message padding required | emitting length of ISAKMP Message: 396 | State DB: re-hashing IKEv1 state #1 IKE SPIi and SPI[ir] | complete v1 state transition with STF_OK | [RE]START processing: state #1 connection "west-east" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) | #1 is idle | doing_xauth:no, t_xauth_client_done:no | peer supports fragmentation | peer supports DPD | DPD is configured locally | IKEv1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 | parent state #1: MAIN_I1(half-open IKE SA) => MAIN_I2(open IKE SA) | event_already_set, deleting event | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x5566794093e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x556679409068 | sending reply packet to 192.1.2.23:500 (from 192.1.2.45:500) | sending 396 bytes for STATE_MAIN_I1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 04 10 02 00 00 00 00 00 00 00 01 8c 0a 00 01 04 | c6 91 a4 ca 38 8a bf 34 6d b1 96 f8 cf 0c be a4 | da 39 7d 76 a5 d8 04 74 00 6b f7 65 b3 25 e3 ed | 6f 4b b8 1e 5d ae f0 04 f0 7a e0 4f 47 13 ba d4 | 1c 6f ef 3f 71 b4 13 00 9d c8 6c d0 51 4c fa b2 | 4b de 13 ef 90 db 09 21 d5 1f b4 82 4c ce e3 83 | a1 94 97 73 cf b3 35 82 33 9f 29 36 f3 35 4e 9d | 42 18 89 0b 29 7d 4b c2 88 de f7 f3 e0 80 f6 10 | 7c 68 49 64 a9 20 eb 6a 18 f0 63 8b 0a c4 0f b3 | b6 03 12 cf 5f 64 22 36 2e 16 e9 6a ef 7d ab 65 | 36 cb 8d a0 39 c1 f9 77 64 bf af 5c 30 95 8b 22 | 10 fc 2f 0b d1 00 73 2c 67 72 0c da 1c 0f 4e ce | 82 73 8a e6 da bb b4 e7 09 ed 34 19 4f 44 db 0f | a0 e5 c4 f2 45 ed 0e ef 20 08 f6 73 37 b7 44 91 | 0f 28 e2 3b e3 70 ac f0 e7 9c a3 51 3d 7d 91 3c | 91 19 ba 79 6f 1d 03 14 2a ab b8 2b 9e 40 be 40 | 09 14 6a 66 c7 cf 24 46 21 2e 33 71 83 ce b9 9c | 14 00 00 24 58 31 0d 8b f8 09 95 97 75 45 03 4c | 8b a6 b9 af ee 05 84 e3 06 e0 a2 30 f0 87 a4 36 | ae 00 39 0b 14 00 00 24 d4 e8 18 e3 4f 50 79 2b | 30 6e 06 9e b4 32 5c c9 4c 6f d1 ee 7d 85 a5 32 | 64 ee b1 b0 6a 5f 81 9b 00 00 00 24 af 4b 2a 6d | 1e f0 5a 67 73 7d 35 c4 43 a3 8b a2 82 5f 9e 3e | f8 83 4e e1 a2 06 62 f1 87 4c 17 c2 | !event_already_set at reschedule | event_schedule: new EVENT_RETRANSMIT-pe@0x556679409068 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 | libevent_malloc: new ptr-libevent@0x55667940c548 size 128 | #1 STATE_MAIN_I2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29656.878225 "west-east" #1: STATE_MAIN_I2: sent MI2, expecting MR2 | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | resume sending helper answer for #1 suppresed complete_v1_state_transition() | #1 spent 0.255 milliseconds in resume sending helper answer | stop processing: state #1 connection "west-east" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f6504002888 | spent 0.00206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 396 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 04 10 02 00 00 00 00 00 00 00 01 8c 0a 00 01 04 | a1 34 9f 15 cc 4c ca 79 31 53 a8 d1 5c ee 1e 96 | 10 48 c0 2b f8 ce 88 ac 96 3f b2 a3 b1 ff 0c 80 | 32 1e 40 b1 de fb 8e f4 eb 05 36 9b 64 d4 37 ce | 38 6a 61 91 ce 9e 05 88 47 2a 93 96 fc 99 df 47 | c1 54 c9 95 ab d1 ba d5 7a 83 59 e9 98 9f b3 53 | 8c c7 18 c5 5f af d8 6b 66 47 80 93 cb 56 b8 74 | 0b 0d ef 5a a6 82 da 57 a8 c4 5c ca 9b 02 bb ee | 59 3c 5e f1 cb 67 9d 9c ea 95 b0 24 76 b5 17 2a | df 24 b0 76 75 fd b5 42 6b 72 7c d7 b0 66 55 62 | c5 f6 87 61 b0 e1 c2 eb 56 0c 10 05 0e 0d 64 01 | 03 79 99 5c e6 e2 df 53 3a c2 a1 c2 61 3e 77 c0 | 22 7a 1e 60 d6 54 b8 05 9a 75 be b5 14 9b f3 1b | a2 70 cf a7 95 14 80 a6 da 57 3f 65 f5 5d 4e 43 | 12 37 7c f1 90 da be 53 4e 7b 20 e1 a3 98 dd 1f | 1d 4b 0e 75 c0 22 9d 8e 22 e0 10 6d ce 44 61 e6 | 56 ea ac 6b 13 e4 0d 38 e4 ed 37 70 33 ac 15 d6 | 14 00 00 24 e4 69 48 7f 9d 1c 31 12 93 66 96 00 | 98 42 c5 c2 e3 41 56 59 9a 65 8c 0e 9d 7f 30 26 | 16 f1 7e 6e 14 00 00 24 af 4b 2a 6d 1e f0 5a 67 | 73 7d 35 c4 43 a3 8b a2 82 5f 9e 3e f8 83 4e e1 | a2 06 62 f1 87 4c 17 c2 00 00 00 24 d4 e8 18 e3 | 4f 50 79 2b 30 6e 06 9e b4 32 5c c9 4c 6f d1 ee | 7d 85 a5 32 64 ee b1 b0 6a 5f 81 9b | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_KE (0x4) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | length: 396 (0x18c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) | State DB: found IKEv1 state #1 in MAIN_I2 (find_state_ikev1) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) | #1 is idle | #1 idle | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080 | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | length: 260 (0x104) | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080 | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | length: 36 (0x24) | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 | ***parse ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | length: 36 (0x24) | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 | ***parse ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 36 (0x24) | message 'main_inR2_outI3' HASH payload not checked early | started looking for secret for @west->@east of kind PKK_PSK | actually looking for secret for @west->@east of kind PKK_PSK | line 1: key type PKK_PSK(@west) to type PKK_RSA | concluding with best_match=000 best=(nil) (lineno=-1) | no PreShared Key Found | adding aggr outR1 DH work-order 2 for state #1 | state #1 requesting EVENT_RETRANSMIT to be deleted | #1 STATE_MAIN_I2: retransmits: cleared | libevent_free: release ptr-libevent@0x55667940c548 | free_event_entry: release EVENT_RETRANSMIT-pe@0x556679409068 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x556679409068 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f6504002888 size 128 | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #1 connection "west-east" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) | suspending state #1 and saving MD | #1 is busy; has a suspended MD | #1 spent 0.0339 milliseconds in process_packet_tail() | crypto helper 1 resuming | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | crypto helper 1 starting work-order 2 for state #1 | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.143 milliseconds in comm_handle_cb() reading and processing packet | crypto helper 1 doing compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 | crypto helper 1 finished compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 time elapsed 0.001156 seconds | (#1) spent 1.16 milliseconds in crypto helper computing work-order 2: aggr outR1 DH (pcr) | crypto helper 1 sending results from work-order 2 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7f64fc000f48 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "west-east" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 2 | calling continuation function 0x5566786aeb50 | main_inR2_outI3_cryptotail for #1: calculated DH, sending R1 | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_ID (0x5) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 5:ISAKMP_NEXT_ID | thinking about whether to send my certificate: | I have RSA key: OAKLEY_RSA_SIG cert.type: 0?? | sendcert: CERT_ALWAYSSEND and I did not get a certificate request | so do not send cert. | I did not send a certificate because I do not have one. | I am not sending a certificate request | I will NOT send an initial contact payload | init checking NAT-T: enabled; RFC 3947 (NAT-Traversal) | natd_hash: hasher=0x556678783ca0(32) | natd_hash: icookie= 06 16 40 37 9b bb 54 13 | natd_hash: rcookie= 3c 56 34 2e a2 ef 88 8f | natd_hash: ip= c0 01 02 2d | natd_hash: port=500 | natd_hash: hash= af 4b 2a 6d 1e f0 5a 67 73 7d 35 c4 43 a3 8b a2 | natd_hash: hash= 82 5f 9e 3e f8 83 4e e1 a2 06 62 f1 87 4c 17 c2 | natd_hash: hasher=0x556678783ca0(32) | natd_hash: icookie= 06 16 40 37 9b bb 54 13 | natd_hash: rcookie= 3c 56 34 2e a2 ef 88 8f | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d4 e8 18 e3 4f 50 79 2b 30 6e 06 9e b4 32 5c c9 | natd_hash: hash= 4c 6f d1 ee 7d 85 a5 32 64 ee b1 b0 6a 5f 81 9b | expected NAT-D(me): af 4b 2a 6d 1e f0 5a 67 73 7d 35 c4 43 a3 8b a2 | expected NAT-D(me): 82 5f 9e 3e f8 83 4e e1 a2 06 62 f1 87 4c 17 c2 | expected NAT-D(him): | d4 e8 18 e3 4f 50 79 2b 30 6e 06 9e b4 32 5c c9 | 4c 6f d1 ee 7d 85 a5 32 64 ee b1 b0 6a 5f 81 9b | received NAT-D: af 4b 2a 6d 1e f0 5a 67 73 7d 35 c4 43 a3 8b a2 | received NAT-D: 82 5f 9e 3e f8 83 4e e1 a2 06 62 f1 87 4c 17 c2 | received NAT-D: d4 e8 18 e3 4f 50 79 2b 30 6e 06 9e b4 32 5c c9 | received NAT-D: 4c 6f d1 ee 7d 85 a5 32 64 ee b1 b0 6a 5f 81 9b | NAT_TRAVERSAL encaps using auto-detect | NAT_TRAVERSAL this end is NOT behind NAT | NAT_TRAVERSAL that end is NOT behind NAT | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected | NAT_T_WITH_KA detected | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_SIG (0x9) | ID type: ID_FQDN (0x2) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 9:ISAKMP_NEXT_SIG | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) | my identity 77 65 73 74 | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 | started looking for secret for @west->@east of kind PKK_RSA | actually looking for secret for @west->@east of kind PKK_RSA | line 1: key type PKK_RSA(@west) to type PKK_RSA | 1: compared key (none) to @west / @east -> 002 | 2: compared key (none) to @west / @east -> 002 | line 1: match=002 | match 002 beats previous best_match 000 match=0x556679361b58 (line=1) | concluding with best_match=002 best=0x556679361b58 (lineno=1) | ***emit ISAKMP Signature Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Signature Payload (9:ISAKMP_NEXT_SIG) | next payload chain: saving location 'ISAKMP Signature Payload'.'next payload type' in 'reply packet' | emitting 274 raw bytes of SIG_I into ISAKMP Signature Payload | SIG_I 58 ce 11 42 c9 66 18 10 d7 ad a5 54 0f b0 ac a8 | SIG_I 20 5e 9b e6 96 00 c0 7d 01 51 70 8b 34 25 6b d1 | SIG_I 47 01 18 45 ef 50 9b cc a0 b8 db 34 29 54 22 59 | SIG_I 62 09 60 72 43 68 06 4e 77 c2 a4 5d 23 ee b6 bb | SIG_I 38 de 4d cf 31 94 38 0d 7b 97 4d 19 06 6e 50 c3 | SIG_I 0c 2d 7f a1 df 36 01 a2 67 36 10 5a e9 6f 3d 24 | SIG_I 90 63 9e 5d 7c 9b 94 fb 5f a7 18 de 7f 15 53 80 | SIG_I 19 a2 5d 5f af 6b 11 65 b0 e1 a1 03 0a 9c e9 52 | SIG_I 32 38 bd 0a 79 7f 1a 03 b5 40 cc ba 7d 4c 2c 81 | SIG_I 86 e4 34 8f 4b dd 78 1f 7e 5e 15 d1 74 74 01 70 | SIG_I 24 0f 60 9b 4f d2 58 8f d1 72 56 3a 3e 67 03 22 | SIG_I e8 e0 26 30 e5 35 24 ca 48 e7 1f 1b 38 1c 0f bb | SIG_I fd 95 63 ed b0 ec b6 fb 10 09 e0 10 45 fa 63 2c | SIG_I 0e 21 dd 2e 7c 8e 75 6b 81 00 90 bc 42 b9 e8 58 | SIG_I a1 4a 8f 18 2e 12 9a 21 d3 3f f8 0a 7c a1 38 7f | SIG_I ec 35 e1 32 9d 43 e0 7e 9c c7 b8 ca dc d7 06 e9 | SIG_I a2 e5 1e e6 4e e1 fc 79 f1 ac c1 51 8c aa f6 0e | SIG_I c2 f2 | emitting length of ISAKMP Signature Payload: 278 | Not sending INITIAL_CONTACT | emitting 14 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 332 | complete v1 state transition with STF_OK | [RE]START processing: state #1 connection "west-east" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) | #1 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 | parent state #1: MAIN_I2(open IKE SA) => MAIN_I3(open IKE SA) | event_already_set, deleting event | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f6504002888 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x556679409068 | sending reply packet to 192.1.2.23:500 (from 192.1.2.45:500) | sending 332 bytes for STATE_MAIN_I2 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 05 10 02 01 00 00 00 00 00 00 01 4c 9f f1 f0 8d | f0 69 e6 de af 5e 8a 2e d5 9d df 88 35 18 c0 ce | fd 8d a6 87 b1 10 3f 6e ec 74 1f df 33 92 dd c0 | d8 71 68 65 f8 f7 02 01 8d 14 38 fd 4a 12 1c 50 | 84 bc af d3 40 5f f7 2d cb 34 31 a1 8b 54 75 b5 | 54 11 9c 01 2d eb c8 82 5e a7 e0 6e b6 2c a1 f9 | 6d 0c ae 44 60 5d f1 91 cc 49 90 03 96 8e 79 42 | e5 bd fb 99 a7 99 84 1c 4e 1e f0 07 65 6c aa b9 | 96 30 29 cb ce db 42 e4 8a 91 af 32 9a b3 cc 18 | 31 ee c3 69 ac ab 9c 59 68 94 45 b9 1e 34 8f 62 | 7f 5f 87 86 a6 94 fe 86 b1 69 63 9b 07 a7 fb 99 | 67 33 54 3b 44 02 e2 d3 c1 47 56 52 5e de 29 d6 | 63 fe 08 c5 93 3a d1 3d 97 48 13 e4 fd f4 9a fd | 03 3d f4 42 f6 20 15 a8 e7 f4 3d e8 fd 26 19 6b | e6 18 e6 0e 76 8b 8e da b3 d4 39 b9 82 ec 13 c0 | 42 99 90 32 85 a6 68 96 06 48 b3 8e fd 22 69 14 | 7b 68 de cc 23 c8 80 f1 5e 92 ae a5 91 88 3b e9 | aa dd 84 c2 f0 51 14 b4 b5 8f 44 e2 4b 90 c5 94 | fc fd ea 18 24 f5 63 be f1 53 ad ac 63 73 92 2a | 57 12 d0 21 e2 d5 4d 44 5e 6c ca 0b | !event_already_set at reschedule | event_schedule: new EVENT_RETRANSMIT-pe@0x556679409068 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 | libevent_malloc: new ptr-libevent@0x5566794093e8 size 128 | #1 STATE_MAIN_I3: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29656.883949 "west-east" #1: STATE_MAIN_I3: sent MI3, expecting MR3 | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | resume sending helper answer for #1 suppresed complete_v1_state_transition() | #1 spent 3.14 milliseconds in resume sending helper answer | stop processing: state #1 connection "west-east" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f64fc000f48 | spent 0.00229 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 332 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 05 10 02 01 00 00 00 00 00 00 01 4c 32 86 18 12 | 2f 38 35 7b 0e b2 df 37 50 83 f5 85 cb cb 3a 01 | e8 18 b8 61 ff 10 89 a7 b2 74 21 7c a9 bd 38 17 | 5c 8f 78 02 d2 bc 23 cb f9 f6 2a ab cb 57 76 47 | 49 ce 00 bb 4b 6b 8b 89 e3 70 1f 52 ba ae f4 e7 | de 78 61 a1 28 c1 28 35 ca 36 b3 f4 a9 c9 14 1f | 46 30 7f 38 48 c5 7d e8 0a 01 f8 67 5d 0a 09 d1 | cb 55 cf 93 36 a9 1e 4e e1 b4 4f 2f 70 28 c4 8d | e4 12 9f b3 1b 83 c8 6c 3e 9e b0 6d 62 43 80 f8 | 8e b6 af 1a c6 ee 51 78 33 ae 84 36 ec 9f 56 92 | 62 97 db 7e 4b b7 3b c4 64 f4 e4 8d 2c b0 99 27 | fd ff 9c 31 26 78 22 1a b2 03 71 c3 17 f2 d0 8a | 60 1a 53 f6 72 29 13 ec 12 a3 9d dd 67 59 96 62 | 3d 69 a2 82 19 87 31 6d b2 04 ca c6 a8 bf af 69 | de bf 98 78 8a 47 9c 83 4f 62 dd 64 3d 5f cd 3d | c8 c1 b5 e1 5e 22 94 2c a0 17 8c 90 b8 2b 93 47 | 97 92 9e 8a 0a 43 fe e4 28 aa 4e 33 71 7c 03 3a | 60 2a d8 3d 25 3a f3 d5 cf e3 c6 37 5d b6 ad a7 | bd c4 f3 fa d0 15 78 6e fa cb 0e 1e 6d d1 50 b2 | bb 4c 5b 1a 42 ac 2a 27 b3 28 11 b1 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_ID (0x5) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 0 (0x0) | length: 332 (0x14c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) | State DB: found IKEv1 state #1 in MAIN_I3 (find_state_ikev1) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x220 opt: 0x20c0 | ***parse ISAKMP Identification Payload: | next payload type: ISAKMP_NEXT_SIG (0x9) | length: 12 (0xc) | ID type: ID_FQDN (0x2) | DOI specific A: 0 (0x0) | DOI specific B: 0 (0x0) | obj: 65 61 73 74 | got payload 0x200 (ISAKMP_NEXT_SIG) needed: 0x200 opt: 0x20c0 | ***parse ISAKMP Signature Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 278 (0x116) | removing 14 bytes of padding | message 'main_inR3' HASH payload not checked early "west-east" #1: Peer ID is ID_FQDN: '@east' | X509: no CERT payloads to process | required RSA CA is '%any' | checking RSA keyid '@east' for match with '@east' | key issuer CA is '%any' | an RSA Sig check passed with *AQO9bJbr3 [preloaded key] | #1 spent 0.0578 milliseconds in try_all_RSA_keys() trying a pubkey "west-east" #1: Authenticated using RSA | FOR_EACH_CONNECTION_... in ISAKMP_SA_established | complete v1 state transition with STF_OK | [RE]START processing: state #1 connection "west-east" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) | #1 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 | parent state #1: MAIN_I3(open IKE SA) => MAIN_I4(established IKE SA) | event_already_set, deleting event | state #1 requesting EVENT_RETRANSMIT to be deleted | #1 STATE_MAIN_I4: retransmits: cleared | libevent_free: release ptr-libevent@0x5566794093e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x556679409068 | !event_already_set at reschedule | event_schedule: new EVENT_SA_REPLACE-pe@0x556679409068 | inserting event EVENT_SA_REPLACE, timeout in 2607 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f64fc000f48 size 128 | pstats #1 ikev1.isakmp established "west-east" #1: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} | DPD: dpd_init() called on ISAKMP SA | DPD: Peer supports Dead Peer Detection | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | unpending state #1 | creating state object #2 at 0x55667940a628 | State DB: adding IKEv1 state #2 in UNDEFINED | pstats #2 ikev1.ipsec started | duplicating state object #1 "west-east" as #2 for IPSEC SA | #2 setting local endpoint to 192.1.2.45:500 from #1.st_localport (in duplicate_state() at state.c:1484) | suspend processing: state #1 connection "west-east" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) | start processing: state #2 connection "west-east" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) | child state #2: UNDEFINED(ignore) => QUICK_I1(established CHILD SA) "west-east" #2: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#1 msgid:a8b2357c proposal=defaults pfsgroup=MODP2048} | adding quick_outI1 KE work-order 3 for state #2 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f6504002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x556679409188 size 128 | stop processing: state #2 connection "west-east" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) | resume processing: state #1 connection "west-east" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) | unqueuing pending Quick Mode with 192.1.2.23 "west-east" | crypto helper 4 resuming | removing pending policy for no connection {0x5566793fb448} | crypto helper 4 starting work-order 3 for state #2 | close_any(fd@24) (in release_whack() at state.c:654) | crypto helper 4 doing build KE and nonce (quick_outI1 KE); request ID 3 | #1 spent 0.334 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.484 milliseconds in comm_handle_cb() reading and processing packet | crypto helper 4 finished build KE and nonce (quick_outI1 KE); request ID 3 time elapsed 0.000574 seconds | (#2) spent 0.579 milliseconds in crypto helper computing work-order 3: quick_outI1 KE (pcr) | crypto helper 4 sending results from work-order 3 for state #2 to event queue | scheduling resume sending helper answer for #2 | libevent_malloc: new ptr-libevent@0x7f6500003f28 size 128 | libevent_realloc: release ptr-libevent@0x5566793ea5d8 | libevent_realloc: new ptr-libevent@0x7f6500003e78 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 3 | calling continuation function 0x5566786aeb50 | quick_outI1_continue for #2: calculated ke+nonce, sending I1 | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2830251388 (0xa8b2357c) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | emitting quick defaults using policy none | empty esp_info, returning defaults for ENCRYPT | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ikev1_out_sa pcn: 0 has 1 valid proposals | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 2 (0x2) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | netlink_get_spi: allocated 0x432e0e59 for esp.0@192.1.2.45 | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload | SPI 43 2e 0e 59 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T (0x3) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ESP): 32 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ESP transform number: 1 (0x1) | ESP transform ID: ESP_3DES (0x3) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | emitting length of ISAKMP Transform Payload (ESP): 28 | emitting length of ISAKMP Proposal Payload: 72 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 84 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload | Ni 2d 10 05 ff 14 b2 4b 97 8a 7c e6 a7 62 21 bd de | Ni 2c d8 a0 c1 a0 45 f1 8e 18 53 99 19 77 92 c9 44 | emitting length of ISAKMP Nonce Payload: 36 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value 79 77 54 25 65 47 ee c3 5a cf 17 e9 6a 18 d4 c9 | keyex value ed 3a 59 45 e9 b6 d6 2c 53 55 20 99 17 17 82 f5 | keyex value 63 0c 52 8a b3 f2 fe 99 e7 fd 04 d9 f6 15 05 3d | keyex value 14 47 17 33 e8 f3 66 ba e7 f5 6f 83 da 61 58 75 | keyex value b3 be 1c fd d2 e4 ee 16 57 cc 1a 66 09 31 e6 07 | keyex value 20 cf f7 ae ef 06 b7 4f 7e db 54 4e d2 83 6d 5e | keyex value 0a 48 35 c9 23 ba 7a 42 1b ed cf 65 40 0f ea 7a | keyex value 93 40 7e a1 06 d9 c4 f4 a6 bc fd e7 c8 b8 6d ac | keyex value 1e a9 cb ae d6 ed 9e 67 b7 19 10 05 d9 b6 4c 95 | keyex value 67 e3 3d 1f 54 98 99 0f 09 41 eb 38 17 4e d8 bc | keyex value fe bc c7 21 54 b7 78 70 9c c4 ab 2b 8a de 21 7f | keyex value d5 9d 0c ef 05 f3 89 65 dd cf f6 f1 7b 6f c0 fe | keyex value 78 89 61 a2 34 dc d0 5f 92 86 c9 03 aa e1 ec ba | keyex value bc b2 13 9e 27 89 c4 b9 da aa bf 54 47 21 43 4d | keyex value 19 09 20 ab e1 98 20 7e 25 ee a3 25 8c dd c1 2c | keyex value 72 e3 a7 9c e8 c3 a5 c3 f7 38 6d d4 ee 48 82 14 | emitting length of ISAKMP Key Exchange Payload: 260 | outI1 HASH(1): | f4 04 4f 31 cf 05 a0 0e d5 c7 1f d1 df 3f d9 7e | fa 95 92 cb 05 86 9a 8c e6 6b 22 6b 33 a6 a5 b6 | no IKEv1 message padding required | emitting length of ISAKMP Message: 444 | sending 444 bytes for reply packet from quick_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #2) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 20 01 a8 b2 35 7c 00 00 01 bc 1f db 17 03 | d6 79 d4 e6 f5 b2 ea f5 51 2b 8b b1 51 41 16 dd | 4b d6 4c 1d be 09 78 bc 81 88 1b 26 a5 33 9e d1 | dd 44 7a 17 a7 f3 c8 dc a3 37 1a 18 c1 f7 78 66 | 4f b2 c5 14 3d ed de 04 f8 73 6b 1f 60 ea 3d f7 | 16 06 03 e2 fb c5 ff 4e 52 d0 07 b5 a4 c5 eb 38 | 8f b1 c8 b6 b2 e6 eb 23 79 c4 b7 c5 30 a5 fd 90 | 70 13 66 bd d3 2c 1f e1 b4 66 12 b0 82 6f cb 43 | 55 86 18 19 f3 ff 32 51 50 d2 00 29 96 06 08 61 | 4c 40 21 fe a1 98 88 2a 8f 9c 4d 81 4f 39 ff 54 | 72 69 48 68 8f 30 ee 68 f1 2a e9 25 9a 9a 6d b7 | 1d a9 73 46 fc 84 62 73 9a be 4a ff 4a 6c b1 9b | 8f 38 a8 f1 15 61 e7 4f 8f 8b 4f ea 61 15 19 cc | 60 de 68 3c d2 96 ac b7 7e 7f 5b e6 b1 f7 13 2b | ef 6b ea 7b 86 0d 43 f8 f9 66 c3 6a 04 6c aa 56 | 87 35 18 6f c3 25 0c 4b 13 99 5d 9e 18 13 53 13 | 8e 9b 78 5b b6 0b d1 a8 3f 0e 6c dd 11 03 4d 10 | 58 24 16 31 15 7f 4f 64 09 4b 27 97 a4 30 2f 29 | ee 58 49 93 df c7 32 53 f6 38 08 1e a1 1f 52 26 | 14 c5 6e 9a a2 b2 20 2d 76 9b 5b ae 09 b3 3f 6a | 8a 9e af 71 65 82 ee f8 2a 2e 1b 7d 74 d0 c5 bf | 54 14 49 18 24 10 40 8d 8c f0 60 b2 ef 8a 54 ce | 6b 16 62 d5 14 4b 89 83 80 ce d2 ee ee 88 7d 68 | e5 3f 04 82 b0 e0 51 4f ad 0f f9 ba 2d 26 cb df | 6a d6 da 88 e5 88 ff 40 da 1e 60 b0 80 14 1c c9 | 2f c1 0d b6 b1 8d ae 0f 7e 3e 0f ab 78 72 22 61 | b3 98 d8 be 59 10 90 1a 5d 40 81 2f | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x556679409188 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f6504002b78 | event_schedule: new EVENT_RETRANSMIT-pe@0x7f6504002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #2 | libevent_malloc: new ptr-libevent@0x5566794093e8 size 128 | #2 STATE_QUICK_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29656.888805 | resume sending helper answer for #2 suppresed complete_v1_state_transition() | #2 spent 0.415 milliseconds in resume sending helper answer | stop processing: state #2 connection "west-east" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f6500003f28 | spent 0.00215 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 428 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 20 01 a8 b2 35 7c 00 00 01 ac 86 43 71 5b | 33 25 a6 b0 3e 5e 3a cb 5b 85 35 0f 67 83 65 6c | 54 c0 e9 10 6a 93 54 fc ca c1 e4 e3 30 a7 dc 61 | d3 af 32 0b 56 6e f8 aa f5 e4 8a 23 53 cd 8c dc | 51 57 7a 8e 5b 92 96 7a 34 9f 54 3e e6 15 c9 a5 | 48 86 ea de cd a8 16 3a cd b2 d1 5f df 33 b4 62 | f6 87 6f fc 59 78 f7 15 e9 c3 fe 53 a1 ed 03 31 | 13 e2 70 d8 48 e5 96 da a5 14 de 9a 5a 44 4d be | 08 df 44 4f 17 d4 f3 6b 5f 15 ae fd 94 36 85 55 | 1a 37 b6 fa 97 df de 25 64 67 fd d9 ae af ea ed | 15 07 87 f1 11 cc d4 3b 2e 3d f1 52 ce c3 16 5c | cf 3d c8 4a 1c ad b9 d8 e9 c4 91 81 2c eb 46 4e | e7 83 93 a5 2e 1a e9 96 82 52 5b 8a 9f a2 89 b1 | 3e a9 ef f8 63 0f b3 26 d8 e4 4f 13 31 88 20 bb | e0 87 4f ba 5c d1 c3 f7 8c dd 29 5a 06 e7 22 16 | c6 51 26 ee d3 ea 9b d0 df 3c cc 4e cc 4a 9e 08 | d4 dd 62 61 97 88 4f b5 3e a3 64 79 60 a2 0e cf | c2 96 c5 41 d1 3d a8 b9 21 02 2f 26 96 b1 91 6c | 6f f6 df fa 36 42 c9 e9 2e 73 ea e4 65 73 e2 2a | 08 a6 8f 3f 5f ef 9b 0b f4 03 24 37 a1 55 3e 59 | 57 25 ae b2 24 a6 7d 0c 38 e4 61 4d ca f6 53 b8 | b6 9c 23 2a 28 da 9d 90 9a e8 10 bd dd cb 99 cf | b1 40 e0 40 3e eb 4a 4a 3e 83 78 5e 73 5c f1 a0 | f6 bc 8c 69 4b 83 40 09 22 01 a3 e3 4d 9a 46 65 | 90 02 b8 f8 8d 27 6d d2 a4 d9 b6 20 6b 1f 32 58 | 3b 88 29 66 ed 05 35 6b 2b 24 de 6a | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2830251388 (0xa8b2357c) | length: 428 (0x1ac) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) | State DB: found IKEv1 state #2 in QUICK_I1 (find_state_ikev1) | start processing: state #2 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1633) | #2 is idle | #2 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_SA (0x1) | length: 36 (0x24) | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | length: 56 (0x38) | DOI: ISAKMP_DOI_IPSEC (0x1) | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030 | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | length: 36 (0x24) | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 260 (0x104) | removing 12 bytes of padding | quick_inR1_outI2 HASH(2): | 64 e8 3a 89 db 3a d5 27 91 31 a8 d0 c3 b9 c8 75 | fd 44 97 35 6f 4c 65 7a d9 f0 46 34 65 cf 61 d5 | received 'quick_inR1_outI2' message HASH(2) data ok | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 44 (0x2c) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 1 (0x1) | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI | SPI 70 3a b8 9d | *****parse ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | ESP IPsec Transform verified unconditionally; no alg_info to check against | started looking for secret for @west->@east of kind PKK_PSK | actually looking for secret for @west->@east of kind PKK_PSK | line 1: key type PKK_PSK(@west) to type PKK_RSA | concluding with best_match=000 best=(nil) (lineno=-1) | no PreShared Key Found | adding quick outI2 DH work-order 4 for state #2 | state #2 requesting EVENT_RETRANSMIT to be deleted | #2 STATE_QUICK_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x5566794093e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f6504002b78 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f6504002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f6500003f28 size 128 | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) | suspending state #2 and saving MD | #2 is busy; has a suspended MD | crypto helper 5 resuming | #2 spent 0.125 milliseconds in process_packet_tail() | crypto helper 5 starting work-order 4 for state #2 | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #2 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | crypto helper 5 doing compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 4 | spent 0.312 milliseconds in comm_handle_cb() reading and processing packet | crypto helper 5 finished compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 4 time elapsed 0.000545 seconds | (#2) spent 0.548 milliseconds in crypto helper computing work-order 4: quick outI2 DH (pcr) | crypto helper 5 sending results from work-order 4 for state #2 to event queue | scheduling resume sending helper answer for #2 | libevent_malloc: new ptr-libevent@0x7f64f4001f78 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 4 | calling continuation function 0x5566786aeb50 | quick_inR1_outI2_continue for #2: calculated ke+nonce, calculating DH | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2830251388 (0xa8b2357c) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | quick_inR1_outI2 HASH(3): | 4a 77 04 0c a7 dd 29 e5 7c 9e 6f d4 25 79 e2 9f | 5c ce bc eb 57 a9 c2 9d 38 0e b3 30 5e 13 d8 c6 | compute_proto_keymat: needed_len (after ESP enc)=16 | compute_proto_keymat: needed_len (after ESP auth)=36 | install_ipsec_sa() for #2: inbound and outbound | could_route called for west-east (kind=CK_PERMANENT) | FOR_EACH_CONNECTION_... in route_owner | conn west-east mark 0/00000000, 0/00000000 vs | conn west-east mark 0/00000000, 0/00000000 | route owner of "west-east" unrouted: NULL; eroute owner: NULL | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'west-east' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.703ab89d@192.1.2.23 included non-error error | set up outgoing SA, ref=0/0 | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'west-east' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.432e0e59@192.1.2.45 included non-error error | priority calculation of connection "west-east" is 0xfdfdf | add inbound eroute 192.1.2.23/32:0 --0-> 192.1.2.45/32:0 => tun.10000@192.1.2.45 (raw_eroute) | IPsec Sa SPD priority set to 1040351 | raw_eroute result=success | set up incoming SA, ref=0/0 | sr for #2: unrouted | route_and_eroute() for proto 0, and source port 0 dest port 0 | FOR_EACH_CONNECTION_... in route_owner | conn west-east mark 0/00000000, 0/00000000 vs | conn west-east mark 0/00000000, 0/00000000 | route owner of "west-east" unrouted: NULL; eroute owner: NULL | route_and_eroute with c: west-east (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2 | priority calculation of connection "west-east" is 0xfdfdf | eroute_connection add eroute 192.1.2.45/32:0 --0-> 192.1.2.23/32:0 => tun.0@192.1.2.23 (raw_eroute) | IPsec Sa SPD priority set to 1040351 | raw_eroute result=success | running updown command "ipsec _updown" for verb up | command executing up-host | executing up-host: PLUTO_VERB='up-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.1.2.45/32' PLUTO_MY_CLIENT_NET='192.1.2.45' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x703ab89 | popen cmd is 1037 chars long | cmd( 0):PLUTO_VERB='up-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_INTE: | cmd( 80):RFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@wes: | cmd( 160):t' PLUTO_MY_CLIENT='192.1.2.45/32' PLUTO_MY_CLIENT_NET='192.1.2.45' PLUTO_MY_CLI: | cmd( 240):ENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQI: | cmd( 320):D='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUT: | cmd( 400):O_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIE: | cmd( 480):NT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER: | cmd( 560):_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+: | cmd( 640):TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK: | cmd( 720):_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' : | cmd( 800):PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_: | cmd( 880):SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING: | cmd( 960):='no' VTI_SHARED='no' SPI_IN=0x703ab89d SPI_OUT=0x432e0e59 ipsec _updown 2>&1: | route_and_eroute: firewall_notified: true | running updown command "ipsec _updown" for verb prepare | command executing prepare-host | executing prepare-host: PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.1.2.45/32' PLUTO_MY_CLIENT_NET='192.1.2.45' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN | popen cmd is 1042 chars long | cmd( 0):PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO: | cmd( 80):_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID=: | cmd( 160):'@west' PLUTO_MY_CLIENT='192.1.2.45/32' PLUTO_MY_CLIENT_NET='192.1.2.45' PLUTO_M: | cmd( 240):Y_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA: | cmd( 320):_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east': | cmd( 400): PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER: | cmd( 480):_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO: | cmd( 560):_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENC: | cmd( 640):RYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIN: | cmd( 720):D='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO: | cmd( 800):='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO: | cmd( 880):_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_RO: | cmd( 960):UTING='no' VTI_SHARED='no' SPI_IN=0x703ab89d SPI_OUT=0x432e0e59 ipsec _updown 2>: | cmd(1040):&1: | running updown command "ipsec _updown" for verb route | command executing route-host | executing route-host: PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.1.2.45/32' PLUTO_MY_CLIENT_NET='192.1.2.45' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x7 | popen cmd is 1040 chars long | cmd( 0):PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west-east' PLUTO_I: | cmd( 80):NTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@: | cmd( 160):west' PLUTO_MY_CLIENT='192.1.2.45/32' PLUTO_MY_CLIENT_NET='192.1.2.45' PLUTO_MY_: | cmd( 240):CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_R: | cmd( 320):EQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' P: | cmd( 400):LUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_C: | cmd( 480):LIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_P: | cmd( 560):EER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRY: | cmd( 640):PT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND=: | cmd( 720):'CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO=': | cmd( 800):0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_C: | cmd( 880):FG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUT: | cmd( 960):ING='no' VTI_SHARED='no' SPI_IN=0x703ab89d SPI_OUT=0x432e0e59 ipsec _updown 2>&1: | route_and_eroute: instance "west-east", setting eroute_owner {spd=0x556679408928,sr=0x556679408928} to #2 (was #0) (newest_ipsec_sa=#0) | #1 spent 1.68 milliseconds in install_ipsec_sa() | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 76 | inR1_outI2: instance west-east[0], setting IKEv1 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1 | DPD: dpd_init() called on IPsec SA | State DB: found IKEv1 state #1 in MAIN_I4 (find_state_ikev1) | event_schedule: new EVENT_DPD-pe@0x7f6500004218 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b118 size 128 | complete v1 state transition with STF_OK | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) | #2 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | child state #2: QUICK_I1(established CHILD SA) => QUICK_I2(established CHILD SA) | event_already_set, deleting event | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f6500003f28 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f6504002b78 | sending reply packet to 192.1.2.23:500 (from 192.1.2.45:500) | sending 76 bytes for STATE_QUICK_I1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #2) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 20 01 a8 b2 35 7c 00 00 00 4c c0 8f 16 c6 | 16 ae 05 70 e7 d5 1f 07 df 4b 4a 7e 56 4f 58 15 | 5f 71 f4 a7 a5 b0 09 15 4f 5f ad 18 54 fe 59 07 | 59 04 3d 74 88 78 5a 69 2b 6e a1 35 | !event_already_set at reschedule | event_schedule: new EVENT_SA_REPLACE-pe@0x7f6504002b78 | inserting event EVENT_SA_REPLACE, timeout in 28048 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f6500003f28 size 128 | pstats #2 ikev1.ipsec established | NAT-T: encaps is 'auto' "west-east" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x703ab89d <0x432e0e59 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=active} | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | close_any(fd@25) (in release_whack() at state.c:654) | resume sending helper answer for #2 suppresed complete_v1_state_transition() | #2 spent 2.01 milliseconds in resume sending helper answer | stop processing: state #2 connection "west-east" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f64f4001f78 | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00401 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00248 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.0025 milliseconds in signal handler PLUTO_SIGCHLD | timer_event_cb: processing event@0x7f6500004218 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | DPD: out event not sent, phase 2 active | event_schedule: new EVENT_DPD-pe@0x55667940c898 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f64f4001f78 size 128 | libevent_free: release ptr-libevent@0x55667940b118 | free_event_entry: release EVENT_DPD-pe@0x7f6500004218 | #2 spent 0.103 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_STATE_... in show_traffic_status (sort_states) | FOR_EACH_STATE_... in sort_states | get_sa_info esp.432e0e59@192.1.2.45 | get_sa_info esp.703ab89d@192.1.2.23 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0687 milliseconds in whack | timer_event_cb: processing event@0x55667940c898 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | DPD: out event not sent, phase 2 active | event_schedule: new EVENT_DPD-pe@0x7f6500004218 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b118 size 128 | libevent_free: release ptr-libevent@0x7f64f4001f78 | free_event_entry: release EVENT_DPD-pe@0x55667940c898 | #2 spent 0.0615 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f6500004218 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x55667940c898 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f64f4001f78 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x55667938e828 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x556679413988 size 128 | DPD: sending R_U_THERE 23768 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1790506533 (0x6ab8f625) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c d8 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 5a 1d 93 37 f6 39 ca 54 d1 6b e6 fd 75 2b 68 d7 | d4 af d9 dd f1 82 14 cf 92 e9 87 3b 3b a7 48 25 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 6a b8 f6 25 00 00 00 6c 08 e9 eb 78 | 0c 17 1a 99 ce ad 2c 66 c6 9d 39 50 31 c7 ad d2 | e3 b0 ab 54 0d 51 8b cf 31 06 25 6a 33 46 f5 de | 95 c1 13 e5 26 d2 37 ce 16 85 3a 0d 88 fd cd 0d | f1 37 04 16 b9 36 dc 9c 6c c2 51 4b 6f 9c 1e 12 | 49 fe a4 21 1c 71 f5 97 a8 2d b8 de | libevent_free: release ptr-libevent@0x55667940b118 | free_event_entry: release EVENT_DPD-pe@0x7f6500004218 | #2 spent 0.345 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 d1 a2 cb 0d 00 00 00 6c 04 2d cc 4c | c9 87 26 13 1f 19 6e 34 b9 a3 1f 94 a4 0a 6a ef | 87 12 1b 8e 28 c1 cd 4c 35 22 0b cc 46 ec 30 6e | 96 96 6e 73 0a ef 77 34 f4 d5 04 fa 3d 31 8b 84 | 9b aa 08 5f f9 0c 65 24 45 0f 6d e8 c0 18 6c e5 | b1 4a d0 23 21 a8 09 d5 55 ae df 6c | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3517106957 (0xd1a2cb0d) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | c2 9a 8b dd df d0 a8 7a d6 d3 d6 d8 6b c1 4c f3 | f2 98 ee fe da 47 f2 f7 31 42 4f 4f 9e e6 84 da | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c d8 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23768 expected: 23768 (state=#1) | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x55667938e828 be deleted | libevent_free: release ptr-libevent@0x556679413988 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x55667938e828 | complete v1 state transition with STF_IGNORE | #1 spent 0.0151 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.128 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x55667940c898 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x7f6500004218 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x556679414958 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x55667941b998 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x55667940b1c8 size 128 | DPD: sending R_U_THERE 23769 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3488176806 (0xcfe95aa6) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c d9 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 3f 8a d1 0b d0 c4 71 f5 06 f0 a8 2e bc b0 50 0c | 06 37 f5 7c 36 f6 68 91 a1 3f b0 a7 fc 7a cb 14 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 cf e9 5a a6 00 00 00 6c 63 8c 4a 71 | f2 38 d7 0b ea 4a f6 2f f4 28 fe 3f 41 58 68 1e | 76 28 d4 33 04 ae 4c 12 a3 62 f2 6b 2a 71 4e e6 | 51 0c 19 01 85 f7 ed 59 3c 1d 2c 1a a6 14 e6 3b | 97 9b ed 56 37 78 c5 74 7a f8 c9 c9 8a cb ea 5d | 6c 14 46 5a bb 6b d7 05 39 4d 25 93 | libevent_free: release ptr-libevent@0x7f64f4001f78 | free_event_entry: release EVENT_DPD-pe@0x55667940c898 | #2 spent 0.183 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00142 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 0b 69 22 93 00 00 00 6c 74 0d 56 86 | b6 c8 49 8f ef d8 15 bd 1d fa 05 b7 3a fe 82 f1 | 4f c8 65 70 fd e7 79 10 c2 3e bc 74 6d 62 c6 b2 | 65 93 14 c6 e4 29 c3 a7 dc 31 35 fc 16 e6 d9 87 | 1d 13 1a 8a 27 73 c4 28 34 d7 95 72 00 a7 6d 1b | 3f 7a 0f 36 41 bf a1 b1 e0 4d f7 a1 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 191439507 (0xb692293) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | b5 72 b1 2c c7 6b 72 83 3b ff 82 1c b2 14 7c 58 | f7 e6 94 61 a1 15 f7 67 d1 75 ed c8 54 fb cb d7 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c f1 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15601 monotime:29668.907102 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 103640066 (0x62d6c02) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c f1 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 8d 88 c2 90 83 14 99 ca 4d 67 4f f5 d4 f4 0d b8 | b0 ff a1 01 ee 7d e5 d1 78 bc 00 74 8a 0f 6f b9 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 06 2d 6c 02 00 00 00 6c e9 bb 18 c6 | 72 18 be 47 a4 f3 8d 50 c4 10 0d 0f 2a f7 8f f3 | e5 8d d7 67 7b 53 00 0a 53 51 6a 83 be 08 ec 6d | a3 78 7a 5b e8 fc d0 fc a6 6f 4c b2 51 7d 51 47 | 22 26 77 89 a5 31 e3 4e 7a 42 f3 cc df 0c e2 84 | 05 b8 38 c5 f9 b2 0d 2b 8e 4e 84 16 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x55667941b998 be deleted | libevent_free: release ptr-libevent@0x55667940b1c8 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x55667941b998 | complete v1 state transition with STF_IGNORE | #1 spent 0.0931 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.192 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00206 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 c7 51 6b 4c 00 00 00 6c c6 a5 a3 08 | bb d9 aa 70 15 c5 66 8e df 2f 19 57 5a 1b e0 3d | c4 93 dc 87 4e be 33 30 3a 63 0b d3 07 8c e2 e4 | c4 b6 ac 72 df c4 d3 5b 66 8c 59 ef 4d 6c 75 bb | ce 83 75 38 e6 65 99 fb 25 b5 e4 b4 47 95 35 d6 | e4 be 2e 9e b9 6e 84 57 e4 ba ed f7 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3344001868 (0xc7516b4c) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | ed b3 b3 d0 c2 9b 81 55 76 f2 79 c4 12 3a cd 66 | 0f 73 53 e4 da b8 07 4c 6d 42 8b 7e 98 47 7a dc | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c d9 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23769 expected: 23769 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00684 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.111 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00278 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 b0 b3 46 f9 00 00 00 6c 32 fc da 35 | 41 5d e1 c1 57 d9 de 3e 8b 1c 87 ca 81 39 4d 1b | a4 58 b8 f7 07 c0 72 90 e4 22 df c8 05 76 b3 e3 | 47 d9 56 a8 c3 56 61 a7 87 f4 a1 b4 56 74 67 b0 | 49 46 90 fe 78 76 3a 00 40 b3 cf 9e 98 d7 94 8a | 07 1c 9c d2 ea e3 68 73 d3 2d a7 3d | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2964539129 (0xb0b346f9) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | a3 d0 ac 0e 8f 98 4f 39 4d e7 42 b9 f9 d3 eb df | 61 3c 75 be 91 61 f1 02 1e 90 22 bf 72 94 6b a8 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c f2 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15602 monotime:29671.910189 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2535385507 (0x971ee9a3) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c f2 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 5a 3d 4e bb 9d 59 f0 81 b7 61 84 9a 90 1f 01 10 | 65 fb 73 50 16 61 24 0a 74 74 17 71 05 9b 07 d6 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 97 1e e9 a3 00 00 00 6c 35 44 28 0e | d2 f7 e0 d6 d0 b5 8a fb f7 10 75 b3 c9 1d 61 a8 | a9 fe 9e 73 1e 1d 22 bd 05 e1 c7 b9 5c 7c 04 0c | a2 a5 4a fb 40 f9 4b c8 92 96 91 2e 4c 1c cf 5b | 4d e6 a0 0d ee 1f ab 4f 2b 74 6b ae 03 94 90 f7 | 95 e8 9a af 0a 2e b1 7b 49 ec e8 09 | complete v1 state transition with STF_IGNORE | #1 spent 0.096 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.21 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x7f6500004218 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | DPD: not yet time for dpd event: 29671.910314 < 29674.910189 | event_schedule: new EVENT_DPD-pe@0x55667941b998 | inserting event EVENT_DPD, timeout in 2.999875 seconds for #2 | libevent_malloc: new ptr-libevent@0x556679411de8 size 128 | libevent_free: release ptr-libevent@0x556679414958 | free_event_entry: release EVENT_DPD-pe@0x7f6500004218 | #2 spent 0.0236 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.0038 milliseconds in global timer EVENT_SHUNT_SCAN | timer_event_cb: processing event@0x55667941b998 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x7f6500004218 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x556679414958 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x55667940c898 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x55667940b118 size 128 | DPD: sending R_U_THERE 23770 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1194211560 (0x472e38e8) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c da | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 66 7f e6 39 6c c7 9a 58 2f 10 e1 cf c6 51 7b aa | 1e ab 0b b9 53 82 59 23 bc d3 04 79 6e 53 c0 48 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 47 2e 38 e8 00 00 00 6c 0d 12 2f 84 | 23 df 69 6e 6f be b8 0a c0 e2 9f d6 17 e2 62 ec | 0a 9c 7d bc 4f 39 c1 5f 7a 8d f6 2d 5d e1 c1 04 | 87 83 a1 98 5c 21 b3 3e 34 cd 9a 94 41 f9 63 ff | 08 b4 19 d3 24 16 03 ab 8b da 7b fe c5 ac 9e 57 | fc 27 28 6f 79 27 6a 5b 33 7e 84 22 | libevent_free: release ptr-libevent@0x556679411de8 | free_event_entry: release EVENT_DPD-pe@0x55667941b998 | #2 spent 0.273 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00212 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 f9 d6 77 8b 00 00 00 6c c8 ec d1 f4 | 68 9f 3c 79 96 3b 71 1f e5 72 d8 45 37 9c 21 03 | a2 ee c9 4e 70 09 6c 40 39 d8 ad e9 58 67 1c 87 | 15 6e ae 25 c3 6b 36 96 9a c5 c4 12 95 0f a6 fd | 9d df 7f d3 36 77 59 80 49 7e e5 b6 55 23 af 04 | 31 46 a3 4f 5d be 9d 42 06 1b 0f a6 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4191582091 (0xf9d6778b) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | f1 1d 36 4a c6 16 01 22 d3 9a 91 8b 1d c2 ce 67 | cd e4 7c f0 1a af 3f 2a 96 bb 6c a1 c7 56 b8 b3 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c da | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23770 expected: 23770 (state=#1) | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x55667940c898 be deleted | libevent_free: release ptr-libevent@0x55667940b118 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x55667940c898 | complete v1 state transition with STF_IGNORE | #1 spent 0.0114 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.133 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | NAT-T keep-alive (bogus ?) should not reach this point. Ignored. Sender: 192.1.2.23:500 | spent 0.0259 milliseconds in comm_handle_cb() reading and processing packet | processing global timer EVENT_NAT_T_KEEPALIVE | FOR_EACH_STATE_... in nat_traversal_ka_event (for_each_state) | start processing: state #2 connection "west-east" from 192.1.2.23 (in for_each_state() at state.c:1575) | not behind NAT: no NAT-T KEEP-ALIVE required for conn west-east | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in nat_traversal_send_ka() at nat_traversal.c:774) | ka_event: send NAT-KA to 192.1.2.23:500 (state=#2) | sending NAT-T Keep Alive | sending 1 bytes for NAT-T Keep Alive through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #2) | ff | stop processing: state #2 connection "west-east" from 192.1.2.23 (in nat_traversal_send_ka() at nat_traversal.c:786) | processing: STOP state #0 (in for_each_state() at state.c:1577) | start processing: state #1 connection "west-east" from 192.1.2.23 (in for_each_state() at state.c:1575) | not behind NAT: no NAT-T KEEP-ALIVE required for conn west-east | stop processing: state #1 connection "west-east" from 192.1.2.23 (in for_each_state() at state.c:1577) | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds | spent 0.0918 milliseconds in global timer EVENT_NAT_T_KEEPALIVE | timer_event_cb: processing event@0x7f6500004218 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | DPD: out event not sent, phase 2 active | event_schedule: new EVENT_DPD-pe@0x55667940c898 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b1c8 size 128 | libevent_free: release ptr-libevent@0x556679414958 | free_event_entry: release EVENT_DPD-pe@0x7f6500004218 | #2 spent 0.0869 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00305 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 8e 3f f0 88 00 00 00 6c d8 e9 75 96 | e2 39 20 6d dc 1f d1 2a 6d bd 4d 5d 98 5e be d0 | 74 71 2d 34 34 f2 41 a9 50 c9 8a 10 74 53 9b f8 | d1 59 a8 86 d7 ce 1b 7f 66 0c 9d cc f5 09 29 71 | 36 62 de 0d dd 17 f3 9a 41 3d e0 c2 6c 05 a5 27 | f6 ac 16 14 e2 15 56 d4 e7 d9 ac fa | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2386555016 (0x8e3ff088) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | 61 55 f4 54 ab 5c 45 d9 0a 01 6b 86 3a 44 51 da | a1 12 f1 95 ba d4 7f 7d 90 4f 57 25 31 f0 10 00 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c f3 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15603 monotime:29680.915679 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2811276664 (0xa790ad78) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c f3 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | e0 21 ef b2 44 9a 3f 1f 8a 1c b5 0e aa 43 74 68 | 3c 7a 04 3a 3d 3b 6a be 58 63 21 06 79 3e 23 e8 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 a7 90 ad 78 00 00 00 6c 0a 70 e6 65 | 15 a1 cb e7 2b 2a d8 41 e3 56 2d f4 5a b8 59 4e | 8e 61 83 eb 7a 95 4d 12 d4 7a db 00 0b 37 f2 29 | 99 60 da b2 5f 4a 5b 85 63 c5 24 f9 5e 65 23 79 | b2 76 5e 90 48 f1 c4 7c 46 2c ce 06 d3 20 3f 8d | c3 40 b0 89 80 56 d8 e5 37 18 27 06 | complete v1 state transition with STF_IGNORE | #1 spent 0.103 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.285 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x55667940c898 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | DPD: not yet time for dpd event: 29680.91582 < 29683.915679 | event_schedule: new EVENT_DPD-pe@0x7f6500004218 | inserting event EVENT_DPD, timeout in 2.999859 seconds for #2 | libevent_malloc: new ptr-libevent@0x556679414958 size 128 | libevent_free: release ptr-libevent@0x55667940b1c8 | free_event_entry: release EVENT_DPD-pe@0x55667940c898 | #2 spent 0.024 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 9c f8 68 2e 00 00 00 6c 2a c4 38 79 | e7 82 cd 58 3e e2 4f 0b 94 ca cc 55 95 df cc 91 | 57 1f b3 19 13 29 cb 4a be f7 a8 d4 a3 4e e1 6c | fb 5d dc 03 d8 01 c0 bc 9e d1 3e 9b 5f 14 da fe | bb 31 92 8c fe 8a ab 09 b7 f1 f2 7f d1 52 fd 89 | 6c 24 ca d4 23 02 a8 22 e4 f8 e4 18 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2633525294 (0x9cf8682e) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | 50 79 63 af 45 1d b8 2e 62 2b 7c fe 44 d8 bd 76 | bd 10 89 50 97 52 37 4f 61 d5 38 46 fb 0d 91 bc | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c f4 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15604 monotime:29683.918462 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2957678354 (0xb04a9712) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c f4 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | dd 1f aa 69 cc f5 8f 74 e3 c6 f3 29 43 f7 5e 23 | 07 ed 3f f2 ea 37 74 9f 00 30 2c e7 2b c5 d1 e2 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 b0 4a 97 12 00 00 00 6c dd 96 fe bf | d3 ac 20 87 7b b7 ef 5c c9 17 9c aa 8a 7d 82 60 | 29 f7 6e c9 0b 3f f1 cc 2f ff cd 52 62 71 a4 4b | 5b 10 59 d2 bf 6b 30 88 e5 06 ec 4c 13 1a fa c4 | aa e1 55 55 4e 6c e6 d7 82 ad 54 14 9c aa 54 95 | e4 5b fe 04 e6 6d 43 b4 9b d4 3c ce | complete v1 state transition with STF_IGNORE | #1 spent 0.17 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.367 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x7f6500004218 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | DPD: not yet time for dpd event: 29683.918685 < 29686.918462 | event_schedule: new EVENT_DPD-pe@0x55667940c898 | inserting event EVENT_DPD, timeout in 2.999777 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b1c8 size 128 | libevent_free: release ptr-libevent@0x556679414958 | free_event_entry: release EVENT_DPD-pe@0x7f6500004218 | #2 spent 0.0411 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55667940c898 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x7f6500004218 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x556679414958 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x55667941b998 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x556679413988 size 128 | DPD: sending R_U_THERE 23771 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1913146701 (0x72084d4d) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c db | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 25 b8 a4 79 cb 14 6a 44 fa 3b bb c3 ec 17 7b d4 | 0b 8f eb bc f4 da d1 18 6b 07 a6 2f df 95 ca 96 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 72 08 4d 4d 00 00 00 6c fa 80 c8 e2 | ab 28 d4 5d f2 67 92 89 49 91 56 66 17 b1 ff 0c | 1d 8e b4 cc f3 de d9 35 97 b0 36 0e a7 34 53 ca | a1 df f4 c4 ab 75 8d d4 97 3b c8 d7 74 25 f2 d2 | 07 f2 0f 87 6f 1d 18 e1 ad c7 6a cc 4d 15 6d 5e | f5 17 cd 89 bb 90 37 ef 43 de 7f 38 | libevent_free: release ptr-libevent@0x55667940b1c8 | free_event_entry: release EVENT_DPD-pe@0x55667940c898 | #2 spent 0.187 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00213 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 79 59 f1 6c 00 00 00 6c 6b bb b7 5e | 94 38 34 9b 89 7f 0f 51 91 f9 aa a0 bf fa 94 2b | 47 c1 31 bd c5 ee 53 6a 3d 12 d8 6f 96 80 02 8c | 17 9b 9c 21 44 bd 56 0f 16 a4 2a ff cf 65 ad 4c | 7b 5c 1b e6 f3 cb b9 41 ce 03 b2 d5 6a f6 93 e1 | ce e3 75 0a 5b 7e 25 63 ff bf 12 91 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2035937644 (0x7959f16c) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | b6 93 1d 0e 0c f1 7f 4c be 28 19 b5 89 33 9c dc | bb d2 88 8d 9a 37 19 0e 17 87 df 92 6f 52 f9 84 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c db | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23771 expected: 23771 (state=#1) | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x55667941b998 be deleted | libevent_free: release ptr-libevent@0x556679413988 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x55667941b998 | complete v1 state transition with STF_IGNORE | #1 spent 0.0119 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.115 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x7f6500004218 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x55667941b998 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b118 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x55667940c898 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x556679411de8 size 128 | DPD: sending R_U_THERE 23772 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2430530900 (0x90def554) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c dc | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 0f 13 0b 0e cd 4f 47 f4 c5 3e 7e 2a 92 40 2a f2 | 74 9f f1 a8 b3 61 f5 1f 7a 98 9a 64 d3 91 0c 2e | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 90 de f5 54 00 00 00 6c 32 09 52 fb | 48 2d f1 21 3d 6c 57 dc 64 70 40 ea 07 d4 cf d8 | 38 bb 19 3d 53 74 b1 2f 59 34 d1 f7 b3 5a a0 74 | 12 0d 62 a3 27 7c a6 84 fc d4 b1 f7 02 95 a6 70 | 86 7c d3 f8 35 f4 fc 0a 49 28 c3 0c e3 d4 e5 a1 | ee 05 5b 90 fa c5 b6 ee 57 71 fb 3b | libevent_free: release ptr-libevent@0x556679414958 | free_event_entry: release EVENT_DPD-pe@0x7f6500004218 | #2 spent 0.272 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00211 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 57 06 83 44 00 00 00 6c a3 f8 f6 21 | 2d a2 ff 48 f0 ec 34 49 12 c2 55 bc 15 77 12 fa | 36 f6 d2 d1 2b 52 aa 1f 79 61 0e 7f 9d da 43 6a | 17 93 ec 53 a1 2a 2f be 2e d2 35 17 03 5f 03 13 | fc ab 0e 83 85 11 f6 0f 13 99 a1 e1 e2 e6 12 5f | 65 07 f5 8c 50 7f fb 30 1a 9c b3 a6 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1460044612 (0x57068344) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | 96 7b e5 52 3d 6a 4e 47 aa 13 ef f6 3a fb 4e 23 | e9 a7 2f bf 0e ae a8 1c 20 40 14 11 c2 2f 91 b4 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c f5 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15605 monotime:29689.924242 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4245919935 (0xfd1398bf) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c f5 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 04 97 24 0c b8 0c d9 59 bd 21 03 fb c3 c2 27 38 | dc 93 d3 12 a9 dc 45 41 0f 69 a8 2b 01 1b 49 e6 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 fd 13 98 bf 00 00 00 6c e5 96 46 08 | 07 f0 21 b1 fb d5 06 b6 58 c6 33 d3 6e e1 3a 74 | da fd fd 97 9c d5 46 18 69 c8 81 c0 a4 47 a1 e7 | a9 39 e4 b9 35 3b 5f 23 9d 65 6c a8 94 06 83 d0 | 72 f3 62 db 1c 83 12 80 88 e8 93 7a 13 37 49 13 | 7c 45 19 00 9f 95 0d 29 48 74 2f f3 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x55667940c898 be deleted | libevent_free: release ptr-libevent@0x556679411de8 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x55667940c898 | complete v1 state transition with STF_IGNORE | #1 spent 0.181 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.354 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00166 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 cc 39 43 a6 00 00 00 6c 4d 27 e1 8b | d2 1e 3a 4f 88 4b de f0 97 d3 fc e4 0f a2 5c 20 | bd 0d 40 63 42 49 e3 e9 f5 b9 ae 49 99 09 51 61 | 0f b8 84 99 40 01 a7 57 62 8e cc 8f 5f a3 7b 82 | 8d 42 c5 a5 91 dd 17 e3 8e 4f b3 bd db 6e 93 1c | 78 6f 56 93 5b 15 97 63 a4 bc 26 b0 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3426304934 (0xcc3943a6) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | c0 c7 c0 b9 68 6f 96 f2 cb e4 0e 27 9b c5 05 26 | 92 2d b4 5c 5a 2f 4c d1 7d 61 33 a2 2e b0 15 a1 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c dc | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23772 expected: 23772 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00936 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.152 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x55667941b998 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x55667940c898 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b1c8 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x7f6500004218 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x556679413988 size 128 | DPD: sending R_U_THERE 23773 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1760296553 (0x68ebfe69) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c dd | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 72 10 69 d5 8f 0b b5 cf 6b 22 c8 a9 90 6f eb b2 | 5f 14 dc 7f bf ce 33 9d 01 97 cc 26 1c 23 73 5d | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 68 eb fe 69 00 00 00 6c d6 c5 a6 9c | af ae 86 d8 2f 12 13 44 b2 5d 96 82 58 ef a7 37 | 8a 0b 6a e9 0e 35 93 b3 ff 53 b6 4e 97 8a 5a 69 | 2c ed 27 71 bb 21 c6 5b 56 29 d2 7a cf 4c d8 21 | 0b c6 a5 5a 06 44 4c 1b a9 e1 d9 7e 50 df b8 f1 | e4 fc 12 44 c6 cd 6d 2d 35 f4 ae 52 | libevent_free: release ptr-libevent@0x55667940b118 | free_event_entry: release EVENT_DPD-pe@0x55667941b998 | #2 spent 0.711 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.0054 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 cf 11 69 03 00 00 00 6c 47 db 72 9e | 51 9f 9b 86 e8 a2 f5 8d 2d 98 fb 77 13 8f 3a c9 | eb ed 49 b5 7e cc 03 26 8f ed 9f f7 43 8a bb 7f | 0f 7e 0e e5 28 4d a4 8f 94 42 6c cd 35 f3 8a a5 | f1 63 63 54 76 47 89 5e 29 ca 07 b6 a4 47 71 f2 | 51 86 aa 84 5b a6 65 de 70 39 dc 4a | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3474024707 (0xcf116903) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | 26 c2 65 b0 f0 8d 18 5e df f6 26 39 7b 23 45 86 | 68 39 62 56 55 48 e9 7b 8e e8 a5 b0 6f 6e f3 c3 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c f6 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15606 monotime:29692.928115 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3083343601 (0xb7c816f1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c f6 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | e4 45 18 8b da bf ae 08 96 9d 5c 17 f0 91 8c ad | 7a 36 bd 85 25 dd 4d 33 4e 13 b0 4a 25 6f e7 83 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 b7 c8 16 f1 00 00 00 6c 88 c1 35 57 | 42 44 21 f8 53 85 4f 54 57 ac 76 99 ce bf 3b f9 | 4b 25 9d 98 20 58 0f 12 85 75 d1 f9 b7 1a 93 31 | e3 91 54 4b 92 88 fd a7 83 52 49 5f 8d 15 42 31 | 1f 07 10 e0 1c 7d 9f 70 cd cb ec 45 e9 ca 71 d3 | 8d d5 b3 5c 52 51 56 fc a5 52 cc c1 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x7f6500004218 be deleted | libevent_free: release ptr-libevent@0x556679413988 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x7f6500004218 | complete v1 state transition with STF_IGNORE | #1 spent 0.443 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.919 milliseconds in comm_handle_cb() reading and processing packet | spent 0.0101 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 73 a7 62 e9 00 00 00 6c fa 95 73 54 | 29 0a 22 12 54 26 79 73 05 48 a8 ce 38 5f 8f dc | cb 89 d6 a4 84 16 f1 a6 a4 3b 22 5e 71 c7 b5 83 | fb e4 dc dd 7c f9 fa 64 36 08 e8 b1 e3 f7 c2 96 | fc b3 c6 5d f1 99 20 c6 2c a7 e8 a5 b4 46 d4 5f | 4c 22 74 e6 1b 8d b8 f4 1b 68 53 97 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1940349673 (0x73a762e9) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | 41 85 08 de b9 7f 89 d1 13 16 34 c0 29 eb c7 1e | 9e 0f c7 a6 7d 6a 44 cb 18 70 5a a9 60 99 18 c6 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c dd | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23773 expected: 23773 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.0325 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.529 milliseconds in comm_handle_cb() reading and processing packet | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.00296 milliseconds in global timer EVENT_SHUNT_SCAN | timer_event_cb: processing event@0x55667940c898 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x7f6500004218 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x556679411de8 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x55667941b998 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x556679414958 size 128 | DPD: sending R_U_THERE 23774 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1797513332 (0x6b23e074) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c de | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 43 99 aa 31 76 dc f9 93 82 82 07 11 92 70 17 60 | aa 97 d8 9a 0d 20 b1 d4 c1 01 15 67 79 51 40 02 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 6b 23 e0 74 00 00 00 6c 52 fc 3c 9c | f7 49 48 9a 74 5a 6b da 60 9f bc 25 68 a3 33 ff | e5 97 f5 0c be 36 b3 78 e1 98 62 cf 9a 50 e8 e7 | bd f0 25 67 ab 12 90 27 f4 06 9c 3b 72 47 6b 7d | 7e c5 ec 28 80 aa d9 89 c8 0d c8 43 ff f3 fe 71 | 73 0e 82 60 1a b4 6d 52 22 65 39 8c | libevent_free: release ptr-libevent@0x55667940b1c8 | free_event_entry: release EVENT_DPD-pe@0x55667940c898 | #2 spent 0.272 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00212 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 61 a4 df 87 00 00 00 6c b5 e5 bd 45 | 6f f6 93 e5 45 4e 41 02 44 91 57 9c 25 c7 47 27 | e2 54 db 2e 42 39 1f a7 db 74 7f cc f8 55 02 ac | c6 0e cc a1 16 3b da f1 d4 66 a9 03 40 18 4e a7 | 4e c8 84 5c 58 42 40 3d 1b e4 de c9 fd 36 57 42 | c2 4c 03 3e 9f b6 0e 6f 65 24 49 d5 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1638195079 (0x61a4df87) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | 57 67 3a b8 fe ec ee b2 1e 1d d2 a7 1e 0d d7 f4 | 1c d6 0c a8 9a 4b 76 d0 ec 29 f0 26 d9 81 49 e4 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c de | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23774 expected: 23774 (state=#1) | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x55667941b998 be deleted | libevent_free: release ptr-libevent@0x556679414958 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x55667941b998 | complete v1 state transition with STF_IGNORE | #1 spent 0.0128 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.141 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00822 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | NAT-T keep-alive (bogus ?) should not reach this point. Ignored. Sender: 192.1.2.23:500 | spent 0.0265 milliseconds in comm_handle_cb() reading and processing packet | processing global timer EVENT_NAT_T_KEEPALIVE | FOR_EACH_STATE_... in nat_traversal_ka_event (for_each_state) | start processing: state #2 connection "west-east" from 192.1.2.23 (in for_each_state() at state.c:1575) | not behind NAT: no NAT-T KEEP-ALIVE required for conn west-east | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in nat_traversal_send_ka() at nat_traversal.c:774) | ka_event: send NAT-KA to 192.1.2.23:500 (state=#2) | sending NAT-T Keep Alive | sending 1 bytes for NAT-T Keep Alive through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #2) | ff | stop processing: state #2 connection "west-east" from 192.1.2.23 (in nat_traversal_send_ka() at nat_traversal.c:786) | processing: STOP state #0 (in for_each_state() at state.c:1577) | start processing: state #1 connection "west-east" from 192.1.2.23 (in for_each_state() at state.c:1575) | not behind NAT: no NAT-T KEEP-ALIVE required for conn west-east | stop processing: state #1 connection "west-east" from 192.1.2.23 (in for_each_state() at state.c:1577) | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds | spent 0.12 milliseconds in global timer EVENT_NAT_T_KEEPALIVE | spent 0.00257 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 9f 5d 9e 3a 00 00 00 6c d0 bf 92 38 | 4f ae 4c 68 e9 b8 1c bf 35 0c 04 3b 57 39 c9 a3 | ae b6 e8 31 b0 00 67 0f 96 2e 7e fc 16 76 74 63 | 92 9b 6e 67 ea cc 58 96 89 fb 33 4e aa b1 26 03 | 10 20 35 38 6a c4 02 a9 18 e8 40 56 04 81 07 dd | 22 0c f0 f1 bd 01 62 c7 70 8a ce 7f | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2673712698 (0x9f5d9e3a) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | d4 57 cf ba 9d 35 1d d2 1b 7c 66 70 21 66 4c 4d | 18 6c c7 b4 15 1d 25 ea e1 f0 9f 7e 8a 1f 3c 4c | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c f7 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15607 monotime:29698.932537 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 768877000 (0x2dd421c8) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c f7 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 56 6a 2d 17 8e 51 12 e6 3d d6 80 e1 59 ff fe ae | 97 78 ef b6 84 78 37 70 b7 fc 19 ed 86 08 65 34 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 2d d4 21 c8 00 00 00 6c 08 cf cd d9 | 32 4b 97 4d 49 f9 84 aa 84 6d 71 64 c2 c1 48 ba | 0b a6 8f 34 3b 57 13 86 3d be 79 98 89 fe 15 f1 | 7f de ab f5 af dc 56 b2 b8 7b 12 b2 c9 93 33 fb | 1d 77 f6 8b cb 64 7e e3 7d 2b 38 80 ec 92 60 c0 | da 2b 35 d2 ac 3c 7d ea 43 11 98 6f | complete v1 state transition with STF_IGNORE | #1 spent 0.0947 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.208 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x7f6500004218 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | DPD: not yet time for dpd event: 29698.932658 < 29701.932537 | event_schedule: new EVENT_DPD-pe@0x55667941b998 | inserting event EVENT_DPD, timeout in 2.999879 seconds for #2 | libevent_malloc: new ptr-libevent@0x556679413988 size 128 | libevent_free: release ptr-libevent@0x556679411de8 | free_event_entry: release EVENT_DPD-pe@0x7f6500004218 | #2 spent 0.0227 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x55667941b998 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x7f6500004218 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x556679411de8 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x55667940c898 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x55667940b118 size 128 | DPD: sending R_U_THERE 23775 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1193935634 (0x472a0312) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c df | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 5f 1b 1f 57 8e 93 e5 6d e1 00 cd 66 b7 f3 3b c3 | 72 cc a2 38 18 6d 73 bf 51 64 bc f6 94 9d b8 70 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 47 2a 03 12 00 00 00 6c a2 cc 42 2a | 89 33 0e 6f 3b 99 fa 86 b3 e5 ed 03 c1 30 84 f2 | de 9d 61 bd 72 92 fe 49 1b d0 a1 d2 0c dd 82 9f | 73 b8 05 ea 88 aa 8a 34 1c b7 bb cb 08 c5 de e3 | 15 a3 16 cd b9 5f 5e 27 61 60 90 a4 7c 2d 4c 99 | dc 3a 11 d3 16 0f f1 d8 65 19 ea 05 | libevent_free: release ptr-libevent@0x556679413988 | free_event_entry: release EVENT_DPD-pe@0x55667941b998 | #2 spent 0.223 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00156 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 24 0b 90 f9 00 00 00 6c 9b 30 7a 2c | f6 54 00 2f 82 a4 a5 2b 8a ff 18 5b b4 be 66 25 | 33 74 53 4c e0 07 ef 1f 8b 8c 3d 53 33 14 42 a3 | e8 63 b5 03 b4 c8 74 22 83 29 f6 48 be 62 9f 45 | 92 46 a6 58 e3 bf 00 37 c6 2a 2e 41 88 a1 5a d4 | a4 fa 65 38 8f 4e 71 f2 30 c0 d4 6f | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 604737785 (0x240b90f9) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | 8e 02 a3 7c d5 bf 43 c9 fb 25 58 e5 aa 54 c5 b6 | ce ea 90 15 9d 31 b8 8d 5c 19 78 78 5e f5 b8 00 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c f8 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15608 monotime:29701.936095 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3402742195 (0xcad1b9b3) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c f8 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 61 47 b7 24 bb cb 4d 09 84 93 28 e5 cc 33 40 48 | eb 3d 7b 90 81 a5 94 98 18 19 b5 f6 fc 8b 5f e2 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 ca d1 b9 b3 00 00 00 6c 2d 0d d4 0e | bd e9 f0 97 bb cc 20 51 90 bf 41 2e d6 8d f0 3b | 24 45 b3 67 a7 dd 76 3f 8f 98 44 d8 e2 ae 40 7a | 45 54 69 2f fa 97 14 83 19 95 f6 56 4c 3a b0 c0 | 49 e1 47 bc 27 11 21 69 92 d8 fa 34 03 af ca 25 | 57 5b a2 26 d1 70 48 92 62 0a 2a 5e | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x55667940c898 be deleted | libevent_free: release ptr-libevent@0x55667940b118 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x55667940c898 | complete v1 state transition with STF_IGNORE | #1 spent 0.0932 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.196 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00106 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 22 c8 eb 50 00 00 00 6c 5a b3 c4 e8 | 92 c3 84 70 65 f5 fe a9 91 4c 45 86 33 a4 70 80 | d9 d0 e1 69 e7 4f 00 d4 2a 5d 81 59 e7 58 15 34 | 83 ad 76 17 41 5e ad ac 85 8b 9d da 5e 05 c3 9f | 52 97 65 79 79 a0 8c 45 ca ef 46 ee e5 84 2b 13 | 8f 58 13 7f 15 25 eb 5f 3d 4b 5f d6 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 583592784 (0x22c8eb50) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | ef e6 f1 6c bb 08 43 4a 97 9b 65 dc f4 c4 af 44 | 66 9b ee 81 5c 72 75 1c 71 e2 64 df eb 77 a6 7f | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c df | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23775 expected: 23775 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00619 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.0915 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x7f6500004218 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x55667940c898 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b1c8 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x55667941b998 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x556679414958 size 128 | DPD: sending R_U_THERE 23776 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 138685051 (0x8442a7b) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c e0 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 5a 38 b2 b3 bd 22 58 85 ee eb 81 66 89 e8 9a 1b | 55 36 87 af 44 db fd 48 9d 50 2f 3b 40 dc 7e 04 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 08 44 2a 7b 00 00 00 6c 38 0e 03 9b | 3d a9 1d 72 55 cc 57 be cd af 3c 01 73 5b 42 90 | ef 4e f2 12 71 96 f6 23 0c e5 76 86 9e 57 33 10 | 7d 54 2b 2e 8d 4b 33 1c 5c 09 45 4a 2f f4 c7 9f | 45 cd 3c aa 7b b4 b4 28 8e fe 1b a6 6f ce 85 b2 | 60 9f 95 d1 f2 7b 09 c1 3d a6 39 e3 | libevent_free: release ptr-libevent@0x556679411de8 | free_event_entry: release EVENT_DPD-pe@0x7f6500004218 | #2 spent 0.201 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.002 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 0f 8c 9f a1 00 00 00 6c 3e c2 75 d7 | 60 67 38 e1 01 39 3d 3f c4 01 e4 3b cd 87 bf 94 | 26 a5 79 c8 a8 0f a5 65 e6 8c 17 ea 2b 60 1c 41 | 32 f2 53 9a d0 dd 74 2f 3f 1f fe 86 b5 c9 48 74 | 77 e2 2a 67 8f 98 f8 70 7e 53 0e 50 bf 1b d3 39 | 1a 63 55 1e 0b 78 70 8f 25 6f 28 d2 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 260874145 (0xf8c9fa1) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | d5 31 0a ca 60 3c 43 40 64 1b 24 e7 4a 9b 98 b3 | 9e 89 0f 58 73 33 9d 0c d8 cf 9e 2b f3 48 95 59 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c e0 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23776 expected: 23776 (state=#1) | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x55667941b998 be deleted | libevent_free: release ptr-libevent@0x556679414958 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x55667941b998 | complete v1 state transition with STF_IGNORE | #1 spent 0.0117 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.116 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 20 aa 33 87 00 00 00 6c d2 ae 24 b2 | 8b bc 0e 7c cd 57 01 5d 95 bb 33 47 0f ee ac cb | f2 5a b8 41 f5 eb bb 37 87 31 92 76 28 96 84 b1 | 32 cb 04 93 6e cb b0 ed 4b 18 3e 68 d0 4c cc d0 | b0 be e9 bf a4 a1 60 9d a2 59 1c 4c a4 d0 e0 ca | a1 0d 84 8f b2 c0 36 b5 54 ba e3 45 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 548025223 (0x20aa3387) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | 05 ef 3f bd 85 f4 4a ce 69 85 af 6d 46 3c 3d 0d | b3 1b d3 34 e3 c0 b8 a1 3d f2 11 07 e6 06 16 3e | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c f9 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15609 monotime:29707.941207 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4045025674 (0xf11a318a) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c f9 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 0f 5a e7 58 48 32 f6 79 8b b4 05 16 91 8d 88 5c | 9f f6 7f 63 14 34 11 64 4a 70 a7 2f ac 31 e5 66 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 f1 1a 31 8a 00 00 00 6c d1 45 3d fa | e9 95 07 b1 c7 f2 a2 03 04 b7 8a 01 91 97 82 63 | 53 d2 3d f7 da 79 b3 3c bf 25 d1 02 ec 27 ea 1f | da 62 a4 45 c0 37 2b cc e7 68 3a 26 12 c1 ae 96 | d2 27 65 d5 ce d8 bc 06 c5 7b 0f c1 dc a8 25 f0 | 6a 8a 5c 94 09 14 40 78 42 31 81 be | complete v1 state transition with STF_IGNORE | #1 spent 0.0941 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.213 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x55667940c898 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | DPD: not yet time for dpd event: 29707.941332 < 29710.941207 | event_schedule: new EVENT_DPD-pe@0x55667941b998 | inserting event EVENT_DPD, timeout in 2.999875 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b118 size 128 | libevent_free: release ptr-libevent@0x55667940b1c8 | free_event_entry: release EVENT_DPD-pe@0x55667940c898 | #2 spent 0.0238 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00257 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 b9 4d 7f 4b 00 00 00 6c 92 df 90 73 | c9 66 c1 51 49 22 56 8e 82 7f c7 84 7e d4 37 64 | 7d 2d de bf 2e ca b1 84 d0 8c 57 d0 14 50 fb 05 | c2 11 2b 22 dc d2 f7 33 1e d0 21 dd a4 1f 61 c5 | 8a 7a 48 39 0f b9 59 a7 51 20 97 74 07 ac 3c 03 | 51 6e 34 fc b3 24 05 b5 f6 b1 9c de | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3108863819 (0xb94d7f4b) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | 42 e1 8f 4e 4e ed 3e 96 bf b7 47 ce 07 76 88 7d | f1 14 44 74 ab 4d 7f 4a 74 ba df 4f 06 88 02 06 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c fa | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15610 monotime:29710.944163 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 511382259 (0x1e7b12f3) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c fa | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 40 58 9e bf 8d a3 8a 4a cb 01 cc bd 5e c8 a8 ff | 4d 96 68 ef c3 b2 87 5b c5 28 d6 42 42 d0 a2 2d | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 1e 7b 12 f3 00 00 00 6c e1 fb 74 b9 | c3 98 2f 9f ae d3 98 25 0b e2 d8 3f 20 bd ea 83 | 2a 63 4e 22 b7 bb 1f 12 ba 1c 99 bd a6 ac 9f 63 | ea f2 e1 55 cf f7 bd 50 99 ca 5d bf fa 02 90 eb | 9f ba 33 1f 8b 3a e4 9c 6e 69 52 94 af 9c 98 cc | e5 a3 aa b4 c2 7b a6 88 cb a7 5d 28 | complete v1 state transition with STF_IGNORE | #1 spent 0.0937 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.207 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x55667941b998 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | DPD: not yet time for dpd event: 29710.944286 < 29713.944163 | event_schedule: new EVENT_DPD-pe@0x55667940c898 | inserting event EVENT_DPD, timeout in 2.999877 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b1c8 size 128 | libevent_free: release ptr-libevent@0x55667940b118 | free_event_entry: release EVENT_DPD-pe@0x55667941b998 | #2 spent 0.0226 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_PENDING_DDNS | FOR_EACH_CONNECTION_... in connection_check_ddns | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | elapsed time in connection_check_ddns for hostname lookup 0.000004 | spent 0.00793 milliseconds in global timer EVENT_PENDING_DDNS | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.00279 milliseconds in global timer EVENT_SHUNT_SCAN | timer_event_cb: processing event@0x55667940c898 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x55667941b998 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b118 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x7f6500004218 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x556679413988 size 128 | DPD: sending R_U_THERE 23777 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4053553610 (0xf19c51ca) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c e1 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 71 61 6d 15 99 13 d8 44 e1 e6 6b 8a 24 6a 93 18 | 94 1d cc 0a 2f 51 6e 4a c9 dc 8a a8 b3 0e 04 40 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 f1 9c 51 ca 00 00 00 6c e8 14 73 a8 | 52 01 27 92 66 58 12 94 ab 9b 07 08 d4 81 c2 c4 | a5 31 25 78 41 00 de cb b7 21 9c 15 60 01 10 63 | 8a a5 6e 39 fd 8a 1f 88 61 cb 60 7b fe ed 99 66 | 16 8c c6 c8 a2 5a a1 b4 f4 e6 83 cd 73 90 6f a4 | 6e 28 47 08 d9 4e cf 78 26 bc be 3a | libevent_free: release ptr-libevent@0x55667940b1c8 | free_event_entry: release EVENT_DPD-pe@0x55667940c898 | #2 spent 0.777 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00217 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 46 4d 12 db 00 00 00 6c ef 64 b0 03 | 14 f6 7a d0 b7 ab 17 e6 73 ac 8d e8 72 75 29 eb | 3d 0b 7e 32 46 ca 1c 45 c1 18 bd 64 10 54 e6 6d | 36 85 f8 ff 2c c1 24 52 f3 e0 88 8b ec b8 64 07 | d6 61 e0 b9 d8 22 6a 60 0c df 87 c2 82 27 5d 80 | d7 41 e3 4d 0f 6a 94 aa 98 1d 2f 37 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1179456219 (0x464d12db) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | 52 2d 0a 6d e5 88 45 a5 74 f6 e8 8d 57 b7 17 66 | 07 80 1c f7 74 13 4d 54 8b c2 f8 52 f1 3f 06 e6 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c e1 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23777 expected: 23777 (state=#1) | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x7f6500004218 be deleted | libevent_free: release ptr-libevent@0x556679413988 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x7f6500004218 | complete v1 state transition with STF_IGNORE | #1 spent 0.0119 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.162 milliseconds in comm_handle_cb() reading and processing packet | processing global timer EVENT_NAT_T_KEEPALIVE | FOR_EACH_STATE_... in nat_traversal_ka_event (for_each_state) | start processing: state #2 connection "west-east" from 192.1.2.23 (in for_each_state() at state.c:1575) | not behind NAT: no NAT-T KEEP-ALIVE required for conn west-east | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in nat_traversal_send_ka() at nat_traversal.c:774) | ka_event: send NAT-KA to 192.1.2.23:500 (state=#2) | sending NAT-T Keep Alive | sending 1 bytes for NAT-T Keep Alive through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #2) | ff | stop processing: state #2 connection "west-east" from 192.1.2.23 (in nat_traversal_send_ka() at nat_traversal.c:786) | processing: STOP state #0 (in for_each_state() at state.c:1577) | start processing: state #1 connection "west-east" from 192.1.2.23 (in for_each_state() at state.c:1575) | not behind NAT: no NAT-T KEEP-ALIVE required for conn west-east | stop processing: state #1 connection "west-east" from 192.1.2.23 (in for_each_state() at state.c:1577) | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds | spent 0.32 milliseconds in global timer EVENT_NAT_T_KEEPALIVE | spent 0.00133 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | NAT-T keep-alive (bogus ?) should not reach this point. Ignored. Sender: 192.1.2.23:500 | spent 0.00701 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x55667941b998 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | DPD: not yet time for dpd event: 29716.945272 < 29716.945726 | event_schedule: new EVENT_DPD-pe@0x7f6500004218 | inserting event EVENT_DPD, timeout in 0.000454 seconds for #2 | libevent_malloc: new ptr-libevent@0x556679414958 size 128 | libevent_free: release ptr-libevent@0x55667940b118 | free_event_entry: release EVENT_DPD-pe@0x55667941b998 | #2 spent 0.0398 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f6500004218 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x55667941b998 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b118 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x55667940c898 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x556679411de8 size 128 | DPD: sending R_U_THERE 23778 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2265373657 (0x8706dbd9) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c e2 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 6e 1f 49 47 bf de 92 7b 76 99 da 04 90 9e 93 bd | 2b c2 46 ce 0b e4 6f 28 83 fb 6c 7c f8 3f 6a 1b | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 87 06 db d9 00 00 00 6c d8 0c cc d9 | ce 8b af 84 20 ab fa 23 64 f2 db e3 b7 30 f9 b5 | ee b8 a8 a6 32 9c 1e dd 05 1e 88 1f fc 5b 22 16 | a0 82 07 94 ad 1e a7 b2 ec e2 e1 db 08 5b eb 66 | ab b8 aa a4 b2 33 ea 2a e5 be 56 c8 1b 6f 99 e5 | 8f 56 7c b1 21 36 c6 15 29 fd 90 ee | libevent_free: release ptr-libevent@0x556679414958 | free_event_entry: release EVENT_DPD-pe@0x7f6500004218 | #2 spent 0.23 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00161 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 4c 8f 18 ca 00 00 00 6c df 40 81 d9 | fb 52 95 1d 36 a2 95 b3 83 58 8e 93 d2 de ff b2 | 6d 7e 6b 23 de da 31 7e 5c 5d a3 0e 95 a7 b5 43 | b1 aa 49 0b 12 84 38 22 51 17 79 07 eb 43 62 bf | ab 53 0d cf 9a 23 67 72 21 d9 51 17 3a 1e 1d 0a | 73 8f 01 39 b3 eb 21 fd 2c 4a eb b4 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1284446410 (0x4c8f18ca) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | 57 b5 83 81 4e 7a 52 82 b6 47 99 61 66 da 6f 08 | 76 19 31 17 06 a1 8c 11 14 c9 4c 02 d7 d4 1a cf | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c fb | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15611 monotime:29716.946747 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1337305589 (0x4fb5a9f5) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c fb | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | ef 3c f8 e4 67 1e 30 e9 73 0f 97 8e f4 21 74 bd | ef a9 a5 20 35 9d 5e e4 7c 3b cd 65 fb 7f 65 82 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 4f b5 a9 f5 00 00 00 6c f6 b4 c4 d7 | c8 8d 5c 02 52 45 38 0e 5d 95 7a 7d 0a f7 80 e8 | b6 d9 76 0e 45 45 57 c2 e6 3b d4 41 5a 72 02 7c | 97 74 e9 5e 9a 3d ca 88 75 b5 47 c7 c1 e5 63 0d | c9 83 85 d6 4d cb de 48 55 35 bf a1 57 c9 5b 33 | ff 9d 4e e0 9f 4d bb ff 82 83 43 25 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x55667940c898 be deleted | libevent_free: release ptr-libevent@0x556679411de8 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x55667940c898 | complete v1 state transition with STF_IGNORE | #1 spent 0.151 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.298 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00154 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 0d e9 12 92 00 00 00 6c ee f0 f9 03 | 4d cb 4a ce 2d c6 1e b0 f8 cb 69 f0 1d 21 57 58 | 76 11 c9 76 ac 80 59 68 ba c3 e7 c8 7b 8b da 9a | db 0e 81 c4 41 e8 f3 17 92 75 58 27 a8 b0 34 51 | ee ae f0 b8 12 7e b6 fe fa 4f 59 41 93 d0 67 09 | a0 d0 64 79 fe b5 a0 91 4a 9d 0b 1b | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 233378450 (0xde91292) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | 01 da 3d 01 a5 76 6b 62 34 e3 b3 08 43 bb 7a ce | 9a e4 db e5 60 fd b3 0d 45 38 f2 6f c2 1c dc 36 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c e2 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23778 expected: 23778 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00989 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.152 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x55667941b998 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x55667940c898 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b1c8 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x7f6500004218 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x556679413988 size 128 | DPD: sending R_U_THERE 23779 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3632860585 (0xd8890da9) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c e3 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 64 49 37 a1 2f eb d3 23 b0 1b 3a 28 7a ab e0 45 | 0f 04 ce 41 2e 0a 62 86 ac e0 ef 5c 77 a3 87 ea | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 d8 89 0d a9 00 00 00 6c 8f f1 ab 00 | 17 2d 98 a1 9b 1e 21 55 fa 24 a1 a9 fb fe 35 c3 | 70 b2 18 59 b9 81 c9 7f 56 8f 90 2e 06 d0 4e 88 | 34 55 b2 b4 20 f7 2f d7 11 3f 68 b3 8d 6e b0 4d | c4 9f 62 ba 06 4f 3a a5 f9 ea 8a 9a be ac c1 3c | 65 0e 0c fa a1 0a 6d 12 9d 9a 59 38 | libevent_free: release ptr-libevent@0x55667940b118 | free_event_entry: release EVENT_DPD-pe@0x55667941b998 | #2 spent 0.258 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 12 55 52 cc 00 00 00 6c cf af b2 33 | 77 c2 f4 e5 ad eb e7 e2 e4 ad 44 8c 3c f6 a2 97 | c0 38 ae aa 6c c4 78 28 c5 cb 08 02 3a 2d 98 72 | da 89 33 bc 9b be bb 6c 9c db ed cb 00 a9 78 4a | ac 7a 3f 28 e1 5b 2f 25 41 8f 76 de c2 98 7a 3f | db f8 7e 71 ec 7f 3b e6 4f a3 b7 5e | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 307581644 (0x125552cc) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | ab 26 f1 6f 71 04 d7 79 19 13 d0 21 30 30 30 de | 3b f8 d1 bc bb 5e 3b d0 b8 6f 7c 48 09 7c ad 8f | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c fc | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15612 monotime:29719.949595 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3068624640 (0xb6e77f00) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c fc | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | e3 5f df 5d b0 1a e9 5a be 47 48 62 9b db 12 69 | 1d e4 0b 54 37 3e 32 19 9a 4d 65 59 57 67 71 05 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 b6 e7 7f 00 00 00 00 6c 59 e2 71 e4 | b0 88 f2 04 61 56 e4 c4 03 f1 0e af 81 f1 ef aa | 65 05 e7 a5 93 78 b2 48 ca ac 32 72 cf 2e 24 70 | 49 b8 14 40 e0 e4 e0 3c bb a3 61 f9 13 4c 4f d5 | 38 43 e8 cc bc a3 19 60 81 ee f9 ee 28 98 66 6e | 66 6d 4f 2b c5 d8 3d 5e 79 e9 f0 b8 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x7f6500004218 be deleted | libevent_free: release ptr-libevent@0x556679413988 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x7f6500004218 | complete v1 state transition with STF_IGNORE | #1 spent 0.217 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.436 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00143 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 ca 3b 5a 47 00 00 00 6c fa 0e 3a 18 | 98 06 da 18 df 4e 12 bc 2e 72 d0 0f ba 70 0c 7f | 38 fa 33 c7 8a 76 cf 64 3f 08 b9 e3 13 38 20 62 | 55 8b 1d 2f d9 10 92 51 0c de 08 15 06 45 92 ff | 4b 7b 46 cc 0b fb c6 2e 77 64 b7 4f 6e 2d 7c f2 | 0a 54 e4 31 23 b3 d2 51 4b ab ee d8 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3392887367 (0xca3b5a47) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | a7 ef 3f 47 9d dc 0b b6 0f f4 e3 3f 94 31 46 b8 | 2e 67 db 5d e8 b2 e7 ed 1b 1d 4e 1d 21 07 71 e7 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c e3 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23779 expected: 23779 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.0126 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.237 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x55667940c898 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x7f6500004218 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x556679411de8 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x55667941b998 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x556679414958 size 128 | DPD: sending R_U_THERE 23780 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1402453801 (0x5397bf29) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c e4 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | fc 52 01 31 99 f1 d6 8b f8 b4 b4 6f 22 05 42 42 | 9b f6 c2 6e 1d d2 e7 1c a5 c4 fe df 6f 31 42 11 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 53 97 bf 29 00 00 00 6c 46 2f a8 ba | e6 59 28 f6 1a 8d bd 30 32 b0 11 a2 25 c1 b0 f3 | a8 1c da 6a 9c df 70 42 65 11 54 79 b0 90 32 a6 | aa a9 e4 d3 b1 e3 a2 b4 5a e8 a0 f1 b1 9a a8 cc | d4 e1 32 26 a8 4c 86 fc ef 06 c4 6c c7 5c a8 af | 19 14 d2 8f 46 0b e0 26 a6 13 c4 02 | libevent_free: release ptr-libevent@0x55667940b1c8 | free_event_entry: release EVENT_DPD-pe@0x55667940c898 | #2 spent 0.655 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00193 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 eb 75 1d 57 00 00 00 6c 34 de 5e d1 | f4 42 fc 80 9a 9c 7c 7c bb db 4a f1 e6 c7 2a 86 | 34 ff 45 b1 b1 5c 1a 83 17 73 54 b9 79 34 fa 29 | 5c 44 f6 e8 78 61 92 8e b2 d5 4a c2 c5 6d e4 cb | 99 9d 00 ca 03 dd 03 05 ab b5 2f ae 41 ad 9a 1f | a9 5c 8c f5 bf 5a 64 a0 7f b1 d0 46 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3950320983 (0xeb751d57) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | dc e7 14 38 a7 85 c0 99 28 a9 b2 76 12 e9 5b 94 | 59 2f 99 cf 12 3d a5 40 00 1f 09 17 ab e0 5b 39 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c fd | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15613 monotime:29722.953631 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 214071065 (0xcc27719) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c fd | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 93 60 e7 20 5d 8e 64 d0 96 f8 47 6c aa 84 7b 28 | 30 cd 77 42 b0 55 3b fd 2a 64 12 f6 ba 7b 0c b7 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 0c c2 77 19 00 00 00 6c f0 07 81 f3 | 25 7a 94 3d 6e 79 9a bf 92 7f 2b bb 3e 3d 95 6a | 13 b8 f3 b3 2c 6f 5c 69 20 34 0e 8a d1 65 06 1a | 11 1d 44 d0 a2 d4 df 10 d4 7c 7b b5 4d ee 8c 2b | 59 62 c7 16 be b7 b8 15 33 b1 5d 15 00 b4 96 ae | 11 68 c4 dc d1 68 f5 fa e4 2f 03 b5 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x55667941b998 be deleted | libevent_free: release ptr-libevent@0x556679414958 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x55667941b998 | complete v1 state transition with STF_IGNORE | #1 spent 0.152 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.318 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00156 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 95 0c 79 32 00 00 00 6c 71 70 69 0b | 51 21 04 54 d9 1d 52 dc b4 c1 36 fb dd 83 09 46 | 16 59 88 12 d5 0b 76 f9 8c ec 94 3d 54 de 27 ad | 65 b2 16 39 ce f2 b1 f7 3f 67 13 10 ec b6 59 4b | 4c 07 e6 2b 62 f6 b2 f8 a5 da 1a 82 e8 c9 33 51 | 2f 3a 50 1b 61 56 7d f2 0f cb 57 ff | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2500622642 (0x950c7932) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | f5 d9 3b 65 be 7b 08 87 d3 1b aa 49 fd e2 24 f8 | c3 65 74 ea 80 c3 15 b9 4b 6e eb eb 85 c3 c9 05 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c e4 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23780 expected: 23780 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00977 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.151 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x7f6500004218 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x55667941b998 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x556679413988 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x55667940c898 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x55667940b118 size 128 | DPD: sending R_U_THERE 23781 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3296815444 (0xc4816954) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c e5 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 9a 9c 66 3a 2f d0 48 76 2b 8d 72 3b 27 b4 26 d5 | 01 02 d6 b5 82 a8 1f e2 a3 4d 05 ee 4b ec df 1c | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 c4 81 69 54 00 00 00 6c 9a 72 86 93 | 96 78 aa bd 71 8f 39 6b 8c d8 1a ae d9 8f a4 f4 | 2a 4c af f6 01 40 9d 11 d6 a4 ba e7 06 43 44 e2 | f5 e1 6b 11 3f 9c 2d 1b 6b 10 a2 69 7c 3d eb f2 | 4d 78 52 9d aa e6 3c 26 ce ad 37 46 22 b3 70 e3 | ac a4 4d c0 42 e1 7f 87 50 f8 42 fa | libevent_free: release ptr-libevent@0x556679411de8 | free_event_entry: release EVENT_DPD-pe@0x7f6500004218 | #2 spent 0.201 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00126 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 19 c3 58 6f 00 00 00 6c ea 09 52 6c | 4b a6 4f 17 f9 fc 68 6d 8a ce 99 15 9e 70 17 ff | 94 dd 53 73 d6 bb 00 b8 af 40 73 60 db fd cb d7 | 57 a5 16 69 27 68 9f 68 5b 45 5d 8d c7 e9 5d 8a | fc a8 9b 15 b1 83 e2 9b 5c a1 7a 28 e4 6f 0a e5 | 64 85 09 bc 3c 7b 2f ce 8e f1 d8 8e | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 432232559 (0x19c3586f) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | ce 25 64 22 ab 87 85 9d d3 db 40 61 09 5d bf ec | 32 d8 b6 65 12 ea 75 1f 45 2c 0a e3 ad 88 db e4 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c fe | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15614 monotime:29725.956104 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1372671333 (0x51d14d65) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c fe | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | f2 6a 28 b8 97 23 01 2e bb 00 ed ca 80 ee 0d 97 | 46 63 98 87 46 2d bf 03 ed ed 20 0c 46 7a 0c b4 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 51 d1 4d 65 00 00 00 6c bd be 1c df | 7b 50 51 b3 2c 1e 10 81 98 b9 bb 65 1c f5 17 7d | 35 2c db 60 0f 7f 62 a0 6c f1 4d c3 13 c3 65 17 | 3e 1e 54 46 f9 02 92 64 1e e7 5a dc 67 99 b1 ab | 55 ac 38 64 47 40 5f 7e d0 9a c3 1d a8 82 2c b7 | fd be 72 75 e9 4b f3 b8 4c 4c 26 e5 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x55667940c898 be deleted | libevent_free: release ptr-libevent@0x55667940b118 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x55667940c898 | complete v1 state transition with STF_IGNORE | #1 spent 0.0921 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.194 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 43 b4 3e b2 00 00 00 6c de 81 8f 96 | 3a 3e 15 ad 4e 8b be 95 fa 91 6b b5 48 9b b5 79 | 54 d0 96 98 fc 6b c6 ae 50 16 08 23 4e 2d 0f 27 | 74 09 d1 1a fe 7b 58 90 18 3c 54 96 cc 24 41 c3 | d1 e1 2a 7a 37 00 26 36 7b 1a 57 6d 89 bd 74 42 | 2c 63 79 e3 f3 f6 31 a4 f1 cd 1a fa | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1135886002 (0x43b43eb2) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | 25 70 78 d2 fd e9 09 71 ab ac f1 bc 49 5a 97 43 | e2 e6 d1 5e 1b e6 c4 88 c9 91 76 16 35 fc 31 46 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c e5 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23781 expected: 23781 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00685 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.114 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x55667941b998 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x55667940c898 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b1c8 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x7f6500004218 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x556679414958 size 128 | DPD: sending R_U_THERE 23782 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1719326017 (0x667ad541) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c e6 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | c0 ec 0d c0 dc 92 7c c3 4a 02 6a ea a9 34 01 37 | 27 9b b0 a4 ea f9 52 53 cb 0c dd 15 95 4e 2c c2 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 66 7a d5 41 00 00 00 6c 9f d8 08 b6 | d6 e6 17 4e 24 ce 60 e7 f4 f3 40 6a 43 66 11 ac | 85 89 10 c8 a5 1c 38 7e ba c8 c8 2c 97 60 7b f7 | 6a d7 ff cd f8 67 33 b3 db b5 d1 f9 01 cb 74 47 | 2b 49 dd ff 18 a2 87 cd b6 4c 92 d0 63 5d 4f 9a | 82 41 69 9a c1 a5 78 d8 95 51 61 56 | libevent_free: release ptr-libevent@0x556679413988 | free_event_entry: release EVENT_DPD-pe@0x55667941b998 | #2 spent 1.44 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 ef 03 72 e1 00 00 00 6c 69 cb 7b dc | 5b d2 65 40 47 42 c4 6f 1d 0c d3 9e 1c fc ac 42 | db a1 59 e4 c0 99 56 20 57 36 ad 5d 6b 61 8b e0 | 2d b6 18 75 c3 be 96 60 33 48 87 34 6b 14 9e 3d | f2 8d 89 c5 1e 3b 2b 81 76 36 95 05 49 78 95 ce | 16 17 7a bb 81 bc 1c 2f a4 68 d6 e6 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4009980641 (0xef0372e1) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | 8f a1 6a 74 ba 45 fd de a5 28 50 88 88 1d e9 84 | c2 3a 90 71 11 95 0e 04 8f ef 32 39 5f ac 9b c8 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3c ff | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15615 monotime:29728.961115 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3242475847 (0xc1444147) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3c ff | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 9c d4 e9 cd 31 c1 6b 84 4c 4e 6a b5 63 34 37 e4 | 79 da 03 18 45 0b 1b ab ed c4 20 06 d4 a4 7e 45 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 c1 44 41 47 00 00 00 6c f4 4b 70 7e | f3 95 8f 69 f4 17 1e cb d5 17 32 48 b2 16 bf bf | 54 62 00 8d 9b 2b 54 d9 11 5d df 60 df 74 f0 13 | 76 64 33 13 05 aa d0 2d 1c 18 e9 11 94 29 cd 6b | ac 7c 81 50 d6 f1 39 50 c0 8f cb c8 5f 80 10 72 | 38 0d f6 d7 c7 bb 0c e7 40 58 e3 33 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x7f6500004218 be deleted | libevent_free: release ptr-libevent@0x556679414958 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x7f6500004218 | complete v1 state transition with STF_IGNORE | #1 spent 0.446 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.937 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 c8 91 76 32 00 00 00 6c 1c f2 0e 7f | 61 12 ae ff 16 2f e3 32 08 70 49 3c 3b ae 78 ab | 57 a0 e5 06 58 b0 85 2a 08 13 71 05 21 c4 4a f2 | fe a9 c8 34 13 0a 23 71 60 68 d3 e1 4a eb 85 b8 | bb c8 0b 4c 36 a5 7e 96 7a 76 79 9d e3 f7 ac a6 | 09 7e 47 0b 69 3b 34 35 76 d7 2f 45 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3364976178 (0xc8917632) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | a7 37 e7 2a ff 70 94 2d 7f 56 77 eb ae 5c 4b 22 | a2 cd 92 df 3e 3b e1 c9 0f 17 a0 10 72 bd bb a2 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c e6 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23782 expected: 23782 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.0415 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.617 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00565 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 0f da 07 73 00 00 00 6c 58 60 cd d9 | ae 34 bd 0e f0 bc 6c 53 9e ea 90 c5 00 8b 64 62 | 0e 4b c9 69 61 25 db 94 89 6d 1c 49 dc ab bd be | 4c 53 bb c0 6d b3 7c 46 0a b3 d6 e5 dd 40 7a 3b | b0 a3 6f 2f 59 63 25 b5 74 2f 1c e7 ac 81 1e c1 | 83 b8 62 7f 1f e5 ef 08 e0 61 6d a1 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 265946995 (0xfda0773) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | removing 12 bytes of padding | informational HASH(1): | 9a ed 46 54 fa de 90 45 90 d8 e4 57 d4 cd 3e 87 | c3 11 11 b5 ed 5c 59 04 75 3c dd 09 22 ce 09 45 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 3d 00 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:15616 monotime:29731.963624 (state=#1 name="west-east") | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1303300986 (0x4daecb7a) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 3d 00 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 6b c7 51 50 80 6b 55 5b e5 4f cc 5f 5c 02 b1 2e | 48 d3 86 79 05 1b d0 e4 6f 91 65 fd d9 ef 47 66 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 4d ae cb 7a 00 00 00 6c 5c 18 59 be | 59 75 cc ad ec 9c af dc a7 dd 81 d1 1d 5a 50 0b | 70 8e 97 92 6b 08 d6 a8 84 73 f8 74 35 d1 0e 62 | 07 c0 9a db 61 6d 00 94 ec fd f4 80 2b c1 80 c2 | 79 c2 be 10 d8 1e c6 f7 30 85 ce 59 fe 98 f1 32 | 41 a5 21 53 9c 01 a2 ff 0a e4 8d 70 | complete v1 state transition with STF_IGNORE | #1 spent 0.237 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.531 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x55667940c898 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | DPD: not yet time for dpd event: 29731.963965 < 29734.963624 | event_schedule: new EVENT_DPD-pe@0x7f6500004218 | inserting event EVENT_DPD, timeout in 2.999659 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b118 size 128 | libevent_free: release ptr-libevent@0x55667940b1c8 | free_event_entry: release EVENT_DPD-pe@0x55667940c898 | #2 spent 0.0909 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.00423 milliseconds in global timer EVENT_SHUNT_SCAN | timer_event_cb: processing event@0x7f6500004218 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "west-east" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("west-east") | get_sa_info esp.432e0e59@192.1.2.45 | event_schedule: new EVENT_DPD-pe@0x55667940c898 | inserting event EVENT_DPD, timeout in 3 seconds for #2 | libevent_malloc: new ptr-libevent@0x55667940b1c8 size 128 | DPD: scheduling timeout to 10 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x55667941b998 | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 | libevent_malloc: new ptr-libevent@0x556679411de8 size 128 | DPD: sending R_U_THERE 23783 to 192.1.2.23:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3547000080 (0xd36aed10) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 06 16 40 37 9b bb 54 13 | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie 3c 56 34 2e a2 ef 88 8f | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 5c e7 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | bd e3 6d 8c da 11 f6 ba ce d4 c9 56 d2 b5 14 4e | 16 d1 21 4a de 8c 62 aa 14 43 93 19 71 8a 75 e3 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 108 | sending 108 bytes for ISAKMP notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 d3 6a ed 10 00 00 00 6c 08 b1 84 5a | 4f b6 10 e0 5b c8 96 84 dd 5d e1 d5 42 0d cf 97 | 95 e2 1b 54 69 3b 46 b1 b2 f1 29 a4 38 15 ca ed | 15 f5 c8 71 17 0f 1e 4a 9e 01 bb ba f7 f6 22 e6 | 9a 27 0b e0 fc d4 8d 04 6e 54 6b a7 12 e7 55 f5 | 29 58 84 3c 8b 29 f4 36 37 1c b0 b0 | libevent_free: release ptr-libevent@0x55667940b118 | free_event_entry: release EVENT_DPD-pe@0x7f6500004218 | #2 spent 0.246 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "west-east" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | spent 0.00218 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 108 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | 08 10 05 01 f8 8e d6 b2 00 00 00 6c fa c2 06 88 | 4c 96 8b e6 21 36 71 98 6f bd 0a 0a 3a 78 0f f4 | 6a a5 e8 72 a0 63 5e 93 36 bb 3a bf 1b 20 ab b4 | 51 4f 9c 32 12 7c 61 f8 61 4a df 54 a1 e1 78 62 | a0 ec 8a 4a 76 4f 4a d3 45 6c d9 c3 e3 63 78 27 | 3e b2 98 ff ae 05 34 32 88 3c b9 d9 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 06 16 40 37 9b bb 54 13 | responder cookie: | 3c 56 34 2e a2 ef 88 8f | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4170110642 (0xf88ed6b2) | length: 108 (0x6c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=a8b2357c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "west-east" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 36 (0x24) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | removing 12 bytes of padding | informational HASH(1): | 39 c7 85 0f 46 42 b1 55 bf 0d 22 22 88 34 50 db | c6 a1 88 00 d9 b3 0a 48 8d 15 df d3 8c 64 c8 60 | received 'informational' message HASH(1) data ok | info: 06 16 40 37 9b bb 54 13 3c 56 34 2e a2 ef 88 8f | info: 00 00 5c e7 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 23783 expected: 23783 (state=#1) | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x55667941b998 be deleted | libevent_free: release ptr-libevent@0x556679411de8 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x55667941b998 | complete v1 state transition with STF_IGNORE | #1 spent 0.012 milliseconds in process_packet_tail() | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "west-east" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.118 milliseconds in comm_handle_cb() reading and processing packet