Aug 26 18:32:52.180629: FIPS Product: YES
Aug 26 18:32:52.180746: FIPS Kernel: NO
Aug 26 18:32:52.180749: FIPS Mode: NO
Aug 26 18:32:52.180752: NSS DB directory: sql:/etc/ipsec.d
Aug 26 18:32:52.180899: Initializing NSS
Aug 26 18:32:52.180906: Opening NSS database "sql:/etc/ipsec.d" read-only
Aug 26 18:32:52.213116: NSS initialized
Aug 26 18:32:52.213133: NSS crypto library initialized
Aug 26 18:32:52.213136: FIPS HMAC integrity support [enabled]
Aug 26 18:32:52.213138: FIPS mode disabled for pluto daemon
Aug 26 18:32:52.247491: FIPS HMAC integrity verification self-test FAILED
Aug 26 18:32:52.247599: libcap-ng support [enabled]
Aug 26 18:32:52.247609: Linux audit support [enabled]
Aug 26 18:32:52.247634: Linux audit activated
Aug 26 18:32:52.247639: Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:17892
Aug 26 18:32:52.247642: core dump dir: /tmp
Aug 26 18:32:52.247644: secrets file: /etc/ipsec.secrets
Aug 26 18:32:52.247646: leak-detective enabled
Aug 26 18:32:52.247648: NSS crypto [enabled]
Aug 26 18:32:52.247651: XAUTH PAM support [enabled]
Aug 26 18:32:52.247721: | libevent is using pluto's memory allocator
Aug 26 18:32:52.247729: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800)
Aug 26 18:32:52.247745: | libevent_malloc: new ptr-libevent@0x55c66d8f06d8 size 40
Aug 26 18:32:52.247752: | libevent_malloc: new ptr-libevent@0x55c66d8f0658 size 40
Aug 26 18:32:52.247755: | libevent_malloc: new ptr-libevent@0x55c66d8f05d8 size 40
Aug 26 18:32:52.247758: | creating event base
Aug 26 18:32:52.247762: | libevent_malloc: new ptr-libevent@0x55c66d8e2208 size 56
Aug 26 18:32:52.247766: | libevent_malloc: new ptr-libevent@0x55c66d863538 size 664
Aug 26 18:32:52.247777: | libevent_malloc: new ptr-libevent@0x55c66d92ace8 size 24
Aug 26 18:32:52.247780: | libevent_malloc: new ptr-libevent@0x55c66d92ad38 size 384
Aug 26 18:32:52.247790: | libevent_malloc: new ptr-libevent@0x55c66d92aca8 size 16
Aug 26 18:32:52.247793: | libevent_malloc: new ptr-libevent@0x55c66d8f0558 size 40
Aug 26 18:32:52.247796: | libevent_malloc: new ptr-libevent@0x55c66d8f04d8 size 48
Aug 26 18:32:52.247801: | libevent_realloc: new ptr-libevent@0x55c66d8631c8 size 256
Aug 26 18:32:52.247803: | libevent_malloc: new ptr-libevent@0x55c66d92aee8 size 16
Aug 26 18:32:52.247809: | libevent_free: release ptr-libevent@0x55c66d8e2208
Aug 26 18:32:52.247813: | libevent initialized
Aug 26 18:32:52.247817: | libevent_realloc: new ptr-libevent@0x55c66d8e2208 size 64
Aug 26 18:32:52.247820: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds
Aug 26 18:32:52.247835: | init_nat_traversal() initialized with keep_alive=0s
Aug 26 18:32:52.247838: NAT-Traversal support  [enabled]
Aug 26 18:32:52.247841: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized
Aug 26 18:32:52.247860: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized
Aug 26 18:32:52.247863: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds
Aug 26 18:32:52.247898: | global one-shot timer EVENT_REVIVE_CONNS initialized
Aug 26 18:32:52.247902: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds
Aug 26 18:32:52.247905: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds
Aug 26 18:32:52.247950: Encryption algorithms:
Aug 26 18:32:52.247959:   AES_CCM_16              IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm, aes_ccm_c
Aug 26 18:32:52.247963:   AES_CCM_12              IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm_b
Aug 26 18:32:52.247967:   AES_CCM_8               IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm_a
Aug 26 18:32:52.247971:   3DES_CBC                IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  [*192]  3des
Aug 26 18:32:52.247974:   CAMELLIA_CTR            IKEv1:     ESP     IKEv2:     ESP           {256,192,*128}
Aug 26 18:32:52.247982:   CAMELLIA_CBC            IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  camellia
Aug 26 18:32:52.247986:   AES_GCM_16              IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm, aes_gcm_c
Aug 26 18:32:52.247990:   AES_GCM_12              IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm_b
Aug 26 18:32:52.247994:   AES_GCM_8               IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm_a
Aug 26 18:32:52.247997:   AES_CTR                 IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aesctr
Aug 26 18:32:52.248001:   AES_CBC                 IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes
Aug 26 18:32:52.248005:   SERPENT_CBC             IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  serpent
Aug 26 18:32:52.248008:   TWOFISH_CBC             IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  twofish
Aug 26 18:32:52.248012:   TWOFISH_SSH             IKEv1: IKE         IKEv2: IKE ESP           {256,192,*128}  twofish_cbc_ssh
Aug 26 18:32:52.248016:   NULL_AUTH_AES_GMAC      IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_gmac
Aug 26 18:32:52.248019:   NULL                    IKEv1:     ESP     IKEv2:     ESP           []
Aug 26 18:32:52.248022:   CHACHA20_POLY1305       IKEv1:             IKEv2: IKE ESP           [*256]  chacha20poly1305
Aug 26 18:32:52.248030: Hash algorithms:
Aug 26 18:32:52.248032:   MD5                     IKEv1: IKE         IKEv2:                 
Aug 26 18:32:52.248036:   SHA1                    IKEv1: IKE         IKEv2:             FIPS  sha
Aug 26 18:32:52.248039:   SHA2_256                IKEv1: IKE         IKEv2:             FIPS  sha2, sha256
Aug 26 18:32:52.248042:   SHA2_384                IKEv1: IKE         IKEv2:             FIPS  sha384
Aug 26 18:32:52.248045:   SHA2_512                IKEv1: IKE         IKEv2:             FIPS  sha512
Aug 26 18:32:52.248058: PRF algorithms:
Aug 26 18:32:52.248061:   HMAC_MD5                IKEv1: IKE         IKEv2: IKE               md5
Aug 26 18:32:52.248064:   HMAC_SHA1               IKEv1: IKE         IKEv2: IKE         FIPS  sha, sha1
Aug 26 18:32:52.248068:   HMAC_SHA2_256           IKEv1: IKE         IKEv2: IKE         FIPS  sha2, sha256, sha2_256
Aug 26 18:32:52.248071:   HMAC_SHA2_384           IKEv1: IKE         IKEv2: IKE         FIPS  sha384, sha2_384
Aug 26 18:32:52.248074:   HMAC_SHA2_512           IKEv1: IKE         IKEv2: IKE         FIPS  sha512, sha2_512
Aug 26 18:32:52.248077:   AES_XCBC                IKEv1:             IKEv2: IKE               aes128_xcbc
Aug 26 18:32:52.248104: Integrity algorithms:
Aug 26 18:32:52.248107:   HMAC_MD5_96             IKEv1: IKE ESP AH  IKEv2: IKE ESP AH        md5, hmac_md5
Aug 26 18:32:52.248111:   HMAC_SHA1_96            IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha, sha1, sha1_96, hmac_sha1
Aug 26 18:32:52.248115:   HMAC_SHA2_512_256       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha512, sha2_512, sha2_512_256, hmac_sha2_512
Aug 26 18:32:52.248119:   HMAC_SHA2_384_192       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha384, sha2_384, sha2_384_192, hmac_sha2_384
Aug 26 18:32:52.248124:   HMAC_SHA2_256_128       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256
Aug 26 18:32:52.248126:   HMAC_SHA2_256_TRUNCBUG  IKEv1:     ESP AH  IKEv2:         AH      
Aug 26 18:32:52.248130:   AES_XCBC_96             IKEv1:     ESP AH  IKEv2: IKE ESP AH        aes_xcbc, aes128_xcbc, aes128_xcbc_96
Aug 26 18:32:52.248133:   AES_CMAC_96             IKEv1:     ESP AH  IKEv2:     ESP AH  FIPS  aes_cmac
Aug 26 18:32:52.248136:   NONE                    IKEv1:     ESP     IKEv2: IKE ESP     FIPS  null
Aug 26 18:32:52.248148: DH algorithms:
Aug 26 18:32:52.248152:   NONE                    IKEv1:             IKEv2: IKE ESP AH  FIPS  null, dh0
Aug 26 18:32:52.248155:   MODP1536                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH        dh5
Aug 26 18:32:52.248158:   MODP2048                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh14
Aug 26 18:32:52.248163:   MODP3072                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh15
Aug 26 18:32:52.248166:   MODP4096                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh16
Aug 26 18:32:52.248169:   MODP6144                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh17
Aug 26 18:32:52.248172:   MODP8192                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh18
Aug 26 18:32:52.248175:   DH19                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_256, ecp256
Aug 26 18:32:52.248192:   DH20                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_384, ecp384
Aug 26 18:32:52.248195:   DH21                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_521, ecp521
Aug 26 18:32:52.248198:   DH31                    IKEv1: IKE         IKEv2: IKE ESP AH        curve25519
Aug 26 18:32:52.248201: testing CAMELLIA_CBC:
Aug 26 18:32:52.248204:   Camellia: 16 bytes with 128-bit key
Aug 26 18:32:52.248336:   Camellia: 16 bytes with 128-bit key
Aug 26 18:32:52.248372:   Camellia: 16 bytes with 256-bit key
Aug 26 18:32:52.248404:   Camellia: 16 bytes with 256-bit key
Aug 26 18:32:52.248432: testing AES_GCM_16:
Aug 26 18:32:52.248435:   empty string
Aug 26 18:32:52.248461:   one block
Aug 26 18:32:52.248492:   two blocks
Aug 26 18:32:52.248522:   two blocks with associated data
Aug 26 18:32:52.248553: testing AES_CTR:
Aug 26 18:32:52.248557:   Encrypting 16 octets using AES-CTR with 128-bit key
Aug 26 18:32:52.248589:   Encrypting 32 octets using AES-CTR with 128-bit key
Aug 26 18:32:52.248623:   Encrypting 36 octets using AES-CTR with 128-bit key
Aug 26 18:32:52.248657:   Encrypting 16 octets using AES-CTR with 192-bit key
Aug 26 18:32:52.248689:   Encrypting 32 octets using AES-CTR with 192-bit key
Aug 26 18:32:52.248722:   Encrypting 36 octets using AES-CTR with 192-bit key
Aug 26 18:32:52.248755:   Encrypting 16 octets using AES-CTR with 256-bit key
Aug 26 18:32:52.248785:   Encrypting 32 octets using AES-CTR with 256-bit key
Aug 26 18:32:52.248819:   Encrypting 36 octets using AES-CTR with 256-bit key
Aug 26 18:32:52.248852: testing AES_CBC:
Aug 26 18:32:52.248855:   Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key
Aug 26 18:32:52.248887:   Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key
Aug 26 18:32:52.248921:   Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key
Aug 26 18:32:52.248953:   Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key
Aug 26 18:32:52.248985: testing AES_XCBC:
Aug 26 18:32:52.248990:   RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input
Aug 26 18:32:52.249104:   RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input
Aug 26 18:32:52.249236:   RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input
Aug 26 18:32:52.249364:   RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input
Aug 26 18:32:52.249496:   RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input
Aug 26 18:32:52.249623:   RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input
Aug 26 18:32:52.249757:   RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input
Aug 26 18:32:52.250065:   RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16)
Aug 26 18:32:52.250203:   RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10)
Aug 26 18:32:52.250365:   RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18)
Aug 26 18:32:52.250602: testing HMAC_MD5:
Aug 26 18:32:52.250608:   RFC 2104: MD5_HMAC test 1
Aug 26 18:32:52.250782:   RFC 2104: MD5_HMAC test 2
Aug 26 18:32:52.250930:   RFC 2104: MD5_HMAC test 3
Aug 26 18:32:52.251106: 8 CPU cores online
Aug 26 18:32:52.251111: starting up 7 crypto helpers
Aug 26 18:32:52.251143: started thread for crypto helper 0
Aug 26 18:32:52.251148: | starting up helper thread 0
Aug 26 18:32:52.251168: started thread for crypto helper 1
Aug 26 18:32:52.251170: | status value returned by setting the priority of this thread (crypto helper 0) 22
Aug 26 18:32:52.251175: | crypto helper 0 waiting (nothing to do)
Aug 26 18:32:52.251191: started thread for crypto helper 2
Aug 26 18:32:52.251193: | starting up helper thread 2
Aug 26 18:32:52.251203: | status value returned by setting the priority of this thread (crypto helper 2) 22
Aug 26 18:32:52.251206: | crypto helper 2 waiting (nothing to do)
Aug 26 18:32:52.251222: started thread for crypto helper 3
Aug 26 18:32:52.251241: started thread for crypto helper 4
Aug 26 18:32:52.251243: | starting up helper thread 4
Aug 26 18:32:52.251248: | starting up helper thread 3
Aug 26 18:32:52.251255: | status value returned by setting the priority of this thread (crypto helper 4) 22
Aug 26 18:32:52.251267: | status value returned by setting the priority of this thread (crypto helper 3) 22
Aug 26 18:32:52.251267: | crypto helper 4 waiting (nothing to do)
Aug 26 18:32:52.251277: | crypto helper 3 waiting (nothing to do)
Aug 26 18:32:52.251279: started thread for crypto helper 5
Aug 26 18:32:52.251316: started thread for crypto helper 6
Aug 26 18:32:52.251325: | starting up helper thread 1
Aug 26 18:32:52.251328: | checking IKEv1 state table
Aug 26 18:32:52.251331: | status value returned by setting the priority of this thread (crypto helper 1) 22
Aug 26 18:32:52.251334: | crypto helper 1 waiting (nothing to do)
Aug 26 18:32:52.251318: | starting up helper thread 6
Aug 26 18:32:52.251338: |   MAIN_R0: category: half-open IKE SA flags: 0:
Aug 26 18:32:52.251342: | starting up helper thread 5
Aug 26 18:32:52.251344: | status value returned by setting the priority of this thread (crypto helper 6) 22
Aug 26 18:32:52.251347: |     -> MAIN_R1 EVENT_SO_DISCARD
Aug 26 18:32:52.251358: | crypto helper 6 waiting (nothing to do)
Aug 26 18:32:52.251362: |   MAIN_I1: category: half-open IKE SA flags: 0:
Aug 26 18:32:52.251366: | status value returned by setting the priority of this thread (crypto helper 5) 22
Aug 26 18:32:52.251370: |     -> MAIN_I2 EVENT_RETRANSMIT
Aug 26 18:32:52.251376: | crypto helper 5 waiting (nothing to do)
Aug 26 18:32:52.251381: |   MAIN_R1: category: open IKE SA flags: 200:
Aug 26 18:32:52.251388: |     -> MAIN_R2 EVENT_RETRANSMIT
Aug 26 18:32:52.251391: |     -> UNDEFINED EVENT_RETRANSMIT
Aug 26 18:32:52.251394: |     -> UNDEFINED EVENT_RETRANSMIT
Aug 26 18:32:52.251396: |   MAIN_I2: category: open IKE SA flags: 0:
Aug 26 18:32:52.251398: |     -> MAIN_I3 EVENT_RETRANSMIT
Aug 26 18:32:52.251400: |     -> UNDEFINED EVENT_RETRANSMIT
Aug 26 18:32:52.251403: |     -> UNDEFINED EVENT_RETRANSMIT
Aug 26 18:32:52.251405: |   MAIN_R2: category: open IKE SA flags: 0:
Aug 26 18:32:52.251407: |     -> MAIN_R3 EVENT_SA_REPLACE
Aug 26 18:32:52.251409: |     -> MAIN_R3 EVENT_SA_REPLACE
Aug 26 18:32:52.251411: |     -> UNDEFINED EVENT_SA_REPLACE
Aug 26 18:32:52.251414: |   MAIN_I3: category: open IKE SA flags: 0:
Aug 26 18:32:52.251416: |     -> MAIN_I4 EVENT_SA_REPLACE
Aug 26 18:32:52.251418: |     -> MAIN_I4 EVENT_SA_REPLACE
Aug 26 18:32:52.251420: |     -> UNDEFINED EVENT_SA_REPLACE
Aug 26 18:32:52.251423: |   MAIN_R3: category: established IKE SA flags: 200:
Aug 26 18:32:52.251425: |     -> UNDEFINED EVENT_NULL
Aug 26 18:32:52.251427: |   MAIN_I4: category: established IKE SA flags: 0:
Aug 26 18:32:52.251429: |     -> UNDEFINED EVENT_NULL
Aug 26 18:32:52.251432: |   AGGR_R0: category: half-open IKE SA flags: 0:
Aug 26 18:32:52.251434: |     -> AGGR_R1 EVENT_SO_DISCARD
Aug 26 18:32:52.251437: |   AGGR_I1: category: half-open IKE SA flags: 0:
Aug 26 18:32:52.251439: |     -> AGGR_I2 EVENT_SA_REPLACE
Aug 26 18:32:52.251441: |     -> AGGR_I2 EVENT_SA_REPLACE
Aug 26 18:32:52.251443: |   AGGR_R1: category: open IKE SA flags: 200:
Aug 26 18:32:52.251445: |     -> AGGR_R2 EVENT_SA_REPLACE
Aug 26 18:32:52.251448: |     -> AGGR_R2 EVENT_SA_REPLACE
Aug 26 18:32:52.251450: |   AGGR_I2: category: established IKE SA flags: 200:
Aug 26 18:32:52.251452: |     -> UNDEFINED EVENT_NULL
Aug 26 18:32:52.251455: |   AGGR_R2: category: established IKE SA flags: 0:
Aug 26 18:32:52.251457: |     -> UNDEFINED EVENT_NULL
Aug 26 18:32:52.251460: |   QUICK_R0: category: established CHILD SA flags: 0:
Aug 26 18:32:52.251462: |     -> QUICK_R1 EVENT_RETRANSMIT
Aug 26 18:32:52.251468: |   QUICK_I1: category: established CHILD SA flags: 0:
Aug 26 18:32:52.251471: |     -> QUICK_I2 EVENT_SA_REPLACE
Aug 26 18:32:52.251473: |   QUICK_R1: category: established CHILD SA flags: 0:
Aug 26 18:32:52.251475: |     -> QUICK_R2 EVENT_SA_REPLACE
Aug 26 18:32:52.251478: |   QUICK_I2: category: established CHILD SA flags: 200:
Aug 26 18:32:52.251480: |     -> UNDEFINED EVENT_NULL
Aug 26 18:32:52.251483: |   QUICK_R2: category: established CHILD SA flags: 0:
Aug 26 18:32:52.251485: |     -> UNDEFINED EVENT_NULL
Aug 26 18:32:52.251487: |   INFO: category: informational flags: 0:
Aug 26 18:32:52.251489: |     -> UNDEFINED EVENT_NULL
Aug 26 18:32:52.251492: |   INFO_PROTECTED: category: informational flags: 0:
Aug 26 18:32:52.251494: |     -> UNDEFINED EVENT_NULL
Aug 26 18:32:52.251496: |   XAUTH_R0: category: established IKE SA flags: 0:
Aug 26 18:32:52.251498: |     -> XAUTH_R1 EVENT_NULL
Aug 26 18:32:52.251501: |   XAUTH_R1: category: established IKE SA flags: 0:
Aug 26 18:32:52.251503: |     -> MAIN_R3 EVENT_SA_REPLACE
Aug 26 18:32:52.251506: |   MODE_CFG_R0: category: informational flags: 0:
Aug 26 18:32:52.251508: |     -> MODE_CFG_R1 EVENT_SA_REPLACE
Aug 26 18:32:52.251510: |   MODE_CFG_R1: category: established IKE SA flags: 0:
Aug 26 18:32:52.251513: |     -> MODE_CFG_R2 EVENT_SA_REPLACE
Aug 26 18:32:52.251515: |   MODE_CFG_R2: category: established IKE SA flags: 0:
Aug 26 18:32:52.251517: |     -> UNDEFINED EVENT_NULL
Aug 26 18:32:52.251520: |   MODE_CFG_I1: category: established IKE SA flags: 0:
Aug 26 18:32:52.251522: |     -> MAIN_I4 EVENT_SA_REPLACE
Aug 26 18:32:52.251524: |   XAUTH_I0: category: established IKE SA flags: 0:
Aug 26 18:32:52.251527: |     -> XAUTH_I1 EVENT_RETRANSMIT
Aug 26 18:32:52.251529: |   XAUTH_I1: category: established IKE SA flags: 0:
Aug 26 18:32:52.251531: |     -> MAIN_I4 EVENT_RETRANSMIT
Aug 26 18:32:52.251537: | checking IKEv2 state table
Aug 26 18:32:52.251544: |   PARENT_I0: category: ignore flags: 0:
Aug 26 18:32:52.251547: |     -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT)
Aug 26 18:32:52.251550: |   PARENT_I1: category: half-open IKE SA flags: 0:
Aug 26 18:32:52.251552: |     -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification)
Aug 26 18:32:52.251555: |     -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH)
Aug 26 18:32:52.251558: |   PARENT_I2: category: open IKE SA flags: 0:
Aug 26 18:32:52.251561: |     -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification)
Aug 26 18:32:52.251564: |     -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification)
Aug 26 18:32:52.251567: |     -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification)
Aug 26 18:32:52.251570: |     -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response)
Aug 26 18:32:52.251573: |     -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification)
Aug 26 18:32:52.251576: |   PARENT_I3: category: established IKE SA flags: 0:
Aug 26 18:32:52.251579: |     -> PARENT_I3 EVENT_RETAIN (I3: Informational Request)
Aug 26 18:32:52.251581: |     -> PARENT_I3 EVENT_RETAIN (I3: Informational Response)
Aug 26 18:32:52.251583: |     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request)
Aug 26 18:32:52.251586: |     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response)
Aug 26 18:32:52.251588: |   PARENT_R0: category: half-open IKE SA flags: 0:
Aug 26 18:32:52.251591: |     -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT)
Aug 26 18:32:52.251593: |   PARENT_R1: category: half-open IKE SA flags: 0:
Aug 26 18:32:52.251596: |     -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED))
Aug 26 18:32:52.251598: |     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request)
Aug 26 18:32:52.251601: |   PARENT_R2: category: established IKE SA flags: 0:
Aug 26 18:32:52.251603: |     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request)
Aug 26 18:32:52.251608: |     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response)
Aug 26 18:32:52.251612: |     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request)
Aug 26 18:32:52.251614: |     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response)
Aug 26 18:32:52.251617: |   V2_CREATE_I0: category: established IKE SA flags: 0:
Aug 26 18:32:52.251619: |     -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA)
Aug 26 18:32:52.251622: |   V2_CREATE_I: category: established IKE SA flags: 0:
Aug 26 18:32:52.251624: |     -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response)
Aug 26 18:32:52.251627: |   V2_REKEY_IKE_I0: category: established IKE SA flags: 0:
Aug 26 18:32:52.251629: |     -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey)
Aug 26 18:32:52.251632: |   V2_REKEY_IKE_I: category: established IKE SA flags: 0:
Aug 26 18:32:52.251635: |     -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response)
Aug 26 18:32:52.251637: |   V2_REKEY_CHILD_I0: category: established IKE SA flags: 0:
Aug 26 18:32:52.251640: |     -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA)
Aug 26 18:32:52.251643: |   V2_REKEY_CHILD_I: category: established IKE SA flags: 0: <none>
Aug 26 18:32:52.251645: |   V2_CREATE_R: category: established IKE SA flags: 0:
Aug 26 18:32:52.251648: |     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request)
Aug 26 18:32:52.251650: |   V2_REKEY_IKE_R: category: established IKE SA flags: 0:
Aug 26 18:32:52.251653: |     -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey)
Aug 26 18:32:52.251656: |   V2_REKEY_CHILD_R: category: established IKE SA flags: 0: <none>
Aug 26 18:32:52.251658: |   V2_IPSEC_I: category: established CHILD SA flags: 0: <none>
Aug 26 18:32:52.251661: |   V2_IPSEC_R: category: established CHILD SA flags: 0: <none>
Aug 26 18:32:52.251664: |   IKESA_DEL: category: established IKE SA flags: 0:
Aug 26 18:32:52.251666: |     -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL)
Aug 26 18:32:52.251668: |   CHILDSA_DEL: category: informational flags: 0: <none>
Aug 26 18:32:52.251682: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64
Aug 26 18:32:52.251749: | Hard-wiring algorithms
Aug 26 18:32:52.251753: | adding AES_CCM_16 to kernel algorithm db
Aug 26 18:32:52.251757: | adding AES_CCM_12 to kernel algorithm db
Aug 26 18:32:52.251760: | adding AES_CCM_8 to kernel algorithm db
Aug 26 18:32:52.251762: | adding 3DES_CBC to kernel algorithm db
Aug 26 18:32:52.251765: | adding CAMELLIA_CBC to kernel algorithm db
Aug 26 18:32:52.251767: | adding AES_GCM_16 to kernel algorithm db
Aug 26 18:32:52.251769: | adding AES_GCM_12 to kernel algorithm db
Aug 26 18:32:52.251771: | adding AES_GCM_8 to kernel algorithm db
Aug 26 18:32:52.251774: | adding AES_CTR to kernel algorithm db
Aug 26 18:32:52.251776: | adding AES_CBC to kernel algorithm db
Aug 26 18:32:52.251778: | adding SERPENT_CBC to kernel algorithm db
Aug 26 18:32:52.251781: | adding TWOFISH_CBC to kernel algorithm db
Aug 26 18:32:52.251783: | adding NULL_AUTH_AES_GMAC to kernel algorithm db
Aug 26 18:32:52.251786: | adding NULL to kernel algorithm db
Aug 26 18:32:52.251789: | adding CHACHA20_POLY1305 to kernel algorithm db
Aug 26 18:32:52.251791: | adding HMAC_MD5_96 to kernel algorithm db
Aug 26 18:32:52.251793: | adding HMAC_SHA1_96 to kernel algorithm db
Aug 26 18:32:52.251796: | adding HMAC_SHA2_512_256 to kernel algorithm db
Aug 26 18:32:52.251798: | adding HMAC_SHA2_384_192 to kernel algorithm db
Aug 26 18:32:52.251801: | adding HMAC_SHA2_256_128 to kernel algorithm db
Aug 26 18:32:52.251803: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db
Aug 26 18:32:52.251805: | adding AES_XCBC_96 to kernel algorithm db
Aug 26 18:32:52.251807: | adding AES_CMAC_96 to kernel algorithm db
Aug 26 18:32:52.251810: | adding NONE to kernel algorithm db
Aug 26 18:32:52.251832: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes
Aug 26 18:32:52.251840: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds
Aug 26 18:32:52.251842: | setup kernel fd callback
Aug 26 18:32:52.251845: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x55c66d8ea3f8
Aug 26 18:32:52.251849: | libevent_malloc: new ptr-libevent@0x55c66d929368 size 128
Aug 26 18:32:52.251852: | libevent_malloc: new ptr-libevent@0x55c66d9304e8 size 16
Aug 26 18:32:52.251858: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x55c66d930478
Aug 26 18:32:52.251861: | libevent_malloc: new ptr-libevent@0x55c66d929418 size 128
Aug 26 18:32:52.251863: | libevent_malloc: new ptr-libevent@0x55c66d930148 size 16
Aug 26 18:32:52.252077: | global one-shot timer EVENT_CHECK_CRLS initialized
Aug 26 18:32:52.252086: selinux support is enabled.
Aug 26 18:32:52.252320: | unbound context created - setting debug level to 5
Aug 26 18:32:52.252362: | /etc/hosts lookups activated
Aug 26 18:32:52.252391: | /etc/resolv.conf usage activated
Aug 26 18:32:52.252455: | outgoing-port-avoid set 0-65535
Aug 26 18:32:52.252484: | outgoing-port-permit set 32768-60999
Aug 26 18:32:52.252488: | Loading dnssec root key from:/var/lib/unbound/root.key
Aug 26 18:32:52.252491: | No additional dnssec trust anchors defined via dnssec-trusted= option
Aug 26 18:32:52.252494: | Setting up events, loop start
Aug 26 18:32:52.252497: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x55c66d930918
Aug 26 18:32:52.252501: | libevent_malloc: new ptr-libevent@0x55c66d93c778 size 128
Aug 26 18:32:52.252504: | libevent_malloc: new ptr-libevent@0x55c66d947a68 size 16
Aug 26 18:32:52.252509: | libevent_realloc: new ptr-libevent@0x55c66d947aa8 size 256
Aug 26 18:32:52.252512: | libevent_malloc: new ptr-libevent@0x55c66d947bd8 size 8
Aug 26 18:32:52.252515: | libevent_realloc: new ptr-libevent@0x55c66d947c18 size 144
Aug 26 18:32:52.252518: | libevent_malloc: new ptr-libevent@0x55c66d8ee9c8 size 152
Aug 26 18:32:52.252521: | libevent_malloc: new ptr-libevent@0x55c66d947cd8 size 16
Aug 26 18:32:52.252525: | signal event handler PLUTO_SIGCHLD installed
Aug 26 18:32:52.252528: | libevent_malloc: new ptr-libevent@0x55c66d947d18 size 8
Aug 26 18:32:52.252530: | libevent_malloc: new ptr-libevent@0x55c66d864c58 size 152
Aug 26 18:32:52.252533: | signal event handler PLUTO_SIGTERM installed
Aug 26 18:32:52.252536: | libevent_malloc: new ptr-libevent@0x55c66d947d58 size 8
Aug 26 18:32:52.252540: | libevent_malloc: new ptr-libevent@0x55c66d868038 size 152
Aug 26 18:32:52.252543: | signal event handler PLUTO_SIGHUP installed
Aug 26 18:32:52.252545: | libevent_malloc: new ptr-libevent@0x55c66d947d98 size 8
Aug 26 18:32:52.252548: | libevent_realloc: release ptr-libevent@0x55c66d947c18
Aug 26 18:32:52.252550: | libevent_realloc: new ptr-libevent@0x55c66d947dd8 size 256
Aug 26 18:32:52.252553: | libevent_malloc: new ptr-libevent@0x55c66d947f08 size 152
Aug 26 18:32:52.252556: | signal event handler PLUTO_SIGSYS installed
Aug 26 18:32:52.252938: | created addconn helper (pid:18065) using fork+execve
Aug 26 18:32:52.252959: | forked child 18065
Aug 26 18:32:52.253006: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:32:52.253026: listening for IKE messages
Aug 26 18:32:52.253066: | Inspecting interface lo 
Aug 26 18:32:52.253074: | found lo with address 127.0.0.1
Aug 26 18:32:52.253082: | Inspecting interface eth0 
Aug 26 18:32:52.253088: | found eth0 with address 192.0.3.254
Aug 26 18:32:52.253093: | Inspecting interface eth1 
Aug 26 18:32:52.253098: | found eth1 with address 192.1.3.33
Aug 26 18:32:52.253199: Kernel supports NIC esp-hw-offload
Aug 26 18:32:52.253213: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.3.33:500
Aug 26 18:32:52.253306: | NAT-Traversal: Trying sockopt style NAT-T
Aug 26 18:32:52.253317: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
Aug 26 18:32:52.253322: adding interface eth1/eth1 192.1.3.33:4500
Aug 26 18:32:52.253358: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.3.254:500
Aug 26 18:32:52.253381: | NAT-Traversal: Trying sockopt style NAT-T
Aug 26 18:32:52.253386: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
Aug 26 18:32:52.253390: adding interface eth0/eth0 192.0.3.254:4500
Aug 26 18:32:52.253417: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500
Aug 26 18:32:52.253441: | NAT-Traversal: Trying sockopt style NAT-T
Aug 26 18:32:52.253445: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
Aug 26 18:32:52.253450: adding interface lo/lo 127.0.0.1:4500
Aug 26 18:32:52.253517: | no interfaces to sort
Aug 26 18:32:52.253522: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
Aug 26 18:32:52.253532: | add_fd_read_event_handler: new ethX-pe@0x55c66d9484e8
Aug 26 18:32:52.253536: | libevent_malloc: new ptr-libevent@0x55c66d93c6c8 size 128
Aug 26 18:32:52.253539: | libevent_malloc: new ptr-libevent@0x55c66d948558 size 16
Aug 26 18:32:52.253545: | setup callback for interface lo 127.0.0.1:4500 fd 22
Aug 26 18:32:52.253549: | add_fd_read_event_handler: new ethX-pe@0x55c66d948598
Aug 26 18:32:52.253553: | libevent_malloc: new ptr-libevent@0x55c66d8e2f08 size 128
Aug 26 18:32:52.253556: | libevent_malloc: new ptr-libevent@0x55c66d948608 size 16
Aug 26 18:32:52.253562: | setup callback for interface lo 127.0.0.1:500 fd 21
Aug 26 18:32:52.253565: | add_fd_read_event_handler: new ethX-pe@0x55c66d948648
Aug 26 18:32:52.253570: | libevent_malloc: new ptr-libevent@0x55c66d8e2fb8 size 128
Aug 26 18:32:52.253573: | libevent_malloc: new ptr-libevent@0x55c66d9486b8 size 16
Aug 26 18:32:52.253578: | setup callback for interface eth0 192.0.3.254:4500 fd 20
Aug 26 18:32:52.253581: | add_fd_read_event_handler: new ethX-pe@0x55c66d9486f8
Aug 26 18:32:52.253585: | libevent_malloc: new ptr-libevent@0x55c66d8e1f28 size 128
Aug 26 18:32:52.253588: | libevent_malloc: new ptr-libevent@0x55c66d948768 size 16
Aug 26 18:32:52.253593: | setup callback for interface eth0 192.0.3.254:500 fd 19
Aug 26 18:32:52.253597: | add_fd_read_event_handler: new ethX-pe@0x55c66d9487a8
Aug 26 18:32:52.253600: | libevent_malloc: new ptr-libevent@0x55c66d8ea238 size 128
Aug 26 18:32:52.253604: | libevent_malloc: new ptr-libevent@0x55c66d948818 size 16
Aug 26 18:32:52.253609: | setup callback for interface eth1 192.1.3.33:4500 fd 18
Aug 26 18:32:52.253612: | add_fd_read_event_handler: new ethX-pe@0x55c66d948858
Aug 26 18:32:52.253615: | libevent_malloc: new ptr-libevent@0x55c66d8ead58 size 128
Aug 26 18:32:52.253618: | libevent_malloc: new ptr-libevent@0x55c66d9488c8 size 16
Aug 26 18:32:52.253623: | setup callback for interface eth1 192.1.3.33:500 fd 17
Aug 26 18:32:52.253628: | certs and keys locked by 'free_preshared_secrets'
Aug 26 18:32:52.253631: | certs and keys unlocked by 'free_preshared_secrets'
Aug 26 18:32:52.253651: loading secrets from "/etc/ipsec.secrets"
Aug 26 18:32:52.253668: | saving Modulus
Aug 26 18:32:52.253672: | saving PublicExponent
Aug 26 18:32:52.253676: | ignoring PrivateExponent
Aug 26 18:32:52.253680: | ignoring Prime1
Aug 26 18:32:52.253684: | ignoring Prime2
Aug 26 18:32:52.253687: | ignoring Exponent1
Aug 26 18:32:52.253691: | ignoring Exponent2
Aug 26 18:32:52.253694: | ignoring Coefficient
Aug 26 18:32:52.253698: | ignoring CKAIDNSS
Aug 26 18:32:52.253733: | computed rsa CKAID  90 5d fc a1  08 68 74 7c  6f 20 d3 1b  2d 20 4b 8f
Aug 26 18:32:52.253737: | computed rsa CKAID  88 aa 7c 5d
Aug 26 18:32:52.253741: loaded private key for keyid: PKK_RSA:AQPl33O2P
Aug 26 18:32:52.253748: | certs and keys locked by 'process_secret'
Aug 26 18:32:52.253752: | certs and keys unlocked by 'process_secret'
Aug 26 18:32:52.253762: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:32:52.253770: | spent 0.76 milliseconds in whack
Aug 26 18:32:52.276617: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:32:52.276640: listening for IKE messages
Aug 26 18:32:52.276711: | Inspecting interface lo 
Aug 26 18:32:52.276717: | found lo with address 127.0.0.1
Aug 26 18:32:52.276719: | Inspecting interface eth0 
Aug 26 18:32:52.276722: | found eth0 with address 192.0.3.254
Aug 26 18:32:52.276724: | Inspecting interface eth1 
Aug 26 18:32:52.276726: | found eth1 with address 192.1.3.33
Aug 26 18:32:52.276777: | no interfaces to sort
Aug 26 18:32:52.276784: | libevent_free: release ptr-libevent@0x55c66d93c6c8
Aug 26 18:32:52.276786: | free_event_entry: release EVENT_NULL-pe@0x55c66d9484e8
Aug 26 18:32:52.276788: | add_fd_read_event_handler: new ethX-pe@0x55c66d9484e8
Aug 26 18:32:52.276791: | libevent_malloc: new ptr-libevent@0x55c66d93c6c8 size 128
Aug 26 18:32:52.276796: | setup callback for interface lo 127.0.0.1:4500 fd 22
Aug 26 18:32:52.276799: | libevent_free: release ptr-libevent@0x55c66d8e2f08
Aug 26 18:32:52.276800: | free_event_entry: release EVENT_NULL-pe@0x55c66d948598
Aug 26 18:32:52.276802: | add_fd_read_event_handler: new ethX-pe@0x55c66d948598
Aug 26 18:32:52.276804: | libevent_malloc: new ptr-libevent@0x55c66d8e2f08 size 128
Aug 26 18:32:52.276807: | setup callback for interface lo 127.0.0.1:500 fd 21
Aug 26 18:32:52.276810: | libevent_free: release ptr-libevent@0x55c66d8e2fb8
Aug 26 18:32:52.276811: | free_event_entry: release EVENT_NULL-pe@0x55c66d948648
Aug 26 18:32:52.276813: | add_fd_read_event_handler: new ethX-pe@0x55c66d948648
Aug 26 18:32:52.276815: | libevent_malloc: new ptr-libevent@0x55c66d8e2fb8 size 128
Aug 26 18:32:52.276818: | setup callback for interface eth0 192.0.3.254:4500 fd 20
Aug 26 18:32:52.276820: | libevent_free: release ptr-libevent@0x55c66d8e1f28
Aug 26 18:32:52.276822: | free_event_entry: release EVENT_NULL-pe@0x55c66d9486f8
Aug 26 18:32:52.276824: | add_fd_read_event_handler: new ethX-pe@0x55c66d9486f8
Aug 26 18:32:52.276826: | libevent_malloc: new ptr-libevent@0x55c66d8e1f28 size 128
Aug 26 18:32:52.276829: | setup callback for interface eth0 192.0.3.254:500 fd 19
Aug 26 18:32:52.276831: | libevent_free: release ptr-libevent@0x55c66d8ea238
Aug 26 18:32:52.276833: | free_event_entry: release EVENT_NULL-pe@0x55c66d9487a8
Aug 26 18:32:52.276834: | add_fd_read_event_handler: new ethX-pe@0x55c66d9487a8
Aug 26 18:32:52.276836: | libevent_malloc: new ptr-libevent@0x55c66d8ea238 size 128
Aug 26 18:32:52.276839: | setup callback for interface eth1 192.1.3.33:4500 fd 18
Aug 26 18:32:52.276842: | libevent_free: release ptr-libevent@0x55c66d8ead58
Aug 26 18:32:52.276843: | free_event_entry: release EVENT_NULL-pe@0x55c66d948858
Aug 26 18:32:52.276845: | add_fd_read_event_handler: new ethX-pe@0x55c66d948858
Aug 26 18:32:52.276847: | libevent_malloc: new ptr-libevent@0x55c66d8ead58 size 128
Aug 26 18:32:52.276850: | setup callback for interface eth1 192.1.3.33:500 fd 17
Aug 26 18:32:52.276852: | certs and keys locked by 'free_preshared_secrets'
Aug 26 18:32:52.276854: forgetting secrets
Aug 26 18:32:52.276862: | certs and keys unlocked by 'free_preshared_secrets'
Aug 26 18:32:52.276872: loading secrets from "/etc/ipsec.secrets"
Aug 26 18:32:52.276883: | saving Modulus
Aug 26 18:32:52.276885: | saving PublicExponent
Aug 26 18:32:52.276887: | ignoring PrivateExponent
Aug 26 18:32:52.276889: | ignoring Prime1
Aug 26 18:32:52.276891: | ignoring Prime2
Aug 26 18:32:52.276893: | ignoring Exponent1
Aug 26 18:32:52.276895: | ignoring Exponent2
Aug 26 18:32:52.276897: | ignoring Coefficient
Aug 26 18:32:52.276899: | ignoring CKAIDNSS
Aug 26 18:32:52.276917: | computed rsa CKAID  90 5d fc a1  08 68 74 7c  6f 20 d3 1b  2d 20 4b 8f
Aug 26 18:32:52.276919: | computed rsa CKAID  88 aa 7c 5d
Aug 26 18:32:52.276922: loaded private key for keyid: PKK_RSA:AQPl33O2P
Aug 26 18:32:52.276926: | certs and keys locked by 'process_secret'
Aug 26 18:32:52.276928: | certs and keys unlocked by 'process_secret'
Aug 26 18:32:52.276935: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:32:52.276940: | spent 0.343 milliseconds in whack
Aug 26 18:32:52.277427: | processing signal PLUTO_SIGCHLD
Aug 26 18:32:52.277441: | waitpid returned pid 18065 (exited with status 0)
Aug 26 18:32:52.277447: | reaped addconn helper child (status 0)
Aug 26 18:32:52.277451: | waitpid returned ECHILD (no child processes left)
Aug 26 18:32:52.277454: | spent 0.0164 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:32:52.334896: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:32:52.334919: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:32:52.334922: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias
Aug 26 18:32:52.334924: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:32:52.334925: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias
Aug 26 18:32:52.334928: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:32:52.334934: | Added new connection north-a-dpd with policy ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
Aug 26 18:32:52.334936: | No AUTH policy was set - defaulting to RSASIG
Aug 26 18:32:52.335404: | setting ID to ID_DER_ASN1_DN: 'E=user-north@testing.libreswan.org,CN=north.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA'
Aug 26 18:32:52.335418: | loading left certificate 'north' pubkey
Aug 26 18:32:52.335489: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d94a998
Aug 26 18:32:52.335493: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d94a948
Aug 26 18:32:52.335495: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d94a8f8
Aug 26 18:32:52.335585: | unreference key: 0x55c66d94a9e8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org cnt 1--
Aug 26 18:32:52.335717: | certs and keys locked by 'lsw_add_rsa_secret'
Aug 26 18:32:52.335721: | certs and keys unlocked by 'lsw_add_rsa_secret'
Aug 26 18:32:52.335727: | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org is 0
Aug 26 18:32:52.336149: | setting ID to ID_DER_ASN1_DN: 'E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA'
Aug 26 18:32:52.336155: | loading right certificate 'east' pubkey
Aug 26 18:32:52.336212: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d94ec98
Aug 26 18:32:52.336217: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d94ec48
Aug 26 18:32:52.336218: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d94e008
Aug 26 18:32:52.336220: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d94db38
Aug 26 18:32:52.336221: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d94a648
Aug 26 18:32:52.336401: | unreference key: 0x55c66d953828 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1--
Aug 26 18:32:52.336480: | warning: no secret key loaded for right certificate with nickname east: NSS: cert private key not found
Aug 26 18:32:52.336487: | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org is 0
Aug 26 18:32:52.336495: | connect_to_host_pair: 192.1.3.33:500 192.1.2.23:500 -> hp@(nil): none
Aug 26 18:32:52.336497: | new hp@0x55c66d953128
Aug 26 18:32:52.336500: added connection description "north-a-dpd"
Aug 26 18:32:52.336510: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
Aug 26 18:32:52.336542: | 192.0.3.0/24===192.1.3.33<192.1.3.33>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org]---192.1.3.254...192.1.2.23<192.1.2.23>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org]===192.0.22.0/24
Aug 26 18:32:52.336551: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:32:52.336577: | spent 1.62 milliseconds in whack
Aug 26 18:32:52.417752: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:32:52.417775: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:32:52.417780: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias
Aug 26 18:32:52.417782: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:32:52.417785: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias
Aug 26 18:32:52.417790: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:32:52.417797: | Added new connection northnet-eastnet-b with policy ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
Aug 26 18:32:52.417801: | No AUTH policy was set - defaulting to RSASIG
Aug 26 18:32:52.417934: | setting ID to ID_DER_ASN1_DN: 'E=user-north@testing.libreswan.org,CN=north.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA'
Aug 26 18:32:52.417943: | loading left certificate 'north' pubkey
Aug 26 18:32:52.418011: | unreference key: 0x55c66d94ef88 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org cnt 1--
Aug 26 18:32:52.418028: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d952708
Aug 26 18:32:52.418033: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d94a648
Aug 26 18:32:52.418036: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d952678
Aug 26 18:32:52.418090: | unreference key: 0x55c66d94de38 @north.testing.libreswan.org cnt 1--
Aug 26 18:32:52.418142: | unreference key: 0x55c66d94e058 user-north@testing.libreswan.org cnt 1--
Aug 26 18:32:52.418197: | unreference key: 0x55c66d955458 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org cnt 1--
Aug 26 18:32:52.418246: | secrets entry for north already exists
Aug 26 18:32:52.418256: | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org is 0
Aug 26 18:32:52.418351: | setting ID to ID_DER_ASN1_DN: 'E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA'
Aug 26 18:32:52.418363: | loading right certificate 'east' pubkey
Aug 26 18:32:52.418420: | unreference key: 0x55c66d954b18 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1--
Aug 26 18:32:52.418435: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d952678
Aug 26 18:32:52.418440: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d953208
Aug 26 18:32:52.418443: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d9555f8
Aug 26 18:32:52.418446: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d9535b8
Aug 26 18:32:52.418449: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d952d18
Aug 26 18:32:52.418502: | unreference key: 0x55c66d953608 192.1.2.23 cnt 1--
Aug 26 18:32:52.418556: | unreference key: 0x55c66d952928 east@testing.libreswan.org cnt 1--
Aug 26 18:32:52.418610: | unreference key: 0x55c66d9543b8 @east.testing.libreswan.org cnt 1--
Aug 26 18:32:52.418662: | unreference key: 0x55c66d954908 user-east@testing.libreswan.org cnt 1--
Aug 26 18:32:52.418716: | unreference key: 0x55c66d9533d8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1--
Aug 26 18:32:52.418841: | warning: no secret key loaded for right certificate with nickname east: NSS: cert private key not found
Aug 26 18:32:52.418852: | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org is 0
Aug 26 18:32:52.418862: | find_host_pair: comparing 192.1.3.33:500 to 192.1.2.23:500 but ignoring ports
Aug 26 18:32:52.418867: | connect_to_host_pair: 192.1.3.33:500 192.1.2.23:500 -> hp@0x55c66d953128: north-a-dpd
Aug 26 18:32:52.418870: added connection description "northnet-eastnet-b"
Aug 26 18:32:52.418891: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
Aug 26 18:32:52.418910: | 192.0.3.0/24===192.1.3.33<192.1.3.33>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org]---192.1.3.254...192.1.2.23<192.1.2.23>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org]===192.0.2.0/24
Aug 26 18:32:52.418920: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:32:52.418927: | spent 1.18 milliseconds in whack
Aug 26 18:32:52.533663: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:32:52.533683: | dup_any(fd@16) -> fd@23 (in whack_process() at rcv_whack.c:590)
Aug 26 18:32:52.533686: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:32:52.533689: initiating all conns with alias='north-b'
Aug 26 18:32:52.533693: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias
Aug 26 18:32:52.533698: | close_any(fd@23) (in initiate_connection() at initiate.c:384)
Aug 26 18:32:52.533703: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:32:52.533708: | spent 0.0528 milliseconds in whack
Aug 26 18:32:52.594059: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:32:52.594080: | dup_any(fd@16) -> fd@23 (in whack_process() at rcv_whack.c:590)
Aug 26 18:32:52.594083: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:32:52.594087: | start processing: connection "north-a-dpd" (in initiate_a_connection() at initiate.c:186)
Aug 26 18:32:52.594090: | empty esp_info, returning defaults for ENCRYPT
Aug 26 18:32:52.594095: | connection 'north-a-dpd' +POLICY_UP
Aug 26 18:32:52.594097: | dup_any(fd@23) -> fd@24 (in initiate_a_connection() at initiate.c:342)
Aug 26 18:32:52.594099: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:32:52.594118: | creating state object #1 at 0x55c66d956938
Aug 26 18:32:52.594120: | State DB: adding IKEv1 state #1 in UNDEFINED
Aug 26 18:32:52.594126: | pstats #1 ikev1.isakmp started
Aug 26 18:32:52.594131: | suspend processing: connection "north-a-dpd" (in main_outI1() at ikev1_main.c:118)
Aug 26 18:32:52.594135: | start processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118)
Aug 26 18:32:52.594138: | parent state #1: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA)
Aug 26 18:32:52.594140: | dup_any(fd@24) -> fd@25 (in main_outI1() at ikev1_main.c:123)
Aug 26 18:32:52.594143: | Queuing pending IPsec SA negotiating with 192.1.2.23 "north-a-dpd" IKE SA #1 "north-a-dpd"
Aug 26 18:32:52.594146: "north-a-dpd" #1: initiating Main Mode
Aug 26 18:32:52.594173: | **emit ISAKMP Message:
Aug 26 18:32:52.594175: |    initiator cookie:
Aug 26 18:32:52.594177: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:52.594179: |    responder cookie:
Aug 26 18:32:52.594180: |   00 00 00 00  00 00 00 00
Aug 26 18:32:52.594182: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:32:52.594184: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:32:52.594186: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:32:52.594188: |    flags: none (0x0)
Aug 26 18:32:52.594189: |    Message ID: 0 (0x0)
Aug 26 18:32:52.594191: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:32:52.594193: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:32:52.594196: | no specific IKE algorithms specified - using defaults
Aug 26 18:32:52.594212: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0
Aug 26 18:32:52.594218: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0
Aug 26 18:32:52.594221: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0
Aug 26 18:32:52.594228: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0
Aug 26 18:32:52.594232: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0
Aug 26 18:32:52.594236: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0
Aug 26 18:32:52.594240: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0
Aug 26 18:32:52.594244: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0
Aug 26 18:32:52.594247: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0
Aug 26 18:32:52.594251: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0
Aug 26 18:32:52.594254: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0
Aug 26 18:32:52.594258: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0
Aug 26 18:32:52.594263: | oakley_alg_makedb() returning 0x55c66d958c48
Aug 26 18:32:52.594267: | ***emit ISAKMP Security Association Payload:
Aug 26 18:32:52.594269: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:32:52.594271: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:32:52.594273: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:32:52.594276: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:32:52.594278: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.594280: | ****emit IPsec DOI SIT:
Aug 26 18:32:52.594282: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:32:52.594284: | ikev1_out_sa pcn: 0 has 1 valid proposals
Aug 26 18:32:52.594286: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18
Aug 26 18:32:52.594292: | ****emit ISAKMP Proposal Payload:
Aug 26 18:32:52.594296: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.594298: |    proposal number: 0 (0x0)
Aug 26 18:32:52.594300: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:32:52.594301: |    SPI size: 0 (0x0)
Aug 26 18:32:52.594303: |    number of transforms: 18 (0x12)
Aug 26 18:32:52.594305: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
Aug 26 18:32:52.594307: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.594309: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594310: |    ISAKMP transform number: 0 (0x0)
Aug 26 18:32:52.594312: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.594314: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.594316: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594318: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.594320: |    length/value: 1 (0x1)
Aug 26 18:32:52.594322: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.594323: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594325: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.594327: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.594328: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594330: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.594332: |    length/value: 7 (0x7)
Aug 26 18:32:52.594333: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:32:52.594335: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594337: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.594338: |    length/value: 4 (0x4)
Aug 26 18:32:52.594340: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:32:52.594341: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594343: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.594344: |    length/value: 3 (0x3)
Aug 26 18:32:52.594346: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.594349: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594351: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.594353: |    length/value: 14 (0xe)
Aug 26 18:32:52.594354: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:32:52.594356: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594358: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:32:52.594359: |    length/value: 256 (0x100)
Aug 26 18:32:52.594361: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:32:52.594363: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.594364: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594366: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:32:52.594367: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.594369: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594371: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.594373: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594374: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.594376: |    length/value: 1 (0x1)
Aug 26 18:32:52.594378: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.594379: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594381: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.594382: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.594384: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594385: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.594387: |    length/value: 7 (0x7)
Aug 26 18:32:52.594388: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:32:52.594390: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594392: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.594393: |    length/value: 4 (0x4)
Aug 26 18:32:52.594395: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:32:52.594396: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594398: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.594399: |    length/value: 3 (0x3)
Aug 26 18:32:52.594401: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.594402: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594404: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.594406: |    length/value: 14 (0xe)
Aug 26 18:32:52.594407: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:32:52.594409: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594410: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:32:52.594412: |    length/value: 128 (0x80)
Aug 26 18:32:52.594413: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:32:52.594415: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.594417: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594418: |    ISAKMP transform number: 2 (0x2)
Aug 26 18:32:52.594420: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.594422: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594423: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.594425: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594427: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.594428: |    length/value: 1 (0x1)
Aug 26 18:32:52.594430: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.594431: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594433: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.594434: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.594436: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594438: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.594439: |    length/value: 7 (0x7)
Aug 26 18:32:52.594441: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:32:52.594442: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594445: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.594447: |    length/value: 6 (0x6)
Aug 26 18:32:52.594448: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:32:52.594450: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594451: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.594453: |    length/value: 3 (0x3)
Aug 26 18:32:52.594454: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.594456: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594457: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.594459: |    length/value: 14 (0xe)
Aug 26 18:32:52.594460: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:32:52.594462: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594464: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:32:52.594465: |    length/value: 256 (0x100)
Aug 26 18:32:52.594467: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:32:52.594468: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.594470: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594471: |    ISAKMP transform number: 3 (0x3)
Aug 26 18:32:52.594473: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.594475: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594477: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.594478: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594480: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.594481: |    length/value: 1 (0x1)
Aug 26 18:32:52.594483: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.594484: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594486: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.594488: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.594489: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594491: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.594492: |    length/value: 7 (0x7)
Aug 26 18:32:52.594494: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:32:52.594495: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594497: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.594498: |    length/value: 6 (0x6)
Aug 26 18:32:52.594500: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:32:52.594501: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594503: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.594505: |    length/value: 3 (0x3)
Aug 26 18:32:52.594506: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.594508: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594509: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.594511: |    length/value: 14 (0xe)
Aug 26 18:32:52.594512: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:32:52.594514: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594515: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:32:52.594517: |    length/value: 128 (0x80)
Aug 26 18:32:52.594518: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:32:52.594520: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.594522: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594523: |    ISAKMP transform number: 4 (0x4)
Aug 26 18:32:52.594525: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.594527: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594528: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.594530: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594532: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.594533: |    length/value: 1 (0x1)
Aug 26 18:32:52.594535: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.594536: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594538: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.594540: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.594542: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594544: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.594545: |    length/value: 7 (0x7)
Aug 26 18:32:52.594547: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:32:52.594548: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594550: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.594551: |    length/value: 2 (0x2)
Aug 26 18:32:52.594553: |     [2 is OAKLEY_SHA1]
Aug 26 18:32:52.594554: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594556: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.594557: |    length/value: 3 (0x3)
Aug 26 18:32:52.594559: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.594560: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594562: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.594564: |    length/value: 14 (0xe)
Aug 26 18:32:52.594565: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:32:52.594567: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594568: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:32:52.594570: |    length/value: 256 (0x100)
Aug 26 18:32:52.594571: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:32:52.594573: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.594574: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594576: |    ISAKMP transform number: 5 (0x5)
Aug 26 18:32:52.594578: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.594579: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594581: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.594583: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594584: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.594586: |    length/value: 1 (0x1)
Aug 26 18:32:52.594587: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.594589: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594591: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.594592: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.594594: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594595: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.594597: |    length/value: 7 (0x7)
Aug 26 18:32:52.594598: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:32:52.594600: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594601: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.594603: |    length/value: 2 (0x2)
Aug 26 18:32:52.594604: |     [2 is OAKLEY_SHA1]
Aug 26 18:32:52.594606: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594608: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.594609: |    length/value: 3 (0x3)
Aug 26 18:32:52.594611: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.594612: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594614: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.594615: |    length/value: 14 (0xe)
Aug 26 18:32:52.594617: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:32:52.594618: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594620: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:32:52.594621: |    length/value: 128 (0x80)
Aug 26 18:32:52.594623: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:32:52.594625: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.594626: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594628: |    ISAKMP transform number: 6 (0x6)
Aug 26 18:32:52.594629: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.594631: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594633: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.594637: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594639: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.594640: |    length/value: 1 (0x1)
Aug 26 18:32:52.594642: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.594643: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594645: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.594646: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.594648: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594650: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.594651: |    length/value: 7 (0x7)
Aug 26 18:32:52.594653: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:32:52.594654: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594656: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.594657: |    length/value: 4 (0x4)
Aug 26 18:32:52.594659: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:32:52.594660: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594662: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.594663: |    length/value: 3 (0x3)
Aug 26 18:32:52.594665: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.594666: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594668: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.594669: |    length/value: 5 (0x5)
Aug 26 18:32:52.594671: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:32:52.594672: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594674: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:32:52.594676: |    length/value: 256 (0x100)
Aug 26 18:32:52.594677: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:32:52.594679: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.594680: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594682: |    ISAKMP transform number: 7 (0x7)
Aug 26 18:32:52.594684: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.594685: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594687: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.594689: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594690: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.594692: |    length/value: 1 (0x1)
Aug 26 18:32:52.594693: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.594695: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594697: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.594698: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.594700: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594701: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.594703: |    length/value: 7 (0x7)
Aug 26 18:32:52.594704: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:32:52.594706: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594707: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.594709: |    length/value: 4 (0x4)
Aug 26 18:32:52.594710: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:32:52.594712: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594713: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.594715: |    length/value: 3 (0x3)
Aug 26 18:32:52.594717: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.594718: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594720: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.594721: |    length/value: 5 (0x5)
Aug 26 18:32:52.594723: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:32:52.594724: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594726: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:32:52.594727: |    length/value: 128 (0x80)
Aug 26 18:32:52.594729: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:32:52.594730: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.594732: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594734: |    ISAKMP transform number: 8 (0x8)
Aug 26 18:32:52.594736: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.594738: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594740: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.594741: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594743: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.594745: |    length/value: 1 (0x1)
Aug 26 18:32:52.594746: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.594748: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594749: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.594751: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.594752: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594754: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.594755: |    length/value: 7 (0x7)
Aug 26 18:32:52.594757: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:32:52.594758: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594760: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.594762: |    length/value: 6 (0x6)
Aug 26 18:32:52.594763: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:32:52.594765: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594766: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.594768: |    length/value: 3 (0x3)
Aug 26 18:32:52.594769: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.594771: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594772: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.594774: |    length/value: 5 (0x5)
Aug 26 18:32:52.594775: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:32:52.594777: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594778: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:32:52.594780: |    length/value: 256 (0x100)
Aug 26 18:32:52.594782: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:32:52.594783: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.594785: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594786: |    ISAKMP transform number: 9 (0x9)
Aug 26 18:32:52.594788: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.594790: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594791: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.594793: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594795: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.594796: |    length/value: 1 (0x1)
Aug 26 18:32:52.594798: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.594799: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594801: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.594802: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.594804: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594806: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.594807: |    length/value: 7 (0x7)
Aug 26 18:32:52.594809: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:32:52.594810: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594812: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.594813: |    length/value: 6 (0x6)
Aug 26 18:32:52.594815: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:32:52.594816: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594818: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.594819: |    length/value: 3 (0x3)
Aug 26 18:32:52.594821: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.594822: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594824: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.594825: |    length/value: 5 (0x5)
Aug 26 18:32:52.594828: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:32:52.594829: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594831: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:32:52.594833: |    length/value: 128 (0x80)
Aug 26 18:32:52.594834: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:32:52.594836: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.594837: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594839: |    ISAKMP transform number: 10 (0xa)
Aug 26 18:32:52.594840: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.594842: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594844: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.594846: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594847: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.594849: |    length/value: 1 (0x1)
Aug 26 18:32:52.594850: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.594852: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594854: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.594855: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.594857: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594858: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.594860: |    length/value: 7 (0x7)
Aug 26 18:32:52.594861: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:32:52.594863: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594864: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.594866: |    length/value: 2 (0x2)
Aug 26 18:32:52.594867: |     [2 is OAKLEY_SHA1]
Aug 26 18:32:52.594869: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594871: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.594872: |    length/value: 3 (0x3)
Aug 26 18:32:52.594874: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.594875: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594877: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.594878: |    length/value: 5 (0x5)
Aug 26 18:32:52.594880: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:32:52.594881: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594883: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:32:52.594884: |    length/value: 256 (0x100)
Aug 26 18:32:52.594886: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:32:52.594888: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.594889: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594891: |    ISAKMP transform number: 11 (0xb)
Aug 26 18:32:52.594892: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.594894: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594896: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.594897: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594899: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.594901: |    length/value: 1 (0x1)
Aug 26 18:32:52.594902: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.594904: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594905: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.594907: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.594908: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594910: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.594911: |    length/value: 7 (0x7)
Aug 26 18:32:52.594913: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:32:52.594914: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594916: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.594918: |    length/value: 2 (0x2)
Aug 26 18:32:52.594919: |     [2 is OAKLEY_SHA1]
Aug 26 18:32:52.594921: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594923: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.594925: |    length/value: 3 (0x3)
Aug 26 18:32:52.594926: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.594928: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594929: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.594931: |    length/value: 5 (0x5)
Aug 26 18:32:52.594932: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:32:52.594934: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594935: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:32:52.594937: |    length/value: 128 (0x80)
Aug 26 18:32:52.594938: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:32:52.594940: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.594942: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594943: |    ISAKMP transform number: 12 (0xc)
Aug 26 18:32:52.594945: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.594947: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594948: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.594950: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594952: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.594953: |    length/value: 1 (0x1)
Aug 26 18:32:52.594955: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.594956: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594958: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.594959: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.594961: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594962: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.594964: |    length/value: 5 (0x5)
Aug 26 18:32:52.594965: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:32:52.594967: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594969: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.594970: |    length/value: 4 (0x4)
Aug 26 18:32:52.594972: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:32:52.594973: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594975: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.594976: |    length/value: 3 (0x3)
Aug 26 18:32:52.594978: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.594979: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594981: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.594982: |    length/value: 14 (0xe)
Aug 26 18:32:52.594984: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:32:52.594985: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:32:52.594987: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.594989: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594990: |    ISAKMP transform number: 13 (0xd)
Aug 26 18:32:52.594992: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.594994: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.594995: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.594997: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.594999: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.595000: |    length/value: 1 (0x1)
Aug 26 18:32:52.595002: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.595003: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595005: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.595006: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.595008: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595009: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.595011: |    length/value: 5 (0x5)
Aug 26 18:32:52.595012: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:32:52.595014: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595016: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.595018: |    length/value: 6 (0x6)
Aug 26 18:32:52.595019: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:32:52.595021: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595022: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.595024: |    length/value: 3 (0x3)
Aug 26 18:32:52.595026: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.595027: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595029: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.595030: |    length/value: 14 (0xe)
Aug 26 18:32:52.595032: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:32:52.595033: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:32:52.595035: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.595036: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.595038: |    ISAKMP transform number: 14 (0xe)
Aug 26 18:32:52.595040: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.595041: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.595043: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.595045: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595047: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.595048: |    length/value: 1 (0x1)
Aug 26 18:32:52.595050: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.595051: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595053: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.595054: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.595056: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595057: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.595059: |    length/value: 5 (0x5)
Aug 26 18:32:52.595061: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:32:52.595062: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595064: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.595065: |    length/value: 2 (0x2)
Aug 26 18:32:52.595067: |     [2 is OAKLEY_SHA1]
Aug 26 18:32:52.595068: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595070: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.595071: |    length/value: 3 (0x3)
Aug 26 18:32:52.595073: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.595074: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595076: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.595078: |    length/value: 14 (0xe)
Aug 26 18:32:52.595079: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:32:52.595081: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:32:52.595082: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.595084: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.595085: |    ISAKMP transform number: 15 (0xf)
Aug 26 18:32:52.595087: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.595089: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.595091: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.595092: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595094: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.595095: |    length/value: 1 (0x1)
Aug 26 18:32:52.595097: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.595099: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595100: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.595102: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.595103: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595105: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.595106: |    length/value: 5 (0x5)
Aug 26 18:32:52.595108: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:32:52.595110: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595112: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.595113: |    length/value: 4 (0x4)
Aug 26 18:32:52.595115: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:32:52.595116: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595118: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.595120: |    length/value: 3 (0x3)
Aug 26 18:32:52.595121: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.595123: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595124: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.595126: |    length/value: 5 (0x5)
Aug 26 18:32:52.595127: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:32:52.595129: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:32:52.595131: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.595132: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.595134: |    ISAKMP transform number: 16 (0x10)
Aug 26 18:32:52.595135: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.595137: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.595139: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.595140: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595142: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.595144: |    length/value: 1 (0x1)
Aug 26 18:32:52.595145: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.595147: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595148: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.595150: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.595151: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595153: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.595155: |    length/value: 5 (0x5)
Aug 26 18:32:52.595156: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:32:52.595158: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595159: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.595161: |    length/value: 6 (0x6)
Aug 26 18:32:52.595162: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:32:52.595164: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595165: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.595167: |    length/value: 3 (0x3)
Aug 26 18:32:52.595168: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.595170: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595171: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.595173: |    length/value: 5 (0x5)
Aug 26 18:32:52.595174: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:32:52.595176: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:32:52.595178: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.595179: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.595181: |    ISAKMP transform number: 17 (0x11)
Aug 26 18:32:52.595182: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.595184: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.595186: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:32:52.595187: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595189: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.595191: |    length/value: 1 (0x1)
Aug 26 18:32:52.595192: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.595194: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595195: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.595197: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.595198: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595200: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.595202: |    length/value: 5 (0x5)
Aug 26 18:32:52.595203: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:32:52.595205: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595207: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.595209: |    length/value: 2 (0x2)
Aug 26 18:32:52.595210: |     [2 is OAKLEY_SHA1]
Aug 26 18:32:52.595212: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595213: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.595215: |    length/value: 3 (0x3)
Aug 26 18:32:52.595216: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.595218: | ******emit ISAKMP Oakley attribute:
Aug 26 18:32:52.595219: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.595221: |    length/value: 5 (0x5)
Aug 26 18:32:52.595222: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:32:52.595224: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:32:52.595226: | emitting length of ISAKMP Proposal Payload: 632
Aug 26 18:32:52.595228: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0
Aug 26 18:32:52.595229: | emitting length of ISAKMP Security Association Payload: 644
Aug 26 18:32:52.595231: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
Aug 26 18:32:52.595235: | out_vid(): sending [FRAGMENTATION]
Aug 26 18:32:52.595236: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:32:52.595238: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:32:52.595240: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:32:52.595242: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:32:52.595244: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.595246: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:32:52.595248: | V_ID  40 48 b7 d5  6e bc e8 85  25 e7 de 7f  00 d6 c2 d3
Aug 26 18:32:52.595250: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:32:52.595251: | out_vid(): sending [Dead Peer Detection]
Aug 26 18:32:52.595253: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:32:52.595255: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.595257: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:32:52.595258: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.595260: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:32:52.595262: | V_ID  af ca d7 13  68 a1 f1 c9  6b 86 96 fc  77 57 01 00
Aug 26 18:32:52.595263: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:32:52.595265: | nat add vid
Aug 26 18:32:52.595267: | sending draft and RFC NATT VIDs
Aug 26 18:32:52.595268: | out_vid(): sending [RFC 3947]
Aug 26 18:32:52.595270: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:32:52.595271: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:32:52.595273: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:32:52.595275: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:32:52.595277: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.595279: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:32:52.595280: | V_ID  4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
Aug 26 18:32:52.595282: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:32:52.595283: | skipping VID_NATT_RFC
Aug 26 18:32:52.595285: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03]
Aug 26 18:32:52.595286: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:32:52.595302: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:32:52.595307: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:32:52.595309: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:32:52.595311: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.595312: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:32:52.595314: | V_ID  7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
Aug 26 18:32:52.595316: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:32:52.595317: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n]
Aug 26 18:32:52.595319: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:32:52.595320: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:32:52.595322: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:32:52.595324: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:32:52.595326: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.595328: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:32:52.595329: | V_ID  90 cb 80 91  3e bb 69 6e  08 63 81 b5  ec 42 7b 1f
Aug 26 18:32:52.595331: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:32:52.595332: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02]
Aug 26 18:32:52.595334: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:32:52.595336: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.595337: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:32:52.595339: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.595341: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:32:52.595343: | V_ID  cd 60 46 43  35 df 21 f8  7c fd b2 fc  68 b6 a4 48
Aug 26 18:32:52.595344: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:32:52.595346: | no IKEv1 message padding required
Aug 26 18:32:52.595347: | emitting length of ISAKMP Message: 792
Aug 26 18:32:52.595358: | sending 792 bytes for reply packet for main_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1)
Aug 26 18:32:52.595360: |   35 80 c1 69  e2 a9 e2 31  00 00 00 00  00 00 00 00
Aug 26 18:32:52.595361: |   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
Aug 26 18:32:52.595363: |   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
Aug 26 18:32:52.595364: |   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:32:52.595366: |   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:32:52.595367: |   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
Aug 26 18:32:52.595369: |   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
Aug 26 18:32:52.595370: |   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
Aug 26 18:32:52.595372: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
Aug 26 18:32:52.595373: |   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
Aug 26 18:32:52.595375: |   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:32:52.595376: |   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
Aug 26 18:32:52.595378: |   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:32:52.595379: |   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:32:52.595381: |   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
Aug 26 18:32:52.595382: |   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
Aug 26 18:32:52.595384: |   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
Aug 26 18:32:52.595385: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
Aug 26 18:32:52.595387: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:32:52.595388: |   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:32:52.595391: |   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:32:52.595392: |   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:32:52.595394: |   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:32:52.595395: |   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
Aug 26 18:32:52.595397: |   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
Aug 26 18:32:52.595398: |   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
Aug 26 18:32:52.595400: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
Aug 26 18:32:52.595401: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:32:52.595403: |   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:32:52.595404: |   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:32:52.595406: |   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:32:52.595407: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:32:52.595409: |   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:32:52.595410: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
Aug 26 18:32:52.595412: |   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:32:52.595413: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:32:52.595415: |   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:32:52.595416: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
Aug 26 18:32:52.595418: |   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:32:52.595419: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:32:52.595420: |   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:32:52.595422: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
Aug 26 18:32:52.595423: |   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
Aug 26 18:32:52.595425: |   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
Aug 26 18:32:52.595426: |   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
Aug 26 18:32:52.595428: |   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
Aug 26 18:32:52.595429: |   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
Aug 26 18:32:52.595431: |   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
Aug 26 18:32:52.595432: |   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
Aug 26 18:32:52.595434: |   7c fd b2 fc  68 b6 a4 48
Aug 26 18:32:52.595516: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:32:52.595520: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1
Aug 26 18:32:52.595523: | libevent_malloc: new ptr-libevent@0x55c66d953778 size 128
Aug 26 18:32:52.595527: | #1 STATE_MAIN_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29658.337981
Aug 26 18:32:52.595537: | #1 spent 1.37 milliseconds in main_outI1()
Aug 26 18:32:52.595540: | stop processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in main_outI1() at ikev1_main.c:228)
Aug 26 18:32:52.595543: | resume processing: connection "north-a-dpd" (in main_outI1() at ikev1_main.c:228)
Aug 26 18:32:52.595545: | stop processing: connection "north-a-dpd" (in initiate_a_connection() at initiate.c:349)
Aug 26 18:32:52.595547: | close_any(fd@23) (in initiate_connection() at initiate.c:372)
Aug 26 18:32:52.595550: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:32:52.595553: | spent 1.43 milliseconds in whack
Aug 26 18:32:52.596171: | spent 0.00222 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:32:52.596195: | *received 144 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:32:52.596198: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.596200: |   01 10 02 00  00 00 00 00  00 00 00 90  0d 00 00 38
Aug 26 18:32:52.596201: |   00 00 00 01  00 00 00 01  00 00 00 2c  00 01 00 01
Aug 26 18:32:52.596203: |   00 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:32:52.596204: |   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:32:52.596206: |   80 0e 01 00  0d 00 00 14  40 48 b7 d5  6e bc e8 85
Aug 26 18:32:52.596209: |   25 e7 de 7f  00 d6 c2 d3  0d 00 00 14  af ca d7 13
Aug 26 18:32:52.596211: |   68 a1 f1 c9  6b 86 96 fc  77 57 01 00  00 00 00 14
Aug 26 18:32:52.596212: |   4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
Aug 26 18:32:52.596216: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:32:52.596218: | **parse ISAKMP Message:
Aug 26 18:32:52.596220: |    initiator cookie:
Aug 26 18:32:52.596221: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:52.596223: |    responder cookie:
Aug 26 18:32:52.596224: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.596226: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:32:52.596228: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:32:52.596230: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:32:52.596232: |    flags: none (0x0)
Aug 26 18:32:52.596233: |    Message ID: 0 (0x0)
Aug 26 18:32:52.596235: |    length: 144 (0x90)
Aug 26 18:32:52.596237: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:32:52.596239: | State DB: IKEv1 state not found (find_state_ikev1)
Aug 26 18:32:52.596241: | State DB: found IKEv1 state #1 in MAIN_I1 (find_state_ikev1_init)
Aug 26 18:32:52.596245: | start processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459)
Aug 26 18:32:52.596247: | #1 is idle
Aug 26 18:32:52.596248: | #1 idle
Aug 26 18:32:52.596251: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:32:52.596253: | ***parse ISAKMP Security Association Payload:
Aug 26 18:32:52.596254: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:32:52.596256: |    length: 56 (0x38)
Aug 26 18:32:52.596258: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:32:52.596260: | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Aug 26 18:32:52.596261: | ***parse ISAKMP Vendor ID Payload:
Aug 26 18:32:52.596263: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:32:52.596265: |    length: 20 (0x14)
Aug 26 18:32:52.596266: | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Aug 26 18:32:52.596268: | ***parse ISAKMP Vendor ID Payload:
Aug 26 18:32:52.596270: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:32:52.596271: |    length: 20 (0x14)
Aug 26 18:32:52.596273: | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Aug 26 18:32:52.596274: | ***parse ISAKMP Vendor ID Payload:
Aug 26 18:32:52.596276: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.596278: |    length: 20 (0x14)
Aug 26 18:32:52.596279: | message 'main_inR1_outI2' HASH payload not checked early
Aug 26 18:32:52.596283: | received Vendor ID payload [FRAGMENTATION]
Aug 26 18:32:52.596285: | received Vendor ID payload [Dead Peer Detection]
Aug 26 18:32:52.596287: |  quirks.qnat_traversal_vid set to=117 [RFC 3947]
Aug 26 18:32:52.596305: | received Vendor ID payload [RFC 3947]
Aug 26 18:32:52.596308: | ****parse IPsec DOI SIT:
Aug 26 18:32:52.596310: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:32:52.596312: | ****parse ISAKMP Proposal Payload:
Aug 26 18:32:52.596313: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.596315: |    length: 44 (0x2c)
Aug 26 18:32:52.596317: |    proposal number: 0 (0x0)
Aug 26 18:32:52.596318: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:32:52.596320: |    SPI size: 0 (0x0)
Aug 26 18:32:52.596321: |    number of transforms: 1 (0x1)
Aug 26 18:32:52.596323: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:32:52.596325: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.596326: |    length: 36 (0x24)
Aug 26 18:32:52.596328: |    ISAKMP transform number: 0 (0x0)
Aug 26 18:32:52.596329: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:32:52.596331: | ******parse ISAKMP Oakley attribute:
Aug 26 18:32:52.596333: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:32:52.596335: |    length/value: 1 (0x1)
Aug 26 18:32:52.596336: |    [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:32:52.596338: | ******parse ISAKMP Oakley attribute:
Aug 26 18:32:52.596341: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:32:52.596343: |    length/value: 3600 (0xe10)
Aug 26 18:32:52.596344: | ******parse ISAKMP Oakley attribute:
Aug 26 18:32:52.596346: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:32:52.596348: |    length/value: 7 (0x7)
Aug 26 18:32:52.596349: |    [7 is OAKLEY_AES_CBC]
Aug 26 18:32:52.596351: | ******parse ISAKMP Oakley attribute:
Aug 26 18:32:52.596353: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:32:52.596354: |    length/value: 4 (0x4)
Aug 26 18:32:52.596356: |    [4 is OAKLEY_SHA2_256]
Aug 26 18:32:52.596357: | ******parse ISAKMP Oakley attribute:
Aug 26 18:32:52.596359: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:32:52.596361: |    length/value: 3 (0x3)
Aug 26 18:32:52.596362: |    [3 is OAKLEY_RSA_SIG]
Aug 26 18:32:52.596364: | ******parse ISAKMP Oakley attribute:
Aug 26 18:32:52.596365: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:32:52.596367: |    length/value: 14 (0xe)
Aug 26 18:32:52.596369: |    [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:32:52.596371: | ******parse ISAKMP Oakley attribute:
Aug 26 18:32:52.596372: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:32:52.596374: |    length/value: 256 (0x100)
Aug 26 18:32:52.596376: | OAKLEY proposal verified unconditionally; no alg_info to check against
Aug 26 18:32:52.596377: | Oakley Transform 0 accepted
Aug 26 18:32:52.596379: | sender checking NAT-T: enabled; VID 117
Aug 26 18:32:52.596381: | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC
Aug 26 18:32:52.596383: | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
Aug 26 18:32:52.596387: | adding outI2 KE work-order 1 for state #1
Aug 26 18:32:52.596389: | state #1 requesting EVENT_RETRANSMIT to be deleted
Aug 26 18:32:52.596391: | #1 STATE_MAIN_I1: retransmits: cleared
Aug 26 18:32:52.596394: | libevent_free: release ptr-libevent@0x55c66d953778
Aug 26 18:32:52.596396: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:32:52.596398: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55c66d954c08
Aug 26 18:32:52.596400: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1
Aug 26 18:32:52.596402: | libevent_malloc: new ptr-libevent@0x55c66d953778 size 128
Aug 26 18:32:52.596411: | complete v1 state transition with STF_SUSPEND
Aug 26 18:32:52.596416: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648)
Aug 26 18:32:52.596417: | crypto helper 0 resuming
Aug 26 18:32:52.596419: | suspending state #1 and saving MD
Aug 26 18:32:52.596428: | crypto helper 0 starting work-order 1 for state #1
Aug 26 18:32:52.596433: | #1 is busy; has a suspended MD
Aug 26 18:32:52.596438: | crypto helper 0 doing build KE and nonce (outI2 KE); request ID 1
Aug 26 18:32:52.596442: | #1 spent 0.129 milliseconds in process_packet_tail()
Aug 26 18:32:52.596447: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:32:52.596452: | stop processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in process_md() at demux.c:382)
Aug 26 18:32:52.596455: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:32:52.596459: | spent 0.263 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:32:52.597018: | crypto helper 0 finished build KE and nonce (outI2 KE); request ID 1 time elapsed 0.00058 seconds
Aug 26 18:32:52.597024: | (#1) spent 0.585 milliseconds in crypto helper computing work-order 1: outI2 KE (pcr)
Aug 26 18:32:52.597026: | crypto helper 0 sending results from work-order 1 for state #1 to event queue
Aug 26 18:32:52.597028: | scheduling resume sending helper answer for #1
Aug 26 18:32:52.597030: | libevent_malloc: new ptr-libevent@0x7fbd18002888 size 128
Aug 26 18:32:52.597036: | crypto helper 0 waiting (nothing to do)
Aug 26 18:32:52.597042: | processing resume sending helper answer for #1
Aug 26 18:32:52.597047: | start processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:797)
Aug 26 18:32:52.597052: | crypto helper 0 replies to request ID 1
Aug 26 18:32:52.597054: | calling continuation function 0x55c66cb6db50
Aug 26 18:32:52.597056: | main_inR1_outI2_continue for #1: calculated ke+nonce, sending I2
Aug 26 18:32:52.597059: | **emit ISAKMP Message:
Aug 26 18:32:52.597061: |    initiator cookie:
Aug 26 18:32:52.597063: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:52.597064: |    responder cookie:
Aug 26 18:32:52.597066: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.597067: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.597069: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:32:52.597071: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:32:52.597073: |    flags: none (0x0)
Aug 26 18:32:52.597074: |    Message ID: 0 (0x0)
Aug 26 18:32:52.597076: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:32:52.597078: | ***emit ISAKMP Key Exchange Payload:
Aug 26 18:32:52.597080: |    next payload type: ISAKMP_NEXT_NONCE (0xa)
Aug 26 18:32:52.597082: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE
Aug 26 18:32:52.597084: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE)
Aug 26 18:32:52.597086: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.597088: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
Aug 26 18:32:52.597090: | keyex value  3a fa a3 1b  a7 60 5b 1b  33 67 e8 c6  23 53 6d 36
Aug 26 18:32:52.597091: | keyex value  57 20 a2 bf  07 74 c0 ff  54 a1 aa 20  62 7f 76 c2
Aug 26 18:32:52.597093: | keyex value  14 1d 84 0d  c0 22 8a df  d7 0b be 9e  19 fe 43 1e
Aug 26 18:32:52.597095: | keyex value  0a 0b 03 6d  39 bd c1 6b  07 e7 86 98  ba d6 9e 91
Aug 26 18:32:52.597096: | keyex value  ca 0b f2 b5  33 b8 d9 a1  3e 88 5f 7b  64 b3 74 76
Aug 26 18:32:52.597098: | keyex value  f7 6b 5e 3c  e5 11 28 65  e7 7f 80 01  89 11 3b c0
Aug 26 18:32:52.597099: | keyex value  3a 6e af 3b  8b db 25 17  35 2d 61 a6  78 14 69 8a
Aug 26 18:32:52.597101: | keyex value  c5 89 02 a2  27 93 49 c3  e3 a6 68 53  e4 97 b7 09
Aug 26 18:32:52.597102: | keyex value  ef 71 3e 6c  8d 87 19 cd  7c aa 2f 09  78 b3 06 39
Aug 26 18:32:52.597104: | keyex value  06 a5 e6 6a  70 93 f0 5e  c6 2a 23 23  e5 8c 9f 9b
Aug 26 18:32:52.597105: | keyex value  54 63 4f b0  49 b4 a3 b4  d2 17 e9 96  85 8e 6b 7d
Aug 26 18:32:52.597107: | keyex value  c4 7c 30 b8  2e c6 68 2b  c1 8d 6d 70  43 4f e4 e8
Aug 26 18:32:52.597108: | keyex value  be 98 bf 70  f5 93 a3 9c  63 68 27 2f  33 d0 e4 97
Aug 26 18:32:52.597110: | keyex value  34 55 4b 81  3b ed 67 ba  9c 7e 9e a6  46 51 99 a0
Aug 26 18:32:52.597111: | keyex value  3e 7f 19 8d  80 bb d8 71  26 f6 d9 c5  69 6b e7 7a
Aug 26 18:32:52.597113: | keyex value  cf ec 2f f8  2a 15 21 97  e1 2b cc 57  8a 86 fe 7b
Aug 26 18:32:52.597115: | emitting length of ISAKMP Key Exchange Payload: 260
Aug 26 18:32:52.597116: | ***emit ISAKMP Nonce Payload:
Aug 26 18:32:52.597118: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.597120: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE)
Aug 26 18:32:52.597122: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.597124: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload
Aug 26 18:32:52.597125: | Ni  ca d1 cf c3  34 d6 96 4d  78 f2 c5 0b  9b 7d af 8f
Aug 26 18:32:52.597127: | Ni  76 31 c4 80  06 28 07 3e  06 e9 a3 e9  f3 95 69 e9
Aug 26 18:32:52.597128: | emitting length of ISAKMP Nonce Payload: 36
Aug 26 18:32:52.597130: | NAT-T checking st_nat_traversal
Aug 26 18:32:52.597131: | NAT-T found (implies NAT_T_WITH_NATD)
Aug 26 18:32:52.597133: | sending NAT-D payloads
Aug 26 18:32:52.597142: | natd_hash: hasher=0x55c66cc42ca0(32)
Aug 26 18:32:52.597146: | natd_hash: icookie=  35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:52.597147: | natd_hash: rcookie=  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.597149: | natd_hash: ip=  c0 01 02 17
Aug 26 18:32:52.597151: | natd_hash: port=500
Aug 26 18:32:52.597152: | natd_hash: hash=  c9 92 66 b9  67 83 15 1d  9a 4c 82 8f  0e 14 2c 97
Aug 26 18:32:52.597154: | natd_hash: hash=  30 84 fd 59  a7 4d 65 a9  a7 14 e4 26  9f 4d 53 d2
Aug 26 18:32:52.597156: | ***emit ISAKMP NAT-D Payload:
Aug 26 18:32:52.597157: |    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
Aug 26 18:32:52.597159: | next payload chain: ignoring supplied 'ISAKMP NAT-D Payload'.'next payload type' value 20:ISAKMP_NEXT_NATD_RFC
Aug 26 18:32:52.597161: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC)
Aug 26 18:32:52.597163: | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.597165: | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload
Aug 26 18:32:52.597166: | NAT-D  c9 92 66 b9  67 83 15 1d  9a 4c 82 8f  0e 14 2c 97
Aug 26 18:32:52.597168: | NAT-D  30 84 fd 59  a7 4d 65 a9  a7 14 e4 26  9f 4d 53 d2
Aug 26 18:32:52.597169: | emitting length of ISAKMP NAT-D Payload: 36
Aug 26 18:32:52.597174: | natd_hash: hasher=0x55c66cc42ca0(32)
Aug 26 18:32:52.597175: | natd_hash: icookie=  35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:52.597177: | natd_hash: rcookie=  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.597178: | natd_hash: ip=  c0 01 03 21
Aug 26 18:32:52.597180: | natd_hash: port=500
Aug 26 18:32:52.597181: | natd_hash: hash=  e5 b1 e5 3a  ee 64 89 c4  76 40 93 c8  0d 72 18 b9
Aug 26 18:32:52.597183: | natd_hash: hash=  23 84 b0 f8  24 74 2c 01  22 f9 2f b2  1e 2c d0 9e
Aug 26 18:32:52.597185: | ***emit ISAKMP NAT-D Payload:
Aug 26 18:32:52.597186: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.597188: | next payload chain: setting previous 'ISAKMP NAT-D Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC)
Aug 26 18:32:52.597190: | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.597192: | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload
Aug 26 18:32:52.597193: | NAT-D  e5 b1 e5 3a  ee 64 89 c4  76 40 93 c8  0d 72 18 b9
Aug 26 18:32:52.597195: | NAT-D  23 84 b0 f8  24 74 2c 01  22 f9 2f b2  1e 2c d0 9e
Aug 26 18:32:52.597196: | emitting length of ISAKMP NAT-D Payload: 36
Aug 26 18:32:52.597198: | no IKEv1 message padding required
Aug 26 18:32:52.597200: | emitting length of ISAKMP Message: 396
Aug 26 18:32:52.597201: | State DB: re-hashing IKEv1 state #1 IKE SPIi and SPI[ir]
Aug 26 18:32:52.597204: | complete v1 state transition with STF_OK
Aug 26 18:32:52.597207: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:32:52.597208: | #1 is idle
Aug 26 18:32:52.597210: | doing_xauth:no, t_xauth_client_done:no
Aug 26 18:32:52.597212: | peer supports fragmentation
Aug 26 18:32:52.597213: | peer supports DPD
Aug 26 18:32:52.597215: | DPD is configured locally
Aug 26 18:32:52.597216: | IKEv1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
Aug 26 18:32:52.597219: | parent state #1: MAIN_I1(half-open IKE SA) => MAIN_I2(open IKE SA)
Aug 26 18:32:52.597221: | event_already_set, deleting event
Aug 26 18:32:52.597222: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Aug 26 18:32:52.597224: | libevent_free: release ptr-libevent@0x55c66d953778
Aug 26 18:32:52.597226: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55c66d954c08
Aug 26 18:32:52.597230: | sending reply packet to 192.1.2.23:500 (from 192.1.3.33:500)
Aug 26 18:32:52.597234: | sending 396 bytes for STATE_MAIN_I1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1)
Aug 26 18:32:52.597238: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.597240: |   04 10 02 00  00 00 00 00  00 00 01 8c  0a 00 01 04
Aug 26 18:32:52.597243: |   3a fa a3 1b  a7 60 5b 1b  33 67 e8 c6  23 53 6d 36
Aug 26 18:32:52.597244: |   57 20 a2 bf  07 74 c0 ff  54 a1 aa 20  62 7f 76 c2
Aug 26 18:32:52.597246: |   14 1d 84 0d  c0 22 8a df  d7 0b be 9e  19 fe 43 1e
Aug 26 18:32:52.597247: |   0a 0b 03 6d  39 bd c1 6b  07 e7 86 98  ba d6 9e 91
Aug 26 18:32:52.597249: |   ca 0b f2 b5  33 b8 d9 a1  3e 88 5f 7b  64 b3 74 76
Aug 26 18:32:52.597250: |   f7 6b 5e 3c  e5 11 28 65  e7 7f 80 01  89 11 3b c0
Aug 26 18:32:52.597252: |   3a 6e af 3b  8b db 25 17  35 2d 61 a6  78 14 69 8a
Aug 26 18:32:52.597253: |   c5 89 02 a2  27 93 49 c3  e3 a6 68 53  e4 97 b7 09
Aug 26 18:32:52.597255: |   ef 71 3e 6c  8d 87 19 cd  7c aa 2f 09  78 b3 06 39
Aug 26 18:32:52.597256: |   06 a5 e6 6a  70 93 f0 5e  c6 2a 23 23  e5 8c 9f 9b
Aug 26 18:32:52.597258: |   54 63 4f b0  49 b4 a3 b4  d2 17 e9 96  85 8e 6b 7d
Aug 26 18:32:52.597259: |   c4 7c 30 b8  2e c6 68 2b  c1 8d 6d 70  43 4f e4 e8
Aug 26 18:32:52.597261: |   be 98 bf 70  f5 93 a3 9c  63 68 27 2f  33 d0 e4 97
Aug 26 18:32:52.597262: |   34 55 4b 81  3b ed 67 ba  9c 7e 9e a6  46 51 99 a0
Aug 26 18:32:52.597263: |   3e 7f 19 8d  80 bb d8 71  26 f6 d9 c5  69 6b e7 7a
Aug 26 18:32:52.597265: |   cf ec 2f f8  2a 15 21 97  e1 2b cc 57  8a 86 fe 7b
Aug 26 18:32:52.597266: |   14 00 00 24  ca d1 cf c3  34 d6 96 4d  78 f2 c5 0b
Aug 26 18:32:52.597268: |   9b 7d af 8f  76 31 c4 80  06 28 07 3e  06 e9 a3 e9
Aug 26 18:32:52.597269: |   f3 95 69 e9  14 00 00 24  c9 92 66 b9  67 83 15 1d
Aug 26 18:32:52.597271: |   9a 4c 82 8f  0e 14 2c 97  30 84 fd 59  a7 4d 65 a9
Aug 26 18:32:52.597272: |   a7 14 e4 26  9f 4d 53 d2  00 00 00 24  e5 b1 e5 3a
Aug 26 18:32:52.597274: |   ee 64 89 c4  76 40 93 c8  0d 72 18 b9  23 84 b0 f8
Aug 26 18:32:52.597275: |   24 74 2c 01  22 f9 2f b2  1e 2c d0 9e
Aug 26 18:32:52.597314: | !event_already_set at reschedule
Aug 26 18:32:52.597321: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:32:52.597324: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1
Aug 26 18:32:52.597326: | libevent_malloc: new ptr-libevent@0x55c66d958a58 size 128
Aug 26 18:32:52.597329: | #1 STATE_MAIN_I2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29658.339787
Aug 26 18:32:52.597332: "north-a-dpd" #1: STATE_MAIN_I2: sent MI2, expecting MR2
Aug 26 18:32:52.597338: | modecfg pull: noquirk policy:push not-client
Aug 26 18:32:52.597340: | phase 1 is done, looking for phase 2 to unpend
Aug 26 18:32:52.597343: | resume sending helper answer for #1 suppresed complete_v1_state_transition()
Aug 26 18:32:52.597346: | #1 spent 0.266 milliseconds in resume sending helper answer
Aug 26 18:32:52.597350: | stop processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:833)
Aug 26 18:32:52.597352: | libevent_free: release ptr-libevent@0x7fbd18002888
Aug 26 18:32:52.598747: | spent 0.00221 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:32:52.598765: | *received 576 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:32:52.598768: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.598770: |   04 10 02 00  00 00 00 00  00 00 02 40  0a 00 01 04
Aug 26 18:32:52.598771: |   f0 74 45 1b  f1 9e 11 7d  29 36 26 40  6f b2 a3 ec
Aug 26 18:32:52.598773: |   6f 0f 30 37  ab 74 28 62  58 15 32 88  b9 04 22 d8
Aug 26 18:32:52.598774: |   6d b2 e3 b0  76 cb 34 5e  e8 f4 42 e8  06 e3 1d a5
Aug 26 18:32:52.598776: |   25 b7 03 ee  97 6d 53 0e  9a 3d aa da  db d3 3e 42
Aug 26 18:32:52.598777: |   93 06 c2 a6  7f 06 a5 96  c3 9c 58 15  6e 65 07 99
Aug 26 18:32:52.598779: |   8d 16 53 54  41 5a 70 a2  4e d4 87 c1  ea 12 88 cc
Aug 26 18:32:52.598780: |   ed 2b 72 27  fc 71 c4 0b  ce ba 7d da  7e 09 c7 25
Aug 26 18:32:52.598782: |   c1 be 96 b4  15 58 a8 75  11 fb 5c ac  21 b8 a4 30
Aug 26 18:32:52.598783: |   79 72 63 c1  29 6e 87 43  48 b1 e1 7d  55 d5 ae 80
Aug 26 18:32:52.598785: |   26 03 ea 55  ea 99 f3 e4  00 e7 48 42  b1 af 95 6e
Aug 26 18:32:52.598786: |   a3 27 af 3d  1c 12 d7 3b  ed c4 57 f4  68 01 6d 9d
Aug 26 18:32:52.598790: |   f3 92 e6 43  45 72 32 4a  4c ae 3e db  42 5e db 56
Aug 26 18:32:52.598792: |   9a b6 c9 27  11 c4 40 ef  59 73 0a 13  cb a6 8e d3
Aug 26 18:32:52.598793: |   9c cd c3 d8  73 58 98 be  68 fa a0 7d  74 3e 8f a7
Aug 26 18:32:52.598795: |   bb 85 e4 5a  e1 9e d3 dc  16 50 e0 80  56 0c 46 17
Aug 26 18:32:52.598796: |   1f 4b da 68  f8 8a b4 5d  d1 ae 9d 6f  50 e9 7c a0
Aug 26 18:32:52.598798: |   07 00 00 24  8b bb 54 e3  8c f2 15 1c  86 29 b5 6f
Aug 26 18:32:52.598799: |   03 e9 85 c4  4a 9d fa 77  b4 97 73 a9  53 8e ce f6
Aug 26 18:32:52.598801: |   2d 6f 7b db  14 00 00 b4  04 30 81 ac  31 0b 30 09
Aug 26 18:32:52.598802: |   06 03 55 04  06 13 02 43  41 31 10 30  0e 06 03 55
Aug 26 18:32:52.598804: |   04 08 0c 07  4f 6e 74 61  72 69 6f 31  10 30 0e 06
Aug 26 18:32:52.598805: |   03 55 04 07  0c 07 54 6f  72 6f 6e 74  6f 31 12 30
Aug 26 18:32:52.598807: |   10 06 03 55  04 0a 0c 09  4c 69 62 72  65 73 77 61
Aug 26 18:32:52.598808: |   6e 31 18 30  16 06 03 55  04 0b 0c 0f  54 65 73 74
Aug 26 18:32:52.598810: |   20 44 65 70  61 72 74 6d  65 6e 74 31  25 30 23 06
Aug 26 18:32:52.598811: |   03 55 04 03  0c 1c 4c 69  62 72 65 73  77 61 6e 20
Aug 26 18:32:52.598813: |   74 65 73 74  20 43 41 20  66 6f 72 20  6d 61 69 6e
Aug 26 18:32:52.598814: |   63 61 31 24  30 22 06 09  2a 86 48 86  f7 0d 01 09
Aug 26 18:32:52.598816: |   01 16 15 74  65 73 74 69  6e 67 40 6c  69 62 72 65
Aug 26 18:32:52.598817: |   73 77 61 6e  2e 6f 72 67  14 00 00 24  e5 b1 e5 3a
Aug 26 18:32:52.598819: |   ee 64 89 c4  76 40 93 c8  0d 72 18 b9  23 84 b0 f8
Aug 26 18:32:52.598820: |   24 74 2c 01  22 f9 2f b2  1e 2c d0 9e  00 00 00 24
Aug 26 18:32:52.598822: |   c9 92 66 b9  67 83 15 1d  9a 4c 82 8f  0e 14 2c 97
Aug 26 18:32:52.598823: |   30 84 fd 59  a7 4d 65 a9  a7 14 e4 26  9f 4d 53 d2
Aug 26 18:32:52.598826: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:32:52.598828: | **parse ISAKMP Message:
Aug 26 18:32:52.598830: |    initiator cookie:
Aug 26 18:32:52.598832: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:52.598834: |    responder cookie:
Aug 26 18:32:52.598835: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.598837: |    next payload type: ISAKMP_NEXT_KE (0x4)
Aug 26 18:32:52.598839: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:32:52.598840: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:32:52.598842: |    flags: none (0x0)
Aug 26 18:32:52.598844: |    Message ID: 0 (0x0)
Aug 26 18:32:52.598845: |    length: 576 (0x240)
Aug 26 18:32:52.598847: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:32:52.598850: | State DB: found IKEv1 state #1 in MAIN_I2 (find_state_ikev1)
Aug 26 18:32:52.598853: | start processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459)
Aug 26 18:32:52.598855: | #1 is idle
Aug 26 18:32:52.598857: | #1 idle
Aug 26 18:32:52.598859: | got payload 0x10  (ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080
Aug 26 18:32:52.598861: | ***parse ISAKMP Key Exchange Payload:
Aug 26 18:32:52.598862: |    next payload type: ISAKMP_NEXT_NONCE (0xa)
Aug 26 18:32:52.598864: |    length: 260 (0x104)
Aug 26 18:32:52.598866: | got payload 0x400  (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080
Aug 26 18:32:52.598868: | ***parse ISAKMP Nonce Payload:
Aug 26 18:32:52.598869: |    next payload type: ISAKMP_NEXT_CR (0x7)
Aug 26 18:32:52.598871: |    length: 36 (0x24)
Aug 26 18:32:52.598873: | got payload 0x80  (ISAKMP_NEXT_CR) needed: 0x0 opt: 0x102080
Aug 26 18:32:52.598875: | ***parse ISAKMP Certificate RequestPayload:
Aug 26 18:32:52.598876: |    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
Aug 26 18:32:52.598878: |    length: 180 (0xb4)
Aug 26 18:32:52.598880: |    cert type: CERT_X509_SIGNATURE (0x4)
Aug 26 18:32:52.598881: | got payload 0x100000  (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080
Aug 26 18:32:52.598883: | ***parse ISAKMP NAT-D Payload:
Aug 26 18:32:52.598884: |    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
Aug 26 18:32:52.598887: |    length: 36 (0x24)
Aug 26 18:32:52.598889: | got payload 0x100000  (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080
Aug 26 18:32:52.598891: | ***parse ISAKMP NAT-D Payload:
Aug 26 18:32:52.598892: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.598894: |    length: 36 (0x24)
Aug 26 18:32:52.598896: | message 'main_inR2_outI3' HASH payload not checked early
Aug 26 18:32:52.598905: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK
Aug 26 18:32:52.598909: | actually looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK
Aug 26 18:32:52.598915: | line 0: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA
Aug 26 18:32:52.598918: | line 1: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA
Aug 26 18:32:52.598920: | concluding with best_match=000 best=(nil) (lineno=-1)
Aug 26 18:32:52.598921: | no PreShared Key Found
Aug 26 18:32:52.598924: | adding aggr outR1 DH work-order 2 for state #1
Aug 26 18:32:52.598926: | state #1 requesting EVENT_RETRANSMIT to be deleted
Aug 26 18:32:52.598927: | #1 STATE_MAIN_I2: retransmits: cleared
Aug 26 18:32:52.598930: | libevent_free: release ptr-libevent@0x55c66d958a58
Aug 26 18:32:52.598932: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:32:52.598934: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55c66d954c08
Aug 26 18:32:52.598936: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1
Aug 26 18:32:52.598938: | libevent_malloc: new ptr-libevent@0x7fbd18002888 size 128
Aug 26 18:32:52.598945: | complete v1 state transition with STF_SUSPEND
Aug 26 18:32:52.598951: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648)
Aug 26 18:32:52.598952: | crypto helper 2 resuming
Aug 26 18:32:52.598953: | suspending state #1 and saving MD
Aug 26 18:32:52.598964: | crypto helper 2 starting work-order 2 for state #1
Aug 26 18:32:52.598966: | #1 is busy; has a suspended MD
Aug 26 18:32:52.598970: | crypto helper 2 doing compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2
Aug 26 18:32:52.598972: | #1 spent 0.0694 milliseconds in process_packet_tail()
Aug 26 18:32:52.598976: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:32:52.598981: | stop processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in process_md() at demux.c:382)
Aug 26 18:32:52.598984: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:32:52.598989: | spent 0.227 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:32:52.599654: | crypto helper 2 finished compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 time elapsed 0.000685 seconds
Aug 26 18:32:52.599663: | (#1) spent 0.691 milliseconds in crypto helper computing work-order 2: aggr outR1 DH (pcr)
Aug 26 18:32:52.599665: | crypto helper 2 sending results from work-order 2 for state #1 to event queue
Aug 26 18:32:52.599667: | scheduling resume sending helper answer for #1
Aug 26 18:32:52.599670: | libevent_malloc: new ptr-libevent@0x7fbd10000f48 size 128
Aug 26 18:32:52.599676: | crypto helper 2 waiting (nothing to do)
Aug 26 18:32:52.599681: | processing resume sending helper answer for #1
Aug 26 18:32:52.599688: | start processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:797)
Aug 26 18:32:52.599692: | crypto helper 2 replies to request ID 2
Aug 26 18:32:52.599700: | calling continuation function 0x55c66cb6db50
Aug 26 18:32:52.599703: | main_inR2_outI3_cryptotail for #1: calculated DH, sending R1
Aug 26 18:32:52.599706: | **emit ISAKMP Message:
Aug 26 18:32:52.599708: |    initiator cookie:
Aug 26 18:32:52.599710: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:52.599712: |    responder cookie:
Aug 26 18:32:52.599713: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.599715: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:32:52.599717: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:32:52.599719: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:32:52.599721: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:32:52.599722: |    Message ID: 0 (0x0)
Aug 26 18:32:52.599724: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:32:52.599726: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 5:ISAKMP_NEXT_ID
Aug 26 18:32:52.599729: | CR  30 81 ac 31  0b 30 09 06  03 55 04 06  13 02 43 41
Aug 26 18:32:52.599731: | CR  31 10 30 0e  06 03 55 04  08 0c 07 4f  6e 74 61 72
Aug 26 18:32:52.599732: | CR  69 6f 31 10  30 0e 06 03  55 04 07 0c  07 54 6f 72
Aug 26 18:32:52.599734: | CR  6f 6e 74 6f  31 12 30 10  06 03 55 04  0a 0c 09 4c
Aug 26 18:32:52.599735: | CR  69 62 72 65  73 77 61 6e  31 18 30 16  06 03 55 04
Aug 26 18:32:52.599737: | CR  0b 0c 0f 54  65 73 74 20  44 65 70 61  72 74 6d 65
Aug 26 18:32:52.599738: | CR  6e 74 31 25  30 23 06 03  55 04 03 0c  1c 4c 69 62
Aug 26 18:32:52.599740: | CR  72 65 73 77  61 6e 20 74  65 73 74 20  43 41 20 66
Aug 26 18:32:52.599741: | CR  6f 72 20 6d  61 69 6e 63  61 31 24 30  22 06 09 2a
Aug 26 18:32:52.599742: | CR  86 48 86 f7  0d 01 09 01  16 15 74 65  73 74 69 6e
Aug 26 18:32:52.599744: | CR  67 40 6c 69  62 72 65 73  77 61 6e 2e  6f 72 67
Aug 26 18:32:52.599749: | requested CA: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:32:52.599751: | thinking about whether to send my certificate:
Aug 26 18:32:52.599753: |   I have RSA key: OAKLEY_RSA_SIG cert.type: CERT_X509_SIGNATURE 
Aug 26 18:32:52.599755: |   sendcert: CERT_ALWAYSSEND and I did get a certificate request 
Aug 26 18:32:52.599756: |   so send cert.
Aug 26 18:32:52.599759: |  I am sending a certificate request
Aug 26 18:32:52.599760: | I will NOT send an initial contact payload
Aug 26 18:32:52.599762: | init checking NAT-T: enabled; RFC 3947 (NAT-Traversal)
Aug 26 18:32:52.599770: | natd_hash: hasher=0x55c66cc42ca0(32)
Aug 26 18:32:52.599772: | natd_hash: icookie=  35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:52.599774: | natd_hash: rcookie=  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.599775: | natd_hash: ip=  c0 01 03 21
Aug 26 18:32:52.599777: | natd_hash: port=500
Aug 26 18:32:52.599779: | natd_hash: hash=  e5 b1 e5 3a  ee 64 89 c4  76 40 93 c8  0d 72 18 b9
Aug 26 18:32:52.599780: | natd_hash: hash=  23 84 b0 f8  24 74 2c 01  22 f9 2f b2  1e 2c d0 9e
Aug 26 18:32:52.599784: | natd_hash: hasher=0x55c66cc42ca0(32)
Aug 26 18:32:52.599786: | natd_hash: icookie=  35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:52.599787: | natd_hash: rcookie=  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.599789: | natd_hash: ip=  c0 01 02 17
Aug 26 18:32:52.599790: | natd_hash: port=500
Aug 26 18:32:52.599792: | natd_hash: hash=  c9 92 66 b9  67 83 15 1d  9a 4c 82 8f  0e 14 2c 97
Aug 26 18:32:52.599793: | natd_hash: hash=  30 84 fd 59  a7 4d 65 a9  a7 14 e4 26  9f 4d 53 d2
Aug 26 18:32:52.599795: | expected NAT-D(me):  e5 b1 e5 3a  ee 64 89 c4  76 40 93 c8  0d 72 18 b9
Aug 26 18:32:52.599797: | expected NAT-D(me):  23 84 b0 f8  24 74 2c 01  22 f9 2f b2  1e 2c d0 9e
Aug 26 18:32:52.599798: | expected NAT-D(him):
Aug 26 18:32:52.599800: |   c9 92 66 b9  67 83 15 1d  9a 4c 82 8f  0e 14 2c 97
Aug 26 18:32:52.599801: |   30 84 fd 59  a7 4d 65 a9  a7 14 e4 26  9f 4d 53 d2
Aug 26 18:32:52.599803: | received NAT-D:  e5 b1 e5 3a  ee 64 89 c4  76 40 93 c8  0d 72 18 b9
Aug 26 18:32:52.599804: | received NAT-D:  23 84 b0 f8  24 74 2c 01  22 f9 2f b2  1e 2c d0 9e
Aug 26 18:32:52.599807: | received NAT-D:  c9 92 66 b9  67 83 15 1d  9a 4c 82 8f  0e 14 2c 97
Aug 26 18:32:52.599809: | received NAT-D:  30 84 fd 59  a7 4d 65 a9  a7 14 e4 26  9f 4d 53 d2
Aug 26 18:32:52.599811: | NAT_TRAVERSAL encaps using auto-detect
Aug 26 18:32:52.599812: | NAT_TRAVERSAL this end is NOT behind NAT
Aug 26 18:32:52.599814: | NAT_TRAVERSAL that end is NOT behind NAT
Aug 26 18:32:52.599816: | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23
Aug 26 18:32:52.599818: | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected
Aug 26 18:32:52.599819: |  NAT_T_WITH_KA detected
Aug 26 18:32:52.599821: | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds
Aug 26 18:32:52.599824: | ***emit ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:32:52.599826: |    next payload type: ISAKMP_NEXT_CERT (0x6)
Aug 26 18:32:52.599827: |    ID type: ID_DER_ASN1_DN (0x9)
Aug 26 18:32:52.599829: |    Protocol ID: 0 (0x0)
Aug 26 18:32:52.599831: |    port: 0 (0x0)
Aug 26 18:32:52.599833: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 6:ISAKMP_NEXT_CERT
Aug 26 18:32:52.599835: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
Aug 26 18:32:52.599837: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
Aug 26 18:32:52.599839: | emitting 185 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:32:52.599841: | my identity  30 81 b6 31  0b 30 09 06  03 55 04 06  13 02 43 41
Aug 26 18:32:52.599842: | my identity  31 10 30 0e  06 03 55 04  08 0c 07 4f  6e 74 61 72
Aug 26 18:32:52.599844: | my identity  69 6f 31 10  30 0e 06 03  55 04 07 0c  07 54 6f 72
Aug 26 18:32:52.599846: | my identity  6f 6e 74 6f  31 12 30 10  06 03 55 04  0a 0c 09 4c
Aug 26 18:32:52.599847: | my identity  69 62 72 65  73 77 61 6e  31 18 30 16  06 03 55 04
Aug 26 18:32:52.599849: | my identity  0b 0c 0f 54  65 73 74 20  44 65 70 61  72 74 6d 65
Aug 26 18:32:52.599850: | my identity  6e 74 31 24  30 22 06 03  55 04 03 0c  1b 6e 6f 72
Aug 26 18:32:52.599852: | my identity  74 68 2e 74  65 73 74 69  6e 67 2e 6c  69 62 72 65
Aug 26 18:32:52.599853: | my identity  73 77 61 6e  2e 6f 72 67  31 2f 30 2d  06 09 2a 86
Aug 26 18:32:52.599855: | my identity  48 86 f7 0d  01 09 01 16  20 75 73 65  72 2d 6e 6f
Aug 26 18:32:52.599856: | my identity  72 74 68 40  74 65 73 74  69 6e 67 2e  6c 69 62 72
Aug 26 18:32:52.599858: | my identity  65 73 77 61  6e 2e 6f 72  67
Aug 26 18:32:52.599859: | emitting length of ISAKMP Identification Payload (IPsec DOI): 193
Aug 26 18:32:52.599861: "north-a-dpd" #1: I am sending my cert
Aug 26 18:32:52.599869: | ***emit ISAKMP Certificate Payload:
Aug 26 18:32:52.599871: |    next payload type: ISAKMP_NEXT_CR (0x7)
Aug 26 18:32:52.599873: |    cert encoding: CERT_X509_SIGNATURE (0x4)
Aug 26 18:32:52.599875: | next payload chain: ignoring supplied 'ISAKMP Certificate Payload'.'next payload type' value 7:ISAKMP_NEXT_CR
Aug 26 18:32:52.599877: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Certificate Payload (6:ISAKMP_NEXT_CERT)
Aug 26 18:32:52.599879: | next payload chain: saving location 'ISAKMP Certificate Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.599881: | emitting 1227 raw bytes of CERT into ISAKMP Certificate Payload
Aug 26 18:32:52.599882: | CERT  30 82 04 c7  30 82 04 30  a0 03 02 01  02 02 01 06
Aug 26 18:32:52.599884: | CERT  30 0d 06 09  2a 86 48 86  f7 0d 01 01  0b 05 00 30
Aug 26 18:32:52.599885: | CERT  81 ac 31 0b  30 09 06 03  55 04 06 13  02 43 41 31
Aug 26 18:32:52.599887: | CERT  10 30 0e 06  03 55 04 08  0c 07 4f 6e  74 61 72 69
Aug 26 18:32:52.599888: | CERT  6f 31 10 30  0e 06 03 55  04 07 0c 07  54 6f 72 6f
Aug 26 18:32:52.599890: | CERT  6e 74 6f 31  12 30 10 06  03 55 04 0a  0c 09 4c 69
Aug 26 18:32:52.599892: | CERT  62 72 65 73  77 61 6e 31  18 30 16 06  03 55 04 0b
Aug 26 18:32:52.599894: | CERT  0c 0f 54 65  73 74 20 44  65 70 61 72  74 6d 65 6e
Aug 26 18:32:52.599896: | CERT  74 31 25 30  23 06 03 55  04 03 0c 1c  4c 69 62 72
Aug 26 18:32:52.599897: | CERT  65 73 77 61  6e 20 74 65  73 74 20 43  41 20 66 6f
Aug 26 18:32:52.599899: | CERT  72 20 6d 61  69 6e 63 61  31 24 30 22  06 09 2a 86
Aug 26 18:32:52.599900: | CERT  48 86 f7 0d  01 09 01 16  15 74 65 73  74 69 6e 67
Aug 26 18:32:52.599902: | CERT  40 6c 69 62  72 65 73 77  61 6e 2e 6f  72 67 30 22
Aug 26 18:32:52.599903: | CERT  18 0f 32 30  31 39 30 38  32 34 30 39  30 37 35 33
Aug 26 18:32:52.599905: | CERT  5a 18 0f 32  30 32 32 30  38 32 33 30  39 30 37 35
Aug 26 18:32:52.599906: | CERT  33 5a 30 81  b6 31 0b 30  09 06 03 55  04 06 13 02
Aug 26 18:32:52.599908: | CERT  43 41 31 10  30 0e 06 03  55 04 08 0c  07 4f 6e 74
Aug 26 18:32:52.599909: | CERT  61 72 69 6f  31 10 30 0e  06 03 55 04  07 0c 07 54
Aug 26 18:32:52.599911: | CERT  6f 72 6f 6e  74 6f 31 12  30 10 06 03  55 04 0a 0c
Aug 26 18:32:52.599912: | CERT  09 4c 69 62  72 65 73 77  61 6e 31 18  30 16 06 03
Aug 26 18:32:52.599914: | CERT  55 04 0b 0c  0f 54 65 73  74 20 44 65  70 61 72 74
Aug 26 18:32:52.599916: | CERT  6d 65 6e 74  31 24 30 22  06 03 55 04  03 0c 1b 6e
Aug 26 18:32:52.599918: | CERT  6f 72 74 68  2e 74 65 73  74 69 6e 67  2e 6c 69 62
Aug 26 18:32:52.599920: | CERT  72 65 73 77  61 6e 2e 6f  72 67 31 2f  30 2d 06 09
Aug 26 18:32:52.599922: | CERT  2a 86 48 86  f7 0d 01 09  01 16 20 75  73 65 72 2d
Aug 26 18:32:52.599924: | CERT  6e 6f 72 74  68 40 74 65  73 74 69 6e  67 2e 6c 69
Aug 26 18:32:52.599927: | CERT  62 72 65 73  77 61 6e 2e  6f 72 67 30  82 01 a2 30
Aug 26 18:32:52.599929: | CERT  0d 06 09 2a  86 48 86 f7  0d 01 01 01  05 00 03 82
Aug 26 18:32:52.599931: | CERT  01 8f 00 30  82 01 8a 02  82 01 81 00  c0 59 bd 4b
Aug 26 18:32:52.599933: | CERT  40 fd f4 2c  e7 cf 9e f3  29 e6 61 73  de ab 42 3d
Aug 26 18:32:52.599936: | CERT  cc 51 1a e8  79 d6 53 46  a1 fd 66 d1  9e ab b4 65
Aug 26 18:32:52.599938: | CERT  76 51 ad 3f  6f 8f ef d2  73 f9 fd 8f  44 b0 6c 36
Aug 26 18:32:52.599940: | CERT  4b 95 c3 b2  45 0f 31 0c  e9 df 35 95  44 c0 19 53
Aug 26 18:32:52.599942: | CERT  8d df 6a 4b  b2 af d6 d3  e8 dd f5 20  df 9c cd 8a
Aug 26 18:32:52.599944: | CERT  f7 6a 09 92  60 00 45 44  39 4c 17 6c  06 02 91 37
Aug 26 18:32:52.599946: | CERT  4b f5 6a c3  5e 21 c6 64  32 32 98 1d  b7 99 1f 3c
Aug 26 18:32:52.599949: | CERT  13 fe ec c7  a4 a5 3b 37  30 df e4 31  95 47 91 b1
Aug 26 18:32:52.599951: | CERT  ca 96 66 b7  9e 49 65 a2  4c 79 54 17  ed 68 19 34
Aug 26 18:32:52.599953: | CERT  9d 7e 67 91  27 51 f0 ee  cb b3 90 68  7c 1d fd 83
Aug 26 18:32:52.599956: | CERT  32 06 2e e6  6f d5 f0 62  00 4d ef 11  90 b6 ad 61
Aug 26 18:32:52.599958: | CERT  83 0b 21 94  18 d9 2b 88  09 0d 33 2e  3b 71 18 f4
Aug 26 18:32:52.599960: | CERT  ce 4a 45 f3  37 f4 db c0  d6 ab c2 da  da cd 6d e0
Aug 26 18:32:52.599963: | CERT  a3 9d 21 53  19 34 b1 0c  d9 63 7c 45  b7 26 a4 d9
Aug 26 18:32:52.599965: | CERT  d6 93 25 1e  1f 74 3c 07  32 69 9b bc  0f db ba 3e
Aug 26 18:32:52.599967: | CERT  30 85 a4 3d  ec 5c 70 fe  fe 7d 64 3c  2c 48 b3 8a
Aug 26 18:32:52.599969: | CERT  eb 26 bf 05  d4 33 1e c3  f7 1c 24 c9  99 e3 d1 99
Aug 26 18:32:52.599971: | CERT  91 df 32 10  d5 7c 31 7e  9e 6f 70 01  dc 0d d7 21
Aug 26 18:32:52.599974: | CERT  03 76 4d f5  b2 e3 87 30  94 8c b2 0a  c0 b4 d9 0b
Aug 26 18:32:52.599976: | CERT  d4 d9 37 e0  7a 73 13 50  8d 6f 93 9a  7c 5a 1a b2
Aug 26 18:32:52.599978: | CERT  87 7e 0c 64  60 cb 4b 2c  ef 22 75 b1  7c 60 3e e3
Aug 26 18:32:52.599980: | CERT  e5 f1 94 38  51 8f 00 e8  35 7b b5 01  ed c1 c4 fd
Aug 26 18:32:52.599982: | CERT  a3 4b 56 42  d6 8b 64 38  74 95 c4 13  70 f0 f0 23
Aug 26 18:32:52.599985: | CERT  29 57 2b ef  74 97 97 76  8d 30 48 91  02 03 01 00
Aug 26 18:32:52.599987: | CERT  01 a3 81 e4  30 81 e1 30  09 06 03 55  1d 13 04 02
Aug 26 18:32:52.599989: | CERT  30 00 30 26  06 03 55 1d  11 04 1f 30  1d 82 1b 6e
Aug 26 18:32:52.599993: | CERT  6f 72 74 68  2e 74 65 73  74 69 6e 67  2e 6c 69 62
Aug 26 18:32:52.599996: | CERT  72 65 73 77  61 6e 2e 6f  72 67 30 0b  06 03 55 1d
Aug 26 18:32:52.599998: | CERT  0f 04 04 03  02 07 80 30  1d 06 03 55  1d 25 04 16
Aug 26 18:32:52.600000: | CERT  30 14 06 08  2b 06 01 05  05 07 03 01  06 08 2b 06
Aug 26 18:32:52.600003: | CERT  01 05 05 07  03 02 30 41  06 08 2b 06  01 05 05 07
Aug 26 18:32:52.600005: | CERT  01 01 04 35  30 33 30 31  06 08 2b 06  01 05 05 07
Aug 26 18:32:52.600007: | CERT  30 01 86 25  68 74 74 70  3a 2f 2f 6e  69 63 2e 74
Aug 26 18:32:52.600010: | CERT  65 73 74 69  6e 67 2e 6c  69 62 72 65  73 77 61 6e
Aug 26 18:32:52.600012: | CERT  2e 6f 72 67  3a 32 35 36  30 30 3d 06  03 55 1d 1f
Aug 26 18:32:52.600014: | CERT  04 36 30 34  30 32 a0 30  a0 2e 86 2c  68 74 74 70
Aug 26 18:32:52.600017: | CERT  3a 2f 2f 6e  69 63 2e 74  65 73 74 69  6e 67 2e 6c
Aug 26 18:32:52.600019: | CERT  69 62 72 65  73 77 61 6e  2e 6f 72 67  2f 72 65 76
Aug 26 18:32:52.600021: | CERT  6f 6b 65 64  2e 63 72 6c  30 0d 06 09  2a 86 48 86
Aug 26 18:32:52.600024: | CERT  f7 0d 01 01  0b 05 00 03  81 81 00 9e  e9 26 57 73
Aug 26 18:32:52.600026: | CERT  c2 4c 64 c6  ab d6 d3 1a  13 4f 6b 48  e3 17 b2 3d
Aug 26 18:32:52.600028: | CERT  fb 30 93 2d  15 92 6e a3  60 29 10 1d  3e a7 93 48
Aug 26 18:32:52.600031: | CERT  3c 40 5b af  9e e5 93 b7  2f d5 4b 9f  db bd ab 5d
Aug 26 18:32:52.600033: | CERT  03 57 3a 1a  f9 81 87 13  dd 32 e7 93  b5 9e 3b 40
Aug 26 18:32:52.600035: | CERT  3c c6 c9 d5  ce c6 c7 5d  da 89 36 3d  d0 36 82 fd
Aug 26 18:32:52.600038: | CERT  b2 ab 00 2a  7c 0e a7 ad  3e e2 b1 5a  0d 88 45 26
Aug 26 18:32:52.600040: | CERT  48 51 b3 c7  79 d7 04 e7  47 5f 28 f8  63 fb ae 58
Aug 26 18:32:52.600042: | CERT  52 8b ba 60  ce 19 ac fa  4e 65 7d
Aug 26 18:32:52.600045: | emitting length of ISAKMP Certificate Payload: 1232
Aug 26 18:32:52.600048: "north-a-dpd" #1: I am sending a certificate request
Aug 26 18:32:52.600053: | ***emit ISAKMP Certificate RequestPayload:
Aug 26 18:32:52.600055: |    next payload type: ISAKMP_NEXT_SIG (0x9)
Aug 26 18:32:52.600057: |    cert type: CERT_X509_SIGNATURE (0x4)
Aug 26 18:32:52.600059: | next payload chain: ignoring supplied 'ISAKMP Certificate RequestPayload'.'next payload type' value 9:ISAKMP_NEXT_SIG
Aug 26 18:32:52.600061: | next payload chain: setting previous 'ISAKMP Certificate Payload'.'next payload type' to current ISAKMP Certificate RequestPayload (7:ISAKMP_NEXT_CR)
Aug 26 18:32:52.600063: | next payload chain: saving location 'ISAKMP Certificate RequestPayload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.600065: | emitting 175 raw bytes of CA into ISAKMP Certificate RequestPayload
Aug 26 18:32:52.600067: | CA  30 81 ac 31  0b 30 09 06  03 55 04 06  13 02 43 41
Aug 26 18:32:52.600068: | CA  31 10 30 0e  06 03 55 04  08 0c 07 4f  6e 74 61 72
Aug 26 18:32:52.600070: | CA  69 6f 31 10  30 0e 06 03  55 04 07 0c  07 54 6f 72
Aug 26 18:32:52.600071: | CA  6f 6e 74 6f  31 12 30 10  06 03 55 04  0a 0c 09 4c
Aug 26 18:32:52.600073: | CA  69 62 72 65  73 77 61 6e  31 18 30 16  06 03 55 04
Aug 26 18:32:52.600074: | CA  0b 0c 0f 54  65 73 74 20  44 65 70 61  72 74 6d 65
Aug 26 18:32:52.600076: | CA  6e 74 31 25  30 23 06 03  55 04 03 0c  1c 4c 69 62
Aug 26 18:32:52.600077: | CA  72 65 73 77  61 6e 20 74  65 73 74 20  43 41 20 66
Aug 26 18:32:52.600079: | CA  6f 72 20 6d  61 69 6e 63  61 31 24 30  22 06 09 2a
Aug 26 18:32:52.600080: | CA  86 48 86 f7  0d 01 09 01  16 15 74 65  73 74 69 6e
Aug 26 18:32:52.600082: | CA  67 40 6c 69  62 72 65 73  77 61 6e 2e  6f 72 67
Aug 26 18:32:52.600084: | emitting length of ISAKMP Certificate RequestPayload: 180
Aug 26 18:32:52.600114: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_RSA
Aug 26 18:32:52.600179: | searching for certificate PKK_RSA:AwEAAcBZv vs PKK_RSA:AwEAAcBZv
Aug 26 18:32:52.605633: | ***emit ISAKMP Signature Payload:
Aug 26 18:32:52.605643: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.605646: | next payload chain: setting previous 'ISAKMP Certificate RequestPayload'.'next payload type' to current ISAKMP Signature Payload (9:ISAKMP_NEXT_SIG)
Aug 26 18:32:52.605648: | next payload chain: saving location 'ISAKMP Signature Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.605650: | emitting 384 raw bytes of SIG_I into ISAKMP Signature Payload
Aug 26 18:32:52.605652: | SIG_I  ae 93 f4 88  c9 d3 63 33  95 44 a1 2a  cc fc b9 13
Aug 26 18:32:52.605654: | SIG_I  c8 73 15 bd  ee 42 fd 39  61 bd 8d 63  fb 9b 62 f1
Aug 26 18:32:52.605655: | SIG_I  13 ac 6f 59  4b 3b 6a 0e  0b 9b 10 e6  46 21 ac b8
Aug 26 18:32:52.605657: | SIG_I  94 f4 33 eb  ac 0f ad 3c  94 e7 8c 8a  0e cc 03 95
Aug 26 18:32:52.605658: | SIG_I  a4 ea 1b ec  75 e9 7d fb  40 48 4d e8  c3 86 f7 c5
Aug 26 18:32:52.605660: | SIG_I  91 07 83 78  02 5c 58 75  c0 dc 55 f9  c4 d5 94 66
Aug 26 18:32:52.605661: | SIG_I  7a 6c 0a 1e  4d f5 6b 7f  88 ba 06 69  bb e1 20 db
Aug 26 18:32:52.605663: | SIG_I  fd 29 6a 03  5e e1 c0 77  61 7d 3d 4b  7a 49 d1 d9
Aug 26 18:32:52.605664: | SIG_I  c5 40 8c 75  0c 67 d9 a1  c8 64 0a 39  70 f5 d7 88
Aug 26 18:32:52.605666: | SIG_I  83 59 0b fc  ab f0 be 57  df 32 c9 d9  1e e1 78 c2
Aug 26 18:32:52.605667: | SIG_I  42 1f a0 c5  e3 7f 3c 32  a8 8f c1 59  29 e6 e9 ce
Aug 26 18:32:52.605669: | SIG_I  27 61 4a eb  8b cb b8 71  26 05 35 ce  75 fa b3 42
Aug 26 18:32:52.605670: | SIG_I  29 28 47 0d  16 4a 93 c4  d2 fc 82 da  1d 31 86 61
Aug 26 18:32:52.605672: | SIG_I  d2 e9 65 0b  88 55 a2 ff  c6 60 02 5c  4c b5 1d 91
Aug 26 18:32:52.605673: | SIG_I  ad b9 65 ff  5e 0f 4e 1c  48 e9 89 24  d9 fd bf fc
Aug 26 18:32:52.605675: | SIG_I  d7 33 64 0c  4f 6d 5f 84  7c 4e 85 42  7b a2 ef f6
Aug 26 18:32:52.605676: | SIG_I  4f e2 a0 f9  4f f0 6c 47  58 3f ea 52  6e 9c 75 8c
Aug 26 18:32:52.605678: | SIG_I  29 dd 0b 50  f1 20 83 a8  f0 ec f8 cf  3a 04 1d 63
Aug 26 18:32:52.605679: | SIG_I  bb 2d 1c 0b  e8 98 f9 96  1e 4a 50 c0  8e 2e 5b 5d
Aug 26 18:32:52.605681: | SIG_I  cf 00 5d c5  74 28 f4 bb  06 78 eb f5  9c d1 31 58
Aug 26 18:32:52.605682: | SIG_I  52 ea d0 a1  88 6b 8a 91  93 17 da 92  e7 6b a7 75
Aug 26 18:32:52.605684: | SIG_I  b8 1d 00 ea  ae a7 60 06  ab 23 15 de  ee d8 ed d8
Aug 26 18:32:52.605686: | SIG_I  5c 1a de 76  34 7a 8c 99  52 44 80 c6  7b 58 64 94
Aug 26 18:32:52.605687: | SIG_I  70 70 70 64  bb 07 1a d8  41 19 d1 37  96 92 b6 78
Aug 26 18:32:52.605689: | emitting length of ISAKMP Signature Payload: 388
Aug 26 18:32:52.605691: | Not sending INITIAL_CONTACT
Aug 26 18:32:52.605693: | emitting 7 zero bytes of encryption padding into ISAKMP Message
Aug 26 18:32:52.605694: | no IKEv1 message padding required
Aug 26 18:32:52.605696: | emitting length of ISAKMP Message: 2028
Aug 26 18:32:52.605706: | complete v1 state transition with STF_OK
Aug 26 18:32:52.605710: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:32:52.605712: | #1 is idle
Aug 26 18:32:52.605714: | doing_xauth:no, t_xauth_client_done:no
Aug 26 18:32:52.605715: | IKEv1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
Aug 26 18:32:52.605718: | parent state #1: MAIN_I2(open IKE SA) => MAIN_I3(open IKE SA)
Aug 26 18:32:52.605720: | event_already_set, deleting event
Aug 26 18:32:52.605722: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Aug 26 18:32:52.605725: | libevent_free: release ptr-libevent@0x7fbd18002888
Aug 26 18:32:52.605727: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55c66d954c08
Aug 26 18:32:52.605731: | sending reply packet to 192.1.2.23:500 (from 192.1.3.33:500)
Aug 26 18:32:52.605736: | sending 2028 bytes for STATE_MAIN_I2 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1)
Aug 26 18:32:52.605738: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.605739: |   05 10 02 01  00 00 00 00  00 00 07 ec  4b 36 36 25
Aug 26 18:32:52.605741: |   f5 b6 6c 91  6a 87 5c 1c  c8 a5 38 47  e3 e2 73 4b
Aug 26 18:32:52.605744: |   c2 f9 b3 96  9c 00 8a 3a  16 b1 5a 73  64 09 2b 48
Aug 26 18:32:52.605746: |   c9 c0 23 98  57 42 53 e3  6c 6b 1d c8  6d 5d 15 51
Aug 26 18:32:52.605748: |   0f ee 7b e6  8b 7e 88 28  f4 69 63 72  4c d0 ce 45
Aug 26 18:32:52.605749: |   89 60 3e f0  c9 10 d4 e4  d4 51 3a e2  ba 0a 8e a8
Aug 26 18:32:52.605751: |   c7 5f c7 3e  d5 d4 26 06  72 c8 97 41  e3 89 81 3a
Aug 26 18:32:52.605752: |   1f 9b 41 77  e3 6b ed d3  25 5f 0b 9e  f0 11 39 6b
Aug 26 18:32:52.605754: |   77 03 79 6c  fa 32 23 7d  14 85 8e 2d  9c 4e c8 4e
Aug 26 18:32:52.605755: |   74 7b 40 25  5e 7d 07 43  0b 1b c4 5d  dc 16 14 19
Aug 26 18:32:52.605756: |   26 ce 86 d5  dd c1 2f be  29 ed c6 cd  dc 36 f5 1b
Aug 26 18:32:52.605758: |   af 40 61 6b  1a 3f d1 4a  6b 56 28 bd  86 33 f1 53
Aug 26 18:32:52.605759: |   16 a7 b1 f3  77 47 29 68  e9 23 e0 7e  15 2f 84 9b
Aug 26 18:32:52.605761: |   65 34 b2 ff  26 ae c7 76  26 23 28 c3  af 82 c8 c7
Aug 26 18:32:52.605762: |   d8 1c 76 4e  ee 89 98 29  aa 0f 4a 03  ea 1f 63 72
Aug 26 18:32:52.605764: |   44 5e 38 d3  59 57 65 de  5b 10 2e d0  34 0b f2 2d
Aug 26 18:32:52.605765: |   c9 16 8d 56  38 7b 37 f6  a5 02 9e 0c  b6 86 13 12
Aug 26 18:32:52.605767: |   5d b5 50 46  19 f7 43 57  ea 0a 21 b6  e4 f4 66 e3
Aug 26 18:32:52.605768: |   bf 7a 88 de  f0 32 09 73  ff 82 25 0c  f2 67 b3 d1
Aug 26 18:32:52.605770: |   22 7e ef d6  00 32 54 07  d6 cd b0 52  13 2e 1a d7
Aug 26 18:32:52.605771: |   a7 01 18 49  a4 a8 06 86  fb 77 7d 21  2e b7 c6 e7
Aug 26 18:32:52.605773: |   be 75 5a 35  a5 6a 36 24  8b a5 d4 05  36 69 27 63
Aug 26 18:32:52.605774: |   2a 23 aa 7b  7a 58 9e 43  9f 94 0d 9a  69 aa 01 11
Aug 26 18:32:52.605776: |   d3 f2 40 fe  3f 71 53 5d  51 55 57 9d  63 f9 38 26
Aug 26 18:32:52.605777: |   fb a9 2a 27  b7 e9 3a 78  ab 3c 81 64  c8 75 1f 61
Aug 26 18:32:52.605779: |   a1 a9 a2 ab  31 e3 14 65  5a 7d 1b c0  ae fc 0a 33
Aug 26 18:32:52.605780: |   e7 f0 cf 7f  dc 2d 44 f3  0a 7b c4 ee  17 7e b0 78
Aug 26 18:32:52.605782: |   2b a7 03 c5  9d 1d 7b 19  d2 c9 ff b5  d1 47 b1 d3
Aug 26 18:32:52.605783: |   ce 8e 79 6d  ba 0b 59 c5  85 e8 d9 39  5e f8 a8 aa
Aug 26 18:32:52.605785: |   93 51 f5 2b  26 4e 3e 38  70 ae b5 2b  cb 8b ab 79
Aug 26 18:32:52.605786: |   4a c7 a0 2c  0a db 91 e4  08 0a e8 d5  ac 2d d6 09
Aug 26 18:32:52.605788: |   aa 81 d9 29  3c 27 92 ce  fd 2b e7 71  4a e7 24 61
Aug 26 18:32:52.605789: |   33 a3 a9 2b  4d c6 e1 01  fd b5 21 46  6e b2 c5 aa
Aug 26 18:32:52.605791: |   63 4f ee 64  a4 3c 77 9a  5b 7f e3 28  6f a0 bd 60
Aug 26 18:32:52.605792: |   ef 88 11 88  74 39 e7 1a  1a 19 5f 79  71 f0 28 7a
Aug 26 18:32:52.605794: |   0c 82 fc ba  8a 58 42 1f  59 f2 18 aa  70 eb 59 31
Aug 26 18:32:52.605795: |   65 aa 5a 0d  04 60 a3 d4  6f 8a 96 fc  11 37 02 0f
Aug 26 18:32:52.605797: |   cb f3 81 3d  5a 73 3b fe  73 4e 6d c2  05 32 65 a6
Aug 26 18:32:52.605798: |   1e 53 d0 f8  61 58 52 8b  d2 ad 18 70  6e f2 ba cf
Aug 26 18:32:52.605800: |   98 49 01 46  42 e0 be 3b  51 92 91 db  20 56 04 c8
Aug 26 18:32:52.605801: |   eb e6 09 72  96 80 db 95  6a 00 65 53  3d c0 6d 08
Aug 26 18:32:52.605803: |   77 cd 8b 6f  d3 f2 0b 1f  18 47 c1 e3  6d 6c 25 4b
Aug 26 18:32:52.605804: |   4b 63 04 20  68 a9 ca 25  ff bd f4 cd  ec 17 aa dd
Aug 26 18:32:52.605806: |   a6 b7 47 66  d5 38 4b 33  d9 d9 0f 70  7c 77 f9 4e
Aug 26 18:32:52.605807: |   40 9e 71 2f  7e 80 cd df  c7 bd f5 b2  68 8e 41 16
Aug 26 18:32:52.605809: |   fd e1 a9 e8  fe d7 ae fe  33 ef 6f b7  82 58 a9 69
Aug 26 18:32:52.605810: |   ec 13 4d a0  d5 25 c4 54  34 b5 d3 b6  08 86 6a f6
Aug 26 18:32:52.605812: |   ad 29 51 8a  ec 0b 55 fc  68 e7 ad a2  1b 55 b2 f8
Aug 26 18:32:52.605813: |   cf ef 58 c3  06 cb f7 d5  5d 81 ce a1  dc 9e 8d 69
Aug 26 18:32:52.605815: |   d3 c2 08 c3  4b 17 a9 cc  4d 42 6c 68  9d 44 24 65
Aug 26 18:32:52.605816: |   8e df 90 94  c2 29 27 2c  db 10 89 8a  ad d5 10 29
Aug 26 18:32:52.605818: |   66 95 2d ce  5f 27 9c 47  25 ba 70 7e  7a 52 80 1f
Aug 26 18:32:52.605819: |   31 34 cc 23  61 e5 4f e5  31 74 0f 96  de 49 33 9a
Aug 26 18:32:52.605822: |   b0 10 74 92  27 8f 67 d3  36 e0 94 a6  7f 73 38 13
Aug 26 18:32:52.605823: |   6b 79 a8 5d  13 0c 65 98  50 26 cc e9  05 7b 7e 68
Aug 26 18:32:52.605825: |   76 8c 64 bc  d7 52 73 c6  60 18 e8 8d  ce 2e 4f b7
Aug 26 18:32:52.605826: |   5b ce 57 29  1b 8f 9b e8  9b c9 d9 a6  28 f2 16 2a
Aug 26 18:32:52.605828: |   27 36 5e 79  d4 e0 97 d7  bd bc 07 74  e8 89 46 0b
Aug 26 18:32:52.605829: |   11 11 56 cc  50 c8 f3 f7  df 3f 1d db  23 b7 7d d5
Aug 26 18:32:52.605831: |   70 eb da 57  79 08 2c 3c  7a 72 71 0a  98 11 a5 aa
Aug 26 18:32:52.605832: |   85 dd 24 68  1f 69 31 89  dc 3e d9 bb  ca f3 25 8d
Aug 26 18:32:52.605834: |   d9 07 09 91  3b df 25 ee  49 b4 f4 99  54 5a 5a d6
Aug 26 18:32:52.605835: |   2a e2 4d df  33 8a ab 44  bb de 27 b9  d1 e8 d6 4a
Aug 26 18:32:52.605837: |   4b f7 a4 2e  70 ff 7b 4c  11 72 85 6d  5c bd 0b 73
Aug 26 18:32:52.605838: |   4d ed 8f b0  9d 63 5a df  ec a9 4c 55  ac 29 af 27
Aug 26 18:32:52.605839: |   6a 6d b4 41  8e f0 88 63  a8 ea 32 ae  04 49 0e 80
Aug 26 18:32:52.605841: |   84 6c 8a f2  f2 4c be 38  dd a7 cc 4d  da 18 5c 37
Aug 26 18:32:52.605842: |   56 e7 9e a1  40 71 ab a4  46 93 a5 90  f4 37 e2 e6
Aug 26 18:32:52.605844: |   ab c4 cd 49  93 13 3a ef  bc 45 51 19  06 f1 1a 76
Aug 26 18:32:52.605845: |   50 d1 d5 27  9b 13 ed eb  5b b4 ca 02  51 a9 8d a7
Aug 26 18:32:52.605847: |   ae 84 3a 01  54 9b ea a1  e9 ba aa a2  60 ea 11 25
Aug 26 18:32:52.605848: |   c8 82 ed dd  24 4b 2e 28  91 2b ed 3d  27 5d 3a b7
Aug 26 18:32:52.605850: |   6c ef 40 d3  ac 28 c2 62  0b e0 df 4b  18 86 5e be
Aug 26 18:32:52.605851: |   7f 8c 68 21  bc 3b 64 29  62 04 ec 4b  9e 72 84 7b
Aug 26 18:32:52.605853: |   d6 8f 68 74  e1 f6 6e 33  fd 42 b3 3b  f0 ef a6 94
Aug 26 18:32:52.605854: |   30 8e 9b 13  d0 57 bd 09  fe bc e8 ec  74 17 91 47
Aug 26 18:32:52.605856: |   45 1d 31 26  29 2a b8 e5  8d fd 6b 52  72 f0 c1 0a
Aug 26 18:32:52.605857: |   93 e2 20 d6  c8 a5 cf d9  be 32 af ff  af b3 8c a9
Aug 26 18:32:52.605859: |   4e f4 3d 6b  01 f2 49 5f  76 78 80 2a  b1 dd e3 90
Aug 26 18:32:52.605860: |   0f 2a f4 30  9d f0 bc 56  8b 2d a1 83  7b 4f 3f 66
Aug 26 18:32:52.605862: |   80 bb eb a6  df f6 52 38  42 99 69 ee  11 41 86 7a
Aug 26 18:32:52.605863: |   80 c8 18 91  e5 49 8c bd  6d 18 7d 1a  29 4c 67 5f
Aug 26 18:32:52.605865: |   92 e7 2c 39  8f 0e a2 e9  4e 07 41 14  5f fa f1 9a
Aug 26 18:32:52.605866: |   1e ab 62 ef  5d 51 f8 51  35 28 f0 d2  93 b4 fe 24
Aug 26 18:32:52.605868: |   42 b7 46 ff  25 a7 15 b2  05 02 a3 d6  78 6a 4e 93
Aug 26 18:32:52.605869: |   84 7e 96 9f  7b 24 29 7e  9c ac 88 29  b6 c5 69 6f
Aug 26 18:32:52.605871: |   02 4c 2c d9  7c 20 0e 43  b0 a1 03 cb  4e cd 9a 54
Aug 26 18:32:52.605872: |   1b 81 56 0e  d0 7b eb 51  76 2b 0f 28  8d e9 91 37
Aug 26 18:32:52.605874: |   01 4e cb e7  41 ec 3f 5f  f7 80 97 8e  ca 78 e4 f5
Aug 26 18:32:52.605875: |   25 da d6 73  a6 c1 bd 11  07 cb 4e df  e4 03 53 b1
Aug 26 18:32:52.605877: |   ef 64 0c 23  f2 04 71 dd  f7 92 bd 02  44 61 8b f8
Aug 26 18:32:52.605878: |   2f 35 2d f4  fb 2e 51 15  06 2f 23 b2  a7 31 73 e3
Aug 26 18:32:52.605880: |   cb 22 9a 81  c1 88 a8 4f  e1 52 da 3e  84 b6 20 7d
Aug 26 18:32:52.605881: |   19 7e f9 c0  7e 6c 1d 59  61 b0 57 b7  ec e1 03 f7
Aug 26 18:32:52.605883: |   11 e6 05 fd  da 75 b7 fe  7b c0 0e 14  fa 77 a6 ba
Aug 26 18:32:52.605884: |   64 94 2f 62  35 a8 09 0f  4f f3 bf 8a  ae fb 4e e0
Aug 26 18:32:52.605886: |   30 e0 ea 2d  c1 09 db 98  c7 3e 6f 8b  c3 fa ac e7
Aug 26 18:32:52.605887: |   12 36 1a 36  8c 3f 27 e0  27 da 94 03  b4 a5 1d be
Aug 26 18:32:52.605889: |   eb d2 ee 38  2a 0d 15 ce  a9 d5 ac b1  e3 6b e8 da
Aug 26 18:32:52.605890: |   4a 17 c7 a8  05 96 c0 95  b7 e8 c4 5d  88 73 b0 3d
Aug 26 18:32:52.605892: |   b1 0d 86 3a  1b 51 62 89  66 81 e3 6d  37 11 df 21
Aug 26 18:32:52.605893: |   0b 9c 91 b0  2d 03 ec 4d  e5 9a 0b d7  58 c9 14 dd
Aug 26 18:32:52.605895: |   10 3c 8f 5d  6e fa 83 03  ac dc 27 fa  3b 70 f1 1d
Aug 26 18:32:52.605896: |   37 b0 cb 49  85 69 3f 49  27 6d 78 45  44 e1 36 65
Aug 26 18:32:52.605898: |   5d 92 fd 52  bf f8 f1 28  66 c3 91 24  c0 10 d7 28
Aug 26 18:32:52.605900: |   a2 b0 89 98  fb a5 4e 90  f6 62 c2 3d  5f 9a 40 32
Aug 26 18:32:52.605901: |   f0 45 e7 11  dd 10 f2 13  ee 86 69 8e  20 03 50 57
Aug 26 18:32:52.605903: |   7e 9f 78 95  b2 86 c2 09  aa 0c 6c f6  3f f8 2c 73
Aug 26 18:32:52.605904: |   12 24 a8 6f  bf 62 ff ce  3c 06 9f bc  c4 fd 7b dd
Aug 26 18:32:52.605906: |   0c dc 7d cf  04 0b ed 08  b9 84 33 83  07 15 26 ad
Aug 26 18:32:52.605907: |   11 e6 e1 23  70 9d a0 a6  05 23 46 bd  68 a6 ac fe
Aug 26 18:32:52.605909: |   75 e4 03 53  a4 be 93 55  01 d1 24 bb  4c f0 04 67
Aug 26 18:32:52.605910: |   f0 4d 7d fe  6d 97 82 9c  0b a7 bc 77  f9 b6 3a 49
Aug 26 18:32:52.605912: |   e2 c1 53 16  6c 58 a4 de  9a 46 6b a2  d3 c5 c2 7a
Aug 26 18:32:52.605913: |   2e cf 29 d3  cd cb e2 24  ee 5f 88 1d  ba 62 77 a7
Aug 26 18:32:52.605915: |   1e 95 d4 02  13 9a d3 82  4b c0 06 f4  fa 71 fa 62
Aug 26 18:32:52.605916: |   72 4f f6 c5  a2 be 5b 33  f1 21 0e ea  37 1b 55 0e
Aug 26 18:32:52.605918: |   bb 37 89 9a  20 8f 04 0d  5d 7d 54 b0  76 51 30 bd
Aug 26 18:32:52.605919: |   1e 70 6b 6a  d2 7f 7a c5  e9 de 01 b4  89 d8 ad 61
Aug 26 18:32:52.605921: |   31 8b 3b 74  37 44 4e 05  01 e9 0d f1  92 b7 6e bc
Aug 26 18:32:52.605922: |   78 28 58 87  4f 70 00 c9  5a e5 65 05  53 7b 9f 85
Aug 26 18:32:52.605924: |   61 85 b8 1e  e9 c5 15 cf  c3 78 08 aa  cf 2c 18 f2
Aug 26 18:32:52.605925: |   47 c8 98 d9  05 f4 47 26  63 d2 7e 80  c3 6a 07 00
Aug 26 18:32:52.605927: |   98 87 e2 cd  71 8e 33 af  63 11 7b 6f  68 3d 14 74
Aug 26 18:32:52.605928: |   89 ef 45 c1  d6 69 88 44  e0 59 df ba  13 c7 9b 60
Aug 26 18:32:52.605930: |   9f 87 16 73  c2 33 f2 fc  f4 be f9 1d
Aug 26 18:32:52.605984: | !event_already_set at reschedule
Aug 26 18:32:52.605988: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:32:52.605991: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1
Aug 26 18:32:52.605993: | libevent_malloc: new ptr-libevent@0x55c66d953748 size 128
Aug 26 18:32:52.605997: | #1 STATE_MAIN_I3: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29658.348455
Aug 26 18:32:52.605999: "north-a-dpd" #1: STATE_MAIN_I3: sent MI3, expecting MR3
Aug 26 18:32:52.606006: | modecfg pull: noquirk policy:push not-client
Aug 26 18:32:52.606008: | phase 1 is done, looking for phase 2 to unpend
Aug 26 18:32:52.606011: | resume sending helper answer for #1 suppresed complete_v1_state_transition()
Aug 26 18:32:52.606017: | #1 spent 6.27 milliseconds in resume sending helper answer
Aug 26 18:32:52.606020: | stop processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:833)
Aug 26 18:32:52.606023: | libevent_free: release ptr-libevent@0x7fbd10000f48
Aug 26 18:32:52.618079: | spent 0.00348 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:32:52.618110: | *received 1884 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:32:52.618115: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.618118: |   05 10 02 01  00 00 00 00  00 00 07 5c  cb 37 0f 37
Aug 26 18:32:52.618121: |   39 65 6c f3  6b 86 9b 85  86 8e f5 c1  7d 36 28 a9
Aug 26 18:32:52.618123: |   5b 1e f7 c8  f9 97 f3 52  10 cb 92 f8  60 07 9c d9
Aug 26 18:32:52.618126: |   72 22 71 5f  81 9f 99 eb  81 b5 f1 9e  b4 c7 f2 aa
Aug 26 18:32:52.618128: |   b0 f6 be cd  23 54 f4 6f  d1 83 ac fc  64 8f 74 87
Aug 26 18:32:52.618131: |   85 5c 2f 12  0a 3d 7c 8e  21 87 10 69  c7 f7 5d be
Aug 26 18:32:52.618134: |   84 81 e1 cf  90 79 4e bb  46 80 30 c3  7e 4b a3 76
Aug 26 18:32:52.618136: |   0d 02 96 75  3a ac bb 1e  9f 6f 68 9c  f0 e7 c0 57
Aug 26 18:32:52.618139: |   48 be 79 3f  75 48 91 ea  19 46 6b 9e  dd a0 8f 14
Aug 26 18:32:52.618141: |   b7 a1 c4 69  bd 73 88 77  ea 8a 27 e4  04 b7 b4 f1
Aug 26 18:32:52.618144: |   29 4d 8e 6c  50 ef 3a de  21 7a 56 94  cd e4 84 d2
Aug 26 18:32:52.618146: |   d3 b9 7d ca  56 4c 73 73  ee 46 e2 4d  a6 d0 10 ed
Aug 26 18:32:52.618149: |   d9 58 27 49  d1 a6 10 2a  30 e9 65 93  ef 43 ca 3a
Aug 26 18:32:52.618152: |   07 cc b5 84  e0 db d7 47  de 97 50 77  93 42 86 a3
Aug 26 18:32:52.618160: |   7c 07 b7 27  f2 34 82 7d  49 c5 52 0d  c1 ea 06 ae
Aug 26 18:32:52.618163: |   d7 c1 18 60  22 34 62 56  1b ae 9a 44  c2 df 6f 3b
Aug 26 18:32:52.618165: |   58 c9 52 be  da 76 98 74  3b 87 fc 59  43 a7 f5 7b
Aug 26 18:32:52.618168: |   fc 36 c0 51  31 4d bd 64  08 ba 74 db  16 96 4d d0
Aug 26 18:32:52.618170: |   60 23 18 8d  ff 3e 6c 33  e2 21 42 19  5b e5 f4 e1
Aug 26 18:32:52.618173: |   39 08 2f 21  a0 18 0b ec  94 97 4a b8  37 09 01 2b
Aug 26 18:32:52.618175: |   ff ad 14 9d  c8 d1 95 10  7d fe 14 68  d4 6c dc 8f
Aug 26 18:32:52.618178: |   0c 89 e4 70  53 09 a3 9d  01 10 d6 5e  b0 0f ad b5
Aug 26 18:32:52.618180: |   43 e0 2c 0e  79 4d 33 63  3f b5 b6 2a  ce ef 4a 0a
Aug 26 18:32:52.618183: |   ed f2 c1 fe  0c ef bf 7e  be ae e5 6a  ee 27 65 69
Aug 26 18:32:52.618185: |   48 96 5a 46  a7 d1 b0 6d  30 a8 8d bb  f8 ed e6 cd
Aug 26 18:32:52.618188: |   f0 06 80 89  98 05 34 d8  bc ac be 5e  bd cb 46 56
Aug 26 18:32:52.618190: |   77 ce f9 84  2a 6d 9b a2  86 62 0f 3a  0b e9 90 11
Aug 26 18:32:52.618193: |   01 dd 6a e9  c3 51 9c de  57 ed 66 05  1a 1b e0 5a
Aug 26 18:32:52.618196: |   b0 e3 04 7c  2c bd a4 2a  df 33 35 b8  ca b8 0f 85
Aug 26 18:32:52.618198: |   a4 5a fc 60  5c 4f 3f fa  77 20 68 47  d7 63 98 2b
Aug 26 18:32:52.618201: |   95 2e d2 e5  52 22 d0 0f  18 4b 88 e0  89 de bd 24
Aug 26 18:32:52.618203: |   16 53 ca b1  f3 15 3b 3b  90 5e 4e fd  00 b1 5d cb
Aug 26 18:32:52.618206: |   04 ed 37 9a  18 07 89 fc  90 e0 3f 4b  a6 5c 84 64
Aug 26 18:32:52.618208: |   da f8 66 97  43 cb 3c 40  56 16 df f1  56 45 b4 76
Aug 26 18:32:52.618211: |   01 c6 f7 9f  6c ca 30 2a  15 cd 6c f5  74 ce 6f a7
Aug 26 18:32:52.618213: |   31 09 ca f6  e7 d3 16 58  06 9e e5 d0  26 64 16 9a
Aug 26 18:32:52.618216: |   4a 2f c2 74  f4 b3 a2 14  b8 49 16 d3  76 f5 4a 1a
Aug 26 18:32:52.618219: |   d5 c6 83 bf  d2 6f 6d eb  eb 81 5b 70  05 6a 87 9f
Aug 26 18:32:52.618221: |   2e dd 27 66  0d 01 74 ca  d1 0a 20 ef  37 54 2f af
Aug 26 18:32:52.618224: |   6c 30 a5 4d  e6 ac 0e b8  52 fd b6 ad  5a 5d 43 b6
Aug 26 18:32:52.618226: |   84 7f 01 56  17 80 7c f0  86 c7 dd 7c  28 6a f2 7a
Aug 26 18:32:52.618229: |   7f e5 a0 5f  b7 70 59 a7  2e 02 8e d0  f2 3d 62 6c
Aug 26 18:32:52.618231: |   ce 2d 49 1f  d1 12 41 89  b3 2e f8 5b  f1 74 68 2e
Aug 26 18:32:52.618234: |   00 9c 2f 6e  39 cb 4c 83  10 af 12 ac  ba 4d 8c 3e
Aug 26 18:32:52.618236: |   c7 58 44 c3  5a 85 83 c5  93 a8 b2 67  1c 0a 8a 80
Aug 26 18:32:52.618239: |   36 9d 93 d4  fc 7e f0 1e  ef 86 c9 16  9e ec 41 9f
Aug 26 18:32:52.618241: |   04 90 d9 45  5d 41 0d 49  9d 55 d8 4f  9b b3 dd 20
Aug 26 18:32:52.618244: |   1c 0c 55 f6  b1 e1 c2 19  c9 ec 54 b0  19 de 5e a5
Aug 26 18:32:52.618246: |   1e 60 c7 53  82 bf 33 85  2f 03 ee 30  d7 55 54 5b
Aug 26 18:32:52.618249: |   3a a6 fb e1  c0 63 65 ed  51 17 f7 7d  10 43 35 9f
Aug 26 18:32:52.618252: |   a0 6a dd 04  6b f1 f8 80  5f 4c 58 e3  25 7d ff 3d
Aug 26 18:32:52.618254: |   bc 2d f1 0e  ae 62 9d 03  60 0d 8a 99  d7 af ee 06
Aug 26 18:32:52.618256: |   2a 18 40 20  41 fe 5a 05  e5 68 90 13  91 ee ae 0b
Aug 26 18:32:52.618259: |   3c 53 5e 98  08 fb 80 58  09 c9 d2 6d  8b 56 f9 4d
Aug 26 18:32:52.618262: |   dc 2a fb d8  5f 0d e5 8b  57 ae e3 87  3b a3 09 e4
Aug 26 18:32:52.618264: |   4d 37 ba 4c  e1 34 cf 5d  0a 65 a7 5d  4e ab 4e 48
Aug 26 18:32:52.618267: |   a9 a7 ca e2  e9 dc be a6  a5 87 29 55  ac 5d c8 4d
Aug 26 18:32:52.618269: |   5f 79 93 d8  c7 3d 09 b9  a1 5b 70 70  6a c9 5c 2f
Aug 26 18:32:52.618272: |   a5 d3 db 96  b3 8e 29 8e  04 5d 2c bc  4d 2f 0c df
Aug 26 18:32:52.618274: |   9f 79 a0 12  70 97 82 93  4b 4f 1e 92  b3 58 8f c7
Aug 26 18:32:52.618277: |   76 d4 59 2d  d1 42 4d d6  5d a9 9c b5  5d 98 fe 85
Aug 26 18:32:52.618279: |   d1 71 65 82  f2 58 55 eb  cb 34 ac 02  9e 95 14 4e
Aug 26 18:32:52.618282: |   51 f8 f6 74  19 1b 9d 2c  23 0f d8 4e  b3 69 66 cb
Aug 26 18:32:52.618284: |   fa 77 71 56  0c 5a 54 d1  3b 7e 5a ca  07 a9 b3 3c
Aug 26 18:32:52.618287: |   53 59 45 d1  73 5a d8 32  21 3b 2e 6d  89 af b8 fb
Aug 26 18:32:52.618296: |   cc 9e e8 81  cf 45 33 27  2d 42 36 79  9f a1 19 e2
Aug 26 18:32:52.618300: |   e8 a4 3b 30  b7 e7 fc 25  40 39 09 7e  fd 91 85 a2
Aug 26 18:32:52.618302: |   1d 4a a1 58  64 bc 09 a8  23 f5 83 a4  be e2 af 72
Aug 26 18:32:52.618305: |   0e 41 16 b0  e7 1b dc 53  0b 69 86 e4  1f 07 01 a0
Aug 26 18:32:52.618307: |   06 ea 3d f0  44 67 bc 9d  e1 24 4d db  6b b3 da aa
Aug 26 18:32:52.618310: |   a8 65 a0 2a  52 68 29 47  80 79 c7 16  7a 54 ef 14
Aug 26 18:32:52.618312: |   c3 4b 3c 95  02 9e a3 9e  ac 7e b9 e6  7b 77 a2 16
Aug 26 18:32:52.618315: |   4a 1f 46 89  e1 0d 21 51  bd 1d f6 d0  e2 42 39 77
Aug 26 18:32:52.618317: |   cf 95 56 15  55 52 6b 28  6f 4b 95 0e  dc e7 6e 0b
Aug 26 18:32:52.618320: |   96 e8 92 1e  88 af 99 ba  01 1c 08 66  6e 7d 5b 10
Aug 26 18:32:52.618322: |   8e 05 8e b1  73 71 73 54  8c e3 bf b1  55 5f 86 91
Aug 26 18:32:52.618325: |   89 8a da e1  b8 69 4a d0  6d 87 36 59  bf 58 b0 e5
Aug 26 18:32:52.618327: |   6f e4 d7 be  91 c2 8e 1b  83 fb 9f 65  ce 46 fb 0f
Aug 26 18:32:52.618330: |   9d 54 5c dc  66 e1 32 de  01 73 76 94  2a e8 65 11
Aug 26 18:32:52.618332: |   cf b5 01 a1  90 b3 f3 31  26 68 89 b3  d9 da 77 4c
Aug 26 18:32:52.618335: |   2b 5e 47 1d  bf 76 7b 64  ef 26 d2 2b  70 64 fe 94
Aug 26 18:32:52.618337: |   fa 35 f5 9c  6c ee 41 cf  8e 65 84 38  e1 9f 58 d9
Aug 26 18:32:52.618340: |   f5 b7 a4 40  da 88 f2 41  c6 8b f2 b9  17 29 01 f5
Aug 26 18:32:52.618342: |   97 53 a7 9d  61 10 03 f3  32 f6 cb a6  cb 53 66 20
Aug 26 18:32:52.618345: |   4c dd 9d 93  d3 e8 34 1e  45 f3 c6 c7  46 74 e7 76
Aug 26 18:32:52.618348: |   8b 10 64 24  c1 1b 16 db  aa df d7 51  07 ea f7 df
Aug 26 18:32:52.618350: |   04 3a df 94  56 31 7e 27  fe 66 fc db  0f 29 9b 07
Aug 26 18:32:52.618353: |   60 6d 84 1a  46 98 aa 20  0b c7 78 40  d9 9b ed c8
Aug 26 18:32:52.618355: |   a8 23 c9 95  5d ed bb 2b  a9 5c fb 25  ab c7 fe 44
Aug 26 18:32:52.618358: |   02 7a 5e d8  ce 14 0f ab  ce 3e f0 29  6f 9e df a9
Aug 26 18:32:52.618360: |   d5 50 53 55  5f b2 48 26  02 d0 1b 92  0a 4c dc 80
Aug 26 18:32:52.618363: |   52 58 62 b8  41 60 a7 05  1a 6a 12 07  11 b4 1a 84
Aug 26 18:32:52.618365: |   fe b3 1d 83  fc 2f 5d 2e  7e 97 e0 68  8c 32 f8 54
Aug 26 18:32:52.618368: |   c7 be 8b bf  8f 0c dd 0e  a7 1f b4 4f  4b d1 e3 13
Aug 26 18:32:52.618370: |   4c 69 32 cd  49 e2 17 90  73 27 00 df  01 14 e9 6d
Aug 26 18:32:52.618373: |   dd 6f e2 8e  ab a7 9d 04  a5 c8 b7 af  88 57 f0 8e
Aug 26 18:32:52.618375: |   7f 85 d1 5d  46 cd 7f ab  18 55 75 cd  9a 77 df 01
Aug 26 18:32:52.618378: |   15 e5 5e a0  ae 8c 48 f6  b1 e5 a2 b4  76 1f 58 45
Aug 26 18:32:52.618380: |   cf a5 0a 1b  e9 4b f5 50  47 99 f8 a4  a0 d5 5a 91
Aug 26 18:32:52.618383: |   ff 6a a1 e8  88 be 0e c8  0a 2a 5f 6b  00 c2 42 aa
Aug 26 18:32:52.618385: |   25 c2 c3 2a  e8 86 20 14  f8 36 99 9c  9f a2 c7 a0
Aug 26 18:32:52.618388: |   52 f0 ee ae  48 84 f2 73  59 38 99 51  a1 00 be 82
Aug 26 18:32:52.618390: |   7e 7e 59 59  64 94 24 e1  17 87 0f 54  b2 f0 40 00
Aug 26 18:32:52.618393: |   2a 1f ff 5b  1b ea e1 d3  ab d7 ee 08  fa f9 e0 a1
Aug 26 18:32:52.618396: |   8b 15 49 ee  f0 d7 cf 04  ce 2d 76 6c  ad f0 dc c0
Aug 26 18:32:52.618398: |   a8 2d 99 2c  f0 48 68 7e  03 cd 30 e4  56 15 4a 74
Aug 26 18:32:52.618401: |   cb b9 75 7e  0a 5f f8 93  4e 54 d4 1e  99 70 e7 15
Aug 26 18:32:52.618403: |   ba 91 fd ca  e8 fc c3 47  f2 23 87 cd  d4 ef e2 3f
Aug 26 18:32:52.618406: |   15 5e a1 ee  0a 7a 04 a7  dd b8 60 86  c4 39 b0 62
Aug 26 18:32:52.618408: |   bb 88 53 dd  79 af 2b 4a  a0 35 19 3a  0f 29 27 98
Aug 26 18:32:52.618411: |   81 29 74 72  cd 13 3b d3  8d 2f 5f 2d  30 06 78 6e
Aug 26 18:32:52.618413: |   5e 0a 65 70  75 30 ac 0e  a0 bf cd 8d  b7 e7 8d bc
Aug 26 18:32:52.618416: |   ca 01 ec 17  78 3d ae ee  46 26 66 5a  7f f2 ef 5b
Aug 26 18:32:52.618418: |   7f 55 80 44  04 78 f9 2a  a6 35 ec 1e  04 b3 bc cb
Aug 26 18:32:52.618421: |   80 72 1f 46  4c dc b6 43  76 d0 73 11  42 b6 37 c5
Aug 26 18:32:52.618423: |   92 93 93 27  0b 90 90 cb  e7 dd 3c 0c  cc c6 c5 97
Aug 26 18:32:52.618426: |   5c 14 bb 9d  34 e6 e5 56  56 b2 e3 0f
Aug 26 18:32:52.618431: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:32:52.618436: | **parse ISAKMP Message:
Aug 26 18:32:52.618439: |    initiator cookie:
Aug 26 18:32:52.618442: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:52.618445: |    responder cookie:
Aug 26 18:32:52.618447: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.618450: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:32:52.618453: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:32:52.618456: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:32:52.618459: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:32:52.618462: |    Message ID: 0 (0x0)
Aug 26 18:32:52.618464: |    length: 1884 (0x75c)
Aug 26 18:32:52.618467: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:32:52.618472: | State DB: found IKEv1 state #1 in MAIN_I3 (find_state_ikev1)
Aug 26 18:32:52.618477: | start processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459)
Aug 26 18:32:52.618480: | #1 is idle
Aug 26 18:32:52.618483: | #1 idle
Aug 26 18:32:52.618486: | received encrypted packet from 192.1.2.23:500
Aug 26 18:32:52.618505: | got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x220 opt: 0x20c0
Aug 26 18:32:52.618509: | ***parse ISAKMP Identification Payload:
Aug 26 18:32:52.618512: |    next payload type: ISAKMP_NEXT_CERT (0x6)
Aug 26 18:32:52.618514: |    length: 191 (0xbf)
Aug 26 18:32:52.618517: |    ID type: ID_DER_ASN1_DN (0x9)
Aug 26 18:32:52.618520: |    DOI specific A: 0 (0x0)
Aug 26 18:32:52.618522: |    DOI specific B: 0 (0x0)
Aug 26 18:32:52.618525: |      obj:   30 81 b4 31  0b 30 09 06  03 55 04 06  13 02 43 41
Aug 26 18:32:52.618528: |      obj:   31 10 30 0e  06 03 55 04  08 0c 07 4f  6e 74 61 72
Aug 26 18:32:52.618531: |      obj:   69 6f 31 10  30 0e 06 03  55 04 07 0c  07 54 6f 72
Aug 26 18:32:52.618533: |      obj:   6f 6e 74 6f  31 12 30 10  06 03 55 04  0a 0c 09 4c
Aug 26 18:32:52.618536: |      obj:   69 62 72 65  73 77 61 6e  31 18 30 16  06 03 55 04
Aug 26 18:32:52.618538: |      obj:   0b 0c 0f 54  65 73 74 20  44 65 70 61  72 74 6d 65
Aug 26 18:32:52.618541: |      obj:   6e 74 31 23  30 21 06 03  55 04 03 0c  1a 65 61 73
Aug 26 18:32:52.618543: |      obj:   74 2e 74 65  73 74 69 6e  67 2e 6c 69  62 72 65 73
Aug 26 18:32:52.618546: |      obj:   77 61 6e 2e  6f 72 67 31  2e 30 2c 06  09 2a 86 48
Aug 26 18:32:52.618549: |      obj:   86 f7 0d 01  09 01 16 1f  75 73 65 72  2d 65 61 73
Aug 26 18:32:52.618551: |      obj:   74 40 74 65  73 74 69 6e  67 2e 6c 69  62 72 65 73
Aug 26 18:32:52.618554: |      obj:   77 61 6e 2e  6f 72 67
Aug 26 18:32:52.618557: | got payload 0x40  (ISAKMP_NEXT_CERT) needed: 0x200 opt: 0x20c0
Aug 26 18:32:52.618560: | ***parse ISAKMP Certificate Payload:
Aug 26 18:32:52.618562: |    next payload type: ISAKMP_NEXT_SIG (0x9)
Aug 26 18:32:52.618565: |    length: 1265 (0x4f1)
Aug 26 18:32:52.618568: |    cert encoding: CERT_X509_SIGNATURE (0x4)
Aug 26 18:32:52.618571: | got payload 0x200  (ISAKMP_NEXT_SIG) needed: 0x200 opt: 0x20c0
Aug 26 18:32:52.618574: | ***parse ISAKMP Signature Payload:
Aug 26 18:32:52.618576: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.618579: |    length: 388 (0x184)
Aug 26 18:32:52.618581: | removing 12 bytes of padding
Aug 26 18:32:52.618584: | message 'main_inR3' HASH payload not checked early
Aug 26 18:32:52.618589: | DER ASN1 DN:  30 81 b4 31  0b 30 09 06  03 55 04 06  13 02 43 41
Aug 26 18:32:52.618592: | DER ASN1 DN:  31 10 30 0e  06 03 55 04  08 0c 07 4f  6e 74 61 72
Aug 26 18:32:52.618594: | DER ASN1 DN:  69 6f 31 10  30 0e 06 03  55 04 07 0c  07 54 6f 72
Aug 26 18:32:52.618597: | DER ASN1 DN:  6f 6e 74 6f  31 12 30 10  06 03 55 04  0a 0c 09 4c
Aug 26 18:32:52.618599: | DER ASN1 DN:  69 62 72 65  73 77 61 6e  31 18 30 16  06 03 55 04
Aug 26 18:32:52.618602: | DER ASN1 DN:  0b 0c 0f 54  65 73 74 20  44 65 70 61  72 74 6d 65
Aug 26 18:32:52.618605: | DER ASN1 DN:  6e 74 31 23  30 21 06 03  55 04 03 0c  1a 65 61 73
Aug 26 18:32:52.618607: | DER ASN1 DN:  74 2e 74 65  73 74 69 6e  67 2e 6c 69  62 72 65 73
Aug 26 18:32:52.618612: | DER ASN1 DN:  77 61 6e 2e  6f 72 67 31  2e 30 2c 06  09 2a 86 48
Aug 26 18:32:52.618614: | DER ASN1 DN:  86 f7 0d 01  09 01 16 1f  75 73 65 72  2d 65 61 73
Aug 26 18:32:52.618617: | DER ASN1 DN:  74 40 74 65  73 74 69 6e  67 2e 6c 69  62 72 65 73
Aug 26 18:32:52.618620: | DER ASN1 DN:  77 61 6e 2e  6f 72 67
Aug 26 18:32:52.618629: "north-a-dpd" #1: Peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org'
Aug 26 18:32:52.618642: | global one-shot timer EVENT_FREE_ROOT_CERTS scheduled in 300 seconds
Aug 26 18:32:52.618646: loading root certificate cache
Aug 26 18:32:52.622624: | spent 3.94 milliseconds in get_root_certs() calling PK11_ListCertsInSlot()
Aug 26 18:32:52.622666: | spent 0.0247 milliseconds in get_root_certs() filtering CAs
Aug 26 18:32:52.622673: |     #1 spent 4 milliseconds in find_and_verify_certs() calling get_root_certs()
Aug 26 18:32:52.622677: | checking for known CERT payloads
Aug 26 18:32:52.622681: | saving certificate of type 'X509_SIGNATURE'
Aug 26 18:32:52.622725: | decoded cert: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA
Aug 26 18:32:52.622732: |     #1 spent 0.053 milliseconds in find_and_verify_certs() calling decode_cert_payloads()
Aug 26 18:32:52.622737: | cert_issuer_has_current_crl: looking for a CRL issued by E=testing@libreswan.org,CN=Libreswan test CA for mainca,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA
Aug 26 18:32:52.622783: |     #1 spent 0.0444 milliseconds in find_and_verify_certs() calling crl_update_check()
Aug 26 18:32:52.622788: | missing or expired CRL
Aug 26 18:32:52.622792: | crl_strict: 0, ocsp: 0, ocsp_strict: 0, ocsp_post: 0
Aug 26 18:32:52.622795: | verify_end_cert trying profile IPsec
Aug 26 18:32:52.622928: | certificate is valid (profile IPsec)
Aug 26 18:32:52.622937: |     #1 spent 0.144 milliseconds in find_and_verify_certs() calling verify_end_cert()
Aug 26 18:32:52.622942: "north-a-dpd" #1: certificate verified OK: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA
Aug 26 18:32:52.623018: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d965ac8
Aug 26 18:32:52.623024: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d965108
Aug 26 18:32:52.623027: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d964f58
Aug 26 18:32:52.623030: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d964598
Aug 26 18:32:52.623033: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d9768f8
Aug 26 18:32:52.623244: | unreference key: 0x55c66d974e78 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1--
Aug 26 18:32:52.623254: |     #1 spent 0.299 milliseconds in decode_certs() calling add_pubkey_from_nss_cert()
Aug 26 18:32:52.623259: |   #1 spent 4.59 milliseconds in decode_certs()
Aug 26 18:32:52.623272: | ID_DER_ASN1_DN 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' needs further ID comparison against 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org'
Aug 26 18:32:52.623276: | ID_DER_ASN1_DN 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' matched our ID
Aug 26 18:32:52.623279: | SAN ID matched, updating that.cert
Aug 26 18:32:52.623282: | X509: CERT and ID matches current connection
Aug 26 18:32:52.623329: | required RSA CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:32:52.623345: | checking RSA keyid 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' for match with 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org'
Aug 26 18:32:52.623355: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:32:52.623362: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:32:52.623369: | key issuer CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:32:52.623544: | an RSA Sig check passed with *AwEAAbEef [remote certificates]
Aug 26 18:32:52.623550: |   #1 spent 0.176 milliseconds in try_all_RSA_keys() trying a pubkey
Aug 26 18:32:52.623554: "north-a-dpd" #1: Authenticated using RSA
Aug 26 18:32:52.623563: | FOR_EACH_CONNECTION_... in ISAKMP_SA_established
Aug 26 18:32:52.623638: | complete v1 state transition with STF_OK
Aug 26 18:32:52.623646: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:32:52.623650: | #1 is idle
Aug 26 18:32:52.623653: | doing_xauth:no, t_xauth_client_done:no
Aug 26 18:32:52.623656: | IKEv1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
Aug 26 18:32:52.623660: | parent state #1: MAIN_I3(open IKE SA) => MAIN_I4(established IKE SA)
Aug 26 18:32:52.623663: | event_already_set, deleting event
Aug 26 18:32:52.623666: | state #1 requesting EVENT_RETRANSMIT to be deleted
Aug 26 18:32:52.623670: | #1 STATE_MAIN_I4: retransmits: cleared
Aug 26 18:32:52.623675: | libevent_free: release ptr-libevent@0x55c66d953748
Aug 26 18:32:52.623678: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:32:52.623682: | !event_already_set at reschedule
Aug 26 18:32:52.623686: | event_schedule: new EVENT_SA_REPLACE-pe@0x55c66d954c08
Aug 26 18:32:52.623691: | inserting event EVENT_SA_REPLACE, timeout in 2607 seconds for #1
Aug 26 18:32:52.623694: | libevent_malloc: new ptr-libevent@0x55c66d976ab8 size 128
Aug 26 18:32:52.623698: | pstats #1 ikev1.isakmp established
Aug 26 18:32:52.623703: "north-a-dpd" #1: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048}
Aug 26 18:32:52.623711: | DPD: dpd_init() called on ISAKMP SA
Aug 26 18:32:52.623713: | DPD: Peer supports Dead Peer Detection
Aug 26 18:32:52.623717: | modecfg pull: noquirk policy:push not-client
Aug 26 18:32:52.623720: | phase 1 is done, looking for phase 2 to unpend
Aug 26 18:32:52.623722: | unpending state #1
Aug 26 18:32:52.623728: | creating state object #2 at 0x55c66d974f68
Aug 26 18:32:52.623732: | State DB: adding IKEv1 state #2 in UNDEFINED
Aug 26 18:32:52.623737: | pstats #2 ikev1.ipsec started
Aug 26 18:32:52.623740: | duplicating state object #1 "north-a-dpd" as #2 for IPSEC SA
Aug 26 18:32:52.623746: | #2 setting local endpoint to 192.1.3.33:500 from #1.st_localport (in duplicate_state() at state.c:1484)
Aug 26 18:32:52.623752: | suspend processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685)
Aug 26 18:32:52.623757: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685)
Aug 26 18:32:52.623763: | child state #2: UNDEFINED(ignore) => QUICK_I1(established CHILD SA)
Aug 26 18:32:52.623770: "north-a-dpd" #2: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#1 msgid:896f01e8 proposal=defaults pfsgroup=MODP2048}
Aug 26 18:32:52.623777: | adding quick_outI1 KE work-order 3 for state #2
Aug 26 18:32:52.623780: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55c66d95ef28
Aug 26 18:32:52.623784: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2
Aug 26 18:32:52.623787: | libevent_malloc: new ptr-libevent@0x55c66d94a328 size 128
Aug 26 18:32:52.623790: | libevent_realloc: release ptr-libevent@0x55c66d8e2208
Aug 26 18:32:52.623793: | libevent_realloc: new ptr-libevent@0x55c66d9494d8 size 128
Aug 26 18:32:52.623805: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764)
Aug 26 18:32:52.623810: | resume processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764)
Aug 26 18:32:52.623811: | crypto helper 4 resuming
Aug 26 18:32:52.623814: | unqueuing pending Quick Mode with 192.1.2.23 "north-a-dpd"
Aug 26 18:32:52.623821: | crypto helper 4 starting work-order 3 for state #2
Aug 26 18:32:52.623826: | removing pending policy for no connection {0x55c66d9489a8}
Aug 26 18:32:52.623832: | crypto helper 4 doing build KE and nonce (quick_outI1 KE); request ID 3
Aug 26 18:32:52.623836: | close_any(fd@24) (in release_whack() at state.c:654)
Aug 26 18:32:52.623841: | #1 spent 5.21 milliseconds in process_packet_tail()
Aug 26 18:32:52.623846: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:32:52.623851: | stop processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in process_md() at demux.c:382)
Aug 26 18:32:52.623854: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:32:52.623858: | spent 5.72 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:32:52.624474: | crypto helper 4 finished build KE and nonce (quick_outI1 KE); request ID 3 time elapsed 0.000641 seconds
Aug 26 18:32:52.624484: | (#2) spent 0.648 milliseconds in crypto helper computing work-order 3: quick_outI1 KE (pcr)
Aug 26 18:32:52.624487: | crypto helper 4 sending results from work-order 3 for state #2 to event queue
Aug 26 18:32:52.624489: | scheduling resume sending helper answer for #2
Aug 26 18:32:52.624491: | libevent_malloc: new ptr-libevent@0x7fbd14003f28 size 128
Aug 26 18:32:52.624498: | crypto helper 4 waiting (nothing to do)
Aug 26 18:32:52.624506: | processing resume sending helper answer for #2
Aug 26 18:32:52.624513: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:797)
Aug 26 18:32:52.624517: | crypto helper 4 replies to request ID 3
Aug 26 18:32:52.624520: | calling continuation function 0x55c66cb6db50
Aug 26 18:32:52.624523: | quick_outI1_continue for #2: calculated ke+nonce, sending I1
Aug 26 18:32:52.624528: | **emit ISAKMP Message:
Aug 26 18:32:52.624531: |    initiator cookie:
Aug 26 18:32:52.624534: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:52.624537: |    responder cookie:
Aug 26 18:32:52.624539: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.624542: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.624545: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:32:52.624548: |    exchange type: ISAKMP_XCHG_QUICK (0x20)
Aug 26 18:32:52.624551: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:32:52.624553: |    Message ID: 2305753576 (0x896f01e8)
Aug 26 18:32:52.624556: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:32:52.624560: | ***emit ISAKMP Hash Payload:
Aug 26 18:32:52.624562: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.624566: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:32:52.624569: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.624572: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:32:52.624575: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:32:52.624577: | emitting quick defaults using policy none
Aug 26 18:32:52.624581: | empty esp_info, returning defaults for ENCRYPT
Aug 26 18:32:52.624585: | ***emit ISAKMP Security Association Payload:
Aug 26 18:32:52.624588: |    next payload type: ISAKMP_NEXT_NONCE (0xa)
Aug 26 18:32:52.624591: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:32:52.624594: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE
Aug 26 18:32:52.624597: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:32:52.624602: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.624605: | ****emit IPsec DOI SIT:
Aug 26 18:32:52.624608: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:32:52.624611: | ikev1_out_sa pcn: 0 has 1 valid proposals
Aug 26 18:32:52.624614: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2
Aug 26 18:32:52.624616: | ****emit ISAKMP Proposal Payload:
Aug 26 18:32:52.624619: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.624621: |    proposal number: 0 (0x0)
Aug 26 18:32:52.624624: |    protocol ID: PROTO_IPSEC_ESP (0x3)
Aug 26 18:32:52.624627: |    SPI size: 4 (0x4)
Aug 26 18:32:52.624629: |    number of transforms: 2 (0x2)
Aug 26 18:32:52.624632: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
Aug 26 18:32:52.624649: | netlink_get_spi: allocated 0x93d21727 for esp.0@192.1.3.33
Aug 26 18:32:52.624653: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
Aug 26 18:32:52.624656: | SPI  93 d2 17 27
Aug 26 18:32:52.624658: | *****emit ISAKMP Transform Payload (ESP):
Aug 26 18:32:52.624661: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.624664: |    ESP transform number: 0 (0x0)
Aug 26 18:32:52.624666: |    ESP transform ID: ESP_AES (0xc)
Aug 26 18:32:52.624669: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type'
Aug 26 18:32:52.624672: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.624675: |    af+type: AF+GROUP_DESCRIPTION (0x8003)
Aug 26 18:32:52.624678: |    length/value: 14 (0xe)
Aug 26 18:32:52.624681: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:32:52.624683: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.624686: |    af+type: AF+ENCAPSULATION_MODE (0x8004)
Aug 26 18:32:52.624689: |    length/value: 1 (0x1)
Aug 26 18:32:52.624692: |     [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 26 18:32:52.624694: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.624697: |    af+type: AF+SA_LIFE_TYPE (0x8001)
Aug 26 18:32:52.624699: |    length/value: 1 (0x1)
Aug 26 18:32:52.624702: |     [1 is SA_LIFE_TYPE_SECONDS]
Aug 26 18:32:52.624704: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.624707: |    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
Aug 26 18:32:52.624710: |    length/value: 28800 (0x7080)
Aug 26 18:32:52.624713: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.624715: |    af+type: AF+AUTH_ALGORITHM (0x8005)
Aug 26 18:32:52.624718: |    length/value: 2 (0x2)
Aug 26 18:32:52.624720: |     [2 is AUTH_ALGORITHM_HMAC_SHA1]
Aug 26 18:32:52.624723: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.624726: |    af+type: AF+KEY_LENGTH (0x8006)
Aug 26 18:32:52.624728: |    length/value: 128 (0x80)
Aug 26 18:32:52.624731: | emitting length of ISAKMP Transform Payload (ESP): 32
Aug 26 18:32:52.624734: | *****emit ISAKMP Transform Payload (ESP):
Aug 26 18:32:52.624736: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.624739: |    ESP transform number: 1 (0x1)
Aug 26 18:32:52.624742: |    ESP transform ID: ESP_3DES (0x3)
Aug 26 18:32:52.624745: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:32:52.624748: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type'
Aug 26 18:32:52.624750: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.624753: |    af+type: AF+GROUP_DESCRIPTION (0x8003)
Aug 26 18:32:52.624756: |    length/value: 14 (0xe)
Aug 26 18:32:52.624758: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:32:52.624761: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.624763: |    af+type: AF+ENCAPSULATION_MODE (0x8004)
Aug 26 18:32:52.624766: |    length/value: 1 (0x1)
Aug 26 18:32:52.624769: |     [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 26 18:32:52.624773: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.624775: |    af+type: AF+SA_LIFE_TYPE (0x8001)
Aug 26 18:32:52.624778: |    length/value: 1 (0x1)
Aug 26 18:32:52.624781: |     [1 is SA_LIFE_TYPE_SECONDS]
Aug 26 18:32:52.624783: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.624786: |    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
Aug 26 18:32:52.624788: |    length/value: 28800 (0x7080)
Aug 26 18:32:52.624791: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.624794: |    af+type: AF+AUTH_ALGORITHM (0x8005)
Aug 26 18:32:52.624796: |    length/value: 2 (0x2)
Aug 26 18:32:52.624799: |     [2 is AUTH_ALGORITHM_HMAC_SHA1]
Aug 26 18:32:52.624801: | emitting length of ISAKMP Transform Payload (ESP): 28
Aug 26 18:32:52.624804: | emitting length of ISAKMP Proposal Payload: 72
Aug 26 18:32:52.624807: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0
Aug 26 18:32:52.624810: | emitting length of ISAKMP Security Association Payload: 84
Aug 26 18:32:52.624813: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
Aug 26 18:32:52.624816: | ***emit ISAKMP Nonce Payload:
Aug 26 18:32:52.624819: |    next payload type: ISAKMP_NEXT_KE (0x4)
Aug 26 18:32:52.624822: | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE
Aug 26 18:32:52.624825: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE)
Aug 26 18:32:52.624828: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.624831: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload
Aug 26 18:32:52.624834: | Ni  09 9e e3 29  89 64 36 56  5d 54 3c 9e  ad fa 05 49
Aug 26 18:32:52.624837: | Ni  c7 29 e2 70  6f 8f 4d e3  24 30 42 df  6b af c5 5a
Aug 26 18:32:52.624839: | emitting length of ISAKMP Nonce Payload: 36
Aug 26 18:32:52.624842: | ***emit ISAKMP Key Exchange Payload:
Aug 26 18:32:52.624845: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:32:52.624848: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID
Aug 26 18:32:52.624851: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE)
Aug 26 18:32:52.624854: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.624857: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
Aug 26 18:32:52.624860: | keyex value  36 1b a9 1f  33 ab a2 77  8d 38 dc bb  5a f8 32 65
Aug 26 18:32:52.624862: | keyex value  37 0f 94 59  72 2e c3 29  8f 4d 79 9a  ab 71 ee 3d
Aug 26 18:32:52.624865: | keyex value  f7 92 c1 28  c3 e9 31 3c  9e 20 fa 91  18 ca 46 f4
Aug 26 18:32:52.624867: | keyex value  49 03 16 78  52 7b b6 54  75 b5 61 8a  e9 b1 9a 63
Aug 26 18:32:52.624870: | keyex value  24 7e 79 4c  b9 cc 1c c9  6e e9 74 e6  47 39 f3 cd
Aug 26 18:32:52.624872: | keyex value  8c 01 8b ef  83 26 0f 8a  1c 4c 94 dc  7e 0f 99 f3
Aug 26 18:32:52.624875: | keyex value  a9 b4 24 e9  3c cd 01 71  87 cf cc 78  cd b6 7b 12
Aug 26 18:32:52.624877: | keyex value  8a 78 68 99  0a 61 2a 31  a9 2f 0f 5b  18 15 ab c9
Aug 26 18:32:52.624880: | keyex value  05 88 3f 9f  8e 1c 03 c4  b1 10 9e 9f  4d 33 e5 0f
Aug 26 18:32:52.624883: | keyex value  d5 5b 0d f2  af 78 7a 4c  2e 56 e4 e6  ba 19 bf f7
Aug 26 18:32:52.624885: | keyex value  3f 98 49 4e  f8 e9 e6 e5  37 83 1a 54  29 c9 6b 7c
Aug 26 18:32:52.624888: | keyex value  a5 67 cb 1b  48 f6 1a 7e  71 8e 7e 46  5f 27 a0 af
Aug 26 18:32:52.624890: | keyex value  9a d4 6a a9  d7 5f 23 e8  37 d2 3c 65  3c a1 3c d8
Aug 26 18:32:52.624893: | keyex value  87 8f c2 07  f8 5a 99 c4  59 3f ef 49  49 52 41 31
Aug 26 18:32:52.624895: | keyex value  f7 18 d5 4e  88 fd 01 e0  7f f7 26 d4  cf 4a 23 c3
Aug 26 18:32:52.624901: | keyex value  be f6 5f dd  2b 6d 50 1b  df cb 2f 9b  cf a1 25 69
Aug 26 18:32:52.624904: | emitting length of ISAKMP Key Exchange Payload: 260
Aug 26 18:32:52.624907: | ***emit ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:32:52.624910: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:32:52.624912: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:32:52.624915: |    Protocol ID: 0 (0x0)
Aug 26 18:32:52.624917: |    port: 0 (0x0)
Aug 26 18:32:52.624920: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID
Aug 26 18:32:52.624924: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
Aug 26 18:32:52.624927: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
Aug 26 18:32:52.624930: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:32:52.624933: | client network  c0 00 03 00
Aug 26 18:32:52.624936: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:32:52.624938: | client mask  ff ff ff 00
Aug 26 18:32:52.624941: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16
Aug 26 18:32:52.624944: | ***emit ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:32:52.624946: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.624949: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:32:52.624951: |    Protocol ID: 0 (0x0)
Aug 26 18:32:52.624954: |    port: 0 (0x0)
Aug 26 18:32:52.624957: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
Aug 26 18:32:52.624960: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
Aug 26 18:32:52.624963: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:32:52.624965: | client network  c0 00 16 00
Aug 26 18:32:52.624968: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:32:52.624971: | client mask  ff ff ff 00
Aug 26 18:32:52.624973: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16
Aug 26 18:32:52.624997: | outI1 HASH(1):
Aug 26 18:32:52.625001: |   d7 16 5d 2a  bc da ba 84  46 32 1d e8  f5 bd 25 7e
Aug 26 18:32:52.625003: |   15 38 1f c5  15 18 21 4f  ae 14 e2 47  4c 7d 26 48
Aug 26 18:32:52.625011: | no IKEv1 message padding required
Aug 26 18:32:52.625014: | emitting length of ISAKMP Message: 476
Aug 26 18:32:52.625029: | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #2)
Aug 26 18:32:52.625032: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.625035: |   08 10 20 01  89 6f 01 e8  00 00 01 dc  52 d0 3c 92
Aug 26 18:32:52.625037: |   bc 96 aa 3f  55 66 1b 4f  b0 a6 4f 5b  8c 5b 47 de
Aug 26 18:32:52.625040: |   92 39 b1 56  5b c7 fe f0  39 a6 c2 60  5f 81 1c 13
Aug 26 18:32:52.625042: |   05 56 44 78  61 45 51 dd  d2 60 81 0f  35 37 ff bf
Aug 26 18:32:52.625045: |   db 57 b9 f9  f9 00 42 ec  b5 9d 03 38  90 3e 00 c7
Aug 26 18:32:52.625047: |   f3 71 8e b3  3e 61 9c 63  57 e0 18 42  f4 5a aa 34
Aug 26 18:32:52.625050: |   9a 1c 6f 2c  0c 96 fe 7c  14 99 b1 71  9b ec 5d fe
Aug 26 18:32:52.625052: |   11 df 42 1f  8e 9a 7d b3  75 5a b1 db  7d ca e2 9a
Aug 26 18:32:52.625055: |   e9 19 49 d0  c8 5d 5d 4f  ed 1d a0 d4  09 64 12 be
Aug 26 18:32:52.625057: |   6d 76 44 a9  48 2f cc f3  81 28 57 5b  10 d7 ee b7
Aug 26 18:32:52.625060: |   d1 18 2a 14  c6 4d 7c ff  47 42 54 fd  92 1d ee c8
Aug 26 18:32:52.625062: |   f7 8b ea 4f  55 d3 ec ed  48 c6 13 ed  74 84 d0 60
Aug 26 18:32:52.625065: |   6c ee 63 d1  dd 8b 84 5c  2a 8f 8a 66  4a c4 8f b8
Aug 26 18:32:52.625067: |   de 72 ed 39  7f c1 94 80  e3 0c ce bb  38 45 79 16
Aug 26 18:32:52.625073: |   4b 9f c9 75  3e 42 c7 1f  d9 fe ad f1  fe 66 29 6c
Aug 26 18:32:52.625076: |   06 4b d7 3f  9a eb 5a 91  1b 4c 4e 3d  af 93 ed a0
Aug 26 18:32:52.625078: |   20 02 54 04  1a 36 73 42  98 1c 74 d7  2c 29 f1 95
Aug 26 18:32:52.625081: |   19 d4 5b 3d  a0 51 ab c2  7a 6f db 56  c6 a0 2d 57
Aug 26 18:32:52.625083: |   87 7e fc 74  20 e0 fa 36  dc f1 5f 6b  d4 73 c9 96
Aug 26 18:32:52.625086: |   7a e1 1f 08  01 32 58 ba  ad 3a 50 a0  56 bc b9 8d
Aug 26 18:32:52.625088: |   b1 e9 c3 f8  4a 2d 5a 16  15 3c 52 7c  85 97 55 e9
Aug 26 18:32:52.625090: |   16 6e 03 2f  89 28 d6 7b  c6 3e 34 16  77 8e a0 df
Aug 26 18:32:52.625093: |   c0 8d ad d9  16 63 3b 9e  95 72 f3 39  b3 e8 f9 4b
Aug 26 18:32:52.625095: |   24 ad c6 3d  63 e0 ac bf  d4 22 95 32  e3 bd 19 56
Aug 26 18:32:52.625098: |   a9 fa eb dd  8c e5 e3 27  aa 25 a2 e1  e8 64 0b 88
Aug 26 18:32:52.625100: |   0f d6 c1 5f  8d a3 b5 88  52 54 cb aa  12 6d 4e c7
Aug 26 18:32:52.625103: |   73 b7 21 e8  e9 5e 69 3f  9c 57 25 82  77 f0 dd fd
Aug 26 18:32:52.625105: |   d7 c3 4d 20  4d a0 17 16  09 ec 27 ea  b2 cc ea e4
Aug 26 18:32:52.625108: |   05 9a 98 31  73 7a ab 6c  4e 8b 2c ae
Aug 26 18:32:52.625154: | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Aug 26 18:32:52.625159: | libevent_free: release ptr-libevent@0x55c66d94a328
Aug 26 18:32:52.625163: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55c66d95ef28
Aug 26 18:32:52.625166: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d95ef28
Aug 26 18:32:52.625170: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #2
Aug 26 18:32:52.625173: | libevent_malloc: new ptr-libevent@0x55c66d961418 size 128
Aug 26 18:32:52.625179: | #2 STATE_QUICK_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29658.367633
Aug 26 18:32:52.625188: | resume sending helper answer for #2 suppresed complete_v1_state_transition()
Aug 26 18:32:52.625193: | #2 spent 0.649 milliseconds in resume sending helper answer
Aug 26 18:32:52.625199: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:833)
Aug 26 18:32:52.625202: | libevent_free: release ptr-libevent@0x7fbd14003f28
Aug 26 18:32:52.628525: | spent 0.00272 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:32:52.628544: | *received 460 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:32:52.628547: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.628549: |   08 10 20 01  89 6f 01 e8  00 00 01 cc  a5 47 52 7f
Aug 26 18:32:52.628550: |   f5 74 04 27  a0 ca fc da  d0 16 b9 e7  b4 ca 3a 94
Aug 26 18:32:52.628552: |   c0 3e 12 cf  46 f7 26 a3  28 d2 37 6e  0c 8b e8 e7
Aug 26 18:32:52.628556: |   46 ed 9e d3  7f 2c e1 70  06 21 8e 90  b5 c9 c9 80
Aug 26 18:32:52.628560: |   be 0e c3 04  11 02 83 14  4b e4 bc 72  a6 8d d9 0b
Aug 26 18:32:52.628563: |   99 07 d8 2a  97 d9 4c fa  41 20 0d 7a  05 da 66 31
Aug 26 18:32:52.628565: |   07 b1 f2 77  61 b5 70 b7  70 47 bd 0e  b8 fb e0 b3
Aug 26 18:32:52.628567: |   da 82 06 9b  fd 19 e5 f5  02 3b 11 57  a6 01 f3 82
Aug 26 18:32:52.628569: |   b7 e1 0e f5  30 1a 7d 92  dd 0d 90 9c  13 d9 cb f1
Aug 26 18:32:52.628571: |   68 3a 9c f5  58 6f 27 7f  0d 18 5c 65  c1 04 60 61
Aug 26 18:32:52.628573: |   f4 18 a7 96  a9 e1 5a a9  ab 7c d2 bd  6e 5b 67 4c
Aug 26 18:32:52.628575: |   11 a6 68 ed  95 7a 9b ee  02 72 ba 3d  28 27 6a ff
Aug 26 18:32:52.628578: |   ac 9a f8 d9  17 54 3f 31  7f 5a f8 5b  ea 84 88 94
Aug 26 18:32:52.628580: |   d5 a0 c9 20  44 4e c3 d8  62 1f e6 81  60 1f a0 fc
Aug 26 18:32:52.628583: |   ce 8f b0 99  3b a0 3f 68  6a 6d 50 c1  35 1b 76 22
Aug 26 18:32:52.628585: |   46 41 50 2c  66 8b d2 43  26 a8 8a 02  92 3d 67 3a
Aug 26 18:32:52.628588: |   c1 1f 8f 9b  16 46 a3 4d  53 a4 f0 5f  0d 06 21 c5
Aug 26 18:32:52.628590: |   a4 5c ec 61  89 9f fe d8  14 25 80 f6  97 c9 bd e9
Aug 26 18:32:52.628592: |   75 d3 0e d0  3f f3 e4 d3  33 69 f1 fe  dd 3e fb 14
Aug 26 18:32:52.628594: |   9e e6 ec 12  02 bc 6f c5  85 d8 a1 b1  9a a3 4f 64
Aug 26 18:32:52.628599: |   af be 8a 5c  03 9e 3e f4  e3 f1 9c 97  5f de dc 85
Aug 26 18:32:52.628602: |   b7 e9 db fb  24 c7 be ce  63 27 67 6e  4f 24 8d 95
Aug 26 18:32:52.628604: |   f3 5a c0 a7  7e bd 65 cb  a3 69 0e af  fc f7 f5 9f
Aug 26 18:32:52.628606: |   e1 6b 98 2e  1d e9 16 32  e8 be 46 cd  94 3f c3 37
Aug 26 18:32:52.628608: |   49 59 bc 73  39 05 e6 30  80 5c 1c a0  7f 02 fa 9d
Aug 26 18:32:52.628611: |   12 1a c8 6b  59 a8 e9 23  a5 07 66 05  d8 89 1a 30
Aug 26 18:32:52.628614: |   00 89 9b 2c  cc 2c a1 77  44 49 59 8d  1d 43 37 e8
Aug 26 18:32:52.628616: |   68 26 a8 2b  3a 4b 94 a9  74 9c 67 52
Aug 26 18:32:52.628621: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:32:52.628625: | **parse ISAKMP Message:
Aug 26 18:32:52.628628: |    initiator cookie:
Aug 26 18:32:52.628631: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:52.628633: |    responder cookie:
Aug 26 18:32:52.628636: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.628639: |    next payload type: ISAKMP_NEXT_HASH (0x8)
Aug 26 18:32:52.628643: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:32:52.628646: |    exchange type: ISAKMP_XCHG_QUICK (0x20)
Aug 26 18:32:52.628649: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:32:52.628652: |    Message ID: 2305753576 (0x896f01e8)
Aug 26 18:32:52.628655: |    length: 460 (0x1cc)
Aug 26 18:32:52.628658: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
Aug 26 18:32:52.628662: | State DB: found IKEv1 state #2 in QUICK_I1 (find_state_ikev1)
Aug 26 18:32:52.628665: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1633)
Aug 26 18:32:52.628667: | #2 is idle
Aug 26 18:32:52.628669: | #2 idle
Aug 26 18:32:52.628671: | received encrypted packet from 192.1.2.23:500
Aug 26 18:32:52.628684: | got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030
Aug 26 18:32:52.628686: | ***parse ISAKMP Hash Payload:
Aug 26 18:32:52.628688: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:32:52.628690: |    length: 36 (0x24)
Aug 26 18:32:52.628692: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030
Aug 26 18:32:52.628694: | ***parse ISAKMP Security Association Payload:
Aug 26 18:32:52.628696: |    next payload type: ISAKMP_NEXT_NONCE (0xa)
Aug 26 18:32:52.628697: |    length: 56 (0x38)
Aug 26 18:32:52.628699: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:32:52.628700: | got payload 0x400  (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030
Aug 26 18:32:52.628702: | ***parse ISAKMP Nonce Payload:
Aug 26 18:32:52.628704: |    next payload type: ISAKMP_NEXT_KE (0x4)
Aug 26 18:32:52.628705: |    length: 36 (0x24)
Aug 26 18:32:52.628707: | got payload 0x10  (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030
Aug 26 18:32:52.628709: | ***parse ISAKMP Key Exchange Payload:
Aug 26 18:32:52.628710: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:32:52.628712: |    length: 260 (0x104)
Aug 26 18:32:52.628714: | got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030
Aug 26 18:32:52.628715: | ***parse ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:32:52.628717: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:32:52.628718: |    length: 16 (0x10)
Aug 26 18:32:52.628720: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:32:52.628722: |    Protocol ID: 0 (0x0)
Aug 26 18:32:52.628723: |    port: 0 (0x0)
Aug 26 18:32:52.628725: |      obj:   c0 00 03 00  ff ff ff 00
Aug 26 18:32:52.628727: | got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030
Aug 26 18:32:52.628728: | ***parse ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:32:52.628730: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.628732: |    length: 16 (0x10)
Aug 26 18:32:52.628733: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:32:52.628735: |    Protocol ID: 0 (0x0)
Aug 26 18:32:52.628736: |    port: 0 (0x0)
Aug 26 18:32:52.628738: |      obj:   c0 00 16 00  ff ff ff 00
Aug 26 18:32:52.628739: | removing 12 bytes of padding
Aug 26 18:32:52.628755: | quick_inR1_outI2 HASH(2):
Aug 26 18:32:52.628759: |   77 90 f8 c2  3b c8 b7 d2  b2 66 33 73  6a cd ac 4c
Aug 26 18:32:52.628761: |   dd 58 5d d5  18 95 09 b2  65 0e 30 78  f0 e4 bc 74
Aug 26 18:32:52.628763: | received 'quick_inR1_outI2' message HASH(2) data ok
Aug 26 18:32:52.628766: | ****parse IPsec DOI SIT:
Aug 26 18:32:52.628768: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:32:52.628770: | ****parse ISAKMP Proposal Payload:
Aug 26 18:32:52.628772: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.628773: |    length: 44 (0x2c)
Aug 26 18:32:52.628775: |    proposal number: 0 (0x0)
Aug 26 18:32:52.628776: |    protocol ID: PROTO_IPSEC_ESP (0x3)
Aug 26 18:32:52.628778: |    SPI size: 4 (0x4)
Aug 26 18:32:52.628780: |    number of transforms: 1 (0x1)
Aug 26 18:32:52.628781: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
Aug 26 18:32:52.628783: | SPI  da d5 24 50
Aug 26 18:32:52.628785: | *****parse ISAKMP Transform Payload (ESP):
Aug 26 18:32:52.628787: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.628788: |    length: 32 (0x20)
Aug 26 18:32:52.628790: |    ESP transform number: 0 (0x0)
Aug 26 18:32:52.628792: |    ESP transform ID: ESP_AES (0xc)
Aug 26 18:32:52.628794: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.628796: |    af+type: AF+GROUP_DESCRIPTION (0x8003)
Aug 26 18:32:52.628798: |    length/value: 14 (0xe)
Aug 26 18:32:52.628799: |    [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:32:52.628801: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.628803: |    af+type: AF+ENCAPSULATION_MODE (0x8004)
Aug 26 18:32:52.628805: |    length/value: 1 (0x1)
Aug 26 18:32:52.628806: |    [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 26 18:32:52.628808: | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none
Aug 26 18:32:52.628810: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.628812: |    af+type: AF+SA_LIFE_TYPE (0x8001)
Aug 26 18:32:52.628813: |    length/value: 1 (0x1)
Aug 26 18:32:52.628815: |    [1 is SA_LIFE_TYPE_SECONDS]
Aug 26 18:32:52.628816: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.628818: |    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
Aug 26 18:32:52.628820: |    length/value: 28800 (0x7080)
Aug 26 18:32:52.628821: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.628823: |    af+type: AF+AUTH_ALGORITHM (0x8005)
Aug 26 18:32:52.628825: |    length/value: 2 (0x2)
Aug 26 18:32:52.628826: |    [2 is AUTH_ALGORITHM_HMAC_SHA1]
Aug 26 18:32:52.628828: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:32:52.628829: |    af+type: AF+KEY_LENGTH (0x8006)
Aug 26 18:32:52.628831: |    length/value: 128 (0x80)
Aug 26 18:32:52.628833: | ESP IPsec Transform verified unconditionally; no alg_info to check against
Aug 26 18:32:52.628844: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK
Aug 26 18:32:52.628848: | actually looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK
Aug 26 18:32:52.628854: | line 0: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA
Aug 26 18:32:52.628857: | line 1: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA
Aug 26 18:32:52.628859: | concluding with best_match=000 best=(nil) (lineno=-1)
Aug 26 18:32:52.628860: | no PreShared Key Found
Aug 26 18:32:52.628863: | adding quick outI2 DH work-order 4 for state #2
Aug 26 18:32:52.628865: | state #2 requesting EVENT_RETRANSMIT to be deleted
Aug 26 18:32:52.628868: | #2 STATE_QUICK_I1: retransmits: cleared
Aug 26 18:32:52.628870: | libevent_free: release ptr-libevent@0x55c66d961418
Aug 26 18:32:52.628872: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d95ef28
Aug 26 18:32:52.628874: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55c66d95ef28
Aug 26 18:32:52.628877: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2
Aug 26 18:32:52.628879: | libevent_malloc: new ptr-libevent@0x7fbd14003f28 size 128
Aug 26 18:32:52.628885: | complete v1 state transition with STF_SUSPEND
Aug 26 18:32:52.628891: | [RE]START processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648)
Aug 26 18:32:52.628892: | crypto helper 3 resuming
Aug 26 18:32:52.628893: | suspending state #2 and saving MD
Aug 26 18:32:52.628904: | crypto helper 3 starting work-order 4 for state #2
Aug 26 18:32:52.628906: | #2 is busy; has a suspended MD
Aug 26 18:32:52.628908: | crypto helper 3 doing compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 4
Aug 26 18:32:52.628911: | #2 spent 0.14 milliseconds in process_packet_tail()
Aug 26 18:32:52.628915: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:32:52.628920: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in process_md() at demux.c:382)
Aug 26 18:32:52.628923: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:32:52.628927: | spent 0.387 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:32:52.629584: | crypto helper 3 finished compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 4 time elapsed 0.000675 seconds
Aug 26 18:32:52.629595: | (#2) spent 0.683 milliseconds in crypto helper computing work-order 4: quick outI2 DH (pcr)
Aug 26 18:32:52.629599: | crypto helper 3 sending results from work-order 4 for state #2 to event queue
Aug 26 18:32:52.629603: | scheduling resume sending helper answer for #2
Aug 26 18:32:52.629607: | libevent_malloc: new ptr-libevent@0x7fbd08001f78 size 128
Aug 26 18:32:52.629614: | crypto helper 3 waiting (nothing to do)
Aug 26 18:32:52.629650: | processing resume sending helper answer for #2
Aug 26 18:32:52.629659: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:797)
Aug 26 18:32:52.629663: | crypto helper 3 replies to request ID 4
Aug 26 18:32:52.629665: | calling continuation function 0x55c66cb6db50
Aug 26 18:32:52.629667: | quick_inR1_outI2_continue for #2: calculated ke+nonce, calculating DH
Aug 26 18:32:52.629671: | **emit ISAKMP Message:
Aug 26 18:32:52.629673: |    initiator cookie:
Aug 26 18:32:52.629674: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:52.629676: |    responder cookie:
Aug 26 18:32:52.629677: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.629679: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.629681: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:32:52.629683: |    exchange type: ISAKMP_XCHG_QUICK (0x20)
Aug 26 18:32:52.629684: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:32:52.629686: |    Message ID: 2305753576 (0x896f01e8)
Aug 26 18:32:52.629688: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:32:52.629691: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address
Aug 26 18:32:52.629692: | ID address  c0 00 03 00
Aug 26 18:32:52.629694: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask
Aug 26 18:32:52.629696: | ID mask  ff ff ff 00
Aug 26 18:32:52.629699: | our client is subnet 192.0.3.0/24
Aug 26 18:32:52.629700: | our client protocol/port is 0/0
Aug 26 18:32:52.629702: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address
Aug 26 18:32:52.629704: | ID address  c0 00 16 00
Aug 26 18:32:52.629706: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask
Aug 26 18:32:52.629707: | ID mask  ff ff ff 00
Aug 26 18:32:52.629709: | peer client is subnet 192.0.22.0/24
Aug 26 18:32:52.629713: | peer client protocol/port is 0/0
Aug 26 18:32:52.629715: | ***emit ISAKMP Hash Payload:
Aug 26 18:32:52.629717: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:52.629719: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:32:52.629721: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet'
Aug 26 18:32:52.629723: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:32:52.629725: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:32:52.629743: | quick_inR1_outI2 HASH(3):
Aug 26 18:32:52.629745: |   ba 12 f7 3e  be de 83 31  3e f4 3e f4  3e 7c 80 3f
Aug 26 18:32:52.629747: |   99 b8 c9 8b  59 42 fb 78  54 47 d8 dd  b1 63 66 6e
Aug 26 18:32:52.629749: | compute_proto_keymat: needed_len (after ESP enc)=16
Aug 26 18:32:52.629750: | compute_proto_keymat: needed_len (after ESP auth)=36
Aug 26 18:32:52.629813: | install_ipsec_sa() for #2: inbound and outbound
Aug 26 18:32:52.629816: | could_route called for north-a-dpd (kind=CK_PERMANENT)
Aug 26 18:32:52.629818: | FOR_EACH_CONNECTION_... in route_owner
Aug 26 18:32:52.629820: |  conn north-a-dpd mark 0/00000000, 0/00000000 vs
Aug 26 18:32:52.629822: |  conn north-a-dpd mark 0/00000000, 0/00000000
Aug 26 18:32:52.629824: |  conn north-a-dpd mark 0/00000000, 0/00000000 vs
Aug 26 18:32:52.629826: |  conn northnet-eastnet-b mark 0/00000000, 0/00000000
Aug 26 18:32:52.629828: | route owner of "north-a-dpd" unrouted: NULL; eroute owner: NULL
Aug 26 18:32:52.629830: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96
Aug 26 18:32:52.629833: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12
Aug 26 18:32:52.629835: | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20
Aug 26 18:32:52.629837: | setting IPsec SA replay-window to 32
Aug 26 18:32:52.629839: | NIC esp-hw-offload not for connection 'north-a-dpd' not available on interface eth1
Aug 26 18:32:52.629841: | netlink: enabling tunnel mode
Aug 26 18:32:52.629844: | netlink: setting IPsec SA replay-window to 32 using old-style req
Aug 26 18:32:52.629845: | netlink: esp-hw-offload not set for IPsec SA
Aug 26 18:32:52.629895: | netlink response for Add SA esp.dad52450@192.1.2.23 included non-error error
Aug 26 18:32:52.629899: | set up outgoing SA, ref=0/0
Aug 26 18:32:52.629907: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96
Aug 26 18:32:52.629911: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12
Aug 26 18:32:52.629915: | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20
Aug 26 18:32:52.629920: | setting IPsec SA replay-window to 32
Aug 26 18:32:52.629923: | NIC esp-hw-offload not for connection 'north-a-dpd' not available on interface eth1
Aug 26 18:32:52.629927: | netlink: enabling tunnel mode
Aug 26 18:32:52.629930: | netlink: setting IPsec SA replay-window to 32 using old-style req
Aug 26 18:32:52.629933: | netlink: esp-hw-offload not set for IPsec SA
Aug 26 18:32:52.629967: | netlink response for Add SA esp.93d21727@192.1.3.33 included non-error error
Aug 26 18:32:52.629971: | priority calculation of connection "north-a-dpd" is 0xfe7e7
Aug 26 18:32:52.629979: | add inbound eroute 192.0.22.0/24:0 --0-> 192.0.3.0/24:0 => tun.10000@192.1.3.33 (raw_eroute)
Aug 26 18:32:52.629984: | IPsec Sa SPD priority set to 1042407
Aug 26 18:32:52.630006: | raw_eroute result=success
Aug 26 18:32:52.630011: | set up incoming SA, ref=0/0
Aug 26 18:32:52.630014: | sr for #2: unrouted
Aug 26 18:32:52.630018: | route_and_eroute() for proto 0, and source port 0 dest port 0
Aug 26 18:32:52.630021: | FOR_EACH_CONNECTION_... in route_owner
Aug 26 18:32:52.630025: |  conn north-a-dpd mark 0/00000000, 0/00000000 vs
Aug 26 18:32:52.630029: |  conn north-a-dpd mark 0/00000000, 0/00000000
Aug 26 18:32:52.630032: |  conn north-a-dpd mark 0/00000000, 0/00000000 vs
Aug 26 18:32:52.630036: |  conn northnet-eastnet-b mark 0/00000000, 0/00000000
Aug 26 18:32:52.630042: | route owner of "north-a-dpd" unrouted: NULL; eroute owner: NULL
Aug 26 18:32:52.630047: | route_and_eroute with c: north-a-dpd (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2
Aug 26 18:32:52.630051: | priority calculation of connection "north-a-dpd" is 0xfe7e7
Aug 26 18:32:52.630056: | eroute_connection add eroute 192.0.3.0/24:0 --0-> 192.0.22.0/24:0 => tun.0@192.1.2.23 (raw_eroute)
Aug 26 18:32:52.630058: | IPsec Sa SPD priority set to 1042407
Aug 26 18:32:52.630069: | raw_eroute result=success
Aug 26 18:32:52.630072: | running updown command "ipsec _updown" for verb up 
Aug 26 18:32:52.630074: | command executing up-client
Aug 26 18:32:52.630103: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:32:52.630108: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:32:52.630120: | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENC
Aug 26 18:32:52.630122: | popen cmd is 1398 chars long
Aug 26 18:32:52.630124: | cmd(   0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_:
Aug 26 18:32:52.630126: | cmd(  80):INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID=:
Aug 26 18:32:52.630128: | cmd( 160):'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.:
Aug 26 18:32:52.630129: | cmd( 240):libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24:
Aug 26 18:32:52.630131: | cmd( 320):' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_:
Aug 26 18:32:52.630133: | cmd( 400):PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_:
Aug 26 18:32:52.630134: | cmd( 480):PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Te:
Aug 26 18:32:52.630136: | cmd( 560):st Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org':
Aug 26 18:32:52.630138: | cmd( 640): PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER:
Aug 26 18:32:52.630139: | cmd( 720):_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_P:
Aug 26 18:32:52.630141: | cmd( 800):EER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libresw:
Aug 26 18:32:52.630143: | cmd( 880):an test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTI:
Aug 26 18:32:52.630144: | cmd( 960):ME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+I:
Aug 26 18:32:52.630146: | cmd(1040):KE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4:
Aug 26 18:32:52.630148: | cmd(1120):' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAI:
Aug 26 18:32:52.630149: | cmd(1200):N_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_N:
Aug 26 18:32:52.630151: | cmd(1280):M_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xdad52450:
Aug 26 18:32:52.630154: | cmd(1360): SPI_OUT=0x93d21727 ipsec _updown 2>&1:
Aug 26 18:32:52.639232: | route_and_eroute: firewall_notified: true
Aug 26 18:32:52.639248: | running updown command "ipsec _updown" for verb prepare 
Aug 26 18:32:52.639252: | command executing prepare-client
Aug 26 18:32:52.639286: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:32:52.639300: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:32:52.639323: | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='
Aug 26 18:32:52.639327: | popen cmd is 1403 chars long
Aug 26 18:32:52.639330: | cmd(   0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' P:
Aug 26 18:32:52.639333: | cmd(  80):LUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_M:
Aug 26 18:32:52.639336: | cmd( 160):Y_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.tes:
Aug 26 18:32:52.639339: | cmd( 240):ting.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3:
Aug 26 18:32:52.639342: | cmd( 320):.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUT:
Aug 26 18:32:52.639344: | cmd( 400):O_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' P:
Aug 26 18:32:52.639347: | cmd( 480):LUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, :
Aug 26 18:32:52.639350: | cmd( 560):OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan:
Aug 26 18:32:52.639353: | cmd( 640):.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO:
Aug 26 18:32:52.639355: | cmd( 720):_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PL:
Aug 26 18:32:52.639358: | cmd( 800):UTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Li:
Aug 26 18:32:52.639361: | cmd( 880):breswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_:
Aug 26 18:32:52.639363: | cmd( 960):ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TR:
Aug 26 18:32:52.639366: | cmd(1040):ACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY=:
Aug 26 18:32:52.639369: | cmd(1120):'ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_:
Aug 26 18:32:52.639372: | cmd(1200):DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PL:
Aug 26 18:32:52.639374: | cmd(1280):UTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xdad:
Aug 26 18:32:52.639377: | cmd(1360):52450 SPI_OUT=0x93d21727 ipsec _updown 2>&1:
Aug 26 18:32:52.649224: | running updown command "ipsec _updown" for verb route 
Aug 26 18:32:52.649239: | command executing route-client
Aug 26 18:32:52.649263: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:32:52.649270: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:32:52.649285: | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSAS
Aug 26 18:32:52.649298: | popen cmd is 1401 chars long
Aug 26 18:32:52.649302: | cmd(   0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLU:
Aug 26 18:32:52.649304: | cmd(  80):TO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_:
Aug 26 18:32:52.649306: | cmd( 160):ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testi:
Aug 26 18:32:52.649308: | cmd( 240):ng.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0:
Aug 26 18:32:52.649309: | cmd( 320):/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_:
Aug 26 18:32:52.649311: | cmd( 400):MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLU:
Aug 26 18:32:52.649313: | cmd( 480):TO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU:
Aug 26 18:32:52.649314: | cmd( 560):=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.o:
Aug 26 18:32:52.649316: | cmd( 640):rg' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_P:
Aug 26 18:32:52.649318: | cmd( 720):EER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUT:
Aug 26 18:32:52.649319: | cmd( 800):O_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libr:
Aug 26 18:32:52.649321: | cmd( 880):eswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_AD:
Aug 26 18:32:52.649323: | cmd( 960):DTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRAC:
Aug 26 18:32:52.649324: | cmd(1040):K+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='i:
Aug 26 18:32:52.649326: | cmd(1120):pv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DO:
Aug 26 18:32:52.649328: | cmd(1200):MAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUT:
Aug 26 18:32:52.649329: | cmd(1280):O_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xdad52:
Aug 26 18:32:52.649331: | cmd(1360):450 SPI_OUT=0x93d21727 ipsec _updown 2>&1:
Aug 26 18:32:52.662613: | route_and_eroute: instance "north-a-dpd", setting eroute_owner {spd=0x55c66d948f98,sr=0x55c66d948f98} to #2 (was #0) (newest_ipsec_sa=#0)
Aug 26 18:32:52.663427: | #1 spent 2.43 milliseconds in install_ipsec_sa()
Aug 26 18:32:52.663441: | emitting 12 zero bytes of encryption padding into ISAKMP Message
Aug 26 18:32:52.663447: | no IKEv1 message padding required
Aug 26 18:32:52.663450: | emitting length of ISAKMP Message: 76
Aug 26 18:32:52.663491: | inR1_outI2: instance north-a-dpd[0], setting IKEv1 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1
Aug 26 18:32:52.663496: | DPD: dpd_init() called on IPsec SA
Aug 26 18:32:52.663503: | State DB: found IKEv1 state #1 in MAIN_I4 (find_state_ikev1)
Aug 26 18:32:52.663508: | event_schedule: new EVENT_DPD-pe@0x7fbd14004218
Aug 26 18:32:52.663513: | inserting event EVENT_DPD, timeout in 3 seconds for #2
Aug 26 18:32:52.663517: | libevent_malloc: new ptr-libevent@0x55c66d94a328 size 128
Aug 26 18:32:52.663527: | complete v1 state transition with STF_OK
Aug 26 18:32:52.663534: | [RE]START processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:32:52.663537: | #2 is idle
Aug 26 18:32:52.663540: | doing_xauth:no, t_xauth_client_done:no
Aug 26 18:32:52.663544: | IKEv1: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Aug 26 18:32:52.663548: | child state #2: QUICK_I1(established CHILD SA) => QUICK_I2(established CHILD SA)
Aug 26 18:32:52.663551: | event_already_set, deleting event
Aug 26 18:32:52.663554: | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Aug 26 18:32:52.663560: | libevent_free: release ptr-libevent@0x7fbd14003f28
Aug 26 18:32:52.663565: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55c66d95ef28
Aug 26 18:32:52.663573: | sending reply packet to 192.1.2.23:500 (from 192.1.3.33:500)
Aug 26 18:32:52.663585: | sending 76 bytes for STATE_QUICK_I1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #2)
Aug 26 18:32:52.663589: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:52.663592: |   08 10 20 01  89 6f 01 e8  00 00 00 4c  8d 8e 11 9f
Aug 26 18:32:52.663594: |   0c 9f be ee  35 ef 27 8d  76 60 25 70  fd b2 3c 39
Aug 26 18:32:52.663597: |   7f c9 f4 ac  df b7 6d 60  9d 13 68 63  11 92 5e a7
Aug 26 18:32:52.663599: |   17 f9 4d d6  3c 15 70 7d  45 35 fa 7b
Aug 26 18:32:52.663659: | !event_already_set at reschedule
Aug 26 18:32:52.663666: | event_schedule: new EVENT_SA_REPLACE-pe@0x55c66d95ef28
Aug 26 18:32:52.663670: | inserting event EVENT_SA_REPLACE, timeout in 28048 seconds for #2
Aug 26 18:32:52.663673: | libevent_malloc: new ptr-libevent@0x7fbd14003f28 size 128
Aug 26 18:32:52.663676: | pstats #2 ikev1.ipsec established
Aug 26 18:32:52.663682: | NAT-T: encaps is 'auto'
Aug 26 18:32:52.663687: "north-a-dpd" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0xdad52450 <0x93d21727 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=active}
Aug 26 18:32:52.663698: | modecfg pull: noquirk policy:push not-client
Aug 26 18:32:52.663701: | phase 1 is done, looking for phase 2 to unpend
Aug 26 18:32:52.663708: | close_any(fd@25) (in release_whack() at state.c:654)
Aug 26 18:32:52.663713: | resume sending helper answer for #2 suppresed complete_v1_state_transition()
Aug 26 18:32:52.663720: | #2 spent 2.84 milliseconds in resume sending helper answer
Aug 26 18:32:52.663725: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:833)
Aug 26 18:32:52.663730: | libevent_free: release ptr-libevent@0x7fbd08001f78
Aug 26 18:32:52.663745: | processing signal PLUTO_SIGCHLD
Aug 26 18:32:52.663751: | waitpid returned ECHILD (no child processes left)
Aug 26 18:32:52.663755: | spent 0.00534 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:32:52.663758: | processing signal PLUTO_SIGCHLD
Aug 26 18:32:52.663762: | waitpid returned ECHILD (no child processes left)
Aug 26 18:32:52.663765: | spent 0.00374 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:32:52.663768: | processing signal PLUTO_SIGCHLD
Aug 26 18:32:52.663772: | waitpid returned ECHILD (no child processes left)
Aug 26 18:32:52.663776: | spent 0.00362 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:32:54.917650: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:32:54.917677: | FOR_EACH_STATE_... in show_traffic_status (sort_states)
Aug 26 18:32:54.917684: | FOR_EACH_STATE_... in sort_states
Aug 26 18:32:54.917692: | get_sa_info esp.93d21727@192.1.3.33
Aug 26 18:32:54.917716: | get_sa_info esp.dad52450@192.1.2.23
Aug 26 18:32:54.917746: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:32:54.917759: | spent 0.118 milliseconds in whack
Aug 26 18:32:55.021712: |  kernel_process_msg_cb process netlink message
Aug 26 18:32:55.022007: | netlink_get: XFRM_MSG_EXPIRE message
Aug 26 18:32:55.022020: | spent 0.287 milliseconds in kernel message
Aug 26 18:32:55.631306: | timer_event_cb: processing event@0x7fbd14004218
Aug 26 18:32:55.631318: | handling event EVENT_DPD for child state #2
Aug 26 18:32:55.631325: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:32:55.631329: | [RE]START processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360)
Aug 26 18:32:55.631331: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:32:55.631334: | DPD: processing for state #2 ("north-a-dpd")
Aug 26 18:32:55.631339: | get_sa_info esp.93d21727@192.1.3.33
Aug 26 18:32:55.631355: | event_schedule: new EVENT_DPD-pe@0x55c66d8e2208
Aug 26 18:32:55.631358: | inserting event EVENT_DPD, timeout in 3 seconds for #2
Aug 26 18:32:55.631361: | libevent_malloc: new ptr-libevent@0x7fbd08001f78 size 128
Aug 26 18:32:55.631377: | DPD: scheduling timeout to 10
Aug 26 18:32:55.631381: | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x55c66d974848
Aug 26 18:32:55.631383: | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1
Aug 26 18:32:55.631386: | libevent_malloc: new ptr-libevent@0x55c66d95d888 size 128
Aug 26 18:32:55.631389: | DPD: sending R_U_THERE 17352 to 192.1.2.23:500 (state #1)
Aug 26 18:32:55.631413: | **emit ISAKMP Message:
Aug 26 18:32:55.631415: |    initiator cookie:
Aug 26 18:32:55.631417: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:55.631419: |    responder cookie:
Aug 26 18:32:55.631420: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:55.631422: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:55.631424: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:32:55.631426: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:32:55.631429: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:32:55.631431: |    Message ID: 4022211571 (0xefbe13f3)
Aug 26 18:32:55.631433: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:32:55.631435: | ***emit ISAKMP Hash Payload:
Aug 26 18:32:55.631437: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:55.631439: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:32:55.631441: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify'
Aug 26 18:32:55.631443: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:32:55.631445: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:32:55.631447: | ***emit ISAKMP Notification Payload:
Aug 26 18:32:55.631448: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:55.631450: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:32:55.631452: |    protocol ID: 1 (0x1)
Aug 26 18:32:55.631453: |    SPI size: 16 (0x10)
Aug 26 18:32:55.631455: |    Notify Message Type: R_U_THERE (0x8d28)
Aug 26 18:32:55.631457: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:32:55.631459: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify'
Aug 26 18:32:55.631461: | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
Aug 26 18:32:55.631463: | notify icookie  35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:55.631465: | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
Aug 26 18:32:55.631466: | notify rcookie  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:55.631468: | emitting 4 raw bytes of notify data into ISAKMP Notification Payload
Aug 26 18:32:55.631470: | notify data  00 00 43 c8
Aug 26 18:32:55.631471: | emitting length of ISAKMP Notification Payload: 32
Aug 26 18:32:55.631506: | notification HASH(1):
Aug 26 18:32:55.631509: |   3c ac 8e 24  e4 f3 41 42  58 c7 76 f3  98 67 7f f9
Aug 26 18:32:55.631512: |   a1 d5 ca 8e  e7 f4 17 f5  9a 75 11 45  31 e9 db e5
Aug 26 18:32:55.631520: | emitting 12 zero bytes of encryption padding into ISAKMP Message
Aug 26 18:32:55.631522: | no IKEv1 message padding required
Aug 26 18:32:55.631523: | emitting length of ISAKMP Message: 108
Aug 26 18:32:55.631535: | sending 108 bytes for ISAKMP notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1)
Aug 26 18:32:55.631537: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:55.631538: |   08 10 05 01  ef be 13 f3  00 00 00 6c  9a 9c 23 3c
Aug 26 18:32:55.631540: |   87 c9 a3 94  d5 11 f6 ae  61 b4 de b2  1e c3 ab 07
Aug 26 18:32:55.631541: |   fc 8d 17 a0  34 d9 05 d5  51 f4 65 ae  e7 0d 4e 11
Aug 26 18:32:55.631543: |   e1 7d 75 87  fc af 54 99  47 eb f6 52  b6 13 64 96
Aug 26 18:32:55.631544: |   3b 40 e7 58  6a f1 38 73  31 aa 79 a6  37 7e 99 c1
Aug 26 18:32:55.631546: |   a6 3e 2b 59  83 f0 53 fd  1c f5 c7 34
Aug 26 18:32:55.631785: ERROR: "north-a-dpd" #2: sendto on eth1 to 192.1.2.23:500 failed in ISAKMP notify. Errno 113: No route to host
Aug 26 18:32:55.631790: | libevent_free: release ptr-libevent@0x55c66d94a328
Aug 26 18:32:55.631793: | free_event_entry: release EVENT_DPD-pe@0x7fbd14004218
Aug 26 18:32:55.631799: | #2 spent 0.494 milliseconds in timer_event_cb() EVENT_DPD
Aug 26 18:32:55.631802: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:32:58.634359: | timer_event_cb: processing event@0x55c66d8e2208
Aug 26 18:32:58.634400: | handling event EVENT_DPD for child state #2
Aug 26 18:32:58.634421: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:32:58.634439: | [RE]START processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360)
Aug 26 18:32:58.634447: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:32:58.634458: | DPD: processing for state #2 ("north-a-dpd")
Aug 26 18:32:58.634475: | get_sa_info esp.93d21727@192.1.3.33
Aug 26 18:32:58.634520: | event_schedule: new EVENT_DPD-pe@0x7fbd14004218
Aug 26 18:32:58.634532: | inserting event EVENT_DPD, timeout in 3 seconds for #2
Aug 26 18:32:58.634543: | libevent_malloc: new ptr-libevent@0x55c66d960ba8 size 128
Aug 26 18:32:58.634556: | DPD: sending R_U_THERE 17353 to 192.1.2.23:500 (state #1)
Aug 26 18:32:58.634589: | **emit ISAKMP Message:
Aug 26 18:32:58.634599: |    initiator cookie:
Aug 26 18:32:58.634606: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:58.634613: |    responder cookie:
Aug 26 18:32:58.634620: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:58.634628: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:58.634636: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:32:58.634643: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:32:58.634651: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:32:58.634659: |    Message ID: 3887767278 (0xe7ba9eee)
Aug 26 18:32:58.634667: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:32:58.634676: | ***emit ISAKMP Hash Payload:
Aug 26 18:32:58.634684: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:58.634693: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:32:58.634701: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify'
Aug 26 18:32:58.634711: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:32:58.634719: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:32:58.634726: | ***emit ISAKMP Notification Payload:
Aug 26 18:32:58.634734: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:32:58.634741: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:32:58.634748: |    protocol ID: 1 (0x1)
Aug 26 18:32:58.634755: |    SPI size: 16 (0x10)
Aug 26 18:32:58.634763: |    Notify Message Type: R_U_THERE (0x8d28)
Aug 26 18:32:58.634772: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:32:58.634790: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify'
Aug 26 18:32:58.634801: | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
Aug 26 18:32:58.634808: | notify icookie  35 80 c1 69  e2 a9 e2 31
Aug 26 18:32:58.634816: | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
Aug 26 18:32:58.634823: | notify rcookie  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:58.634830: | emitting 4 raw bytes of notify data into ISAKMP Notification Payload
Aug 26 18:32:58.634837: | notify data  00 00 43 c9
Aug 26 18:32:58.634844: | emitting length of ISAKMP Notification Payload: 32
Aug 26 18:32:58.634923: | notification HASH(1):
Aug 26 18:32:58.634934: |   a4 97 b1 cd  da 51 46 89  3d e6 f8 9c  4a f1 e8 42
Aug 26 18:32:58.634941: |   79 f6 96 ff  69 58 51 15  e9 a7 c6 99  3e ad 3d 13
Aug 26 18:32:58.634966: | emitting 12 zero bytes of encryption padding into ISAKMP Message
Aug 26 18:32:58.634974: | no IKEv1 message padding required
Aug 26 18:32:58.634981: | emitting length of ISAKMP Message: 108
Aug 26 18:32:58.635023: | sending 108 bytes for ISAKMP notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1)
Aug 26 18:32:58.635032: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:32:58.635039: |   08 10 05 01  e7 ba 9e ee  00 00 00 6c  7d e0 b0 b8
Aug 26 18:32:58.635045: |   86 a4 3f 12  c6 4f 01 09  ed bc 7c 20  7b 22 58 0d
Aug 26 18:32:58.635052: |   bb 57 12 50  f5 82 d4 a9  9c 36 b5 08  fd f5 1f d0
Aug 26 18:32:58.635058: |   f9 12 2c 33  1d 5a 06 66  3d 3e 92 9c  d0 42 e7 7d
Aug 26 18:32:58.635065: |   ca 10 c7 47  42 a0 62 c6  25 10 e2 11  12 76 d9 51
Aug 26 18:32:58.635071: |   35 70 4c ed  fe 20 29 bf  ab 1d 52 1c
Aug 26 18:32:58.635107: ERROR: "north-a-dpd" #2: sendto on eth1 to 192.1.2.23:500 failed in ISAKMP notify. Errno 113: No route to host
Aug 26 18:32:58.635121: | libevent_free: release ptr-libevent@0x7fbd08001f78
Aug 26 18:32:58.635146: | free_event_entry: release EVENT_DPD-pe@0x55c66d8e2208
Aug 26 18:32:58.635177: | #2 spent 0.816 milliseconds in timer_event_cb() EVENT_DPD
Aug 26 18:32:58.635193: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:01.637312: | timer_event_cb: processing event@0x7fbd14004218
Aug 26 18:33:01.637330: | handling event EVENT_DPD for child state #2
Aug 26 18:33:01.637337: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:01.637341: | [RE]START processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360)
Aug 26 18:33:01.637343: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:33:01.637346: | DPD: processing for state #2 ("north-a-dpd")
Aug 26 18:33:01.637351: | get_sa_info esp.93d21727@192.1.3.33
Aug 26 18:33:01.637364: | event_schedule: new EVENT_DPD-pe@0x55c66d8e2208
Aug 26 18:33:01.637367: | inserting event EVENT_DPD, timeout in 3 seconds for #2
Aug 26 18:33:01.637370: | libevent_malloc: new ptr-libevent@0x55c66d94a328 size 128
Aug 26 18:33:01.637373: | DPD: sending R_U_THERE 17354 to 192.1.2.23:500 (state #1)
Aug 26 18:33:01.637384: | **emit ISAKMP Message:
Aug 26 18:33:01.637387: |    initiator cookie:
Aug 26 18:33:01.637388: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:33:01.637390: |    responder cookie:
Aug 26 18:33:01.637391: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:33:01.637393: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:01.637395: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:01.637397: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:33:01.637399: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:01.637401: |    Message ID: 1206718066 (0x47ed0e72)
Aug 26 18:33:01.637403: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:01.637405: | ***emit ISAKMP Hash Payload:
Aug 26 18:33:01.637410: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:01.637418: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:33:01.637423: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify'
Aug 26 18:33:01.637428: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:33:01.637432: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:33:01.637435: | ***emit ISAKMP Notification Payload:
Aug 26 18:33:01.637439: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:01.637442: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:01.637446: |    protocol ID: 1 (0x1)
Aug 26 18:33:01.637462: |    SPI size: 16 (0x10)
Aug 26 18:33:01.637465: |    Notify Message Type: R_U_THERE (0x8d28)
Aug 26 18:33:01.637470: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:33:01.637474: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify'
Aug 26 18:33:01.637479: | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
Aug 26 18:33:01.637482: | notify icookie  35 80 c1 69  e2 a9 e2 31
Aug 26 18:33:01.637486: | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
Aug 26 18:33:01.637489: | notify rcookie  4b 16 40 1f  95 19 a0 1f
Aug 26 18:33:01.637493: | emitting 4 raw bytes of notify data into ISAKMP Notification Payload
Aug 26 18:33:01.637495: | notify data  00 00 43 ca
Aug 26 18:33:01.637499: | emitting length of ISAKMP Notification Payload: 32
Aug 26 18:33:01.637538: | notification HASH(1):
Aug 26 18:33:01.637542: |   f4 4b ba 07  c8 0d 33 50  ce 65 c9 c1  1c 39 7e 52
Aug 26 18:33:01.637546: |   e8 0a 95 07  fd 99 dc 41  c7 65 15 b1  bc 49 56 71
Aug 26 18:33:01.637569: | emitting 12 zero bytes of encryption padding into ISAKMP Message
Aug 26 18:33:01.637572: | no IKEv1 message padding required
Aug 26 18:33:01.637577: | emitting length of ISAKMP Message: 108
Aug 26 18:33:01.637600: | sending 108 bytes for ISAKMP notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1)
Aug 26 18:33:01.637605: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:33:01.637608: |   08 10 05 01  47 ed 0e 72  00 00 00 6c  2b cf ec a2
Aug 26 18:33:01.637611: |   cf b3 50 99  52 99 1e d6  dc 82 7a 62  c8 db 60 a2
Aug 26 18:33:01.637615: |   a4 53 a4 a4  88 42 a3 fb  50 61 6f 44  f7 d5 5d 6b
Aug 26 18:33:01.637618: |   dc 98 0d a5  c2 66 eb f1  d4 52 3a ec  be 1f 9a c0
Aug 26 18:33:01.637621: |   19 6d a7 9a  b9 d0 07 d2  6e ee 21 e5  1c 7b 1b 4d
Aug 26 18:33:01.637624: |   2b 89 7e ce  02 1b 4e 16  f1 53 1e cb
Aug 26 18:33:01.637638: ERROR: "north-a-dpd" #2: sendto on eth1 to 192.1.2.23:500 failed in ISAKMP notify. Errno 113: No route to host
Aug 26 18:33:01.637645: | libevent_free: release ptr-libevent@0x55c66d960ba8
Aug 26 18:33:01.637649: | free_event_entry: release EVENT_DPD-pe@0x7fbd14004218
Aug 26 18:33:01.637658: | #2 spent 0.347 milliseconds in timer_event_cb() EVENT_DPD
Aug 26 18:33:01.637665: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:04.640326: | timer_event_cb: processing event@0x55c66d8e2208
Aug 26 18:33:04.640360: | handling event EVENT_DPD for child state #2
Aug 26 18:33:04.640368: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:04.640375: | [RE]START processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360)
Aug 26 18:33:04.640377: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:33:04.640381: | DPD: processing for state #2 ("north-a-dpd")
Aug 26 18:33:04.640388: | get_sa_info esp.93d21727@192.1.3.33
Aug 26 18:33:04.640408: | event_schedule: new EVENT_DPD-pe@0x7fbd14004218
Aug 26 18:33:04.640412: | inserting event EVENT_DPD, timeout in 3 seconds for #2
Aug 26 18:33:04.640416: | libevent_malloc: new ptr-libevent@0x55c66d960d28 size 128
Aug 26 18:33:04.640424: | DPD: sending R_U_THERE 17355 to 192.1.2.23:500 (state #1)
Aug 26 18:33:04.640436: | **emit ISAKMP Message:
Aug 26 18:33:04.640439: |    initiator cookie:
Aug 26 18:33:04.640442: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:33:04.640444: |    responder cookie:
Aug 26 18:33:04.640446: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:33:04.640449: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:04.640453: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:04.640456: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:33:04.640459: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:04.640461: |    Message ID: 321619681 (0x132b86e1)
Aug 26 18:33:04.640464: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:04.640468: | ***emit ISAKMP Hash Payload:
Aug 26 18:33:04.640470: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:04.640474: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:33:04.640477: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify'
Aug 26 18:33:04.640480: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:33:04.640483: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:33:04.640485: | ***emit ISAKMP Notification Payload:
Aug 26 18:33:04.640488: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:04.640491: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:04.640493: |    protocol ID: 1 (0x1)
Aug 26 18:33:04.640496: |    SPI size: 16 (0x10)
Aug 26 18:33:04.640498: |    Notify Message Type: R_U_THERE (0x8d28)
Aug 26 18:33:04.640502: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:33:04.640504: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify'
Aug 26 18:33:04.640508: | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload
Aug 26 18:33:04.640510: | notify icookie  35 80 c1 69  e2 a9 e2 31
Aug 26 18:33:04.640513: | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload
Aug 26 18:33:04.640516: | notify rcookie  4b 16 40 1f  95 19 a0 1f
Aug 26 18:33:04.640519: | emitting 4 raw bytes of notify data into ISAKMP Notification Payload
Aug 26 18:33:04.640521: | notify data  00 00 43 cb
Aug 26 18:33:04.640524: | emitting length of ISAKMP Notification Payload: 32
Aug 26 18:33:04.640557: | notification HASH(1):
Aug 26 18:33:04.640560: |   48 be 9d 83  9d c7 0c f4  e9 7f f7 a8  d2 df 3e 3e
Aug 26 18:33:04.640563: |   22 28 75 82  83 f8 32 3c  23 d9 32 cb  8b 2c 98 df
Aug 26 18:33:04.640572: | emitting 12 zero bytes of encryption padding into ISAKMP Message
Aug 26 18:33:04.640575: | no IKEv1 message padding required
Aug 26 18:33:04.640577: | emitting length of ISAKMP Message: 108
Aug 26 18:33:04.640591: | sending 108 bytes for ISAKMP notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1)
Aug 26 18:33:04.640594: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:33:04.640597: |   08 10 05 01  13 2b 86 e1  00 00 00 6c  08 46 c6 f5
Aug 26 18:33:04.640599: |   2f 0b 07 ed  bf 5e 49 db  83 03 c5 77  d2 fb e8 73
Aug 26 18:33:04.640602: |   b9 4c 34 13  3d 5d c9 be  3c 98 c9 7d  48 0b 86 fa
Aug 26 18:33:04.640604: |   86 47 82 85  73 5d c8 c6  9f 77 df d8  a3 75 62 6a
Aug 26 18:33:04.640607: |   75 87 21 27  ea 10 04 02  76 16 fc 30  19 91 d2 85
Aug 26 18:33:04.640609: |   0c b3 85 34  34 f5 2b b2  1c 6c bf ca
Aug 26 18:33:04.640623: ERROR: "north-a-dpd" #2: sendto on eth1 to 192.1.2.23:500 failed in ISAKMP notify. Errno 113: No route to host
Aug 26 18:33:04.640628: | libevent_free: release ptr-libevent@0x55c66d94a328
Aug 26 18:33:04.640631: | free_event_entry: release EVENT_DPD-pe@0x55c66d8e2208
Aug 26 18:33:04.640638: | #2 spent 0.312 milliseconds in timer_event_cb() EVENT_DPD
Aug 26 18:33:04.640644: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:05.633427: | timer_event_cb: processing event@0x55c66d974848
Aug 26 18:33:05.633481: | handling event EVENT_DPD_TIMEOUT for parent state #1
Aug 26 18:33:05.633506: | start processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:05.633526: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in dpd_timeout() at ikev1_dpd.c:569)
Aug 26 18:33:05.633537: "north-a-dpd" #1: IKEv1 DPD action - restarting all connections that share this peer
Aug 26 18:33:05.633548: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:33:05.633572: | start processing: connection "northnet-eastnet-b" (BACKGROUND) (in terminate_a_connection() at terminate.c:69)
Aug 26 18:33:05.633581: "north-a-dpd" #1: terminating SAs using this connection
Aug 26 18:33:05.633589: | connection 'northnet-eastnet-b' -POLICY_UP
Aug 26 18:33:05.633601: | connection not shared - terminating IKE and IPsec SA
Aug 26 18:33:05.633610: | Deleting states for connection - not including other IPsec SA's
Aug 26 18:33:05.633618: | pass 0
Aug 26 18:33:05.633627: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
Aug 26 18:33:05.633635: | state #2
Aug 26 18:33:05.633642: | state #1
Aug 26 18:33:05.633649: | pass 1
Aug 26 18:33:05.633657: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
Aug 26 18:33:05.633664: | state #2
Aug 26 18:33:05.633671: | state #1
Aug 26 18:33:05.633682: | stop processing: connection "northnet-eastnet-b" (BACKGROUND) (in terminate_a_connection() at terminate.c:87)
Aug 26 18:33:05.633690: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:33:05.633701: | start processing: connection "north-a-dpd" (BACKGROUND) (in terminate_a_connection() at terminate.c:69)
Aug 26 18:33:05.633709: "north-a-dpd" #1: terminating SAs using this connection
Aug 26 18:33:05.633717: | connection 'north-a-dpd' -POLICY_UP
Aug 26 18:33:05.633725: | FOR_EACH_STATE_... in shared_phase1_connection
Aug 26 18:33:05.633734: | connection not shared - terminating IKE and IPsec SA
Aug 26 18:33:05.633742: | Deleting states for connection - not including other IPsec SA's
Aug 26 18:33:05.633750: | pass 0
Aug 26 18:33:05.633759: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
Aug 26 18:33:05.633767: | state #2
Aug 26 18:33:05.633782: | suspend processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:33:05.633795: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:33:05.633805: | pstats #2 ikev1.ipsec deleted completed
Aug 26 18:33:05.633820: | [RE]START processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in delete_state() at state.c:879)
Aug 26 18:33:05.633835: "north-a-dpd" #2: deleting state (STATE_QUICK_I2) aged 13.010s and sending notification
Aug 26 18:33:05.633848: | child state #2: QUICK_I2(established CHILD SA) => delete
Aug 26 18:33:05.633864: | get_sa_info esp.dad52450@192.1.2.23
Aug 26 18:33:05.633920: | get_sa_info esp.93d21727@192.1.3.33
Aug 26 18:33:05.633948: "north-a-dpd" #2: ESP traffic information: in=0B out=168B
Aug 26 18:33:05.633959: | state #2 requesting EVENT_DPD-pe@0x7fbd14004218 be deleted
Aug 26 18:33:05.633972: | libevent_free: release ptr-libevent@0x55c66d960d28
Aug 26 18:33:05.633984: | free_event_entry: release EVENT_DPD-pe@0x7fbd14004218
Aug 26 18:33:05.633994: | #2 send IKEv1 delete notification for STATE_QUICK_I2
Aug 26 18:33:05.634003: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:33:05.634032: | **emit ISAKMP Message:
Aug 26 18:33:05.634043: |    initiator cookie:
Aug 26 18:33:05.634052: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:33:05.634060: |    responder cookie:
Aug 26 18:33:05.634067: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:33:05.634077: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:05.634085: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:05.634110: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:33:05.634120: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:05.634129: |    Message ID: 433582527 (0x19d7f1bf)
Aug 26 18:33:05.634138: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:05.634149: | ***emit ISAKMP Hash Payload:
Aug 26 18:33:05.634157: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:05.634168: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:33:05.634177: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg'
Aug 26 18:33:05.634188: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:33:05.634196: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:33:05.634204: | ***emit ISAKMP Delete Payload:
Aug 26 18:33:05.634212: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:05.634220: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:05.634228: |    protocol ID: 3 (0x3)
Aug 26 18:33:05.634236: |    SPI size: 4 (0x4)
Aug 26 18:33:05.634245: |    number of SPIs: 1 (0x1)
Aug 26 18:33:05.634259: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D)
Aug 26 18:33:05.634269: | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg'
Aug 26 18:33:05.634279: | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload
Aug 26 18:33:05.634304: | delete payload  93 d2 17 27
Aug 26 18:33:05.634324: | emitting length of ISAKMP Delete Payload: 16
Aug 26 18:33:05.634412: | send delete HASH(1):
Aug 26 18:33:05.634424: |   f3 c0 d8 4f  33 4f af 95  98 a9 58 7e  36 54 65 20
Aug 26 18:33:05.634431: |   0c 29 d6 2d  43 38 9a ea  e2 97 41 72  bf 9d 6c 5e
Aug 26 18:33:05.634457: | emitting 12 zero bytes of encryption padding into ISAKMP Message
Aug 26 18:33:05.634466: | no IKEv1 message padding required
Aug 26 18:33:05.634475: | emitting length of ISAKMP Message: 92
Aug 26 18:33:05.634523: | sending 92 bytes for delete notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1)
Aug 26 18:33:05.634537: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:33:05.634545: |   08 10 05 01  19 d7 f1 bf  00 00 00 5c  22 f3 87 48
Aug 26 18:33:05.634552: |   1e 15 9d af  5f be a6 04  16 62 09 ba  85 72 e6 10
Aug 26 18:33:05.634559: |   04 22 cd 8e  02 59 92 1e  34 c7 65 ee  25 96 cf 32
Aug 26 18:33:05.634567: |   92 4c ed c1  b0 f9 86 c1  20 21 1c 2a  ac 75 5e bb
Aug 26 18:33:05.634574: |   e9 4a 68 da  af 84 65 5c  92 14 07 8d
Aug 26 18:33:05.634614: ERROR: "north-a-dpd" #2: sendto on eth1 to 192.1.2.23:500 failed in delete notify. Errno 113: No route to host
Aug 26 18:33:05.634626: | state #2 requesting EVENT_SA_REPLACE to be deleted
Aug 26 18:33:05.634637: | libevent_free: release ptr-libevent@0x7fbd14003f28
Aug 26 18:33:05.634647: | free_event_entry: release EVENT_SA_REPLACE-pe@0x55c66d95ef28
Aug 26 18:33:05.634964: | running updown command "ipsec _updown" for verb down 
Aug 26 18:33:05.635001: | command executing down-client
Aug 26 18:33:05.635089: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:05.635109: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:05.635167: | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844372' PLUTO_CONN_POLIC
Aug 26 18:33:05.635188: | popen cmd is 1406 chars long
Aug 26 18:33:05.635199: | cmd(   0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUT:
Aug 26 18:33:05.635208: | cmd(  80):O_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_I:
Aug 26 18:33:05.635216: | cmd( 160):D='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testin:
Aug 26 18:33:05.635225: | cmd( 240):g.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/:
Aug 26 18:33:05.635233: | cmd( 320):24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_M:
Aug 26 18:33:05.635241: | cmd( 400):Y_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUT:
Aug 26 18:33:05.635249: | cmd( 480):O_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=:
Aug 26 18:33:05.635257: | cmd( 560):Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.or:
Aug 26 18:33:05.635265: | cmd( 640):g' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PE:
Aug 26 18:33:05.635273: | cmd( 720):ER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO:
Aug 26 18:33:05.635281: | cmd( 800):_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libre:
Aug 26 18:33:05.635310: | cmd( 880):swan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADD:
Aug 26 18:33:05.635330: | cmd( 960):TIME='1566844372' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF:
Aug 26 18:33:05.635338: | cmd(1040):_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMI:
Aug 26 18:33:05.635347: | cmd(1120):LY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PE:
Aug 26 18:33:05.635355: | cmd(1200):ER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0':
Aug 26 18:33:05.635363: | cmd(1280): PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x:
Aug 26 18:33:05.635371: | cmd(1360):dad52450 SPI_OUT=0x93d21727 ipsec _updown 2>&1:
Aug 26 18:33:05.669071: | shunt_eroute() called for connection 'north-a-dpd' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0
Aug 26 18:33:05.669109: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0
Aug 26 18:33:05.669119: | priority calculation of connection "north-a-dpd" is 0xfe7e7
Aug 26 18:33:05.669130: | IPsec Sa SPD priority set to 1042407
Aug 26 18:33:05.669224: | delete esp.dad52450@192.1.2.23
Aug 26 18:33:05.669267: | netlink response for Del SA esp.dad52450@192.1.2.23 included non-error error
Aug 26 18:33:05.669277: | priority calculation of connection "north-a-dpd" is 0xfe7e7
Aug 26 18:33:05.669319: | delete inbound eroute 192.0.22.0/24:0 --0-> 192.0.3.0/24:0 => unk255.10000@192.1.3.33 (raw_eroute)
Aug 26 18:33:05.669389: | raw_eroute result=success
Aug 26 18:33:05.669401: | delete esp.93d21727@192.1.3.33
Aug 26 18:33:05.669441: | netlink response for Del SA esp.93d21727@192.1.3.33 included non-error error
Aug 26 18:33:05.669473: | stop processing: connection "north-a-dpd" (BACKGROUND) (in update_state_connection() at connections.c:4076)
Aug 26 18:33:05.669483: | start processing: connection NULL (in update_state_connection() at connections.c:4077)
Aug 26 18:33:05.669489: | in connection_discard for connection north-a-dpd
Aug 26 18:33:05.669495: | State DB: deleting IKEv1 state #2 in QUICK_I2
Aug 26 18:33:05.669509: | child state #2: QUICK_I2(established CHILD SA) => UNDEFINED(ignore)
Aug 26 18:33:05.669609: | stop processing: state #2 from 192.1.2.23 (in delete_state() at state.c:1143)
Aug 26 18:33:05.669670: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:33:05.669681: | resume processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:33:05.669687: | state #1
Aug 26 18:33:05.669692: | pass 1
Aug 26 18:33:05.669697: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
Aug 26 18:33:05.669702: | state #1
Aug 26 18:33:05.669711: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:33:05.669718: | pstats #1 ikev1.isakmp deleted completed
Aug 26 18:33:05.669731: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in delete_state() at state.c:879)
Aug 26 18:33:05.669740: "north-a-dpd" #1: deleting state (STATE_MAIN_I4) aged 13.075s and sending notification
Aug 26 18:33:05.669747: | parent state #1: MAIN_I4(established IKE SA) => delete
Aug 26 18:33:05.669896: | #1 send IKEv1 delete notification for STATE_MAIN_I4
Aug 26 18:33:05.669944: | **emit ISAKMP Message:
Aug 26 18:33:05.669952: |    initiator cookie:
Aug 26 18:33:05.669958: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:33:05.669963: |    responder cookie:
Aug 26 18:33:05.669968: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:33:05.669974: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:05.669980: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:05.669986: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:33:05.669995: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:05.670001: |    Message ID: 1688857720 (0x64a9ec78)
Aug 26 18:33:05.670008: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:05.670014: | ***emit ISAKMP Hash Payload:
Aug 26 18:33:05.670020: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:05.670027: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:33:05.670033: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg'
Aug 26 18:33:05.670040: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:33:05.670046: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:33:05.670052: | ***emit ISAKMP Delete Payload:
Aug 26 18:33:05.670057: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:05.670062: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:05.670068: |    protocol ID: 1 (0x1)
Aug 26 18:33:05.670073: |    SPI size: 16 (0x10)
Aug 26 18:33:05.670078: |    number of SPIs: 1 (0x1)
Aug 26 18:33:05.670085: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D)
Aug 26 18:33:05.670091: | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg'
Aug 26 18:33:05.670098: | emitting 8 raw bytes of initiator SPI into ISAKMP Delete Payload
Aug 26 18:33:05.670104: | initiator SPI  35 80 c1 69  e2 a9 e2 31
Aug 26 18:33:05.670110: | emitting 8 raw bytes of responder SPI into ISAKMP Delete Payload
Aug 26 18:33:05.670115: | responder SPI  4b 16 40 1f  95 19 a0 1f
Aug 26 18:33:05.670120: | emitting length of ISAKMP Delete Payload: 28
Aug 26 18:33:05.670192: | send delete HASH(1):
Aug 26 18:33:05.670200: |   c1 31 08 a5  b9 d1 6c 47  ba a7 9a ff  9b be 13 67
Aug 26 18:33:05.670206: |   fc dc 1a c3  8b ad 7d 6b  e0 2e 9e fd  02 e4 ee f3
Aug 26 18:33:05.670223: | no IKEv1 message padding required
Aug 26 18:33:05.670229: | emitting length of ISAKMP Message: 92
Aug 26 18:33:05.670271: | sending 92 bytes for delete notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1)
Aug 26 18:33:05.670281: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:33:05.670286: |   08 10 05 01  64 a9 ec 78  00 00 00 5c  44 69 fd 92
Aug 26 18:33:05.670322: |   c7 b8 82 9c  11 8a 68 75  b6 13 86 f0  10 de 8c d5
Aug 26 18:33:05.670329: |   38 d1 c5 f2  a5 26 20 b7  d1 bc 90 f4  b3 e1 1d d4
Aug 26 18:33:05.670334: |   45 0f 85 6b  42 f0 02 cb  85 24 7d b0  c5 f7 e4 5b
Aug 26 18:33:05.670339: |   cf 89 8a f9  4f 91 50 db  3b cd 51 33
Aug 26 18:33:05.670368: ERROR: "north-a-dpd" #1: sendto on eth1 to 192.1.2.23:500 failed in delete notify. Errno 113: No route to host
Aug 26 18:33:05.670376: | state #1 requesting EVENT_SA_REPLACE to be deleted
Aug 26 18:33:05.670391: | libevent_free: release ptr-libevent@0x55c66d976ab8
Aug 26 18:33:05.670401: | free_event_entry: release EVENT_SA_REPLACE-pe@0x55c66d954c08
Aug 26 18:33:05.670411: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:33:05.670419: | in connection_discard for connection north-a-dpd
Aug 26 18:33:05.670425: | State DB: deleting IKEv1 state #1 in MAIN_I4
Aug 26 18:33:05.670432: | parent state #1: MAIN_I4(established IKE SA) => UNDEFINED(ignore)
Aug 26 18:33:05.670451: | unreference key: 0x55c66d954b18 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 2--
Aug 26 18:33:05.670495: | stop processing: state #1 from 192.1.2.23 (in delete_state() at state.c:1143)
Aug 26 18:33:05.670521: | unreference key: 0x55c66d954b18 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1--
Aug 26 18:33:05.670533: | unreference key: 0x55c66d9630d8 user-east@testing.libreswan.org cnt 1--
Aug 26 18:33:05.670541: | unreference key: 0x55c66d963328 @east.testing.libreswan.org cnt 1--
Aug 26 18:33:05.670551: | unreference key: 0x55c66d961578 east@testing.libreswan.org cnt 1--
Aug 26 18:33:05.670562: | unreference key: 0x55c66d961a28 192.1.2.23 cnt 1--
Aug 26 18:33:05.670613: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:33:05.670622: | processing: STOP connection NULL (in terminate_a_connection() at terminate.c:87)
Aug 26 18:33:05.670630: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:33:05.670645: | start processing: connection "northnet-eastnet-b" (in initiate_a_connection() at initiate.c:186)
Aug 26 18:33:05.670652: | empty esp_info, returning defaults for ENCRYPT
Aug 26 18:33:05.670660: | connection 'northnet-eastnet-b' +POLICY_UP
Aug 26 18:33:05.670667: | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342)
Aug 26 18:33:05.670673: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:33:05.670686: | creating state object #3 at 0x55c66d956938
Aug 26 18:33:05.670692: | State DB: adding IKEv1 state #3 in UNDEFINED
Aug 26 18:33:05.670707: | pstats #3 ikev1.isakmp started
Aug 26 18:33:05.670721: | suspend processing: connection "northnet-eastnet-b" (in main_outI1() at ikev1_main.c:118)
Aug 26 18:33:05.670730: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118)
Aug 26 18:33:05.670737: | parent state #3: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA)
Aug 26 18:33:05.670744: | dup_any(fd@-1) -> fd@-1 (in main_outI1() at ikev1_main.c:123)
Aug 26 18:33:05.670752: | Queuing pending IPsec SA negotiating with 192.1.2.23 "northnet-eastnet-b" IKE SA #3 "northnet-eastnet-b"
Aug 26 18:33:05.670760: "northnet-eastnet-b" #3: initiating Main Mode
Aug 26 18:33:05.670823: | **emit ISAKMP Message:
Aug 26 18:33:05.670829: |    initiator cookie:
Aug 26 18:33:05.670835: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:05.670840: |    responder cookie:
Aug 26 18:33:05.670845: |   00 00 00 00  00 00 00 00
Aug 26 18:33:05.670851: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:33:05.670856: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:05.670862: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:33:05.670867: |    flags: none (0x0)
Aug 26 18:33:05.670873: |    Message ID: 0 (0x0)
Aug 26 18:33:05.670878: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:05.670890: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:33:05.670897: | no specific IKE algorithms specified - using defaults
Aug 26 18:33:05.670947: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0
Aug 26 18:33:05.670962: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0
Aug 26 18:33:05.670973: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0
Aug 26 18:33:05.670984: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0
Aug 26 18:33:05.670996: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0
Aug 26 18:33:05.671012: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0
Aug 26 18:33:05.671029: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0
Aug 26 18:33:05.671041: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0
Aug 26 18:33:05.671055: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0
Aug 26 18:33:05.671066: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0
Aug 26 18:33:05.671078: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0
Aug 26 18:33:05.671089: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0
Aug 26 18:33:05.671101: | oakley_alg_makedb() returning 0x55c66d957738
Aug 26 18:33:05.671114: | ***emit ISAKMP Security Association Payload:
Aug 26 18:33:05.671120: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:33:05.671125: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:05.671132: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:33:05.671138: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:33:05.671145: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:05.671150: | ****emit IPsec DOI SIT:
Aug 26 18:33:05.671156: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:33:05.671162: | ikev1_out_sa pcn: 0 has 1 valid proposals
Aug 26 18:33:05.671169: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18
Aug 26 18:33:05.671174: | ****emit ISAKMP Proposal Payload:
Aug 26 18:33:05.671179: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:05.671185: |    proposal number: 0 (0x0)
Aug 26 18:33:05.671190: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:33:05.671195: |    SPI size: 0 (0x0)
Aug 26 18:33:05.671201: |    number of transforms: 18 (0x12)
Aug 26 18:33:05.671207: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
Aug 26 18:33:05.671213: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.671218: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.671223: |    ISAKMP transform number: 0 (0x0)
Aug 26 18:33:05.671229: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.671235: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.671241: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671247: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.671253: |    length/value: 1 (0x1)
Aug 26 18:33:05.671259: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.671264: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671270: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.671275: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.671281: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671286: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.671305: |    length/value: 7 (0x7)
Aug 26 18:33:05.671312: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:05.671322: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671328: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.671333: |    length/value: 4 (0x4)
Aug 26 18:33:05.671343: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:33:05.671349: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671354: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.671359: |    length/value: 3 (0x3)
Aug 26 18:33:05.671364: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.671369: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671374: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.671379: |    length/value: 14 (0xe)
Aug 26 18:33:05.671385: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:05.671390: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671395: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:05.671400: |    length/value: 256 (0x100)
Aug 26 18:33:05.671406: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:05.671412: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.671417: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.671422: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:33:05.671427: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.671434: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.671440: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.671446: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671451: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.671456: |    length/value: 1 (0x1)
Aug 26 18:33:05.671461: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.671466: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671472: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.671477: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.671482: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671487: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.671492: |    length/value: 7 (0x7)
Aug 26 18:33:05.671497: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:05.671502: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671508: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.671513: |    length/value: 4 (0x4)
Aug 26 18:33:05.671518: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:33:05.671523: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671528: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.671533: |    length/value: 3 (0x3)
Aug 26 18:33:05.671538: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.671543: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671548: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.671553: |    length/value: 14 (0xe)
Aug 26 18:33:05.671558: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:05.671563: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671568: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:05.671574: |    length/value: 128 (0x80)
Aug 26 18:33:05.671579: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:05.671584: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.671589: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.671594: |    ISAKMP transform number: 2 (0x2)
Aug 26 18:33:05.671599: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.671605: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.671611: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.671616: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671622: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.671627: |    length/value: 1 (0x1)
Aug 26 18:33:05.671632: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.671637: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671645: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.671650: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.671655: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671661: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.671666: |    length/value: 7 (0x7)
Aug 26 18:33:05.671671: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:05.671676: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671681: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.671686: |    length/value: 6 (0x6)
Aug 26 18:33:05.671691: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:33:05.671696: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671701: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.671706: |    length/value: 3 (0x3)
Aug 26 18:33:05.671711: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.671716: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671721: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.671726: |    length/value: 14 (0xe)
Aug 26 18:33:05.671731: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:05.671736: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671742: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:05.671747: |    length/value: 256 (0x100)
Aug 26 18:33:05.671752: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:05.671757: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.671762: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.671767: |    ISAKMP transform number: 3 (0x3)
Aug 26 18:33:05.671772: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.671779: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.671785: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.671790: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671795: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.671800: |    length/value: 1 (0x1)
Aug 26 18:33:05.671805: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.671810: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671815: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.671820: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.671825: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671831: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.671836: |    length/value: 7 (0x7)
Aug 26 18:33:05.671841: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:05.671846: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671851: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.671856: |    length/value: 6 (0x6)
Aug 26 18:33:05.671861: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:33:05.671866: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671871: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.671876: |    length/value: 3 (0x3)
Aug 26 18:33:05.671881: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.671886: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671891: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.671896: |    length/value: 14 (0xe)
Aug 26 18:33:05.671901: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:05.671906: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671911: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:05.671916: |    length/value: 128 (0x80)
Aug 26 18:33:05.671922: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:05.671927: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.671932: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.671937: |    ISAKMP transform number: 4 (0x4)
Aug 26 18:33:05.671942: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.671948: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.671956: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.671962: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671967: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.671972: |    length/value: 1 (0x1)
Aug 26 18:33:05.671977: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.671982: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.671988: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.671993: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.671998: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672003: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.672008: |    length/value: 7 (0x7)
Aug 26 18:33:05.672013: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:05.672018: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672023: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.672028: |    length/value: 2 (0x2)
Aug 26 18:33:05.672033: |     [2 is OAKLEY_SHA1]
Aug 26 18:33:05.672038: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672044: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.672049: |    length/value: 3 (0x3)
Aug 26 18:33:05.672054: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.672059: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672064: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.672069: |    length/value: 14 (0xe)
Aug 26 18:33:05.672074: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:05.672079: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672084: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:05.672089: |    length/value: 256 (0x100)
Aug 26 18:33:05.672094: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:05.672099: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.672104: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.672109: |    ISAKMP transform number: 5 (0x5)
Aug 26 18:33:05.672114: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.672121: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.672126: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.672132: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672137: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.672142: |    length/value: 1 (0x1)
Aug 26 18:33:05.672147: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.672152: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672157: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.672162: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.672168: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672173: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.672178: |    length/value: 7 (0x7)
Aug 26 18:33:05.672183: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:05.672188: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672193: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.672198: |    length/value: 2 (0x2)
Aug 26 18:33:05.672203: |     [2 is OAKLEY_SHA1]
Aug 26 18:33:05.672208: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672213: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.672218: |    length/value: 3 (0x3)
Aug 26 18:33:05.672223: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.672228: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672233: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.672238: |    length/value: 14 (0xe)
Aug 26 18:33:05.672243: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:05.672248: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672253: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:05.672258: |    length/value: 128 (0x80)
Aug 26 18:33:05.672264: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:05.672269: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.672276: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.672282: |    ISAKMP transform number: 6 (0x6)
Aug 26 18:33:05.672287: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.672305: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.672311: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.672317: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672322: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.672327: |    length/value: 1 (0x1)
Aug 26 18:33:05.672332: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.672340: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672345: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.672351: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.672356: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672361: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.672366: |    length/value: 7 (0x7)
Aug 26 18:33:05.672371: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:05.672376: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672381: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.672386: |    length/value: 4 (0x4)
Aug 26 18:33:05.672391: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:33:05.672396: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672402: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.672407: |    length/value: 3 (0x3)
Aug 26 18:33:05.672412: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.672417: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672422: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.672427: |    length/value: 5 (0x5)
Aug 26 18:33:05.672432: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:05.672437: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672442: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:05.672447: |    length/value: 256 (0x100)
Aug 26 18:33:05.672452: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:05.672457: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.672462: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.672467: |    ISAKMP transform number: 7 (0x7)
Aug 26 18:33:05.672473: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.672479: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.672484: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.672490: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672495: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.672500: |    length/value: 1 (0x1)
Aug 26 18:33:05.672505: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.672510: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672515: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.672520: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.672525: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672531: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.672536: |    length/value: 7 (0x7)
Aug 26 18:33:05.672541: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:05.672545: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672551: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.672556: |    length/value: 4 (0x4)
Aug 26 18:33:05.672561: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:33:05.672566: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672571: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.672576: |    length/value: 3 (0x3)
Aug 26 18:33:05.672581: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.672586: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672591: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.672599: |    length/value: 5 (0x5)
Aug 26 18:33:05.672604: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:05.672609: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672615: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:05.672620: |    length/value: 128 (0x80)
Aug 26 18:33:05.672625: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:05.672630: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.672635: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.672640: |    ISAKMP transform number: 8 (0x8)
Aug 26 18:33:05.672645: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.672651: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.672657: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.672662: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672668: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.672673: |    length/value: 1 (0x1)
Aug 26 18:33:05.672678: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.672683: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672688: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.672693: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.672698: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672703: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.672708: |    length/value: 7 (0x7)
Aug 26 18:33:05.672713: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:05.672718: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672724: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.672729: |    length/value: 6 (0x6)
Aug 26 18:33:05.672734: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:33:05.672738: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672744: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.672749: |    length/value: 3 (0x3)
Aug 26 18:33:05.672754: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.672759: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672764: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.672769: |    length/value: 5 (0x5)
Aug 26 18:33:05.672774: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:05.672779: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672784: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:05.672789: |    length/value: 256 (0x100)
Aug 26 18:33:05.672794: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:05.672799: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.672805: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.672810: |    ISAKMP transform number: 9 (0x9)
Aug 26 18:33:05.672815: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.672821: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.672826: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.672832: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672837: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.672842: |    length/value: 1 (0x1)
Aug 26 18:33:05.672847: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.672852: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672857: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.672862: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.672868: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672873: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.672878: |    length/value: 7 (0x7)
Aug 26 18:33:05.672883: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:05.672888: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672893: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.672898: |    length/value: 6 (0x6)
Aug 26 18:33:05.672903: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:33:05.672910: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672916: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.672921: |    length/value: 3 (0x3)
Aug 26 18:33:05.672926: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.672931: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672936: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.672941: |    length/value: 5 (0x5)
Aug 26 18:33:05.672946: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:05.672951: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.672956: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:05.672961: |    length/value: 128 (0x80)
Aug 26 18:33:05.672967: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:05.672972: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.672977: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.672982: |    ISAKMP transform number: 10 (0xa)
Aug 26 18:33:05.672987: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.672993: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.672999: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.673004: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673009: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.673014: |    length/value: 1 (0x1)
Aug 26 18:33:05.673020: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.673024: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673030: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.673035: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.673040: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673045: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.673050: |    length/value: 7 (0x7)
Aug 26 18:33:05.673056: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:05.673060: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673066: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.673071: |    length/value: 2 (0x2)
Aug 26 18:33:05.673076: |     [2 is OAKLEY_SHA1]
Aug 26 18:33:05.673080: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673086: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.673091: |    length/value: 3 (0x3)
Aug 26 18:33:05.673096: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.673101: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673106: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.673111: |    length/value: 5 (0x5)
Aug 26 18:33:05.673116: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:05.673121: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673126: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:05.673131: |    length/value: 256 (0x100)
Aug 26 18:33:05.673136: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:05.673142: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.673147: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.673152: |    ISAKMP transform number: 11 (0xb)
Aug 26 18:33:05.673157: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.673163: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.673169: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.673174: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673179: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.673184: |    length/value: 1 (0x1)
Aug 26 18:33:05.673189: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.673194: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673200: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.673205: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.673210: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673217: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.673223: |    length/value: 7 (0x7)
Aug 26 18:33:05.673228: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:05.673233: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673238: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.673243: |    length/value: 2 (0x2)
Aug 26 18:33:05.673248: |     [2 is OAKLEY_SHA1]
Aug 26 18:33:05.673253: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673273: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.673277: |    length/value: 3 (0x3)
Aug 26 18:33:05.673281: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.673285: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673295: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.673301: |    length/value: 5 (0x5)
Aug 26 18:33:05.673305: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:05.673309: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673313: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:05.673317: |    length/value: 128 (0x80)
Aug 26 18:33:05.673321: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:05.673325: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.673329: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.673334: |    ISAKMP transform number: 12 (0xc)
Aug 26 18:33:05.673338: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.673343: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.673347: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.673351: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673355: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.673359: |    length/value: 1 (0x1)
Aug 26 18:33:05.673363: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.673367: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673371: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.673375: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.673378: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673382: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.673386: |    length/value: 5 (0x5)
Aug 26 18:33:05.673390: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:33:05.673394: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673397: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.673401: |    length/value: 4 (0x4)
Aug 26 18:33:05.673405: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:33:05.673409: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673413: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.673416: |    length/value: 3 (0x3)
Aug 26 18:33:05.673420: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.673424: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673428: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.673431: |    length/value: 14 (0xe)
Aug 26 18:33:05.673435: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:05.673439: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:33:05.673443: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.673447: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.673451: |    ISAKMP transform number: 13 (0xd)
Aug 26 18:33:05.673454: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.673459: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.673463: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.673467: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673471: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.673475: |    length/value: 1 (0x1)
Aug 26 18:33:05.673479: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.673482: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673489: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.673493: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.673496: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673500: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.673504: |    length/value: 5 (0x5)
Aug 26 18:33:05.673508: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:33:05.673512: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673515: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.673519: |    length/value: 6 (0x6)
Aug 26 18:33:05.673523: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:33:05.673527: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673531: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.673534: |    length/value: 3 (0x3)
Aug 26 18:33:05.673538: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.673542: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673546: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.673549: |    length/value: 14 (0xe)
Aug 26 18:33:05.673553: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:05.673557: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:33:05.673561: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.673565: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.673568: |    ISAKMP transform number: 14 (0xe)
Aug 26 18:33:05.673572: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.673577: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.673581: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.673585: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673589: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.673593: |    length/value: 1 (0x1)
Aug 26 18:33:05.673597: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.673600: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673604: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.673608: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.673612: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673616: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.673619: |    length/value: 5 (0x5)
Aug 26 18:33:05.673623: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:33:05.673627: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673631: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.673635: |    length/value: 2 (0x2)
Aug 26 18:33:05.673638: |     [2 is OAKLEY_SHA1]
Aug 26 18:33:05.673642: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673646: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.673650: |    length/value: 3 (0x3)
Aug 26 18:33:05.673653: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.673657: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673661: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.673665: |    length/value: 14 (0xe)
Aug 26 18:33:05.673668: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:05.673672: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:33:05.673676: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.673680: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.673684: |    ISAKMP transform number: 15 (0xf)
Aug 26 18:33:05.673687: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.673692: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.673696: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.673700: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673704: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.673708: |    length/value: 1 (0x1)
Aug 26 18:33:05.673712: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.673717: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673721: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.673725: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.673729: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673733: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.673737: |    length/value: 5 (0x5)
Aug 26 18:33:05.673740: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:33:05.673744: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673748: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.673752: |    length/value: 4 (0x4)
Aug 26 18:33:05.673756: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:33:05.673759: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673763: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.673767: |    length/value: 3 (0x3)
Aug 26 18:33:05.673771: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.673774: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673778: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.673782: |    length/value: 5 (0x5)
Aug 26 18:33:05.673786: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:05.673790: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:33:05.673793: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.673797: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.673801: |    ISAKMP transform number: 16 (0x10)
Aug 26 18:33:05.673805: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.673809: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.673814: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.673817: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673821: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.673825: |    length/value: 1 (0x1)
Aug 26 18:33:05.673829: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.673833: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673837: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.673841: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.673844: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673848: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.673852: |    length/value: 5 (0x5)
Aug 26 18:33:05.673856: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:33:05.673859: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673863: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.673867: |    length/value: 6 (0x6)
Aug 26 18:33:05.673871: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:33:05.673875: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673878: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.673882: |    length/value: 3 (0x3)
Aug 26 18:33:05.673886: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.673890: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673893: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.673897: |    length/value: 5 (0x5)
Aug 26 18:33:05.673901: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:05.673905: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:33:05.673909: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:05.673912: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:05.673916: |    ISAKMP transform number: 17 (0x11)
Aug 26 18:33:05.673920: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:05.673925: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:05.673929: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:05.673933: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673937: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:05.673940: |    length/value: 1 (0x1)
Aug 26 18:33:05.673946: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:05.673950: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673954: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:05.673958: |    length/value: 3600 (0xe10)
Aug 26 18:33:05.673962: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673966: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:05.673969: |    length/value: 5 (0x5)
Aug 26 18:33:05.673973: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:33:05.673977: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673981: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:05.673984: |    length/value: 2 (0x2)
Aug 26 18:33:05.673988: |     [2 is OAKLEY_SHA1]
Aug 26 18:33:05.673992: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.673996: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:05.673999: |    length/value: 3 (0x3)
Aug 26 18:33:05.674003: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:05.674007: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:05.674011: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:05.674015: |    length/value: 5 (0x5)
Aug 26 18:33:05.674018: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:05.674022: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:33:05.674026: | emitting length of ISAKMP Proposal Payload: 632
Aug 26 18:33:05.674031: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0
Aug 26 18:33:05.674035: | emitting length of ISAKMP Security Association Payload: 644
Aug 26 18:33:05.674040: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
Aug 26 18:33:05.674047: | out_vid(): sending [FRAGMENTATION]
Aug 26 18:33:05.674052: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:33:05.674056: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:33:05.674060: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:33:05.674066: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:33:05.674070: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:05.674075: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:33:05.674080: | V_ID  40 48 b7 d5  6e bc e8 85  25 e7 de 7f  00 d6 c2 d3
Aug 26 18:33:05.674084: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:33:05.674088: | out_vid(): sending [Dead Peer Detection]
Aug 26 18:33:05.674092: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:33:05.674096: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:05.674101: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:33:05.674105: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:05.674109: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:33:05.674113: | V_ID  af ca d7 13  68 a1 f1 c9  6b 86 96 fc  77 57 01 00
Aug 26 18:33:05.674117: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:33:05.674121: | nat add vid
Aug 26 18:33:05.674125: | sending draft and RFC NATT VIDs
Aug 26 18:33:05.674128: | out_vid(): sending [RFC 3947]
Aug 26 18:33:05.674132: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:33:05.674136: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:33:05.674141: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:33:05.674145: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:33:05.674150: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:05.674154: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:33:05.674160: | V_ID  4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
Aug 26 18:33:05.674164: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:33:05.674167: | skipping VID_NATT_RFC
Aug 26 18:33:05.674172: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03]
Aug 26 18:33:05.674175: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:33:05.674179: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:33:05.674184: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:33:05.674188: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:33:05.674193: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:05.674197: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:33:05.674201: | V_ID  7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
Aug 26 18:33:05.674205: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:33:05.674209: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n]
Aug 26 18:33:05.674212: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:33:05.674216: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:33:05.674221: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:33:05.674225: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:33:05.674230: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:05.674234: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:33:05.674238: | V_ID  90 cb 80 91  3e bb 69 6e  08 63 81 b5  ec 42 7b 1f
Aug 26 18:33:05.674242: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:33:05.674245: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02]
Aug 26 18:33:05.674249: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:33:05.674253: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:05.674258: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:33:05.674262: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:05.674266: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:33:05.674270: | V_ID  cd 60 46 43  35 df 21 f8  7c fd b2 fc  68 b6 a4 48
Aug 26 18:33:05.674274: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:33:05.674278: | no IKEv1 message padding required
Aug 26 18:33:05.674282: | emitting length of ISAKMP Message: 792
Aug 26 18:33:05.674321: | sending 792 bytes for reply packet for main_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3)
Aug 26 18:33:05.674327: |   09 eb 5d d0  b4 d5 55 61  00 00 00 00  00 00 00 00
Aug 26 18:33:05.674333: |   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
Aug 26 18:33:05.674337: |   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
Aug 26 18:33:05.674341: |   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:05.674345: |   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:05.674348: |   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
Aug 26 18:33:05.674352: |   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
Aug 26 18:33:05.674356: |   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
Aug 26 18:33:05.674359: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
Aug 26 18:33:05.674363: |   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
Aug 26 18:33:05.674367: |   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:05.674370: |   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
Aug 26 18:33:05.674374: |   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:05.674378: |   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:05.674384: |   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
Aug 26 18:33:05.674388: |   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
Aug 26 18:33:05.674392: |   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
Aug 26 18:33:05.674395: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
Aug 26 18:33:05.674399: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:05.674403: |   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:05.674406: |   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:05.674410: |   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:05.674414: |   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:05.674417: |   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
Aug 26 18:33:05.674421: |   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
Aug 26 18:33:05.674425: |   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
Aug 26 18:33:05.674428: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
Aug 26 18:33:05.674432: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:05.674436: |   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:05.674439: |   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:05.674443: |   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:05.674447: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:05.674450: |   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:05.674454: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
Aug 26 18:33:05.674457: |   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:05.674461: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:05.674465: |   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:05.674468: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
Aug 26 18:33:05.674472: |   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:05.674476: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:05.674479: |   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:05.674483: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
Aug 26 18:33:05.674487: |   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
Aug 26 18:33:05.674490: |   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
Aug 26 18:33:05.674494: |   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
Aug 26 18:33:05.674498: |   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
Aug 26 18:33:05.674501: |   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
Aug 26 18:33:05.674505: |   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
Aug 26 18:33:05.674509: |   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
Aug 26 18:33:05.674512: |   7c fd b2 fc  68 b6 a4 48
Aug 26 18:33:05.674526: ERROR: "northnet-eastnet-b" #3: sendto on eth1 to 192.1.2.23:500 failed in reply packet for main_outI1. Errno 113: No route to host
Aug 26 18:33:05.674534: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:33:05.674541: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3
Aug 26 18:33:05.674546: | libevent_malloc: new ptr-libevent@0x55c66d960ba8 size 128
Aug 26 18:33:05.674557: | #3 STATE_MAIN_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29671.416999
Aug 26 18:33:05.674568: | #3 spent 3.88 milliseconds in main_outI1()
Aug 26 18:33:05.674576: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in main_outI1() at ikev1_main.c:228)
Aug 26 18:33:05.674581: | resume processing: connection "northnet-eastnet-b" (in main_outI1() at ikev1_main.c:228)
Aug 26 18:33:05.674587: | stop processing: connection "northnet-eastnet-b" (in initiate_a_connection() at initiate.c:349)
Aug 26 18:33:05.674591: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:33:05.674598: | start processing: connection "north-a-dpd" (in initiate_a_connection() at initiate.c:186)
Aug 26 18:33:05.674602: | empty esp_info, returning defaults for ENCRYPT
Aug 26 18:33:05.674613: | connection 'north-a-dpd' +POLICY_UP
Aug 26 18:33:05.674618: | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342)
Aug 26 18:33:05.674623: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:33:05.674630: | Queuing pending IPsec SA negotiating with 192.1.2.23 "north-a-dpd" IKE SA #3 "northnet-eastnet-b"
Aug 26 18:33:05.674637: | stop processing: connection "north-a-dpd" (in initiate_a_connection() at initiate.c:349)
Aug 26 18:33:05.674642: | libevent_free: release ptr-libevent@0x55c66d95d888
Aug 26 18:33:05.674647: | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x55c66d974848
Aug 26 18:33:05.674652: | in statetime_stop() and could not find #1
Aug 26 18:33:05.674657: | processing: STOP state #0 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:05.674678: | processing signal PLUTO_SIGCHLD
Aug 26 18:33:05.674687: | waitpid returned ECHILD (no child processes left)
Aug 26 18:33:05.674695: | spent 0.00834 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:33:06.135329: | timer_event_cb: processing event@0x55c66d954c08
Aug 26 18:33:06.135347: | handling event EVENT_RETRANSMIT for parent state #3
Aug 26 18:33:06.135353: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:06.135368: | IKEv1 retransmit event
Aug 26 18:33:06.135371: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61)
Aug 26 18:33:06.135375: | handling event EVENT_RETRANSMIT for 192.1.2.23 "northnet-eastnet-b" #3 keying attempt 1 of 0; retransmit 1
Aug 26 18:33:06.135379: | retransmits: current time 29671.877844; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.460845 exceeds limit? NO
Aug 26 18:33:06.135381: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d94da38
Aug 26 18:33:06.135384: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3
Aug 26 18:33:06.135387: | libevent_malloc: new ptr-libevent@0x55c66d95d888 size 128
Aug 26 18:33:06.135390: "northnet-eastnet-b" #3: STATE_MAIN_I1: retransmission; will wait 0.5 seconds for response
Aug 26 18:33:06.135394: | sending 792 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3)
Aug 26 18:33:06.135396: |   09 eb 5d d0  b4 d5 55 61  00 00 00 00  00 00 00 00
Aug 26 18:33:06.135398: |   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
Aug 26 18:33:06.135399: |   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
Aug 26 18:33:06.135401: |   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.135402: |   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:06.135404: |   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
Aug 26 18:33:06.135405: |   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
Aug 26 18:33:06.135407: |   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
Aug 26 18:33:06.135408: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
Aug 26 18:33:06.135409: |   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
Aug 26 18:33:06.135411: |   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:06.135412: |   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
Aug 26 18:33:06.135414: |   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.135415: |   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:06.135417: |   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
Aug 26 18:33:06.135418: |   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
Aug 26 18:33:06.135420: |   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
Aug 26 18:33:06.135421: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
Aug 26 18:33:06.135423: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:06.135424: |   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:06.135426: |   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:06.135427: |   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.135428: |   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:06.135433: |   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
Aug 26 18:33:06.135435: |   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
Aug 26 18:33:06.135436: |   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
Aug 26 18:33:06.135438: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
Aug 26 18:33:06.135439: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:06.135441: |   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:06.135442: |   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:06.135444: |   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.135445: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:06.135447: |   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.135448: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
Aug 26 18:33:06.135450: |   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.135451: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:06.135453: |   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.135454: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
Aug 26 18:33:06.135456: |   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.135457: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:06.135458: |   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.135460: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
Aug 26 18:33:06.135461: |   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
Aug 26 18:33:06.135463: |   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
Aug 26 18:33:06.135464: |   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
Aug 26 18:33:06.135466: |   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
Aug 26 18:33:06.135467: |   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
Aug 26 18:33:06.135469: |   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
Aug 26 18:33:06.135470: |   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
Aug 26 18:33:06.135472: |   7c fd b2 fc  68 b6 a4 48
Aug 26 18:33:06.135483: ERROR: "northnet-eastnet-b" #3: sendto on eth1 to 192.1.2.23:500 failed in EVENT_RETRANSMIT. Errno 113: No route to host
Aug 26 18:33:06.135486: | libevent_free: release ptr-libevent@0x55c66d960ba8
Aug 26 18:33:06.135488: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:33:06.135494: | #3 spent 0.187 milliseconds in timer_event_cb() EVENT_RETRANSMIT
Aug 26 18:33:06.135497: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:06.636058: | timer_event_cb: processing event@0x55c66d94da38
Aug 26 18:33:06.636119: | handling event EVENT_RETRANSMIT for parent state #3
Aug 26 18:33:06.636153: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:06.636172: | IKEv1 retransmit event
Aug 26 18:33:06.636195: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61)
Aug 26 18:33:06.636217: | handling event EVENT_RETRANSMIT for 192.1.2.23 "northnet-eastnet-b" #3 keying attempt 1 of 0; retransmit 2
Aug 26 18:33:06.636244: | retransmits: current time 29672.378696; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.961697 exceeds limit? NO
Aug 26 18:33:06.636261: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:33:06.636279: | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #3
Aug 26 18:33:06.636330: | libevent_malloc: new ptr-libevent@0x55c66d960ba8 size 128
Aug 26 18:33:06.636359: "northnet-eastnet-b" #3: STATE_MAIN_I1: retransmission; will wait 1 seconds for response
Aug 26 18:33:06.636391: | sending 792 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3)
Aug 26 18:33:06.636405: |   09 eb 5d d0  b4 d5 55 61  00 00 00 00  00 00 00 00
Aug 26 18:33:06.636416: |   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
Aug 26 18:33:06.636440: |   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
Aug 26 18:33:06.636453: |   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.636465: |   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:06.636477: |   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
Aug 26 18:33:06.636490: |   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
Aug 26 18:33:06.636501: |   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
Aug 26 18:33:06.636512: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
Aug 26 18:33:06.636524: |   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
Aug 26 18:33:06.636535: |   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:06.636545: |   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
Aug 26 18:33:06.636556: |   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.636566: |   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:06.636576: |   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
Aug 26 18:33:06.636587: |   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
Aug 26 18:33:06.636597: |   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
Aug 26 18:33:06.636608: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
Aug 26 18:33:06.636619: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:06.636630: |   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:06.636641: |   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:06.636651: |   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.636662: |   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:06.636673: |   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
Aug 26 18:33:06.636685: |   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
Aug 26 18:33:06.636697: |   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
Aug 26 18:33:06.636709: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
Aug 26 18:33:06.636721: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:06.636733: |   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:06.636745: |   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:06.636756: |   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.636768: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:06.636780: |   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.636791: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
Aug 26 18:33:06.636803: |   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.636814: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:06.636826: |   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.636838: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
Aug 26 18:33:06.636850: |   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.636862: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:06.636873: |   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:06.636885: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
Aug 26 18:33:06.636897: |   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
Aug 26 18:33:06.636909: |   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
Aug 26 18:33:06.636921: |   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
Aug 26 18:33:06.636933: |   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
Aug 26 18:33:06.636944: |   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
Aug 26 18:33:06.636956: |   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
Aug 26 18:33:06.636968: |   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
Aug 26 18:33:06.636980: |   7c fd b2 fc  68 b6 a4 48
Aug 26 18:33:06.637029: ERROR: "northnet-eastnet-b" #3: sendto on eth1 to 192.1.2.23:500 failed in EVENT_RETRANSMIT. Errno 113: No route to host
Aug 26 18:33:06.637050: | libevent_free: release ptr-libevent@0x55c66d95d888
Aug 26 18:33:06.637065: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d94da38
Aug 26 18:33:06.637102: | #3 spent 1.02 milliseconds in timer_event_cb() EVENT_RETRANSMIT
Aug 26 18:33:06.637126: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:07.637311: | timer_event_cb: processing event@0x55c66d954c08
Aug 26 18:33:07.637325: | handling event EVENT_RETRANSMIT for parent state #3
Aug 26 18:33:07.637331: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:07.637334: | IKEv1 retransmit event
Aug 26 18:33:07.637338: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61)
Aug 26 18:33:07.637342: | handling event EVENT_RETRANSMIT for 192.1.2.23 "northnet-eastnet-b" #3 keying attempt 1 of 0; retransmit 3
Aug 26 18:33:07.637347: | retransmits: current time 29673.379812; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.962813 exceeds limit? NO
Aug 26 18:33:07.637350: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d94da38
Aug 26 18:33:07.637353: | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #3
Aug 26 18:33:07.637357: | libevent_malloc: new ptr-libevent@0x55c66d95d888 size 128
Aug 26 18:33:07.637361: "northnet-eastnet-b" #3: STATE_MAIN_I1: retransmission; will wait 2 seconds for response
Aug 26 18:33:07.637366: | sending 792 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3)
Aug 26 18:33:07.637369: |   09 eb 5d d0  b4 d5 55 61  00 00 00 00  00 00 00 00
Aug 26 18:33:07.637371: |   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
Aug 26 18:33:07.637373: |   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
Aug 26 18:33:07.637374: |   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:07.637376: |   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:07.637378: |   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
Aug 26 18:33:07.637380: |   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
Aug 26 18:33:07.637382: |   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
Aug 26 18:33:07.637384: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
Aug 26 18:33:07.637385: |   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
Aug 26 18:33:07.637387: |   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:07.637389: |   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
Aug 26 18:33:07.637391: |   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:07.637393: |   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:07.637395: |   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
Aug 26 18:33:07.637396: |   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
Aug 26 18:33:07.637398: |   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
Aug 26 18:33:07.637400: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
Aug 26 18:33:07.637402: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:07.637404: |   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:07.637406: |   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:07.637407: |   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:07.637409: |   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:07.637411: |   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
Aug 26 18:33:07.637413: |   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
Aug 26 18:33:07.637415: |   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
Aug 26 18:33:07.637416: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
Aug 26 18:33:07.637418: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:07.637420: |   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:07.637422: |   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:07.637424: |   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:07.637426: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:07.637427: |   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:07.637432: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
Aug 26 18:33:07.637434: |   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:07.637436: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:07.637438: |   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:07.637439: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
Aug 26 18:33:07.637441: |   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:07.637443: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:07.637445: |   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:07.637447: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
Aug 26 18:33:07.637449: |   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
Aug 26 18:33:07.637450: |   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
Aug 26 18:33:07.637452: |   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
Aug 26 18:33:07.637454: |   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
Aug 26 18:33:07.637456: |   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
Aug 26 18:33:07.637458: |   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
Aug 26 18:33:07.637460: |   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
Aug 26 18:33:07.637461: |   7c fd b2 fc  68 b6 a4 48
Aug 26 18:33:07.637475: ERROR: "northnet-eastnet-b" #3: sendto on eth1 to 192.1.2.23:500 failed in EVENT_RETRANSMIT. Errno 113: No route to host
Aug 26 18:33:07.637478: | libevent_free: release ptr-libevent@0x55c66d960ba8
Aug 26 18:33:07.637481: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:33:07.637488: | #3 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT
Aug 26 18:33:07.637494: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:09.639351: | timer_event_cb: processing event@0x55c66d94da38
Aug 26 18:33:09.639372: | handling event EVENT_RETRANSMIT for parent state #3
Aug 26 18:33:09.639383: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:09.639387: | IKEv1 retransmit event
Aug 26 18:33:09.639393: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61)
Aug 26 18:33:09.639398: | handling event EVENT_RETRANSMIT for 192.1.2.23 "northnet-eastnet-b" #3 keying attempt 1 of 0; retransmit 4
Aug 26 18:33:09.639406: | retransmits: current time 29675.381869; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.96487 exceeds limit? NO
Aug 26 18:33:09.639410: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:33:09.639415: | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #3
Aug 26 18:33:09.639419: | libevent_malloc: new ptr-libevent@0x55c66d960ba8 size 128
Aug 26 18:33:09.639425: "northnet-eastnet-b" #3: STATE_MAIN_I1: retransmission; will wait 4 seconds for response
Aug 26 18:33:09.639432: | sending 792 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3)
Aug 26 18:33:09.639436: |   09 eb 5d d0  b4 d5 55 61  00 00 00 00  00 00 00 00
Aug 26 18:33:09.639438: |   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
Aug 26 18:33:09.639441: |   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
Aug 26 18:33:09.639444: |   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:09.639447: |   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:09.639449: |   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
Aug 26 18:33:09.639452: |   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
Aug 26 18:33:09.639455: |   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
Aug 26 18:33:09.639457: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
Aug 26 18:33:09.639460: |   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
Aug 26 18:33:09.639463: |   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:09.639465: |   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
Aug 26 18:33:09.639473: |   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:09.639476: |   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:09.639479: |   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
Aug 26 18:33:09.639482: |   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
Aug 26 18:33:09.639484: |   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
Aug 26 18:33:09.639487: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
Aug 26 18:33:09.639490: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:09.639492: |   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:09.639495: |   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:09.639498: |   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:09.639500: |   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:09.639503: |   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
Aug 26 18:33:09.639506: |   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
Aug 26 18:33:09.639509: |   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
Aug 26 18:33:09.639511: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
Aug 26 18:33:09.639514: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:09.639517: |   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:09.639519: |   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:09.639522: |   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:09.639525: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:09.639527: |   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:09.639530: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
Aug 26 18:33:09.639533: |   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:09.639535: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:09.639538: |   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:09.639541: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
Aug 26 18:33:09.639543: |   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:09.639546: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:09.639549: |   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:09.639551: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
Aug 26 18:33:09.639554: |   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
Aug 26 18:33:09.639557: |   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
Aug 26 18:33:09.639559: |   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
Aug 26 18:33:09.639562: |   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
Aug 26 18:33:09.639565: |   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
Aug 26 18:33:09.639567: |   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
Aug 26 18:33:09.639570: |   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
Aug 26 18:33:09.639573: |   7c fd b2 fc  68 b6 a4 48
Aug 26 18:33:09.639591: ERROR: "northnet-eastnet-b" #3: sendto on eth1 to 192.1.2.23:500 failed in EVENT_RETRANSMIT. Errno 113: No route to host
Aug 26 18:33:09.639596: | libevent_free: release ptr-libevent@0x55c66d95d888
Aug 26 18:33:09.639600: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d94da38
Aug 26 18:33:09.639609: | #3 spent 0.259 milliseconds in timer_event_cb() EVENT_RETRANSMIT
Aug 26 18:33:09.639614: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:12.253419: | processing global timer EVENT_SHUNT_SCAN
Aug 26 18:33:12.253484: | expiring aged bare shunts from shunt table
Aug 26 18:33:12.253516: | spent 0.0267 milliseconds in global timer EVENT_SHUNT_SCAN
Aug 26 18:33:12.599899: | processing global timer EVENT_NAT_T_KEEPALIVE
Aug 26 18:33:12.599922: | FOR_EACH_STATE_... in nat_traversal_ka_event (for_each_state)
Aug 26 18:33:12.599931: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in for_each_state() at state.c:1575)
Aug 26 18:33:12.599935: | not behind NAT: no NAT-T KEEP-ALIVE required for conn northnet-eastnet-b
Aug 26 18:33:12.599945: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in for_each_state() at state.c:1577)
Aug 26 18:33:12.599952: | spent 0.0295 milliseconds in global timer EVENT_NAT_T_KEEPALIVE
Aug 26 18:33:12.599965: | spent 0.00279 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:33:12.599979: | NAT-T keep-alive (bogus ?) should not reach this point. Ignored. Sender: 192.1.2.23:500
Aug 26 18:33:12.599985: | spent 0.0139 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:33:13.641352: | timer_event_cb: processing event@0x55c66d954c08
Aug 26 18:33:13.641379: | handling event EVENT_RETRANSMIT for parent state #3
Aug 26 18:33:13.641386: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:13.641388: | IKEv1 retransmit event
Aug 26 18:33:13.641391: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61)
Aug 26 18:33:13.641395: | handling event EVENT_RETRANSMIT for 192.1.2.23 "northnet-eastnet-b" #3 keying attempt 1 of 0; retransmit 5
Aug 26 18:33:13.641399: | retransmits: current time 29679.383864; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 7.966865 exceeds limit? NO
Aug 26 18:33:13.641402: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d94da38
Aug 26 18:33:13.641404: | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #3
Aug 26 18:33:13.641407: | libevent_malloc: new ptr-libevent@0x55c66d95d888 size 128
Aug 26 18:33:13.641410: "northnet-eastnet-b" #3: STATE_MAIN_I1: retransmission; will wait 8 seconds for response
Aug 26 18:33:13.641415: | sending 792 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3)
Aug 26 18:33:13.641416: |   09 eb 5d d0  b4 d5 55 61  00 00 00 00  00 00 00 00
Aug 26 18:33:13.641418: |   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
Aug 26 18:33:13.641419: |   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
Aug 26 18:33:13.641421: |   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:13.641422: |   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:13.641424: |   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
Aug 26 18:33:13.641425: |   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
Aug 26 18:33:13.641427: |   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
Aug 26 18:33:13.641428: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
Aug 26 18:33:13.641430: |   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
Aug 26 18:33:13.641431: |   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:13.641433: |   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
Aug 26 18:33:13.641434: |   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:13.641435: |   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:13.641437: |   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
Aug 26 18:33:13.641438: |   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
Aug 26 18:33:13.641440: |   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
Aug 26 18:33:13.641441: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
Aug 26 18:33:13.641443: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:13.641444: |   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:13.641446: |   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:13.641447: |   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:13.641449: |   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:13.641450: |   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
Aug 26 18:33:13.641452: |   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
Aug 26 18:33:13.641453: |   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
Aug 26 18:33:13.641454: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
Aug 26 18:33:13.641456: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:13.641461: |   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:13.641463: |   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:13.641465: |   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:13.641466: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:13.641467: |   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:13.641469: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
Aug 26 18:33:13.641470: |   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:13.641472: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:13.641473: |   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:13.641475: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
Aug 26 18:33:13.641476: |   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:13.641478: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:13.641479: |   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:13.641481: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
Aug 26 18:33:13.641482: |   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
Aug 26 18:33:13.641484: |   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
Aug 26 18:33:13.641485: |   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
Aug 26 18:33:13.641487: |   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
Aug 26 18:33:13.641488: |   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
Aug 26 18:33:13.641489: |   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
Aug 26 18:33:13.641491: |   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
Aug 26 18:33:13.641492: |   7c fd b2 fc  68 b6 a4 48
Aug 26 18:33:13.641504: ERROR: "northnet-eastnet-b" #3: sendto on eth1 to 192.1.2.23:500 failed in EVENT_RETRANSMIT. Errno 113: No route to host
Aug 26 18:33:13.641507: | libevent_free: release ptr-libevent@0x55c66d960ba8
Aug 26 18:33:13.641509: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:33:13.641515: | #3 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT
Aug 26 18:33:13.641518: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:21.649346: | timer_event_cb: processing event@0x55c66d94da38
Aug 26 18:33:21.649361: | handling event EVENT_RETRANSMIT for parent state #3
Aug 26 18:33:21.649367: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:21.649370: | IKEv1 retransmit event
Aug 26 18:33:21.649373: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61)
Aug 26 18:33:21.649376: | handling event EVENT_RETRANSMIT for 192.1.2.23 "northnet-eastnet-b" #3 keying attempt 1 of 0; retransmit 6
Aug 26 18:33:21.649380: | retransmits: current time 29687.391845; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 15.974846 exceeds limit? NO
Aug 26 18:33:21.649383: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:33:21.649385: | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #3
Aug 26 18:33:21.649388: | libevent_malloc: new ptr-libevent@0x55c66d960ba8 size 128
Aug 26 18:33:21.649391: "northnet-eastnet-b" #3: STATE_MAIN_I1: retransmission; will wait 16 seconds for response
Aug 26 18:33:21.649395: | sending 792 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3)
Aug 26 18:33:21.649397: |   09 eb 5d d0  b4 d5 55 61  00 00 00 00  00 00 00 00
Aug 26 18:33:21.649399: |   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
Aug 26 18:33:21.649400: |   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
Aug 26 18:33:21.649402: |   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:21.649403: |   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:21.649405: |   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
Aug 26 18:33:21.649406: |   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
Aug 26 18:33:21.649411: |   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
Aug 26 18:33:21.649412: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
Aug 26 18:33:21.649414: |   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
Aug 26 18:33:21.649415: |   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:21.649417: |   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
Aug 26 18:33:21.649418: |   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:21.649420: |   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:21.649421: |   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
Aug 26 18:33:21.649423: |   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
Aug 26 18:33:21.649424: |   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
Aug 26 18:33:21.649426: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
Aug 26 18:33:21.649427: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:21.649429: |   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:21.649430: |   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:21.649432: |   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:21.649433: |   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:21.649435: |   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
Aug 26 18:33:21.649436: |   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
Aug 26 18:33:21.649438: |   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
Aug 26 18:33:21.649439: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
Aug 26 18:33:21.649441: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:21.649442: |   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:21.649444: |   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:21.649445: |   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:21.649447: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:21.649448: |   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:21.649450: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
Aug 26 18:33:21.649451: |   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:21.649453: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:21.649454: |   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:21.649456: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
Aug 26 18:33:21.649457: |   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:21.649459: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:21.649460: |   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:21.649462: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
Aug 26 18:33:21.649463: |   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
Aug 26 18:33:21.649465: |   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
Aug 26 18:33:21.649466: |   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
Aug 26 18:33:21.649468: |   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
Aug 26 18:33:21.649469: |   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
Aug 26 18:33:21.649471: |   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
Aug 26 18:33:21.649472: |   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
Aug 26 18:33:21.649474: |   7c fd b2 fc  68 b6 a4 48
Aug 26 18:33:21.649485: ERROR: "northnet-eastnet-b" #3: sendto on eth1 to 192.1.2.23:500 failed in EVENT_RETRANSMIT. Errno 113: No route to host
Aug 26 18:33:21.649488: | libevent_free: release ptr-libevent@0x55c66d95d888
Aug 26 18:33:21.649490: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d94da38
Aug 26 18:33:21.649496: | #3 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT
Aug 26 18:33:21.649499: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:32.263208: | processing global timer EVENT_SHUNT_SCAN
Aug 26 18:33:32.263242: | expiring aged bare shunts from shunt table
Aug 26 18:33:32.263252: | spent 0.00807 milliseconds in global timer EVENT_SHUNT_SCAN
Aug 26 18:33:32.601758: | spent 0.0111 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:33:32.601830: | NAT-T keep-alive (bogus ?) should not reach this point. Ignored. Sender: 192.1.2.23:500
Aug 26 18:33:32.601847: | spent 0.0392 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:33:35.232714: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:33:35.233158: | FOR_EACH_CONNECTION_... in show_connections_status
Aug 26 18:33:35.233163: | FOR_EACH_CONNECTION_... in show_connections_status
Aug 26 18:33:35.233284: | FOR_EACH_STATE_... in show_states_status (sort_states)
Aug 26 18:33:35.233301: | FOR_EACH_STATE_... in sort_states
Aug 26 18:33:35.233321: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:33:35.233327: | spent 0.61 milliseconds in whack
Aug 26 18:33:35.285667: |  kernel_process_msg_cb process netlink message
Aug 26 18:33:35.285685: | netlink_get: XFRM_MSG_UPDPOLICY message
Aug 26 18:33:35.285691: | spent 0.00781 milliseconds in kernel message
Aug 26 18:33:36.461761: |  kernel_process_msg_cb process netlink message
Aug 26 18:33:36.461792: | netlink_get: XFRM_MSG_ACQUIRE message
Aug 26 18:33:36.461794: | xfrm netlink msg len 376
Aug 26 18:33:36.461796: | xfrm acquire rtattribute type 5
Aug 26 18:33:36.461797: | xfrm acquire rtattribute type 16
Aug 26 18:33:36.461807: | add bare shunt 0x55c66d949fb8 192.0.3.254/32:8 --1--> 192.0.22.254/32:0 => %hold 0    %acquire-netlink
Aug 26 18:33:36.461812: initiate on demand from 192.0.3.254:8 to 192.0.22.254:0 proto=1 because: acquire
Aug 26 18:33:36.461815: | find_connection: looking for policy for connection: 192.0.3.254:1/8 -> 192.0.22.254:1/0
Aug 26 18:33:36.461817: | FOR_EACH_CONNECTION_... in find_connection_for_clients
Aug 26 18:33:36.461821: | find_connection: conn "north-a-dpd" has compatible peers: 192.0.3.0/24 -> 192.0.22.0/24 [pri: 25214986]
Aug 26 18:33:36.461823: | find_connection: first OK "north-a-dpd" [pri:25214986]{0x55c66d948e48} (child none)
Aug 26 18:33:36.461825: | find_connection: concluding with "north-a-dpd" [pri:25214986]{0x55c66d948e48} kind=CK_PERMANENT
Aug 26 18:33:36.461828: | assign hold, routing was prospective erouted, needs to be erouted HOLD
Aug 26 18:33:36.461829: | assign_holdpass() need broad(er) shunt
Aug 26 18:33:36.461831: | priority calculation of connection "north-a-dpd" is 0xfe7e7
Aug 26 18:33:36.461835: | eroute_connection replace %trap with broad %pass or %hold eroute 192.0.3.0/24:0 --0-> 192.0.22.0/24:0 => %hold>%hold (raw_eroute)
Aug 26 18:33:36.461840: | netlink_raw_eroute: SPI_HOLD implemented as no-op
Aug 26 18:33:36.461842: | raw_eroute result=success
Aug 26 18:33:36.461843: | assign_holdpass() eroute_connection() done
Aug 26 18:33:36.461845: | fiddle_bare_shunt called
Aug 26 18:33:36.461847: | fiddle_bare_shunt with transport_proto 1
Aug 26 18:33:36.461848: | removing specific host-to-host bare shunt
Aug 26 18:33:36.461851: | delete narrow %hold eroute 192.0.3.254/32:8 --1-> 192.0.22.254/32:0 => %hold (raw_eroute)
Aug 26 18:33:36.461853: | netlink_raw_eroute: SPI_PASS
Aug 26 18:33:36.461868: | raw_eroute result=success
Aug 26 18:33:36.461870: | raw_eroute with op='delete' for transport_proto='1' kernel shunt succeeded, bare shunt lookup succeeded
Aug 26 18:33:36.461874: | delete bare shunt 0x55c66d949fb8 192.0.3.254/32:8 --1--> 192.0.22.254/32:0 => %hold 0    %acquire-netlink
Aug 26 18:33:36.461876: assign_holdpass() delete_bare_shunt() failed
Aug 26 18:33:36.461877: initiate_ondemand_body() failed to install negotiation_shunt,
Aug 26 18:33:36.461879: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:33:36.461883: | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "north-a-dpd"
Aug 26 18:33:36.461886: | initiate on demand using RSASIG from 192.0.3.254 to 192.0.22.254
Aug 26 18:33:36.461891: | spent 0.101 milliseconds in kernel message
Aug 26 18:33:37.650316: | timer_event_cb: processing event@0x55c66d954c08
Aug 26 18:33:37.650335: | handling event EVENT_RETRANSMIT for parent state #3
Aug 26 18:33:37.650345: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:37.650349: | IKEv1 retransmit event
Aug 26 18:33:37.650352: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61)
Aug 26 18:33:37.650356: | handling event EVENT_RETRANSMIT for 192.1.2.23 "northnet-eastnet-b" #3 keying attempt 1 of 0; retransmit 7
Aug 26 18:33:37.650361: | retransmits: current time 29703.392825; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 31.975826 exceeds limit? NO
Aug 26 18:33:37.650364: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d94da38
Aug 26 18:33:37.650367: | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #3
Aug 26 18:33:37.650370: | libevent_malloc: new ptr-libevent@0x55c66d95d888 size 128
Aug 26 18:33:37.650374: "northnet-eastnet-b" #3: STATE_MAIN_I1: retransmission; will wait 32 seconds for response
Aug 26 18:33:37.650379: | sending 792 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3)
Aug 26 18:33:37.650381: |   09 eb 5d d0  b4 d5 55 61  00 00 00 00  00 00 00 00
Aug 26 18:33:37.650383: |   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
Aug 26 18:33:37.650384: |   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
Aug 26 18:33:37.650386: |   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:37.650388: |   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:37.650390: |   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
Aug 26 18:33:37.650391: |   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
Aug 26 18:33:37.650393: |   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
Aug 26 18:33:37.650395: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
Aug 26 18:33:37.650396: |   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
Aug 26 18:33:37.650398: |   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:37.650400: |   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
Aug 26 18:33:37.650402: |   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:37.650403: |   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:37.650405: |   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
Aug 26 18:33:37.650407: |   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
Aug 26 18:33:37.650408: |   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
Aug 26 18:33:37.650410: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
Aug 26 18:33:37.650412: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:37.650414: |   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:37.650415: |   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:37.650417: |   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:37.650419: |   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:37.650420: |   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
Aug 26 18:33:37.650422: |   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
Aug 26 18:33:37.650424: |   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
Aug 26 18:33:37.650426: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
Aug 26 18:33:37.650427: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:37.650429: |   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:37.650431: |   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:37.650432: |   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:37.650434: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:37.650436: |   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:37.650438: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
Aug 26 18:33:37.650439: |   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:37.650441: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:37.650443: |   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:37.650446: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
Aug 26 18:33:37.650448: |   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:37.650449: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:37.650451: |   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:37.650453: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
Aug 26 18:33:37.650454: |   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
Aug 26 18:33:37.650456: |   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
Aug 26 18:33:37.650458: |   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
Aug 26 18:33:37.650460: |   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
Aug 26 18:33:37.650461: |   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
Aug 26 18:33:37.650463: |   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
Aug 26 18:33:37.650465: |   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
Aug 26 18:33:37.650466: |   7c fd b2 fc  68 b6 a4 48
Aug 26 18:33:37.650745: | libevent_free: release ptr-libevent@0x55c66d960ba8
Aug 26 18:33:37.650750: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:33:37.650756: | #3 spent 0.442 milliseconds in timer_event_cb() EVENT_RETRANSMIT
Aug 26 18:33:37.650760: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:37.651471: | spent 0.00234 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:33:37.651490: | *received 144 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:33:37.651494: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.651498: |   01 10 02 00  00 00 00 00  00 00 00 90  0d 00 00 38
Aug 26 18:33:37.651500: |   00 00 00 01  00 00 00 01  00 00 00 2c  00 01 00 01
Aug 26 18:33:37.651503: |   00 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:37.651506: |   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:37.651509: |   80 0e 01 00  0d 00 00 14  40 48 b7 d5  6e bc e8 85
Aug 26 18:33:37.651512: |   25 e7 de 7f  00 d6 c2 d3  0d 00 00 14  af ca d7 13
Aug 26 18:33:37.651515: |   68 a1 f1 c9  6b 86 96 fc  77 57 01 00  00 00 00 14
Aug 26 18:33:37.651518: |   4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
Aug 26 18:33:37.651522: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:33:37.651524: | **parse ISAKMP Message:
Aug 26 18:33:37.651526: |    initiator cookie:
Aug 26 18:33:37.651528: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.651530: |    responder cookie:
Aug 26 18:33:37.651532: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.651534: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:33:37.651536: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:37.651538: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:33:37.651540: |    flags: none (0x0)
Aug 26 18:33:37.651542: |    Message ID: 0 (0x0)
Aug 26 18:33:37.651544: |    length: 144 (0x90)
Aug 26 18:33:37.651546: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:33:37.651548: | State DB: IKEv1 state not found (find_state_ikev1)
Aug 26 18:33:37.651551: | State DB: found IKEv1 state #3 in MAIN_I1 (find_state_ikev1_init)
Aug 26 18:33:37.651554: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459)
Aug 26 18:33:37.651557: | #3 is idle
Aug 26 18:33:37.651558: | #3 idle
Aug 26 18:33:37.651561: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:33:37.651564: | ***parse ISAKMP Security Association Payload:
Aug 26 18:33:37.651566: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:33:37.651568: |    length: 56 (0x38)
Aug 26 18:33:37.651569: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:37.651572: | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Aug 26 18:33:37.651574: | ***parse ISAKMP Vendor ID Payload:
Aug 26 18:33:37.651575: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:33:37.651577: |    length: 20 (0x14)
Aug 26 18:33:37.651581: | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Aug 26 18:33:37.651583: | ***parse ISAKMP Vendor ID Payload:
Aug 26 18:33:37.651585: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:33:37.651587: |    length: 20 (0x14)
Aug 26 18:33:37.651589: | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Aug 26 18:33:37.651590: | ***parse ISAKMP Vendor ID Payload:
Aug 26 18:33:37.651592: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.651594: |    length: 20 (0x14)
Aug 26 18:33:37.651596: | message 'main_inR1_outI2' HASH payload not checked early
Aug 26 18:33:37.651600: | received Vendor ID payload [FRAGMENTATION]
Aug 26 18:33:37.651602: | received Vendor ID payload [Dead Peer Detection]
Aug 26 18:33:37.651604: |  quirks.qnat_traversal_vid set to=117 [RFC 3947]
Aug 26 18:33:37.651606: | received Vendor ID payload [RFC 3947]
Aug 26 18:33:37.651609: | ****parse IPsec DOI SIT:
Aug 26 18:33:37.651612: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:33:37.651614: | ****parse ISAKMP Proposal Payload:
Aug 26 18:33:37.651615: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.651617: |    length: 44 (0x2c)
Aug 26 18:33:37.651619: |    proposal number: 0 (0x0)
Aug 26 18:33:37.651621: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:33:37.651623: |    SPI size: 0 (0x0)
Aug 26 18:33:37.651625: |    number of transforms: 1 (0x1)
Aug 26 18:33:37.651627: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:37.651629: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.651630: |    length: 36 (0x24)
Aug 26 18:33:37.651632: |    ISAKMP transform number: 0 (0x0)
Aug 26 18:33:37.651634: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:37.651636: | ******parse ISAKMP Oakley attribute:
Aug 26 18:33:37.651638: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:37.651640: |    length/value: 1 (0x1)
Aug 26 18:33:37.651642: |    [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:37.651644: | ******parse ISAKMP Oakley attribute:
Aug 26 18:33:37.651646: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:37.651648: |    length/value: 3600 (0xe10)
Aug 26 18:33:37.651649: | ******parse ISAKMP Oakley attribute:
Aug 26 18:33:37.651651: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:37.651653: |    length/value: 7 (0x7)
Aug 26 18:33:37.651655: |    [7 is OAKLEY_AES_CBC]
Aug 26 18:33:37.651657: | ******parse ISAKMP Oakley attribute:
Aug 26 18:33:37.651659: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:37.651661: |    length/value: 4 (0x4)
Aug 26 18:33:37.651663: |    [4 is OAKLEY_SHA2_256]
Aug 26 18:33:37.651665: | ******parse ISAKMP Oakley attribute:
Aug 26 18:33:37.651667: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:37.651668: |    length/value: 3 (0x3)
Aug 26 18:33:37.651670: |    [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:37.651672: | ******parse ISAKMP Oakley attribute:
Aug 26 18:33:37.651674: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:37.651675: |    length/value: 14 (0xe)
Aug 26 18:33:37.651677: |    [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:37.651679: | ******parse ISAKMP Oakley attribute:
Aug 26 18:33:37.651681: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:37.651683: |    length/value: 256 (0x100)
Aug 26 18:33:37.651685: | OAKLEY proposal verified unconditionally; no alg_info to check against
Aug 26 18:33:37.651687: | Oakley Transform 0 accepted
Aug 26 18:33:37.651689: | sender checking NAT-T: enabled; VID 117
Aug 26 18:33:37.651691: | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC
Aug 26 18:33:37.651693: | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
Aug 26 18:33:37.651697: | adding outI2 KE work-order 5 for state #3
Aug 26 18:33:37.651699: | state #3 requesting EVENT_RETRANSMIT to be deleted
Aug 26 18:33:37.651701: | #3 STATE_MAIN_I1: retransmits: cleared
Aug 26 18:33:37.651704: | libevent_free: release ptr-libevent@0x55c66d95d888
Aug 26 18:33:37.651706: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d94da38
Aug 26 18:33:37.651710: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55c66d94da38
Aug 26 18:33:37.651713: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3
Aug 26 18:33:37.651715: | libevent_malloc: new ptr-libevent@0x55c66d960ba8 size 128
Aug 26 18:33:37.651723: | complete v1 state transition with STF_SUSPEND
Aug 26 18:33:37.651729: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648)
Aug 26 18:33:37.651730: | crypto helper 1 resuming
Aug 26 18:33:37.651732: | suspending state #3 and saving MD
Aug 26 18:33:37.651741: | crypto helper 1 starting work-order 5 for state #3
Aug 26 18:33:37.651745: | #3 is busy; has a suspended MD
Aug 26 18:33:37.651752: | crypto helper 1 doing build KE and nonce (outI2 KE); request ID 5
Aug 26 18:33:37.651759: | #3 spent 0.143 milliseconds in process_packet_tail()
Aug 26 18:33:37.651765: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:33:37.651771: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_md() at demux.c:382)
Aug 26 18:33:37.651775: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:33:37.651780: | spent 0.293 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:33:37.652412: | crypto helper 1 finished build KE and nonce (outI2 KE); request ID 5 time elapsed 0.00066 seconds
Aug 26 18:33:37.652422: | (#3) spent 0.659 milliseconds in crypto helper computing work-order 5: outI2 KE (pcr)
Aug 26 18:33:37.652425: | crypto helper 1 sending results from work-order 5 for state #3 to event queue
Aug 26 18:33:37.652427: | scheduling resume sending helper answer for #3
Aug 26 18:33:37.652430: | libevent_malloc: new ptr-libevent@0x7fbd0c002888 size 128
Aug 26 18:33:37.652436: | crypto helper 1 waiting (nothing to do)
Aug 26 18:33:37.652443: | processing resume sending helper answer for #3
Aug 26 18:33:37.652450: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:797)
Aug 26 18:33:37.652454: | crypto helper 1 replies to request ID 5
Aug 26 18:33:37.652455: | calling continuation function 0x55c66cb6db50
Aug 26 18:33:37.652458: | main_inR1_outI2_continue for #3: calculated ke+nonce, sending I2
Aug 26 18:33:37.652462: | **emit ISAKMP Message:
Aug 26 18:33:37.652464: |    initiator cookie:
Aug 26 18:33:37.652466: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.652468: |    responder cookie:
Aug 26 18:33:37.652469: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.652471: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.652473: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:37.652475: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:33:37.652477: |    flags: none (0x0)
Aug 26 18:33:37.652479: |    Message ID: 0 (0x0)
Aug 26 18:33:37.652481: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:37.652484: | ***emit ISAKMP Key Exchange Payload:
Aug 26 18:33:37.652486: |    next payload type: ISAKMP_NEXT_NONCE (0xa)
Aug 26 18:33:37.652488: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE
Aug 26 18:33:37.652490: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE)
Aug 26 18:33:37.652493: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.652495: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
Aug 26 18:33:37.652497: | keyex value  1e 40 df 6d  aa 21 c1 c5  0a 61 6d 2c  0a 5f 5a 42
Aug 26 18:33:37.652499: | keyex value  75 59 2c 9f  ee 20 ef 45  ee d4 c9 fc  df a9 c6 48
Aug 26 18:33:37.652501: | keyex value  6f 53 00 d5  23 47 e8 16  09 2e e7 e9  f4 05 ed ec
Aug 26 18:33:37.652502: | keyex value  bd e9 c6 0c  94 2a 10 d1  50 97 fb 45  4e 1c 6e ff
Aug 26 18:33:37.652504: | keyex value  e4 5c d1 b3  87 50 94 b1  c1 38 ba 7e  32 a9 95 d9
Aug 26 18:33:37.652508: | keyex value  bd 55 9c da  73 b4 09 1f  a4 62 54 c1  1e 08 df e8
Aug 26 18:33:37.652510: | keyex value  b3 ce 51 07  bf a6 57 35  c6 ec 7f 08  12 10 7d 45
Aug 26 18:33:37.652512: | keyex value  18 a5 ca b8  69 be af 0b  68 44 27 94  62 19 7c 28
Aug 26 18:33:37.652513: | keyex value  29 a4 3f 74  64 83 f0 59  1f 09 16 c6  3e 4b 72 e6
Aug 26 18:33:37.652515: | keyex value  e7 d8 a3 56  9e 7e 69 e1  0a 19 a9 ab  11 d4 39 19
Aug 26 18:33:37.652517: | keyex value  cb 36 39 b2  56 f6 e3 91  97 95 d3 35  13 96 70 7f
Aug 26 18:33:37.652519: | keyex value  9e 08 44 53  9f 7c 3b 3b  cb 99 80 35  49 8e 4d 90
Aug 26 18:33:37.652520: | keyex value  54 a9 48 2b  0b 47 95 44  7b a5 d4 6d  a5 81 28 31
Aug 26 18:33:37.652522: | keyex value  16 ac 5a 00  00 c1 7f 82  44 0c 49 39  b5 86 62 93
Aug 26 18:33:37.652524: | keyex value  0c 40 dd 55  34 f1 7b 10  07 af e5 f8  26 47 bd 53
Aug 26 18:33:37.652526: | keyex value  08 5b 8b b0  ce e2 f7 f9  ea 79 0f 65  c5 02 ba 22
Aug 26 18:33:37.652528: | emitting length of ISAKMP Key Exchange Payload: 260
Aug 26 18:33:37.652530: | ***emit ISAKMP Nonce Payload:
Aug 26 18:33:37.652532: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.652534: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE)
Aug 26 18:33:37.652536: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.652538: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload
Aug 26 18:33:37.652540: | Ni  4b ad 06 c4  bf 5d 16 5d  a2 b1 95 ed  41 19 b4 0d
Aug 26 18:33:37.652542: | Ni  64 e7 ca 38  fb ef 9a 5a  10 0b 82 f2  e1 3c 12 91
Aug 26 18:33:37.652544: | emitting length of ISAKMP Nonce Payload: 36
Aug 26 18:33:37.652545: | NAT-T checking st_nat_traversal
Aug 26 18:33:37.652547: | NAT-T found (implies NAT_T_WITH_NATD)
Aug 26 18:33:37.652549: | sending NAT-D payloads
Aug 26 18:33:37.652558: | natd_hash: hasher=0x55c66cc42ca0(32)
Aug 26 18:33:37.652561: | natd_hash: icookie=  09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.652563: | natd_hash: rcookie=  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.652565: | natd_hash: ip=  c0 01 02 17
Aug 26 18:33:37.652568: | natd_hash: port=500
Aug 26 18:33:37.652571: | natd_hash: hash=  c6 bd c2 70  ba b7 51 49  af 0d 55 6a  13 c6 68 56
Aug 26 18:33:37.652574: | natd_hash: hash=  65 69 4b ea  f4 b9 f5 9e  c7 e0 b8 fc  7d de 4a 69
Aug 26 18:33:37.652578: | ***emit ISAKMP NAT-D Payload:
Aug 26 18:33:37.652581: |    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
Aug 26 18:33:37.652585: | next payload chain: ignoring supplied 'ISAKMP NAT-D Payload'.'next payload type' value 20:ISAKMP_NEXT_NATD_RFC
Aug 26 18:33:37.652589: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC)
Aug 26 18:33:37.652592: | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.652596: | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload
Aug 26 18:33:37.652599: | NAT-D  c6 bd c2 70  ba b7 51 49  af 0d 55 6a  13 c6 68 56
Aug 26 18:33:37.652602: | NAT-D  65 69 4b ea  f4 b9 f5 9e  c7 e0 b8 fc  7d de 4a 69
Aug 26 18:33:37.652606: | emitting length of ISAKMP NAT-D Payload: 36
Aug 26 18:33:37.652614: | natd_hash: hasher=0x55c66cc42ca0(32)
Aug 26 18:33:37.652618: | natd_hash: icookie=  09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.652621: | natd_hash: rcookie=  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.652624: | natd_hash: ip=  c0 01 03 21
Aug 26 18:33:37.652627: | natd_hash: port=500
Aug 26 18:33:37.652630: | natd_hash: hash=  6f 8d 63 6a  d4 19 20 d8  5f 86 45 16  14 68 51 73
Aug 26 18:33:37.652633: | natd_hash: hash=  9e 95 60 2c  4f e8 46 93  aa 77 0f 1c  2c da bd f8
Aug 26 18:33:37.652636: | ***emit ISAKMP NAT-D Payload:
Aug 26 18:33:37.652639: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.652643: | next payload chain: setting previous 'ISAKMP NAT-D Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC)
Aug 26 18:33:37.652649: | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.652652: | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload
Aug 26 18:33:37.652656: | NAT-D  6f 8d 63 6a  d4 19 20 d8  5f 86 45 16  14 68 51 73
Aug 26 18:33:37.652659: | NAT-D  9e 95 60 2c  4f e8 46 93  aa 77 0f 1c  2c da bd f8
Aug 26 18:33:37.652662: | emitting length of ISAKMP NAT-D Payload: 36
Aug 26 18:33:37.652665: | no IKEv1 message padding required
Aug 26 18:33:37.652668: | emitting length of ISAKMP Message: 396
Aug 26 18:33:37.652671: | State DB: re-hashing IKEv1 state #3 IKE SPIi and SPI[ir]
Aug 26 18:33:37.652675: | complete v1 state transition with STF_OK
Aug 26 18:33:37.652681: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:33:37.652684: | #3 is idle
Aug 26 18:33:37.652687: | doing_xauth:no, t_xauth_client_done:no
Aug 26 18:33:37.652690: | peer supports fragmentation
Aug 26 18:33:37.652693: | peer supports DPD
Aug 26 18:33:37.652697: | IKEv1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
Aug 26 18:33:37.652701: | parent state #3: MAIN_I1(half-open IKE SA) => MAIN_I2(open IKE SA)
Aug 26 18:33:37.652704: | event_already_set, deleting event
Aug 26 18:33:37.652708: | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Aug 26 18:33:37.652713: | libevent_free: release ptr-libevent@0x55c66d960ba8
Aug 26 18:33:37.652717: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55c66d94da38
Aug 26 18:33:37.652725: | sending reply packet to 192.1.2.23:500 (from 192.1.3.33:500)
Aug 26 18:33:37.652733: | sending 396 bytes for STATE_MAIN_I1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3)
Aug 26 18:33:37.652737: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.652739: |   04 10 02 00  00 00 00 00  00 00 01 8c  0a 00 01 04
Aug 26 18:33:37.652742: |   1e 40 df 6d  aa 21 c1 c5  0a 61 6d 2c  0a 5f 5a 42
Aug 26 18:33:37.652745: |   75 59 2c 9f  ee 20 ef 45  ee d4 c9 fc  df a9 c6 48
Aug 26 18:33:37.652748: |   6f 53 00 d5  23 47 e8 16  09 2e e7 e9  f4 05 ed ec
Aug 26 18:33:37.652750: |   bd e9 c6 0c  94 2a 10 d1  50 97 fb 45  4e 1c 6e ff
Aug 26 18:33:37.652753: |   e4 5c d1 b3  87 50 94 b1  c1 38 ba 7e  32 a9 95 d9
Aug 26 18:33:37.652756: |   bd 55 9c da  73 b4 09 1f  a4 62 54 c1  1e 08 df e8
Aug 26 18:33:37.652759: |   b3 ce 51 07  bf a6 57 35  c6 ec 7f 08  12 10 7d 45
Aug 26 18:33:37.652761: |   18 a5 ca b8  69 be af 0b  68 44 27 94  62 19 7c 28
Aug 26 18:33:37.652764: |   29 a4 3f 74  64 83 f0 59  1f 09 16 c6  3e 4b 72 e6
Aug 26 18:33:37.652767: |   e7 d8 a3 56  9e 7e 69 e1  0a 19 a9 ab  11 d4 39 19
Aug 26 18:33:37.652770: |   cb 36 39 b2  56 f6 e3 91  97 95 d3 35  13 96 70 7f
Aug 26 18:33:37.652772: |   9e 08 44 53  9f 7c 3b 3b  cb 99 80 35  49 8e 4d 90
Aug 26 18:33:37.652775: |   54 a9 48 2b  0b 47 95 44  7b a5 d4 6d  a5 81 28 31
Aug 26 18:33:37.652778: |   16 ac 5a 00  00 c1 7f 82  44 0c 49 39  b5 86 62 93
Aug 26 18:33:37.652781: |   0c 40 dd 55  34 f1 7b 10  07 af e5 f8  26 47 bd 53
Aug 26 18:33:37.652783: |   08 5b 8b b0  ce e2 f7 f9  ea 79 0f 65  c5 02 ba 22
Aug 26 18:33:37.652786: |   14 00 00 24  4b ad 06 c4  bf 5d 16 5d  a2 b1 95 ed
Aug 26 18:33:37.652789: |   41 19 b4 0d  64 e7 ca 38  fb ef 9a 5a  10 0b 82 f2
Aug 26 18:33:37.652791: |   e1 3c 12 91  14 00 00 24  c6 bd c2 70  ba b7 51 49
Aug 26 18:33:37.652794: |   af 0d 55 6a  13 c6 68 56  65 69 4b ea  f4 b9 f5 9e
Aug 26 18:33:37.652797: |   c7 e0 b8 fc  7d de 4a 69  00 00 00 24  6f 8d 63 6a
Aug 26 18:33:37.652800: |   d4 19 20 d8  5f 86 45 16  14 68 51 73  9e 95 60 2c
Aug 26 18:33:37.652802: |   4f e8 46 93  aa 77 0f 1c  2c da bd f8
Aug 26 18:33:37.652840: | !event_already_set at reschedule
Aug 26 18:33:37.652846: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d94da38
Aug 26 18:33:37.652851: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3
Aug 26 18:33:37.652855: | libevent_malloc: new ptr-libevent@0x55c66d94a328 size 128
Aug 26 18:33:37.652863: | #3 STATE_MAIN_I2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29703.395312
Aug 26 18:33:37.652867: "northnet-eastnet-b" #3: STATE_MAIN_I2: sent MI2, expecting MR2
Aug 26 18:33:37.652871: | modecfg pull: noquirk policy:push not-client
Aug 26 18:33:37.652874: | phase 1 is done, looking for phase 2 to unpend
Aug 26 18:33:37.652878: | resume sending helper answer for #3 suppresed complete_v1_state_transition()
Aug 26 18:33:37.652885: | #3 spent 0.408 milliseconds in resume sending helper answer
Aug 26 18:33:37.652891: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:833)
Aug 26 18:33:37.652895: | libevent_free: release ptr-libevent@0x7fbd0c002888
Aug 26 18:33:37.654387: | spent 0.00301 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:33:37.654411: | *received 576 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:33:37.654416: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.654419: |   04 10 02 00  00 00 00 00  00 00 02 40  0a 00 01 04
Aug 26 18:33:37.654422: |   6e 14 b4 f2  7a 7e cf 82  80 4a db 09  4a 20 50 58
Aug 26 18:33:37.654425: |   60 bc e2 0c  a7 b1 23 b9  ff d0 ea 52  26 62 48 43
Aug 26 18:33:37.654427: |   2b 71 54 cf  0d 12 84 cb  d4 f4 a8 fd  d6 73 49 5c
Aug 26 18:33:37.654430: |   bf d0 91 d1  95 1f 11 7e  b7 07 60 d5  e4 3a 5a bb
Aug 26 18:33:37.654433: |   c8 5a 76 7d  d3 88 a4 45  42 8f 5a 86  6b 58 af 71
Aug 26 18:33:37.654436: |   bb 18 47 20  7e ac e1 26  63 3a 96 04  8e cc 0b c6
Aug 26 18:33:37.654439: |   a1 63 48 af  cd 6d cf 88  71 a5 78 55  45 12 fe 5a
Aug 26 18:33:37.654442: |   b2 13 7e df  dc 7a ae af  eb 83 09 66  d4 25 14 29
Aug 26 18:33:37.654445: |   74 70 f3 30  cb 16 d7 4e  b0 d2 5a aa  cc 6a 56 95
Aug 26 18:33:37.654448: |   af d0 37 cc  c5 d3 df 72  f0 8f 41 79  1a d4 8b aa
Aug 26 18:33:37.654451: |   7a 44 79 52  ff 31 bb 8e  c7 5e 99 fa  99 e3 9c 58
Aug 26 18:33:37.654454: |   eb c2 8e 3f  17 6f d7 1f  f1 55 fd 7c  0a bb b9 23
Aug 26 18:33:37.654457: |   b3 84 7c 55  0a 46 64 2d  d8 b6 1e 58  0a 94 07 07
Aug 26 18:33:37.654460: |   c6 c1 66 95  e4 5a 36 fc  75 0d 3f 73  a8 33 77 4d
Aug 26 18:33:37.654462: |   3d d2 da 56  6a d3 bd e0  f3 c9 42 c2  8f d6 3e 6e
Aug 26 18:33:37.654465: |   94 b6 48 79  7f 9d 3d 3e  65 62 54 b7  08 ea b3 62
Aug 26 18:33:37.654468: |   07 00 00 24  3f 7c 53 c2  08 4d d1 48  27 23 4b 93
Aug 26 18:33:37.654471: |   de d1 5d d0  01 71 ab 77  b8 cc 37 74  c8 07 e9 da
Aug 26 18:33:37.654474: |   1d 7c 3f 66  14 00 00 b4  04 30 81 ac  31 0b 30 09
Aug 26 18:33:37.654476: |   06 03 55 04  06 13 02 43  41 31 10 30  0e 06 03 55
Aug 26 18:33:37.654479: |   04 08 0c 07  4f 6e 74 61  72 69 6f 31  10 30 0e 06
Aug 26 18:33:37.654482: |   03 55 04 07  0c 07 54 6f  72 6f 6e 74  6f 31 12 30
Aug 26 18:33:37.654485: |   10 06 03 55  04 0a 0c 09  4c 69 62 72  65 73 77 61
Aug 26 18:33:37.654488: |   6e 31 18 30  16 06 03 55  04 0b 0c 0f  54 65 73 74
Aug 26 18:33:37.654491: |   20 44 65 70  61 72 74 6d  65 6e 74 31  25 30 23 06
Aug 26 18:33:37.654493: |   03 55 04 03  0c 1c 4c 69  62 72 65 73  77 61 6e 20
Aug 26 18:33:37.654496: |   74 65 73 74  20 43 41 20  66 6f 72 20  6d 61 69 6e
Aug 26 18:33:37.654499: |   63 61 31 24  30 22 06 09  2a 86 48 86  f7 0d 01 09
Aug 26 18:33:37.654501: |   01 16 15 74  65 73 74 69  6e 67 40 6c  69 62 72 65
Aug 26 18:33:37.654504: |   73 77 61 6e  2e 6f 72 67  14 00 00 24  6f 8d 63 6a
Aug 26 18:33:37.654507: |   d4 19 20 d8  5f 86 45 16  14 68 51 73  9e 95 60 2c
Aug 26 18:33:37.654509: |   4f e8 46 93  aa 77 0f 1c  2c da bd f8  00 00 00 24
Aug 26 18:33:37.654512: |   c6 bd c2 70  ba b7 51 49  af 0d 55 6a  13 c6 68 56
Aug 26 18:33:37.654515: |   65 69 4b ea  f4 b9 f5 9e  c7 e0 b8 fc  7d de 4a 69
Aug 26 18:33:37.654521: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:33:37.654526: | **parse ISAKMP Message:
Aug 26 18:33:37.654530: |    initiator cookie:
Aug 26 18:33:37.654535: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.654539: |    responder cookie:
Aug 26 18:33:37.654542: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.654545: |    next payload type: ISAKMP_NEXT_KE (0x4)
Aug 26 18:33:37.654549: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:37.654552: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:33:37.654556: |    flags: none (0x0)
Aug 26 18:33:37.654559: |    Message ID: 0 (0x0)
Aug 26 18:33:37.654562: |    length: 576 (0x240)
Aug 26 18:33:37.654566: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:33:37.654570: | State DB: found IKEv1 state #3 in MAIN_I2 (find_state_ikev1)
Aug 26 18:33:37.654577: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459)
Aug 26 18:33:37.654581: | #3 is idle
Aug 26 18:33:37.654584: | #3 idle
Aug 26 18:33:37.654588: | got payload 0x10  (ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080
Aug 26 18:33:37.654592: | ***parse ISAKMP Key Exchange Payload:
Aug 26 18:33:37.654595: |    next payload type: ISAKMP_NEXT_NONCE (0xa)
Aug 26 18:33:37.654599: |    length: 260 (0x104)
Aug 26 18:33:37.654603: | got payload 0x400  (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080
Aug 26 18:33:37.654606: | ***parse ISAKMP Nonce Payload:
Aug 26 18:33:37.654609: |    next payload type: ISAKMP_NEXT_CR (0x7)
Aug 26 18:33:37.654612: |    length: 36 (0x24)
Aug 26 18:33:37.654615: | got payload 0x80  (ISAKMP_NEXT_CR) needed: 0x0 opt: 0x102080
Aug 26 18:33:37.654619: | ***parse ISAKMP Certificate RequestPayload:
Aug 26 18:33:37.654623: |    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
Aug 26 18:33:37.654626: |    length: 180 (0xb4)
Aug 26 18:33:37.654630: |    cert type: CERT_X509_SIGNATURE (0x4)
Aug 26 18:33:37.654633: | got payload 0x100000  (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080
Aug 26 18:33:37.654637: | ***parse ISAKMP NAT-D Payload:
Aug 26 18:33:37.654640: |    next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
Aug 26 18:33:37.654644: |    length: 36 (0x24)
Aug 26 18:33:37.654647: | got payload 0x100000  (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080
Aug 26 18:33:37.654651: | ***parse ISAKMP NAT-D Payload:
Aug 26 18:33:37.654654: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.654657: |    length: 36 (0x24)
Aug 26 18:33:37.654661: | message 'main_inR2_outI3' HASH payload not checked early
Aug 26 18:33:37.654679: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK
Aug 26 18:33:37.654689: | actually looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK
Aug 26 18:33:37.654702: | line 0: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA
Aug 26 18:33:37.654707: | line 1: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA
Aug 26 18:33:37.654711: | concluding with best_match=000 best=(nil) (lineno=-1)
Aug 26 18:33:37.654714: | no PreShared Key Found
Aug 26 18:33:37.654719: | adding aggr outR1 DH work-order 6 for state #3
Aug 26 18:33:37.654723: | state #3 requesting EVENT_RETRANSMIT to be deleted
Aug 26 18:33:37.654726: | #3 STATE_MAIN_I2: retransmits: cleared
Aug 26 18:33:37.654731: | libevent_free: release ptr-libevent@0x55c66d94a328
Aug 26 18:33:37.654735: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d94da38
Aug 26 18:33:37.654739: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fbd0c002b78
Aug 26 18:33:37.654744: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3
Aug 26 18:33:37.654755: | libevent_malloc: new ptr-libevent@0x7fbd0c002888 size 128
Aug 26 18:33:37.654766: | complete v1 state transition with STF_SUSPEND
Aug 26 18:33:37.654773: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648)
Aug 26 18:33:37.654776: | suspending state #3 and saving MD
Aug 26 18:33:37.654779: | #3 is busy; has a suspended MD
Aug 26 18:33:37.654785: | #3 spent 0.118 milliseconds in process_packet_tail()
Aug 26 18:33:37.654791: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:33:37.654796: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_md() at demux.c:382)
Aug 26 18:33:37.654800: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:33:37.654803: | crypto helper 6 resuming
Aug 26 18:33:37.654817: | crypto helper 6 starting work-order 6 for state #3
Aug 26 18:33:37.654805: | spent 0.403 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:33:37.654823: | crypto helper 6 doing compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 6
Aug 26 18:33:37.655602: | crypto helper 6 finished compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 6 time elapsed 0.000778 seconds
Aug 26 18:33:37.655614: | (#3) spent 0.776 milliseconds in crypto helper computing work-order 6: aggr outR1 DH (pcr)
Aug 26 18:33:37.655617: | crypto helper 6 sending results from work-order 6 for state #3 to event queue
Aug 26 18:33:37.655619: | scheduling resume sending helper answer for #3
Aug 26 18:33:37.655622: | libevent_malloc: new ptr-libevent@0x7fbd00000f48 size 128
Aug 26 18:33:37.655629: | crypto helper 6 waiting (nothing to do)
Aug 26 18:33:37.655666: | processing resume sending helper answer for #3
Aug 26 18:33:37.655676: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:797)
Aug 26 18:33:37.655680: | crypto helper 6 replies to request ID 6
Aug 26 18:33:37.655682: | calling continuation function 0x55c66cb6db50
Aug 26 18:33:37.655685: | main_inR2_outI3_cryptotail for #3: calculated DH, sending R1
Aug 26 18:33:37.655689: | **emit ISAKMP Message:
Aug 26 18:33:37.655691: |    initiator cookie:
Aug 26 18:33:37.655693: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.655695: |    responder cookie:
Aug 26 18:33:37.655697: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.655699: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:33:37.655701: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:37.655703: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:33:37.655705: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:37.655707: |    Message ID: 0 (0x0)
Aug 26 18:33:37.655710: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:37.655712: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 5:ISAKMP_NEXT_ID
Aug 26 18:33:37.655715: | CR  30 81 ac 31  0b 30 09 06  03 55 04 06  13 02 43 41
Aug 26 18:33:37.655717: | CR  31 10 30 0e  06 03 55 04  08 0c 07 4f  6e 74 61 72
Aug 26 18:33:37.655718: | CR  69 6f 31 10  30 0e 06 03  55 04 07 0c  07 54 6f 72
Aug 26 18:33:37.655720: | CR  6f 6e 74 6f  31 12 30 10  06 03 55 04  0a 0c 09 4c
Aug 26 18:33:37.655722: | CR  69 62 72 65  73 77 61 6e  31 18 30 16  06 03 55 04
Aug 26 18:33:37.655724: | CR  0b 0c 0f 54  65 73 74 20  44 65 70 61  72 74 6d 65
Aug 26 18:33:37.655725: | CR  6e 74 31 25  30 23 06 03  55 04 03 0c  1c 4c 69 62
Aug 26 18:33:37.655727: | CR  72 65 73 77  61 6e 20 74  65 73 74 20  43 41 20 66
Aug 26 18:33:37.655729: | CR  6f 72 20 6d  61 69 6e 63  61 31 24 30  22 06 09 2a
Aug 26 18:33:37.655731: | CR  86 48 86 f7  0d 01 09 01  16 15 74 65  73 74 69 6e
Aug 26 18:33:37.655732: | CR  67 40 6c 69  62 72 65 73  77 61 6e 2e  6f 72 67
Aug 26 18:33:37.655738: | requested CA: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:37.655743: | thinking about whether to send my certificate:
Aug 26 18:33:37.655746: |   I have RSA key: OAKLEY_RSA_SIG cert.type: CERT_X509_SIGNATURE 
Aug 26 18:33:37.655748: |   sendcert: CERT_ALWAYSSEND and I did get a certificate request 
Aug 26 18:33:37.655750: |   so send cert.
Aug 26 18:33:37.655753: |  I am sending a certificate request
Aug 26 18:33:37.655755: | I will NOT send an initial contact payload
Aug 26 18:33:37.655757: | init checking NAT-T: enabled; RFC 3947 (NAT-Traversal)
Aug 26 18:33:37.655767: | natd_hash: hasher=0x55c66cc42ca0(32)
Aug 26 18:33:37.655770: | natd_hash: icookie=  09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.655772: | natd_hash: rcookie=  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.655773: | natd_hash: ip=  c0 01 03 21
Aug 26 18:33:37.655775: | natd_hash: port=500
Aug 26 18:33:37.655777: | natd_hash: hash=  6f 8d 63 6a  d4 19 20 d8  5f 86 45 16  14 68 51 73
Aug 26 18:33:37.655779: | natd_hash: hash=  9e 95 60 2c  4f e8 46 93  aa 77 0f 1c  2c da bd f8
Aug 26 18:33:37.655783: | natd_hash: hasher=0x55c66cc42ca0(32)
Aug 26 18:33:37.655785: | natd_hash: icookie=  09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.655787: | natd_hash: rcookie=  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.655789: | natd_hash: ip=  c0 01 02 17
Aug 26 18:33:37.655790: | natd_hash: port=500
Aug 26 18:33:37.655792: | natd_hash: hash=  c6 bd c2 70  ba b7 51 49  af 0d 55 6a  13 c6 68 56
Aug 26 18:33:37.655794: | natd_hash: hash=  65 69 4b ea  f4 b9 f5 9e  c7 e0 b8 fc  7d de 4a 69
Aug 26 18:33:37.655796: | expected NAT-D(me):  6f 8d 63 6a  d4 19 20 d8  5f 86 45 16  14 68 51 73
Aug 26 18:33:37.655798: | expected NAT-D(me):  9e 95 60 2c  4f e8 46 93  aa 77 0f 1c  2c da bd f8
Aug 26 18:33:37.655799: | expected NAT-D(him):
Aug 26 18:33:37.655801: |   c6 bd c2 70  ba b7 51 49  af 0d 55 6a  13 c6 68 56
Aug 26 18:33:37.655803: |   65 69 4b ea  f4 b9 f5 9e  c7 e0 b8 fc  7d de 4a 69
Aug 26 18:33:37.655805: | received NAT-D:  6f 8d 63 6a  d4 19 20 d8  5f 86 45 16  14 68 51 73
Aug 26 18:33:37.655807: | received NAT-D:  9e 95 60 2c  4f e8 46 93  aa 77 0f 1c  2c da bd f8
Aug 26 18:33:37.655809: | received NAT-D:  c6 bd c2 70  ba b7 51 49  af 0d 55 6a  13 c6 68 56
Aug 26 18:33:37.655811: | received NAT-D:  65 69 4b ea  f4 b9 f5 9e  c7 e0 b8 fc  7d de 4a 69
Aug 26 18:33:37.655812: | NAT_TRAVERSAL encaps using auto-detect
Aug 26 18:33:37.655814: | NAT_TRAVERSAL this end is NOT behind NAT
Aug 26 18:33:37.655816: | NAT_TRAVERSAL that end is NOT behind NAT
Aug 26 18:33:37.655818: | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23
Aug 26 18:33:37.655821: | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected
Aug 26 18:33:37.655822: |  NAT_T_WITH_KA detected
Aug 26 18:33:37.655825: | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds
Aug 26 18:33:37.655828: | ***emit ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:33:37.655830: |    next payload type: ISAKMP_NEXT_CERT (0x6)
Aug 26 18:33:37.655832: |    ID type: ID_DER_ASN1_DN (0x9)
Aug 26 18:33:37.655834: |    Protocol ID: 0 (0x0)
Aug 26 18:33:37.655836: |    port: 0 (0x0)
Aug 26 18:33:37.655838: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 6:ISAKMP_NEXT_CERT
Aug 26 18:33:37.655841: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
Aug 26 18:33:37.655843: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
Aug 26 18:33:37.655845: | emitting 185 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:37.655847: | my identity  30 81 b6 31  0b 30 09 06  03 55 04 06  13 02 43 41
Aug 26 18:33:37.655849: | my identity  31 10 30 0e  06 03 55 04  08 0c 07 4f  6e 74 61 72
Aug 26 18:33:37.655851: | my identity  69 6f 31 10  30 0e 06 03  55 04 07 0c  07 54 6f 72
Aug 26 18:33:37.655853: | my identity  6f 6e 74 6f  31 12 30 10  06 03 55 04  0a 0c 09 4c
Aug 26 18:33:37.655856: | my identity  69 62 72 65  73 77 61 6e  31 18 30 16  06 03 55 04
Aug 26 18:33:37.655858: | my identity  0b 0c 0f 54  65 73 74 20  44 65 70 61  72 74 6d 65
Aug 26 18:33:37.655860: | my identity  6e 74 31 24  30 22 06 03  55 04 03 0c  1b 6e 6f 72
Aug 26 18:33:37.655861: | my identity  74 68 2e 74  65 73 74 69  6e 67 2e 6c  69 62 72 65
Aug 26 18:33:37.655863: | my identity  73 77 61 6e  2e 6f 72 67  31 2f 30 2d  06 09 2a 86
Aug 26 18:33:37.655865: | my identity  48 86 f7 0d  01 09 01 16  20 75 73 65  72 2d 6e 6f
Aug 26 18:33:37.655867: | my identity  72 74 68 40  74 65 73 74  69 6e 67 2e  6c 69 62 72
Aug 26 18:33:37.655869: | my identity  65 73 77 61  6e 2e 6f 72  67
Aug 26 18:33:37.655871: | emitting length of ISAKMP Identification Payload (IPsec DOI): 193
Aug 26 18:33:37.655873: "northnet-eastnet-b" #3: I am sending my cert
Aug 26 18:33:37.655875: | ***emit ISAKMP Certificate Payload:
Aug 26 18:33:37.655877: |    next payload type: ISAKMP_NEXT_CR (0x7)
Aug 26 18:33:37.655879: |    cert encoding: CERT_X509_SIGNATURE (0x4)
Aug 26 18:33:37.655881: | next payload chain: ignoring supplied 'ISAKMP Certificate Payload'.'next payload type' value 7:ISAKMP_NEXT_CR
Aug 26 18:33:37.655884: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Certificate Payload (6:ISAKMP_NEXT_CERT)
Aug 26 18:33:37.655886: | next payload chain: saving location 'ISAKMP Certificate Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.655888: | emitting 1227 raw bytes of CERT into ISAKMP Certificate Payload
Aug 26 18:33:37.655890: | CERT  30 82 04 c7  30 82 04 30  a0 03 02 01  02 02 01 06
Aug 26 18:33:37.655892: | CERT  30 0d 06 09  2a 86 48 86  f7 0d 01 01  0b 05 00 30
Aug 26 18:33:37.655894: | CERT  81 ac 31 0b  30 09 06 03  55 04 06 13  02 43 41 31
Aug 26 18:33:37.655895: | CERT  10 30 0e 06  03 55 04 08  0c 07 4f 6e  74 61 72 69
Aug 26 18:33:37.655897: | CERT  6f 31 10 30  0e 06 03 55  04 07 0c 07  54 6f 72 6f
Aug 26 18:33:37.655899: | CERT  6e 74 6f 31  12 30 10 06  03 55 04 0a  0c 09 4c 69
Aug 26 18:33:37.655901: | CERT  62 72 65 73  77 61 6e 31  18 30 16 06  03 55 04 0b
Aug 26 18:33:37.655902: | CERT  0c 0f 54 65  73 74 20 44  65 70 61 72  74 6d 65 6e
Aug 26 18:33:37.655904: | CERT  74 31 25 30  23 06 03 55  04 03 0c 1c  4c 69 62 72
Aug 26 18:33:37.655906: | CERT  65 73 77 61  6e 20 74 65  73 74 20 43  41 20 66 6f
Aug 26 18:33:37.655908: | CERT  72 20 6d 61  69 6e 63 61  31 24 30 22  06 09 2a 86
Aug 26 18:33:37.655909: | CERT  48 86 f7 0d  01 09 01 16  15 74 65 73  74 69 6e 67
Aug 26 18:33:37.655911: | CERT  40 6c 69 62  72 65 73 77  61 6e 2e 6f  72 67 30 22
Aug 26 18:33:37.655913: | CERT  18 0f 32 30  31 39 30 38  32 34 30 39  30 37 35 33
Aug 26 18:33:37.655915: | CERT  5a 18 0f 32  30 32 32 30  38 32 33 30  39 30 37 35
Aug 26 18:33:37.655916: | CERT  33 5a 30 81  b6 31 0b 30  09 06 03 55  04 06 13 02
Aug 26 18:33:37.655918: | CERT  43 41 31 10  30 0e 06 03  55 04 08 0c  07 4f 6e 74
Aug 26 18:33:37.655920: | CERT  61 72 69 6f  31 10 30 0e  06 03 55 04  07 0c 07 54
Aug 26 18:33:37.655922: | CERT  6f 72 6f 6e  74 6f 31 12  30 10 06 03  55 04 0a 0c
Aug 26 18:33:37.655923: | CERT  09 4c 69 62  72 65 73 77  61 6e 31 18  30 16 06 03
Aug 26 18:33:37.655925: | CERT  55 04 0b 0c  0f 54 65 73  74 20 44 65  70 61 72 74
Aug 26 18:33:37.655927: | CERT  6d 65 6e 74  31 24 30 22  06 03 55 04  03 0c 1b 6e
Aug 26 18:33:37.655929: | CERT  6f 72 74 68  2e 74 65 73  74 69 6e 67  2e 6c 69 62
Aug 26 18:33:37.655930: | CERT  72 65 73 77  61 6e 2e 6f  72 67 31 2f  30 2d 06 09
Aug 26 18:33:37.655932: | CERT  2a 86 48 86  f7 0d 01 09  01 16 20 75  73 65 72 2d
Aug 26 18:33:37.655934: | CERT  6e 6f 72 74  68 40 74 65  73 74 69 6e  67 2e 6c 69
Aug 26 18:33:37.655936: | CERT  62 72 65 73  77 61 6e 2e  6f 72 67 30  82 01 a2 30
Aug 26 18:33:37.655937: | CERT  0d 06 09 2a  86 48 86 f7  0d 01 01 01  05 00 03 82
Aug 26 18:33:37.655939: | CERT  01 8f 00 30  82 01 8a 02  82 01 81 00  c0 59 bd 4b
Aug 26 18:33:37.655941: | CERT  40 fd f4 2c  e7 cf 9e f3  29 e6 61 73  de ab 42 3d
Aug 26 18:33:37.655944: | CERT  cc 51 1a e8  79 d6 53 46  a1 fd 66 d1  9e ab b4 65
Aug 26 18:33:37.655945: | CERT  76 51 ad 3f  6f 8f ef d2  73 f9 fd 8f  44 b0 6c 36
Aug 26 18:33:37.655947: | CERT  4b 95 c3 b2  45 0f 31 0c  e9 df 35 95  44 c0 19 53
Aug 26 18:33:37.655949: | CERT  8d df 6a 4b  b2 af d6 d3  e8 dd f5 20  df 9c cd 8a
Aug 26 18:33:37.655951: | CERT  f7 6a 09 92  60 00 45 44  39 4c 17 6c  06 02 91 37
Aug 26 18:33:37.655952: | CERT  4b f5 6a c3  5e 21 c6 64  32 32 98 1d  b7 99 1f 3c
Aug 26 18:33:37.655954: | CERT  13 fe ec c7  a4 a5 3b 37  30 df e4 31  95 47 91 b1
Aug 26 18:33:37.655956: | CERT  ca 96 66 b7  9e 49 65 a2  4c 79 54 17  ed 68 19 34
Aug 26 18:33:37.655958: | CERT  9d 7e 67 91  27 51 f0 ee  cb b3 90 68  7c 1d fd 83
Aug 26 18:33:37.655959: | CERT  32 06 2e e6  6f d5 f0 62  00 4d ef 11  90 b6 ad 61
Aug 26 18:33:37.655961: | CERT  83 0b 21 94  18 d9 2b 88  09 0d 33 2e  3b 71 18 f4
Aug 26 18:33:37.655963: | CERT  ce 4a 45 f3  37 f4 db c0  d6 ab c2 da  da cd 6d e0
Aug 26 18:33:37.655964: | CERT  a3 9d 21 53  19 34 b1 0c  d9 63 7c 45  b7 26 a4 d9
Aug 26 18:33:37.655966: | CERT  d6 93 25 1e  1f 74 3c 07  32 69 9b bc  0f db ba 3e
Aug 26 18:33:37.655968: | CERT  30 85 a4 3d  ec 5c 70 fe  fe 7d 64 3c  2c 48 b3 8a
Aug 26 18:33:37.655970: | CERT  eb 26 bf 05  d4 33 1e c3  f7 1c 24 c9  99 e3 d1 99
Aug 26 18:33:37.655971: | CERT  91 df 32 10  d5 7c 31 7e  9e 6f 70 01  dc 0d d7 21
Aug 26 18:33:37.655973: | CERT  03 76 4d f5  b2 e3 87 30  94 8c b2 0a  c0 b4 d9 0b
Aug 26 18:33:37.655975: | CERT  d4 d9 37 e0  7a 73 13 50  8d 6f 93 9a  7c 5a 1a b2
Aug 26 18:33:37.655977: | CERT  87 7e 0c 64  60 cb 4b 2c  ef 22 75 b1  7c 60 3e e3
Aug 26 18:33:37.655978: | CERT  e5 f1 94 38  51 8f 00 e8  35 7b b5 01  ed c1 c4 fd
Aug 26 18:33:37.655980: | CERT  a3 4b 56 42  d6 8b 64 38  74 95 c4 13  70 f0 f0 23
Aug 26 18:33:37.655982: | CERT  29 57 2b ef  74 97 97 76  8d 30 48 91  02 03 01 00
Aug 26 18:33:37.655984: | CERT  01 a3 81 e4  30 81 e1 30  09 06 03 55  1d 13 04 02
Aug 26 18:33:37.655985: | CERT  30 00 30 26  06 03 55 1d  11 04 1f 30  1d 82 1b 6e
Aug 26 18:33:37.655987: | CERT  6f 72 74 68  2e 74 65 73  74 69 6e 67  2e 6c 69 62
Aug 26 18:33:37.655989: | CERT  72 65 73 77  61 6e 2e 6f  72 67 30 0b  06 03 55 1d
Aug 26 18:33:37.655991: | CERT  0f 04 04 03  02 07 80 30  1d 06 03 55  1d 25 04 16
Aug 26 18:33:37.655992: | CERT  30 14 06 08  2b 06 01 05  05 07 03 01  06 08 2b 06
Aug 26 18:33:37.655994: | CERT  01 05 05 07  03 02 30 41  06 08 2b 06  01 05 05 07
Aug 26 18:33:37.655996: | CERT  01 01 04 35  30 33 30 31  06 08 2b 06  01 05 05 07
Aug 26 18:33:37.655997: | CERT  30 01 86 25  68 74 74 70  3a 2f 2f 6e  69 63 2e 74
Aug 26 18:33:37.655999: | CERT  65 73 74 69  6e 67 2e 6c  69 62 72 65  73 77 61 6e
Aug 26 18:33:37.656001: | CERT  2e 6f 72 67  3a 32 35 36  30 30 3d 06  03 55 1d 1f
Aug 26 18:33:37.656003: | CERT  04 36 30 34  30 32 a0 30  a0 2e 86 2c  68 74 74 70
Aug 26 18:33:37.656004: | CERT  3a 2f 2f 6e  69 63 2e 74  65 73 74 69  6e 67 2e 6c
Aug 26 18:33:37.656006: | CERT  69 62 72 65  73 77 61 6e  2e 6f 72 67  2f 72 65 76
Aug 26 18:33:37.656008: | CERT  6f 6b 65 64  2e 63 72 6c  30 0d 06 09  2a 86 48 86
Aug 26 18:33:37.656010: | CERT  f7 0d 01 01  0b 05 00 03  81 81 00 9e  e9 26 57 73
Aug 26 18:33:37.656011: | CERT  c2 4c 64 c6  ab d6 d3 1a  13 4f 6b 48  e3 17 b2 3d
Aug 26 18:33:37.656013: | CERT  fb 30 93 2d  15 92 6e a3  60 29 10 1d  3e a7 93 48
Aug 26 18:33:37.656015: | CERT  3c 40 5b af  9e e5 93 b7  2f d5 4b 9f  db bd ab 5d
Aug 26 18:33:37.656017: | CERT  03 57 3a 1a  f9 81 87 13  dd 32 e7 93  b5 9e 3b 40
Aug 26 18:33:37.656018: | CERT  3c c6 c9 d5  ce c6 c7 5d  da 89 36 3d  d0 36 82 fd
Aug 26 18:33:37.656020: | CERT  b2 ab 00 2a  7c 0e a7 ad  3e e2 b1 5a  0d 88 45 26
Aug 26 18:33:37.656022: | CERT  48 51 b3 c7  79 d7 04 e7  47 5f 28 f8  63 fb ae 58
Aug 26 18:33:37.656024: | CERT  52 8b ba 60  ce 19 ac fa  4e 65 7d
Aug 26 18:33:37.656026: | emitting length of ISAKMP Certificate Payload: 1232
Aug 26 18:33:37.656028: "northnet-eastnet-b" #3: I am sending a certificate request
Aug 26 18:33:37.656030: | ***emit ISAKMP Certificate RequestPayload:
Aug 26 18:33:37.656033: |    next payload type: ISAKMP_NEXT_SIG (0x9)
Aug 26 18:33:37.656035: |    cert type: CERT_X509_SIGNATURE (0x4)
Aug 26 18:33:37.656037: | next payload chain: ignoring supplied 'ISAKMP Certificate RequestPayload'.'next payload type' value 9:ISAKMP_NEXT_SIG
Aug 26 18:33:37.656039: | next payload chain: setting previous 'ISAKMP Certificate Payload'.'next payload type' to current ISAKMP Certificate RequestPayload (7:ISAKMP_NEXT_CR)
Aug 26 18:33:37.656041: | next payload chain: saving location 'ISAKMP Certificate RequestPayload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.656043: | emitting 175 raw bytes of CA into ISAKMP Certificate RequestPayload
Aug 26 18:33:37.656045: | CA  30 81 ac 31  0b 30 09 06  03 55 04 06  13 02 43 41
Aug 26 18:33:37.656047: | CA  31 10 30 0e  06 03 55 04  08 0c 07 4f  6e 74 61 72
Aug 26 18:33:37.656049: | CA  69 6f 31 10  30 0e 06 03  55 04 07 0c  07 54 6f 72
Aug 26 18:33:37.656050: | CA  6f 6e 74 6f  31 12 30 10  06 03 55 04  0a 0c 09 4c
Aug 26 18:33:37.656052: | CA  69 62 72 65  73 77 61 6e  31 18 30 16  06 03 55 04
Aug 26 18:33:37.656054: | CA  0b 0c 0f 54  65 73 74 20  44 65 70 61  72 74 6d 65
Aug 26 18:33:37.656056: | CA  6e 74 31 25  30 23 06 03  55 04 03 0c  1c 4c 69 62
Aug 26 18:33:37.656057: | CA  72 65 73 77  61 6e 20 74  65 73 74 20  43 41 20 66
Aug 26 18:33:37.656059: | CA  6f 72 20 6d  61 69 6e 63  61 31 24 30  22 06 09 2a
Aug 26 18:33:37.656061: | CA  86 48 86 f7  0d 01 09 01  16 15 74 65  73 74 69 6e
Aug 26 18:33:37.656063: | CA  67 40 6c 69  62 72 65 73  77 61 6e 2e  6f 72 67
Aug 26 18:33:37.656065: | emitting length of ISAKMP Certificate RequestPayload: 180
Aug 26 18:33:37.656096: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_RSA
Aug 26 18:33:37.656214: | searching for certificate PKK_RSA:AwEAAcBZv vs PKK_RSA:AwEAAcBZv
Aug 26 18:33:37.662553: | ***emit ISAKMP Signature Payload:
Aug 26 18:33:37.662568: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.662571: | next payload chain: setting previous 'ISAKMP Certificate RequestPayload'.'next payload type' to current ISAKMP Signature Payload (9:ISAKMP_NEXT_SIG)
Aug 26 18:33:37.662574: | next payload chain: saving location 'ISAKMP Signature Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.662577: | emitting 384 raw bytes of SIG_I into ISAKMP Signature Payload
Aug 26 18:33:37.662579: | SIG_I  53 84 df d1  ef 08 42 f3  ee 32 ed f9  96 68 ea 74
Aug 26 18:33:37.662581: | SIG_I  9c e0 ee 66  de 87 81 9b  42 5f 90 96  3c ab 88 9e
Aug 26 18:33:37.662583: | SIG_I  45 07 50 4b  81 69 bc c1  91 6d b1 29  0f 69 39 90
Aug 26 18:33:37.662584: | SIG_I  41 65 6d e0  87 80 67 d8  aa 90 53 eb  7f e3 4a d9
Aug 26 18:33:37.662586: | SIG_I  fd 0d f9 2f  26 09 80 ce  c7 61 00 c7  f4 4e dd cb
Aug 26 18:33:37.662588: | SIG_I  1b c8 8e 9a  e9 9f e7 03  6b e8 4a 1d  a5 30 42 29
Aug 26 18:33:37.662590: | SIG_I  40 d6 2a 35  38 ca c3 76  70 98 84 5f  43 76 ce 1b
Aug 26 18:33:37.662591: | SIG_I  a1 5f f4 9b  13 19 97 ae  e2 c2 6d 0e  e1 94 6e 2b
Aug 26 18:33:37.662593: | SIG_I  55 09 d7 d3  f8 77 a8 17  a8 b1 0d 0d  6d e6 48 03
Aug 26 18:33:37.662595: | SIG_I  76 ba 23 c7  3f da fe 9f  a7 47 f2 9a  93 7b 2e 75
Aug 26 18:33:37.662597: | SIG_I  6e a4 3c 24  32 2a 57 12  98 b2 c2 69  19 3b 90 a6
Aug 26 18:33:37.662598: | SIG_I  7d 78 c9 df  2b 49 04 18  20 d5 20 c0  38 3a d9 9b
Aug 26 18:33:37.662600: | SIG_I  0f 84 8a b1  54 d2 9e b1  c1 2a a1 63  09 19 1c 2c
Aug 26 18:33:37.662602: | SIG_I  78 0d 79 18  7a 51 b4 2d  5c d5 37 2b  ca 90 8c eb
Aug 26 18:33:37.662603: | SIG_I  33 e2 8f 56  fe ae 50 b9  64 d1 e7 cf  0e 09 57 fc
Aug 26 18:33:37.662605: | SIG_I  fe 76 f2 fe  27 03 7e 6d  17 b5 3e 7a  4b 65 e0 e7
Aug 26 18:33:37.662607: | SIG_I  6a ec c8 ec  c2 28 6f 77  1e f7 1b 63  f3 85 43 b3
Aug 26 18:33:37.662609: | SIG_I  e2 d4 1e 31  7b 88 31 49  e6 98 41 33  34 fe f3 ad
Aug 26 18:33:37.662613: | SIG_I  5d e2 2b 67  19 2b 42 0b  d0 05 3c df  07 df e9 3d
Aug 26 18:33:37.662615: | SIG_I  19 00 43 77  3e d9 f1 e9  15 2f ee 84  6d 29 26 b0
Aug 26 18:33:37.662617: | SIG_I  18 69 f6 a6  7b 5f 3b 9f  ab 4c 22 7c  d1 0a a1 06
Aug 26 18:33:37.662618: | SIG_I  7f 5b 8b 6f  a1 04 56 9c  c0 06 c1 1d  bb d1 91 db
Aug 26 18:33:37.662620: | SIG_I  72 70 3f 80  d8 63 95 90  14 b8 92 54  f7 b3 01 7b
Aug 26 18:33:37.662622: | SIG_I  dc 50 2f 2b  a6 1a 77 10  f7 f9 1b bf  4f 59 7a e8
Aug 26 18:33:37.662624: | emitting length of ISAKMP Signature Payload: 388
Aug 26 18:33:37.662626: | Not sending INITIAL_CONTACT
Aug 26 18:33:37.662628: | emitting 7 zero bytes of encryption padding into ISAKMP Message
Aug 26 18:33:37.662630: | no IKEv1 message padding required
Aug 26 18:33:37.662632: | emitting length of ISAKMP Message: 2028
Aug 26 18:33:37.662644: | complete v1 state transition with STF_OK
Aug 26 18:33:37.662649: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:33:37.662651: | #3 is idle
Aug 26 18:33:37.662654: | doing_xauth:no, t_xauth_client_done:no
Aug 26 18:33:37.662656: | IKEv1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
Aug 26 18:33:37.662658: | parent state #3: MAIN_I2(open IKE SA) => MAIN_I3(open IKE SA)
Aug 26 18:33:37.662660: | event_already_set, deleting event
Aug 26 18:33:37.662662: | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Aug 26 18:33:37.662666: | libevent_free: release ptr-libevent@0x7fbd0c002888
Aug 26 18:33:37.662669: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fbd0c002b78
Aug 26 18:33:37.662674: | sending reply packet to 192.1.2.23:500 (from 192.1.3.33:500)
Aug 26 18:33:37.662680: | sending 2028 bytes for STATE_MAIN_I2 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3)
Aug 26 18:33:37.662682: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.662684: |   05 10 02 01  00 00 00 00  00 00 07 ec  91 ac f7 d3
Aug 26 18:33:37.662685: |   9c 7e 86 61  20 06 6f 8c  1e 70 3b 00  30 44 74 9c
Aug 26 18:33:37.662687: |   8b 93 b4 41  14 30 0e 69  a3 bf 8a 11  0e d5 8c 5d
Aug 26 18:33:37.662689: |   68 37 cf c8  fd 1c 18 a7  6f c5 e1 f8  c4 bc 7e de
Aug 26 18:33:37.662690: |   1b 8f ef 79  30 62 7d 60  0f 35 9a 4a  46 ea 68 27
Aug 26 18:33:37.662692: |   9b 9a 6a ef  1d 4d 22 bd  41 3b ce 71  a5 ee 65 41
Aug 26 18:33:37.662694: |   61 ed 7c 4c  ac d4 16 b1  e7 0c 4d d0  c1 e0 7c 96
Aug 26 18:33:37.662696: |   5c 62 4b 8b  62 38 00 2f  f6 d2 ef ab  a6 21 01 23
Aug 26 18:33:37.662697: |   22 9a d4 76  62 f7 37 97  91 e9 cd cd  a5 a8 b6 92
Aug 26 18:33:37.662699: |   e6 d7 cf 31  46 02 ce 6b  59 b6 07 d2  66 51 74 bd
Aug 26 18:33:37.662701: |   ec 6c 99 31  0a 5b be 5b  25 68 77 cd  02 a0 81 18
Aug 26 18:33:37.662702: |   e5 49 8b 3c  a3 12 ca 98  5c e0 3f d9  c6 20 ca 64
Aug 26 18:33:37.662704: |   75 02 64 b4  1a a7 09 89  f8 a3 cf 04  e0 9b 78 4b
Aug 26 18:33:37.662706: |   bd 92 15 8a  3f b1 af 03  10 56 86 34  51 a5 0c 17
Aug 26 18:33:37.662708: |   ad 65 c5 c3  99 51 e6 99  77 3b cf 1f  47 58 8c 12
Aug 26 18:33:37.662709: |   51 6b 82 e8  d1 dc 29 dc  0c 35 4a 7d  15 8e ef 4f
Aug 26 18:33:37.662711: |   b0 32 d0 82  ff e8 d7 0d  70 e9 68 97  c1 47 b9 3e
Aug 26 18:33:37.662713: |   74 8b 33 b4  ca 00 75 10  65 69 99 e7  c4 65 16 1a
Aug 26 18:33:37.662714: |   33 4b 42 ec  67 ff 7e 7c  19 f5 e2 de  38 bf 78 41
Aug 26 18:33:37.662716: |   54 38 47 57  3b d5 06 b4  27 0a 7a 73  87 81 09 06
Aug 26 18:33:37.662718: |   f3 68 ea 26  07 e3 a3 49  28 07 1e fb  1d 13 24 c4
Aug 26 18:33:37.662720: |   85 82 7a fd  e6 88 d7 a7  38 55 d4 cf  50 ee a2 09
Aug 26 18:33:37.662721: |   5f 68 26 a2  32 73 98 be  fc 70 8d 76  c6 18 10 3d
Aug 26 18:33:37.662723: |   e4 30 b9 b9  50 1b 5d 4d  c0 c0 6f 74  8a 32 a5 84
Aug 26 18:33:37.662725: |   64 78 da e0  ec 04 73 af  7b c0 ee c3  3b 16 53 23
Aug 26 18:33:37.662726: |   6c 8a 50 ca  e0 1e 14 9c  72 de 16 a7  a8 17 71 bf
Aug 26 18:33:37.662728: |   af 4c c6 73  88 cf 72 9a  f1 c2 7e 1b  64 17 e9 df
Aug 26 18:33:37.662731: |   d8 ae ad 21  19 fc a4 9b  13 6c d3 2e  ad b9 f6 09
Aug 26 18:33:37.662733: |   0d b5 9b 76  2d 41 af 10  36 54 9c b9  28 b7 0e e0
Aug 26 18:33:37.662735: |   f1 b1 3f 09  e5 85 26 70  0e b0 40 e4  6d 7c 58 42
Aug 26 18:33:37.662737: |   f9 52 60 f4  36 c1 04 d8  3f 7b 74 cd  8e 84 1b 97
Aug 26 18:33:37.662738: |   d7 02 04 e7  fa a5 b1 16  3f d1 9e b6  1d ca e5 52
Aug 26 18:33:37.662740: |   f2 45 a6 c7  51 89 ca b8  da d4 43 0a  5c 38 6c f8
Aug 26 18:33:37.662742: |   31 d8 5d 82  eb bc 8f 33  dd d3 f9 aa  ea a2 ec bb
Aug 26 18:33:37.662744: |   9e 78 73 f6  1a 2b 27 48  39 33 a3 0e  c6 ff bc 4c
Aug 26 18:33:37.662745: |   6a b8 b6 27  aa 0d 75 ee  5f 07 3c 46  cf a7 b4 1e
Aug 26 18:33:37.662747: |   0a d4 f6 d9  c8 20 2c e7  fb fa 05 a3  83 80 9a 07
Aug 26 18:33:37.662749: |   65 d0 2f 77  7a 8b 3c e6  03 6b 5a 77  a6 e3 b4 21
Aug 26 18:33:37.662750: |   5a 74 68 4b  6f b1 81 0d  1a c1 1c 81  6e 52 56 bc
Aug 26 18:33:37.662752: |   9a b3 86 bb  95 ae e5 b4  71 d8 e4 7c  e4 ee 8e 55
Aug 26 18:33:37.662754: |   a9 5d 4a 47  23 40 e6 1b  96 9a a8 ad  12 24 39 c9
Aug 26 18:33:37.662755: |   9d d6 5e c4  05 40 c6 01  d5 17 28 3d  a6 41 8a d5
Aug 26 18:33:37.662757: |   b9 fc e4 9b  11 93 df 30  9e bf 38 8b  bc 64 68 8d
Aug 26 18:33:37.662759: |   c0 d1 8c 96  ca 83 69 43  f3 12 6d 64  f2 62 22 80
Aug 26 18:33:37.662761: |   fa 82 46 79  76 a7 81 ce  2c 02 8b 6a  0e 47 ab 5e
Aug 26 18:33:37.662762: |   e9 41 1a c7  fc 32 ac 65  b5 05 90 0e  4e a3 a2 6b
Aug 26 18:33:37.662764: |   17 e4 49 9b  a2 30 ef f9  df c6 f0 34  a3 e7 93 ff
Aug 26 18:33:37.662766: |   69 ca 32 d2  7e 9c 0e d5  2b f3 c2 ef  8d 4f a2 7a
Aug 26 18:33:37.662767: |   ea 10 65 c6  a3 18 c2 43  93 d5 48 10  c9 bf 91 50
Aug 26 18:33:37.662769: |   c5 34 2d a3  02 81 96 94  28 3d d7 b3  79 25 a5 db
Aug 26 18:33:37.662771: |   f9 2e ff de  39 bc 91 95  18 19 aa 70  f4 3e 85 e9
Aug 26 18:33:37.662773: |   d4 03 5c a7  c1 8c cd 1c  71 d8 54 e5  72 52 5f 01
Aug 26 18:33:37.662774: |   e9 6e ff df  89 c6 40 b6  ef 96 b7 dc  41 1a 40 5d
Aug 26 18:33:37.662776: |   20 bf fa 55  d2 bb cb 7c  5c 42 18 53  14 7f e7 a6
Aug 26 18:33:37.662778: |   03 3b 8b 14  5f f5 9a b0  11 f8 21 84  ae fd 48 f7
Aug 26 18:33:37.662779: |   af 7b 39 fe  99 04 59 66  c4 1c dc a5  58 18 72 e3
Aug 26 18:33:37.662781: |   c1 3c 72 fc  46 f7 e9 48  72 74 56 fa  eb 67 1a d9
Aug 26 18:33:37.662783: |   92 92 20 e8  e8 8a 4f d3  57 c1 77 b3  bb a9 cf a2
Aug 26 18:33:37.662785: |   ac 6d 91 24  3a 45 f1 90  68 6d f9 7f  74 c5 78 f2
Aug 26 18:33:37.662786: |   85 c1 2a 53  72 9e ee d9  5b f6 4b 40  a7 3e 55 a6
Aug 26 18:33:37.662788: |   1d a2 89 5e  d4 8c 0d c3  0a b0 11 80  9e 6b 3d 36
Aug 26 18:33:37.662790: |   9d 73 fa a5  fc 19 43 f7  80 0f bf af  83 94 b2 b2
Aug 26 18:33:37.662791: |   45 f6 60 9d  a7 a2 25 5d  7d 48 ac 84  74 74 2f ac
Aug 26 18:33:37.662793: |   cd 1d 17 f4  a9 0b 24 0f  aa cb ea 5f  71 e9 3a 4c
Aug 26 18:33:37.662795: |   49 83 e4 4c  59 9b c1 15  79 82 f9 2e  c6 69 62 b3
Aug 26 18:33:37.662797: |   ae bc f1 02  06 42 21 ef  b7 be 96 22  be f4 e2 9d
Aug 26 18:33:37.662798: |   06 8e 7b 36  d4 e0 b2 4f  cb ff 4c 14  48 9e e4 42
Aug 26 18:33:37.662800: |   86 58 e0 9c  f2 95 45 af  c8 62 7b 44  c5 e2 0d fc
Aug 26 18:33:37.662802: |   46 90 c4 6c  9b 0d 36 56  f0 29 33 ec  8e 7a 94 db
Aug 26 18:33:37.662803: |   23 f6 4f f7  0f 5b b0 67  a1 85 07 44  18 e5 12 de
Aug 26 18:33:37.662805: |   13 71 aa 9e  8a 12 0c ef  e7 65 e3 93  8f 66 47 15
Aug 26 18:33:37.662807: |   af c8 0f d7  85 9d a3 44  47 0a 44 1e  14 03 69 d8
Aug 26 18:33:37.662809: |   15 6d db a7  2d e2 bf 23  47 00 c1 af  af ab f1 a8
Aug 26 18:33:37.662810: |   ec 90 12 31  5c ef ba 20  70 65 ea b0  3b 4f fa 46
Aug 26 18:33:37.662812: |   42 63 53 e9  89 af 11 85  1b 8c 2a fc  64 aa b0 85
Aug 26 18:33:37.662814: |   6a 53 59 8b  53 59 82 52  53 b6 f6 db  7d 51 bd 57
Aug 26 18:33:37.662815: |   67 f3 e1 1b  be d6 6e 7a  6f b1 02 77  99 ad df ea
Aug 26 18:33:37.662817: |   1e b8 8f a7  e3 cc 57 6e  95 d7 4f 45  b7 c8 39 98
Aug 26 18:33:37.662819: |   4b 8b f6 aa  07 02 60 ba  16 c0 b1 a9  8e 8f 5f 37
Aug 26 18:33:37.662823: |   3e 24 fb 1e  97 31 b2 82  6a 43 ec dd  ce c9 cc d6
Aug 26 18:33:37.662825: |   9c db 3e b1  d1 7b 1f c6  59 9b f4 df  a2 76 af 54
Aug 26 18:33:37.662827: |   84 c5 13 cf  a7 e3 5c c6  49 ed bf e3  e2 c4 70 e9
Aug 26 18:33:37.662829: |   9d d2 a2 8b  a0 71 74 a4  ae 9a 77 05  67 f8 a9 9e
Aug 26 18:33:37.662830: |   d4 12 cd 63  91 27 bb 8c  41 ae d1 a8  35 ee 28 55
Aug 26 18:33:37.662832: |   f8 0d ad 38  00 8e 2c e8  1c 64 fc 0d  03 8c 3e 90
Aug 26 18:33:37.662834: |   96 c5 43 a7  a3 0a fc ce  f4 35 07 f2  97 94 21 3f
Aug 26 18:33:37.662835: |   25 b3 bf 83  06 d8 a1 91  52 5d cc 0f  03 0a 60 6e
Aug 26 18:33:37.662837: |   d3 18 44 27  27 ac 32 26  31 ab 53 46  e9 31 08 2b
Aug 26 18:33:37.662839: |   2b 29 c8 02  56 83 df 63  6e 00 98 e8  04 40 7d f3
Aug 26 18:33:37.662840: |   81 3f fa 45  f5 51 89 f0  29 c9 ec 1b  38 5d 4c 81
Aug 26 18:33:37.662842: |   40 6e 86 ed  91 88 0b 2d  df 32 a6 c8  06 a2 07 14
Aug 26 18:33:37.662844: |   63 4b c3 e0  6c e1 14 da  c9 f9 e7 02  14 a0 29 ba
Aug 26 18:33:37.662846: |   3d b6 26 e2  a9 9d 50 59  70 90 0c 31  84 92 fa b7
Aug 26 18:33:37.662847: |   b3 15 13 ee  3b 4b 20 45  fb 34 80 b1  75 53 74 bf
Aug 26 18:33:37.662849: |   f9 cc d1 04  b9 75 71 7c  50 d7 a8 f7  33 79 73 25
Aug 26 18:33:37.662851: |   a6 16 c5 fd  93 66 d8 40  39 5e 2f ab  41 4f 78 94
Aug 26 18:33:37.662852: |   38 5e f8 a2  58 65 72 ed  1f 86 fd 3f  9c 37 65 11
Aug 26 18:33:37.662854: |   ae f6 8c 5a  3c d2 6b f2  f7 5f 90 75  26 81 16 10
Aug 26 18:33:37.662856: |   75 b9 4e f2  fa 64 15 aa  12 2d 8f b6  9f 0a 63 14
Aug 26 18:33:37.662858: |   ee 12 0f da  7f 67 ac 8c  ed 0e 33 11  5d 0b 12 3a
Aug 26 18:33:37.662859: |   d3 74 73 b9  84 c8 91 13  03 d9 bd d3  60 b0 cd 6e
Aug 26 18:33:37.662861: |   99 70 5a f6  e0 e6 93 db  e7 b7 18 28  ec 19 3a e0
Aug 26 18:33:37.662863: |   2e 89 ff 17  f4 51 2b 1f  6a 49 a0 9c  8a bb fc 0d
Aug 26 18:33:37.662864: |   ec 31 ba 79  20 04 5b 55  89 ab 4f cd  3e 49 c6 5c
Aug 26 18:33:37.662866: |   b2 cb bf 6d  3c 5e 2f 7e  18 9d 94 bd  c5 c6 3c ad
Aug 26 18:33:37.662868: |   b6 b1 93 46  44 8f 9d 5f  09 de fc 5e  45 3a fa d6
Aug 26 18:33:37.662870: |   6c ff c5 da  d9 69 40 56  e1 04 db 92  b8 69 1d 31
Aug 26 18:33:37.662871: |   77 3c 3d 3d  18 a1 33 ec  08 30 9e be  15 02 db 89
Aug 26 18:33:37.662873: |   f4 14 34 b3  b5 e9 06 85  a3 a5 27 09  10 3b b8 c6
Aug 26 18:33:37.662875: |   bb 6d 18 0f  a0 54 d3 bd  4d ab f0 98  d2 18 b7 7e
Aug 26 18:33:37.662876: |   91 69 45 b4  5c af 84 dd  90 77 23 44  ee eb f6 f7
Aug 26 18:33:37.662878: |   ed 14 14 f6  09 5d ac 88  60 ef fc 03  e2 0e 5a 09
Aug 26 18:33:37.662880: |   34 84 b1 d0  7a fe f8 36  ad 39 e2 7a  86 f3 a8 05
Aug 26 18:33:37.662882: |   1f 9f 7f e2  01 da 82 b2  51 03 05 4a  8d 4d b9 22
Aug 26 18:33:37.662883: |   dd 06 12 2c  ad 52 01 cf  33 67 3a d2  d8 fd 0d 5e
Aug 26 18:33:37.662885: |   64 a6 8b 82  5a 3d 21 e5  f3 31 2c e2  3d 50 08 d9
Aug 26 18:33:37.662887: |   34 1e e1 b8  dc 12 d8 6f  66 00 5b 0d  12 0f 96 ed
Aug 26 18:33:37.662888: |   c3 ff d6 14  4f 08 0d ee  20 85 78 1c  90 f9 6f 2a
Aug 26 18:33:37.662890: |   40 ed 88 63  9b ad 0b 56  ea 12 42 e6  f5 74 08 fe
Aug 26 18:33:37.662892: |   e5 15 cd 31  dc 3d 65 ac  14 35 ab 86  fd 9c 0f 5b
Aug 26 18:33:37.662894: |   92 51 87 cc  96 ef 4b 40  01 94 36 4f  6f e5 a3 e3
Aug 26 18:33:37.662895: |   66 4a 9d 61  98 fe 3d 77  05 11 c8 df  05 8b 4d 8d
Aug 26 18:33:37.662897: |   62 e7 d1 ae  e6 65 e9 47  0a 56 dc 5c  bd 46 bd f3
Aug 26 18:33:37.662899: |   e8 0b b4 0e  5f db 2f 4c  56 d4 3b ad  8d c8 1c 26
Aug 26 18:33:37.662900: |   86 9c 1b 79  c2 71 e3 0a  e8 44 b7 b2  ea ae 59 f6
Aug 26 18:33:37.662902: |   38 f3 0a b5  0a 5b f0 e5  3d 1b b4 05
Aug 26 18:33:37.662961: | !event_already_set at reschedule
Aug 26 18:33:37.662969: | event_schedule: new EVENT_RETRANSMIT-pe@0x7fbd0c002b78
Aug 26 18:33:37.662974: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3
Aug 26 18:33:37.662978: | libevent_malloc: new ptr-libevent@0x55c66d960ba8 size 128
Aug 26 18:33:37.662985: | #3 STATE_MAIN_I3: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29703.405434
Aug 26 18:33:37.662990: "northnet-eastnet-b" #3: STATE_MAIN_I3: sent MI3, expecting MR3
Aug 26 18:33:37.662994: | modecfg pull: noquirk policy:push not-client
Aug 26 18:33:37.662998: | phase 1 is done, looking for phase 2 to unpend
Aug 26 18:33:37.663002: | resume sending helper answer for #3 suppresed complete_v1_state_transition()
Aug 26 18:33:37.663010: | #3 spent 7.26 milliseconds in resume sending helper answer
Aug 26 18:33:37.663016: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:833)
Aug 26 18:33:37.663020: | libevent_free: release ptr-libevent@0x7fbd00000f48
Aug 26 18:33:37.671008: | spent 0.00462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:33:37.671041: | *received 1884 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:33:37.671047: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.671051: |   05 10 02 01  00 00 00 00  00 00 07 5c  59 44 f9 52
Aug 26 18:33:37.671054: |   d8 71 4d 2c  ab 13 7f e4  7f dd 89 ea  7e b4 6e b4
Aug 26 18:33:37.671058: |   82 f7 26 ee  fa 97 d0 1d  23 fc e0 dd  d0 bc ff 96
Aug 26 18:33:37.671060: |   86 81 96 89  3c 9a f0 24  63 62 1e 53  f0 4a 14 71
Aug 26 18:33:37.671063: |   be 2e 83 33  80 70 25 53  d0 ef 48 30  ce 30 10 fc
Aug 26 18:33:37.671066: |   09 93 9e 75  a2 cd cc 29  a4 c9 04 c4  64 3a 65 26
Aug 26 18:33:37.671069: |   9e cb ac 76  cb b6 42 d4  d2 b6 5e 5d  02 08 e2 fa
Aug 26 18:33:37.671072: |   e7 bb 90 fd  e6 8b 72 ab  ea fd 64 a5  08 41 cd f6
Aug 26 18:33:37.671075: |   f2 3a 17 6f  d9 cb 7d a2  de 7f 68 3e  4e b9 50 34
Aug 26 18:33:37.671078: |   9b 27 55 4c  47 c7 1d 56  c6 33 45 ff  84 43 3c f3
Aug 26 18:33:37.671082: |   5e 41 1f 54  68 7a 66 31  92 bb 8d 82  a8 38 df 5b
Aug 26 18:33:37.671084: |   c7 45 b5 de  ba 9c 01 0a  83 6a 9f 3f  b4 10 62 47
Aug 26 18:33:37.671087: |   19 8b e1 f6  2f e5 7f 64  b6 69 8a c4  94 e5 f0 90
Aug 26 18:33:37.671091: |   37 28 dc e9  5e 3c b9 53  01 fe 4d 8e  48 8b ba a4
Aug 26 18:33:37.671094: |   4d dc e2 3c  48 15 ee b6  7a ac ce 3e  f8 91 6b 02
Aug 26 18:33:37.671097: |   7e 76 40 f5  76 be a0 65  ad 3e da 49  fe ac 99 b1
Aug 26 18:33:37.671100: |   dd e1 33 d7  1c e5 58 4f  21 c2 f1 37  5a 6c 88 19
Aug 26 18:33:37.671103: |   53 b2 af 49  f6 6d 6a b3  82 73 77 ab  13 8c 15 16
Aug 26 18:33:37.671106: |   55 2f ed f8  2e d5 78 47  a9 6b 48 91  9f 75 91 17
Aug 26 18:33:37.671109: |   2e b5 fd fc  ab 49 f2 44  c7 f5 a8 52  d8 79 bc 04
Aug 26 18:33:37.671112: |   b5 44 9b 94  f5 80 57 23  dc 35 cd c2  e5 4e 9e 83
Aug 26 18:33:37.671115: |   33 c6 0e 79  1e 2a 38 34  0b cc 02 91  e5 fe c0 71
Aug 26 18:33:37.671118: |   bf 55 49 ca  4d e0 12 d9  f2 b3 0d 11  ef 6a 1f c2
Aug 26 18:33:37.671121: |   37 13 5f b5  5e 11 da 77  3b 21 f4 d4  23 32 23 83
Aug 26 18:33:37.671125: |   67 31 77 75  be d4 b6 a6  50 e9 a0 d1  7f d9 17 c5
Aug 26 18:33:37.671128: |   0d 10 2b 0f  c2 71 28 1f  53 05 11 df  22 50 fe 30
Aug 26 18:33:37.671131: |   95 de ed fe  6c d1 8d 24  b4 3b 70 01  28 e2 ba 7b
Aug 26 18:33:37.671134: |   cb ca c3 ff  6b 45 7c c0  e8 e4 3b ce  4b 45 66 ed
Aug 26 18:33:37.671137: |   0a f5 28 58  50 4c 33 37  96 da 72 73  7a 22 bb 89
Aug 26 18:33:37.671140: |   86 db 09 04  a6 5f 84 da  6e bf 6c ff  e7 ca c1 9a
Aug 26 18:33:37.671143: |   b4 44 6d 3b  5b b9 f4 7c  b5 47 bd b9  97 97 be 0f
Aug 26 18:33:37.671146: |   b5 c7 fe 99  e8 06 5b b1  15 9f 4e 3c  68 94 71 3d
Aug 26 18:33:37.671150: |   24 c0 05 7b  af 77 3c 26  2e 7c 9b 74  2d e0 bd 66
Aug 26 18:33:37.671153: |   e6 ce b2 79  b2 65 b8 16  cb bd 98 8f  12 10 19 0b
Aug 26 18:33:37.671156: |   bc e4 93 bb  a2 f7 ee 32  27 5a d3 2d  02 bc 23 18
Aug 26 18:33:37.671159: |   57 ad 62 02  e6 e1 09 8f  70 e0 00 84  45 a1 02 e4
Aug 26 18:33:37.671161: |   11 92 95 33  4c 6b 77 d4  83 1c 36 f8  a8 97 ea d0
Aug 26 18:33:37.671164: |   6e 52 c1 ae  d7 9b 6d 1d  ee 1c 35 19  d2 d5 9c bb
Aug 26 18:33:37.671167: |   86 32 02 38  ea 8b 09 7a  7d ae 1b 52  52 b9 d5 d3
Aug 26 18:33:37.671173: |   55 ba 84 96  12 41 d6 fe  1b f2 f9 1d  69 35 6c 1c
Aug 26 18:33:37.671177: |   57 68 6c 63  53 07 4d a9  99 18 cd 69  cf 94 85 cf
Aug 26 18:33:37.671180: |   86 40 07 43  32 0d 45 b6  4f fd 18 f8  13 fb e8 7e
Aug 26 18:33:37.671183: |   94 84 82 63  0f 69 5e 54  3b 08 29 76  71 0f 60 aa
Aug 26 18:33:37.671186: |   05 95 7e f0  91 85 e6 d7  23 dd ef 9c  08 0f 24 bc
Aug 26 18:33:37.671189: |   f6 e1 a4 3c  58 7e b7 c9  b9 10 a3 79  eb 3d cd 06
Aug 26 18:33:37.671192: |   2e 88 29 c0  6a 70 17 96  03 b0 3c 3d  f6 8c 01 ae
Aug 26 18:33:37.671195: |   ae 25 09 ce  4b fc 60 03  2c e6 95 88  93 34 79 d0
Aug 26 18:33:37.671198: |   d9 bc 3c 33  68 83 73 38  b0 0c 11 56  7e 5e df a3
Aug 26 18:33:37.671201: |   51 50 1c 2b  b9 ea 20 cb  2d 6f 21 35  8a 3e c1 ef
Aug 26 18:33:37.671203: |   e9 d0 58 b3  fc 1b 61 1f  a9 ff 36 d2  24 84 2a 9e
Aug 26 18:33:37.671206: |   cc 0d 9f 74  4a 3e 0c e6  6f 60 0a 87  c3 fd c7 c7
Aug 26 18:33:37.671209: |   77 12 53 ae  aa dd 33 73  1a 19 2f c1  ed 3d 6a 6e
Aug 26 18:33:37.671212: |   67 70 d9 96  4d 15 77 6a  ac 67 83 ff  14 be ce eb
Aug 26 18:33:37.671215: |   70 b2 b0 0a  07 9d f4 9d  cf d7 d3 ee  5e 30 8b 64
Aug 26 18:33:37.671218: |   f8 d9 96 09  2b d2 37 c6  0f 87 de 04  da 88 fe cb
Aug 26 18:33:37.671221: |   ed 6e 7d 79  5c 68 6f 46  92 64 b7 94  8a da 50 49
Aug 26 18:33:37.671224: |   e4 a1 07 cc  44 51 27 4e  e0 5c 16 2e  49 52 0e 32
Aug 26 18:33:37.671226: |   77 a7 6d d0  ce 82 ad 84  ab e5 1c 4d  1e 74 fc 31
Aug 26 18:33:37.671229: |   d1 d6 9d d5  b3 1b a0 b9  b6 13 0a 8b  c4 07 30 8b
Aug 26 18:33:37.671232: |   be 3b 40 62  f6 3a 45 bf  80 8c ed a2  f5 d3 eb 5e
Aug 26 18:33:37.671235: |   78 dd bd 72  9e 3e 2c b5  c1 53 b7 25  2b 8c 17 09
Aug 26 18:33:37.671238: |   fc f6 8e 1c  1b a3 f5 3f  6a a7 ca 2d  89 48 64 6f
Aug 26 18:33:37.671241: |   33 4b a8 f2  0e a0 5d 16  c1 dd 37 ab  7b 88 56 c2
Aug 26 18:33:37.671243: |   0a 42 73 b4  72 5e 85 88  c2 b5 c0 29  9b a4 a9 f5
Aug 26 18:33:37.671246: |   4d 11 c4 0e  0b c5 fe 57  d0 1e 83 ea  57 67 77 79
Aug 26 18:33:37.671249: |   30 3d 18 8e  b8 f9 b0 2c  11 de a5 ac  d2 41 18 c0
Aug 26 18:33:37.671252: |   9a b9 76 e8  b6 11 98 e4  76 4d 1f da  07 6d 03 7c
Aug 26 18:33:37.671255: |   07 24 6d 20  55 c0 91 e8  30 3a bf dc  7d 5d 3c 53
Aug 26 18:33:37.671258: |   01 c6 1c 65  fa 20 5b a6  c6 22 fd 97  43 e9 5b 87
Aug 26 18:33:37.671261: |   95 e9 95 1c  c5 71 90 44  35 ca 1c 87  e0 04 80 44
Aug 26 18:33:37.671263: |   3d 98 ef f8  01 3e ae 50  6f 30 ce 0c  08 36 bd a6
Aug 26 18:33:37.671266: |   d2 ce 4f dd  cd 04 09 13  6b a7 60 a3  47 99 3e c2
Aug 26 18:33:37.671269: |   69 5b a2 06  a5 3b 1a 54  14 5f 73 c1  0f 52 1a 9f
Aug 26 18:33:37.671272: |   17 67 f1 db  e0 d0 65 a9  de 02 07 26  64 88 10 c5
Aug 26 18:33:37.671275: |   44 4e a5 ef  bb 64 32 f0  93 f4 12 97  57 7d 59 c8
Aug 26 18:33:37.671278: |   a4 d2 ba a2  6e 0c 22 b5  89 72 04 cb  ab ed 6f 11
Aug 26 18:33:37.671281: |   8e 19 ad f9  43 64 01 ce  5d bc 0c d1  95 95 01 a0
Aug 26 18:33:37.671284: |   61 fd 20 92  7c 89 4f 2a  a3 8d d5 88  55 92 b8 77
Aug 26 18:33:37.671287: |   72 76 32 f5  1e a9 1b 26  db eb f8 d1  bc 6f 4e dd
Aug 26 18:33:37.671303: |   17 f0 07 45  53 b2 2a 31  fe f7 cd 0a  4a 64 d9 d5
Aug 26 18:33:37.671306: |   92 f9 39 f6  f2 92 82 63  93 fc 6b fc  b2 1a 1f 2f
Aug 26 18:33:37.671309: |   b0 8c d9 82  51 e4 ae 84  ac 25 45 0d  67 30 a9 b3
Aug 26 18:33:37.671312: |   2b 5b ea 2a  27 14 38 e1  2b 23 dd 83  02 15 69 8f
Aug 26 18:33:37.671315: |   57 59 03 da  3c dc 29 8d  a3 75 7e 88  49 37 93 33
Aug 26 18:33:37.671318: |   a0 3b 93 bf  46 60 9a 9e  ae de 60 65  df 4d da 05
Aug 26 18:33:37.671321: |   49 e8 42 ca  47 f8 2f b2  a7 7b 3d a3  00 cc 46 80
Aug 26 18:33:37.671324: |   81 92 72 b9  f0 ee 0a 85  e7 e9 c3 ff  a4 9f 05 36
Aug 26 18:33:37.671327: |   d9 5c 81 2c  24 a3 80 93  7a c9 c3 ea  04 28 bf 72
Aug 26 18:33:37.671329: |   a7 2f dc 04  8b 4f fb e0  f3 5e b3 9e  9d 49 33 fd
Aug 26 18:33:37.671332: |   d5 9c 6f a6  75 7d c0 9a  e0 79 93 86  1c e6 f4 90
Aug 26 18:33:37.671335: |   d1 dc 5f 35  4f b3 92 98  23 96 3f 3f  9d ff 91 19
Aug 26 18:33:37.671340: |   63 eb 85 90  07 13 b5 72  3d b9 6e 2c  62 69 77 b0
Aug 26 18:33:37.671344: |   eb 7f 14 a8  8b 44 b5 06  ad 03 ae af  c9 9c a8 14
Aug 26 18:33:37.671347: |   a5 31 39 51  2c 3a 52 ea  c8 d2 97 b4  0e ac fd e7
Aug 26 18:33:37.671350: |   a7 64 91 fd  46 13 64 8f  50 d7 2f 15  5c f8 e4 1b
Aug 26 18:33:37.671352: |   47 87 9e 62  9b 5c 51 91  06 98 21 a4  b8 41 1f a7
Aug 26 18:33:37.671355: |   77 5c 9a e8  23 b2 e6 5e  f4 d4 0a c2  b5 1b 40 b6
Aug 26 18:33:37.671358: |   df 64 45 cb  f8 50 32 56  fb a3 8b 13  3e 58 cf db
Aug 26 18:33:37.671361: |   84 da b2 8e  8f 3c b1 77  12 01 89 d8  ff 88 32 16
Aug 26 18:33:37.671364: |   6c 1d eb 10  1f 60 9f 17  44 2f 7a 24  15 e1 04 f3
Aug 26 18:33:37.671367: |   fc 48 d6 e0  26 17 49 d4  bc 6f ce db  cc 1e cc 9b
Aug 26 18:33:37.671370: |   cc 95 0f ec  72 0f dc f9  6d e3 8e 36  9e a8 eb 88
Aug 26 18:33:37.671373: |   d9 15 67 5c  55 82 7e 0f  79 82 f9 41  12 61 8a 29
Aug 26 18:33:37.671376: |   8b 1b 26 6a  42 dc c8 7e  de b3 fe b4  9f 61 7a 3d
Aug 26 18:33:37.671379: |   7b 5b bc 46  dd 54 f9 7b  1a 5d 13 ea  2f bb 36 41
Aug 26 18:33:37.671381: |   7c 67 f2 61  5f b1 15 e3  17 a1 6d ce  cd 44 ba 9f
Aug 26 18:33:37.671384: |   c4 6c b2 78  c4 f2 f9 56  32 8d 93 13  5a 57 f0 87
Aug 26 18:33:37.671387: |   ed 09 c3 61  52 6d 11 c5  8b c6 6c 0c  84 3b f8 89
Aug 26 18:33:37.671390: |   8d 13 78 d4  a7 bd e0 6c  0b 2a 87 86  4b f4 4d e0
Aug 26 18:33:37.671393: |   d5 a4 04 3c  98 a4 1c 96  03 38 49 e4  aa 6f 9c e2
Aug 26 18:33:37.671396: |   47 93 d8 ee  d2 fa 00 de  ae 13 b0 74  6d ef ad 9a
Aug 26 18:33:37.671399: |   17 2f 06 46  d2 7a b6 56  f8 60 af 55  27 ea f9 61
Aug 26 18:33:37.671401: |   8e f6 c4 bb  e2 a3 9d 48  b5 ac 54 ec  78 54 a4 d2
Aug 26 18:33:37.671404: |   95 c0 8b 8b  75 8d bb aa  00 ae de 7e  c4 67 f8 62
Aug 26 18:33:37.671407: |   d6 64 af d6  aa 2c 88 aa  10 0e f6 59  32 ad 2a ec
Aug 26 18:33:37.671410: |   1c 47 05 23  6a 6a 7c 1e  5a 71 ff 33  c4 13 89 93
Aug 26 18:33:37.671413: |   22 36 a3 8d  9f f9 9c d8  ad f1 67 02
Aug 26 18:33:37.671419: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:33:37.671424: | **parse ISAKMP Message:
Aug 26 18:33:37.671428: |    initiator cookie:
Aug 26 18:33:37.671431: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.671434: |    responder cookie:
Aug 26 18:33:37.671437: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.671440: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:33:37.671444: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:37.671447: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:33:37.671451: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:37.671454: |    Message ID: 0 (0x0)
Aug 26 18:33:37.671458: |    length: 1884 (0x75c)
Aug 26 18:33:37.671462: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:33:37.671467: | State DB: found IKEv1 state #3 in MAIN_I3 (find_state_ikev1)
Aug 26 18:33:37.671474: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459)
Aug 26 18:33:37.671477: | #3 is idle
Aug 26 18:33:37.671480: | #3 idle
Aug 26 18:33:37.671485: | received encrypted packet from 192.1.2.23:500
Aug 26 18:33:37.671506: | got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x220 opt: 0x20c0
Aug 26 18:33:37.671510: | ***parse ISAKMP Identification Payload:
Aug 26 18:33:37.671514: |    next payload type: ISAKMP_NEXT_CERT (0x6)
Aug 26 18:33:37.671517: |    length: 191 (0xbf)
Aug 26 18:33:37.671520: |    ID type: ID_DER_ASN1_DN (0x9)
Aug 26 18:33:37.671523: |    DOI specific A: 0 (0x0)
Aug 26 18:33:37.671526: |    DOI specific B: 0 (0x0)
Aug 26 18:33:37.671529: |      obj:   30 81 b4 31  0b 30 09 06  03 55 04 06  13 02 43 41
Aug 26 18:33:37.671532: |      obj:   31 10 30 0e  06 03 55 04  08 0c 07 4f  6e 74 61 72
Aug 26 18:33:37.671535: |      obj:   69 6f 31 10  30 0e 06 03  55 04 07 0c  07 54 6f 72
Aug 26 18:33:37.671538: |      obj:   6f 6e 74 6f  31 12 30 10  06 03 55 04  0a 0c 09 4c
Aug 26 18:33:37.671540: |      obj:   69 62 72 65  73 77 61 6e  31 18 30 16  06 03 55 04
Aug 26 18:33:37.671545: |      obj:   0b 0c 0f 54  65 73 74 20  44 65 70 61  72 74 6d 65
Aug 26 18:33:37.671549: |      obj:   6e 74 31 23  30 21 06 03  55 04 03 0c  1a 65 61 73
Aug 26 18:33:37.671552: |      obj:   74 2e 74 65  73 74 69 6e  67 2e 6c 69  62 72 65 73
Aug 26 18:33:37.671556: |      obj:   77 61 6e 2e  6f 72 67 31  2e 30 2c 06  09 2a 86 48
Aug 26 18:33:37.671559: |      obj:   86 f7 0d 01  09 01 16 1f  75 73 65 72  2d 65 61 73
Aug 26 18:33:37.671562: |      obj:   74 40 74 65  73 74 69 6e  67 2e 6c 69  62 72 65 73
Aug 26 18:33:37.671565: |      obj:   77 61 6e 2e  6f 72 67
Aug 26 18:33:37.671568: | got payload 0x40  (ISAKMP_NEXT_CERT) needed: 0x200 opt: 0x20c0
Aug 26 18:33:37.671571: | ***parse ISAKMP Certificate Payload:
Aug 26 18:33:37.671574: |    next payload type: ISAKMP_NEXT_SIG (0x9)
Aug 26 18:33:37.671577: |    length: 1265 (0x4f1)
Aug 26 18:33:37.671581: |    cert encoding: CERT_X509_SIGNATURE (0x4)
Aug 26 18:33:37.671584: | got payload 0x200  (ISAKMP_NEXT_SIG) needed: 0x200 opt: 0x20c0
Aug 26 18:33:37.671587: | ***parse ISAKMP Signature Payload:
Aug 26 18:33:37.671590: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.671593: |    length: 388 (0x184)
Aug 26 18:33:37.671596: | removing 12 bytes of padding
Aug 26 18:33:37.671599: | message 'main_inR3' HASH payload not checked early
Aug 26 18:33:37.671605: | DER ASN1 DN:  30 81 b4 31  0b 30 09 06  03 55 04 06  13 02 43 41
Aug 26 18:33:37.671608: | DER ASN1 DN:  31 10 30 0e  06 03 55 04  08 0c 07 4f  6e 74 61 72
Aug 26 18:33:37.671611: | DER ASN1 DN:  69 6f 31 10  30 0e 06 03  55 04 07 0c  07 54 6f 72
Aug 26 18:33:37.671614: | DER ASN1 DN:  6f 6e 74 6f  31 12 30 10  06 03 55 04  0a 0c 09 4c
Aug 26 18:33:37.671617: | DER ASN1 DN:  69 62 72 65  73 77 61 6e  31 18 30 16  06 03 55 04
Aug 26 18:33:37.671620: | DER ASN1 DN:  0b 0c 0f 54  65 73 74 20  44 65 70 61  72 74 6d 65
Aug 26 18:33:37.671622: | DER ASN1 DN:  6e 74 31 23  30 21 06 03  55 04 03 0c  1a 65 61 73
Aug 26 18:33:37.671625: | DER ASN1 DN:  74 2e 74 65  73 74 69 6e  67 2e 6c 69  62 72 65 73
Aug 26 18:33:37.671628: | DER ASN1 DN:  77 61 6e 2e  6f 72 67 31  2e 30 2c 06  09 2a 86 48
Aug 26 18:33:37.671631: | DER ASN1 DN:  86 f7 0d 01  09 01 16 1f  75 73 65 72  2d 65 61 73
Aug 26 18:33:37.671634: | DER ASN1 DN:  74 40 74 65  73 74 69 6e  67 2e 6c 69  62 72 65 73
Aug 26 18:33:37.671636: | DER ASN1 DN:  77 61 6e 2e  6f 72 67
Aug 26 18:33:37.671647: "northnet-eastnet-b" #3: Peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org'
Aug 26 18:33:37.671655: | global one-shot timer EVENT_FREE_ROOT_CERTS scheduled in 300 seconds
Aug 26 18:33:37.671663: |     #3 spent 0.0075 milliseconds in find_and_verify_certs() calling get_root_certs()
Aug 26 18:33:37.671668: | checking for known CERT payloads
Aug 26 18:33:37.671671: | saving certificate of type 'X509_SIGNATURE'
Aug 26 18:33:37.671739: | decoded cert: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA
Aug 26 18:33:37.671748: |     #3 spent 0.0785 milliseconds in find_and_verify_certs() calling decode_cert_payloads()
Aug 26 18:33:37.671754: | cert_issuer_has_current_crl: looking for a CRL issued by E=testing@libreswan.org,CN=Libreswan test CA for mainca,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA
Aug 26 18:33:37.671857: |     #3 spent 0.101 milliseconds in find_and_verify_certs() calling crl_update_check()
Aug 26 18:33:37.671864: | missing or expired CRL
Aug 26 18:33:37.671868: | crl_strict: 0, ocsp: 0, ocsp_strict: 0, ocsp_post: 0
Aug 26 18:33:37.671871: | verify_end_cert trying profile IPsec
Aug 26 18:33:37.672003: | certificate is valid (profile IPsec)
Aug 26 18:33:37.672013: |     #3 spent 0.144 milliseconds in find_and_verify_certs() calling verify_end_cert()
Aug 26 18:33:37.672019: "northnet-eastnet-b" #3: certificate verified OK: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA
Aug 26 18:33:37.672100: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d970ef8
Aug 26 18:33:37.672106: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d976488
Aug 26 18:33:37.672109: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d9762d8
Aug 26 18:33:37.672112: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d976128
Aug 26 18:33:37.672114: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55c66d9532a8
Aug 26 18:33:37.672328: | unreference key: 0x55c66d961a28 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1--
Aug 26 18:33:37.672343: |     #3 spent 0.312 milliseconds in decode_certs() calling add_pubkey_from_nss_cert()
Aug 26 18:33:37.672348: |   #3 spent 0.692 milliseconds in decode_certs()
Aug 26 18:33:37.672360: | ID_DER_ASN1_DN 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' needs further ID comparison against 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org'
Aug 26 18:33:37.672364: | ID_DER_ASN1_DN 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' matched our ID
Aug 26 18:33:37.672367: | SAN ID matched, updating that.cert
Aug 26 18:33:37.672370: | X509: CERT and ID matches current connection
Aug 26 18:33:37.672410: | required RSA CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:37.672421: | checking RSA keyid 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' for match with 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org'
Aug 26 18:33:37.672428: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:37.672433: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:37.672439: | key issuer CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:37.672585: | an RSA Sig check passed with *AwEAAbEef [remote certificates]
Aug 26 18:33:37.672592: |   #3 spent 0.148 milliseconds in try_all_RSA_keys() trying a pubkey
Aug 26 18:33:37.672596: "northnet-eastnet-b" #3: Authenticated using RSA
Aug 26 18:33:37.672599: | FOR_EACH_CONNECTION_... in ISAKMP_SA_established
Aug 26 18:33:37.672649: | complete v1 state transition with STF_OK
Aug 26 18:33:37.672657: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:33:37.672660: | #3 is idle
Aug 26 18:33:37.672662: | doing_xauth:no, t_xauth_client_done:no
Aug 26 18:33:37.672665: | IKEv1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
Aug 26 18:33:37.672668: | parent state #3: MAIN_I3(open IKE SA) => MAIN_I4(established IKE SA)
Aug 26 18:33:37.672671: | event_already_set, deleting event
Aug 26 18:33:37.672674: | state #3 requesting EVENT_RETRANSMIT to be deleted
Aug 26 18:33:37.672677: | #3 STATE_MAIN_I4: retransmits: cleared
Aug 26 18:33:37.672682: | libevent_free: release ptr-libevent@0x55c66d960ba8
Aug 26 18:33:37.672685: | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fbd0c002b78
Aug 26 18:33:37.672688: | !event_already_set at reschedule
Aug 26 18:33:37.672692: | event_schedule: new EVENT_SA_REPLACE-pe@0x7fbd0c002b78
Aug 26 18:33:37.672696: | inserting event EVENT_SA_REPLACE, timeout in 2638 seconds for #3
Aug 26 18:33:37.672699: | libevent_malloc: new ptr-libevent@0x7fbd00000f48 size 128
Aug 26 18:33:37.672703: | pstats #3 ikev1.isakmp established
Aug 26 18:33:37.672713: "northnet-eastnet-b" #3: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048}
Aug 26 18:33:37.672717: | DPD: dpd_init() called on ISAKMP SA
Aug 26 18:33:37.672719: | DPD: Peer supports Dead Peer Detection
Aug 26 18:33:37.672721: | DPD: not initializing DPD because DPD is disabled locally
Aug 26 18:33:37.672724: | modecfg pull: noquirk policy:push not-client
Aug 26 18:33:37.672726: | phase 1 is done, looking for phase 2 to unpend
Aug 26 18:33:37.672729: | unpending state #3
Aug 26 18:33:37.672735: | creating state object #4 at 0x55c66d96e5f8
Aug 26 18:33:37.672738: | State DB: adding IKEv1 state #4 in UNDEFINED
Aug 26 18:33:37.672742: | pstats #4 ikev1.ipsec started
Aug 26 18:33:37.672745: | duplicating state object #3 "northnet-eastnet-b" as #4 for IPSEC SA
Aug 26 18:33:37.672751: | #4 setting local endpoint to 192.1.3.33:500 from #3.st_localport (in duplicate_state() at state.c:1484)
Aug 26 18:33:37.672756: | in connection_discard for connection northnet-eastnet-b
Aug 26 18:33:37.672762: | suspend processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685)
Aug 26 18:33:37.672768: | start processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685)
Aug 26 18:33:37.672775: | child state #4: UNDEFINED(ignore) => QUICK_I1(established CHILD SA)
Aug 26 18:33:37.672783: "north-a-dpd" #4: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#3 msgid:03b37f3e proposal=defaults pfsgroup=MODP2048}
Aug 26 18:33:37.672789: | adding quick_outI1 KE work-order 7 for state #4
Aug 26 18:33:37.672793: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55c66d954c08
Aug 26 18:33:37.672797: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #4
Aug 26 18:33:37.672800: | libevent_malloc: new ptr-libevent@0x55c66d974918 size 128
Aug 26 18:33:37.672812: | stop processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764)
Aug 26 18:33:37.672817: | resume processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764)
Aug 26 18:33:37.672821: | crypto helper 5 resuming
Aug 26 18:33:37.672821: | unqueuing pending Quick Mode with 192.1.2.23 "north-a-dpd"
Aug 26 18:33:37.672845: | removing pending policy for no connection {0x55c66d9631c8}
Aug 26 18:33:37.672838: | crypto helper 5 starting work-order 7 for state #4
Aug 26 18:33:37.672851: | creating state object #5 at 0x55c66d96fcb8
Aug 26 18:33:37.672855: | crypto helper 5 doing build KE and nonce (quick_outI1 KE); request ID 7
Aug 26 18:33:37.672856: | State DB: adding IKEv1 state #5 in UNDEFINED
Aug 26 18:33:37.672868: | pstats #5 ikev1.ipsec started
Aug 26 18:33:37.672872: | duplicating state object #3 "northnet-eastnet-b" as #5 for IPSEC SA
Aug 26 18:33:37.672878: | #5 setting local endpoint to 192.1.3.33:500 from #3.st_localport (in duplicate_state() at state.c:1484)
Aug 26 18:33:37.672885: | suspend processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685)
Aug 26 18:33:37.672891: | start processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685)
Aug 26 18:33:37.672898: | child state #5: UNDEFINED(ignore) => QUICK_I1(established CHILD SA)
Aug 26 18:33:37.672905: "northnet-eastnet-b" #5: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#3 msgid:ee37f542 proposal=defaults pfsgroup=MODP2048}
Aug 26 18:33:37.672910: | adding quick_outI1 KE work-order 8 for state #5
Aug 26 18:33:37.672914: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fbd18002b78
Aug 26 18:33:37.672919: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #5
Aug 26 18:33:37.672922: | libevent_malloc: new ptr-libevent@0x55c66d967ce8 size 128
Aug 26 18:33:37.672934: | stop processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764)
Aug 26 18:33:37.672943: | crypto helper 0 resuming
Aug 26 18:33:37.672944: | resume processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764)
Aug 26 18:33:37.672961: | crypto helper 0 starting work-order 8 for state #5
Aug 26 18:33:37.672970: | unqueuing pending Quick Mode with 192.1.2.23 "northnet-eastnet-b"
Aug 26 18:33:37.672978: | crypto helper 0 doing build KE and nonce (quick_outI1 KE); request ID 8
Aug 26 18:33:37.672981: | removing pending policy for no connection {0x55c66d9621c8}
Aug 26 18:33:37.672988: | #3 spent 1.37 milliseconds in process_packet_tail()
Aug 26 18:33:37.672995: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:33:37.673002: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_md() at demux.c:382)
Aug 26 18:33:37.673006: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:33:37.673012: | spent 1.96 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:33:37.674910: | crypto helper 0 finished build KE and nonce (quick_outI1 KE); request ID 8 time elapsed 0.001931 seconds
Aug 26 18:33:37.674934: | (#5) spent 1.08 milliseconds in crypto helper computing work-order 8: quick_outI1 KE (pcr)
Aug 26 18:33:37.674938: | crypto helper 0 sending results from work-order 8 for state #5 to event queue
Aug 26 18:33:37.674942: | scheduling resume sending helper answer for #5
Aug 26 18:33:37.674946: | libevent_malloc: new ptr-libevent@0x7fbd18006378 size 128
Aug 26 18:33:37.674957: | crypto helper 0 waiting (nothing to do)
Aug 26 18:33:37.674976: | crypto helper 5 finished build KE and nonce (quick_outI1 KE); request ID 7 time elapsed 0.002121 seconds
Aug 26 18:33:37.674985: | (#4) spent 1.04 milliseconds in crypto helper computing work-order 7: quick_outI1 KE (pcr)
Aug 26 18:33:37.674989: | crypto helper 5 sending results from work-order 7 for state #4 to event queue
Aug 26 18:33:37.674992: | scheduling resume sending helper answer for #4
Aug 26 18:33:37.674996: | libevent_malloc: new ptr-libevent@0x7fbd04002888 size 128
Aug 26 18:33:37.675000: | crypto helper 5 waiting (nothing to do)
Aug 26 18:33:37.675098: | processing resume sending helper answer for #5
Aug 26 18:33:37.675115: | start processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:797)
Aug 26 18:33:37.675123: | crypto helper 0 replies to request ID 8
Aug 26 18:33:37.675127: | calling continuation function 0x55c66cb6db50
Aug 26 18:33:37.675132: | quick_outI1_continue for #5: calculated ke+nonce, sending I1
Aug 26 18:33:37.675140: | **emit ISAKMP Message:
Aug 26 18:33:37.675145: |    initiator cookie:
Aug 26 18:33:37.675148: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.675151: |    responder cookie:
Aug 26 18:33:37.675155: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.675160: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.675165: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:37.675169: |    exchange type: ISAKMP_XCHG_QUICK (0x20)
Aug 26 18:33:37.675173: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:37.675181: |    Message ID: 3996644674 (0xee37f542)
Aug 26 18:33:37.675186: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:37.675191: | ***emit ISAKMP Hash Payload:
Aug 26 18:33:37.675195: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.675200: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:33:37.675205: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.675211: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:33:37.675214: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:33:37.675218: | emitting quick defaults using policy none
Aug 26 18:33:37.675221: | empty esp_info, returning defaults for ENCRYPT
Aug 26 18:33:37.675232: | ***emit ISAKMP Security Association Payload:
Aug 26 18:33:37.675236: |    next payload type: ISAKMP_NEXT_NONCE (0xa)
Aug 26 18:33:37.675240: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:37.675245: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE
Aug 26 18:33:37.675250: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:33:37.675254: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.675259: | ****emit IPsec DOI SIT:
Aug 26 18:33:37.675262: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:33:37.675267: | ikev1_out_sa pcn: 0 has 1 valid proposals
Aug 26 18:33:37.675271: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2
Aug 26 18:33:37.675274: | ****emit ISAKMP Proposal Payload:
Aug 26 18:33:37.675278: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.675281: |    proposal number: 0 (0x0)
Aug 26 18:33:37.675285: |    protocol ID: PROTO_IPSEC_ESP (0x3)
Aug 26 18:33:37.675293: |    SPI size: 4 (0x4)
Aug 26 18:33:37.675301: |    number of transforms: 2 (0x2)
Aug 26 18:33:37.675306: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
Aug 26 18:33:37.675327: | netlink_get_spi: allocated 0x31a5aad0 for esp.0@192.1.3.33
Aug 26 18:33:37.675333: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
Aug 26 18:33:37.675337: | SPI  31 a5 aa d0
Aug 26 18:33:37.675341: | *****emit ISAKMP Transform Payload (ESP):
Aug 26 18:33:37.675345: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:37.675348: |    ESP transform number: 0 (0x0)
Aug 26 18:33:37.675352: |    ESP transform ID: ESP_AES (0xc)
Aug 26 18:33:37.675357: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type'
Aug 26 18:33:37.675362: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675365: |    af+type: AF+GROUP_DESCRIPTION (0x8003)
Aug 26 18:33:37.675369: |    length/value: 14 (0xe)
Aug 26 18:33:37.675373: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:37.675377: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675379: |    af+type: AF+ENCAPSULATION_MODE (0x8004)
Aug 26 18:33:37.675381: |    length/value: 1 (0x1)
Aug 26 18:33:37.675383: |     [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 26 18:33:37.675385: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675387: |    af+type: AF+SA_LIFE_TYPE (0x8001)
Aug 26 18:33:37.675389: |    length/value: 1 (0x1)
Aug 26 18:33:37.675391: |     [1 is SA_LIFE_TYPE_SECONDS]
Aug 26 18:33:37.675393: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675395: |    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
Aug 26 18:33:37.675397: |    length/value: 28800 (0x7080)
Aug 26 18:33:37.675399: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675401: |    af+type: AF+AUTH_ALGORITHM (0x8005)
Aug 26 18:33:37.675402: |    length/value: 2 (0x2)
Aug 26 18:33:37.675404: |     [2 is AUTH_ALGORITHM_HMAC_SHA1]
Aug 26 18:33:37.675406: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675408: |    af+type: AF+KEY_LENGTH (0x8006)
Aug 26 18:33:37.675410: |    length/value: 128 (0x80)
Aug 26 18:33:37.675412: | emitting length of ISAKMP Transform Payload (ESP): 32
Aug 26 18:33:37.675414: | *****emit ISAKMP Transform Payload (ESP):
Aug 26 18:33:37.675416: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.675418: |    ESP transform number: 1 (0x1)
Aug 26 18:33:37.675419: |    ESP transform ID: ESP_3DES (0x3)
Aug 26 18:33:37.675422: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:37.675424: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type'
Aug 26 18:33:37.675426: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675430: |    af+type: AF+GROUP_DESCRIPTION (0x8003)
Aug 26 18:33:37.675432: |    length/value: 14 (0xe)
Aug 26 18:33:37.675434: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:37.675436: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675438: |    af+type: AF+ENCAPSULATION_MODE (0x8004)
Aug 26 18:33:37.675439: |    length/value: 1 (0x1)
Aug 26 18:33:37.675441: |     [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 26 18:33:37.675443: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675445: |    af+type: AF+SA_LIFE_TYPE (0x8001)
Aug 26 18:33:37.675447: |    length/value: 1 (0x1)
Aug 26 18:33:37.675448: |     [1 is SA_LIFE_TYPE_SECONDS]
Aug 26 18:33:37.675450: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675452: |    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
Aug 26 18:33:37.675454: |    length/value: 28800 (0x7080)
Aug 26 18:33:37.675456: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675457: |    af+type: AF+AUTH_ALGORITHM (0x8005)
Aug 26 18:33:37.675459: |    length/value: 2 (0x2)
Aug 26 18:33:37.675461: |     [2 is AUTH_ALGORITHM_HMAC_SHA1]
Aug 26 18:33:37.675463: | emitting length of ISAKMP Transform Payload (ESP): 28
Aug 26 18:33:37.675465: | emitting length of ISAKMP Proposal Payload: 72
Aug 26 18:33:37.675467: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0
Aug 26 18:33:37.675469: | emitting length of ISAKMP Security Association Payload: 84
Aug 26 18:33:37.675471: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
Aug 26 18:33:37.675474: | ***emit ISAKMP Nonce Payload:
Aug 26 18:33:37.675476: |    next payload type: ISAKMP_NEXT_KE (0x4)
Aug 26 18:33:37.675478: | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE
Aug 26 18:33:37.675481: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE)
Aug 26 18:33:37.675483: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.675485: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload
Aug 26 18:33:37.675487: | Ni  af ce cc 5f  36 ad a0 c5  ef 03 b7 3a  be 00 30 ef
Aug 26 18:33:37.675489: | Ni  34 a8 ad cf  6e 49 98 38  be d3 c6 4c  0d 7b a1 e5
Aug 26 18:33:37.675491: | emitting length of ISAKMP Nonce Payload: 36
Aug 26 18:33:37.675494: | ***emit ISAKMP Key Exchange Payload:
Aug 26 18:33:37.675495: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:33:37.675498: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID
Aug 26 18:33:37.675500: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE)
Aug 26 18:33:37.675502: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.675504: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
Aug 26 18:33:37.675506: | keyex value  e7 ae 7e b3  c6 0e 1b 61  d1 e3 88 43  17 4e 97 27
Aug 26 18:33:37.675508: | keyex value  e7 26 a4 84  11 07 ac b3  9b 0d 42 a8  f9 d2 d2 ed
Aug 26 18:33:37.675510: | keyex value  ee f4 5e a1  60 68 20 9f  95 6a ca e4  9e 45 71 d0
Aug 26 18:33:37.675511: | keyex value  59 7c 7d 1a  7c 9c 2a 65  86 3b a5 f9  b7 ec 1a fd
Aug 26 18:33:37.675513: | keyex value  06 21 18 c6  90 dd 17 64  51 a7 6c 19  5e d9 b9 6c
Aug 26 18:33:37.675515: | keyex value  1d be de 27  85 c0 7a c6  92 5b cb cb  eb 19 31 cd
Aug 26 18:33:37.675517: | keyex value  87 6d 65 4c  0b 7c c8 22  fe 3d 75 69  84 bd ff 17
Aug 26 18:33:37.675519: | keyex value  6b 28 52 70  ea 4c 26 e3  1f a3 17 76  ff 66 55 ea
Aug 26 18:33:37.675520: | keyex value  2a 2b af f0  5f 73 ab 05  87 51 e9 64  92 4e 5c 48
Aug 26 18:33:37.675522: | keyex value  87 ed b3 67  70 c6 75 be  04 46 90 63  dc 62 7d c3
Aug 26 18:33:37.675524: | keyex value  67 5d e7 27  67 7b 7b 71  a9 20 9b 56  16 fc 26 d0
Aug 26 18:33:37.675527: | keyex value  fb c6 99 1d  b2 ee 69 5d  a0 92 54 67  9b b0 aa 2f
Aug 26 18:33:37.675529: | keyex value  b6 d8 ab 64  79 90 8a fd  e4 d1 61 3b  7a 6f c0 30
Aug 26 18:33:37.675530: | keyex value  6f ba ad c4  d1 8c 07 29  54 e1 18 f9  78 b4 7b 56
Aug 26 18:33:37.675532: | keyex value  08 e8 11 2b  e0 60 47 99  ec ba 6e 73  29 56 1e 5b
Aug 26 18:33:37.675534: | keyex value  3c 57 7a de  79 d1 4c 44  01 f8 d1 8c  95 9a 0b 45
Aug 26 18:33:37.675536: | emitting length of ISAKMP Key Exchange Payload: 260
Aug 26 18:33:37.675538: | ***emit ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:33:37.675540: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:33:37.675542: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:33:37.675544: |    Protocol ID: 0 (0x0)
Aug 26 18:33:37.675546: |    port: 0 (0x0)
Aug 26 18:33:37.675548: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID
Aug 26 18:33:37.675550: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
Aug 26 18:33:37.675552: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
Aug 26 18:33:37.675555: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:37.675557: | client network  c0 00 03 00
Aug 26 18:33:37.675559: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:37.675561: | client mask  ff ff ff 00
Aug 26 18:33:37.675563: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16
Aug 26 18:33:37.675565: | ***emit ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:33:37.675566: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.675568: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:33:37.675570: |    Protocol ID: 0 (0x0)
Aug 26 18:33:37.675572: |    port: 0 (0x0)
Aug 26 18:33:37.675574: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
Aug 26 18:33:37.675576: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
Aug 26 18:33:37.675578: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:37.675580: | client network  c0 00 02 00
Aug 26 18:33:37.675582: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:37.675584: | client mask  ff ff ff 00
Aug 26 18:33:37.675585: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16
Aug 26 18:33:37.675610: | outI1 HASH(1):
Aug 26 18:33:37.675613: |   2c 67 8f 67  70 9c 70 74  bf cd f0 e3  18 87 bc 03
Aug 26 18:33:37.675615: |   5b f7 56 4a  49 b5 cb 6a  2f a9 6b dc  84 fa 9b 8b
Aug 26 18:33:37.675622: | no IKEv1 message padding required
Aug 26 18:33:37.675624: | emitting length of ISAKMP Message: 476
Aug 26 18:33:37.675637: | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #5)
Aug 26 18:33:37.675640: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.675642: |   08 10 20 01  ee 37 f5 42  00 00 01 dc  91 1e cc 87
Aug 26 18:33:37.675643: |   1c e9 eb 78  92 4d 33 f0  07 35 12 57  1a 4a fb ec
Aug 26 18:33:37.675645: |   44 d7 78 a3  07 07 87 e5  bb a1 3a 0c  e0 94 bb 7b
Aug 26 18:33:37.675647: |   af 49 59 cd  32 23 09 ca  a9 09 3a bc  ee d9 51 2f
Aug 26 18:33:37.675648: |   3c c7 07 df  92 a5 23 25  31 5e 74 83  68 54 91 eb
Aug 26 18:33:37.675650: |   4b 09 45 14  3a 2e 98 c2  51 a6 b5 58  6c d2 d5 ba
Aug 26 18:33:37.675652: |   86 2d 24 56  04 5d 6e 4b  78 61 31 cc  64 b3 3d 08
Aug 26 18:33:37.675654: |   b5 7d 51 18  99 c7 aa 70  53 8b 40 ae  e7 10 f5 21
Aug 26 18:33:37.675655: |   ad 8f 53 b9  a1 d2 b2 ac  48 e4 c7 65  bd 46 cd fc
Aug 26 18:33:37.675659: |   83 c1 b4 83  eb 17 ff cc  fd 15 6f 64  dc e4 96 7f
Aug 26 18:33:37.675661: |   a9 19 11 eb  07 38 ff 47  28 68 f5 a6  df ac 9c f5
Aug 26 18:33:37.675662: |   c3 e0 8a 06  cd 53 67 e4  c9 bc 51 48  cf 4a 98 f9
Aug 26 18:33:37.675664: |   f3 30 03 ed  0d 5a d1 14  b3 45 47 7e  4a 9a 6c 15
Aug 26 18:33:37.675666: |   1e 3a 70 77  d2 48 d5 45  bf 5a f6 72  c3 10 09 8a
Aug 26 18:33:37.675667: |   b1 fc 53 d2  6b 38 6f dd  58 40 e2 b0  5d fd df 57
Aug 26 18:33:37.675669: |   57 79 88 d6  f4 cd 95 59  74 1e 51 e6  c9 8d df a9
Aug 26 18:33:37.675671: |   99 b4 7a a6  1f ac d7 5c  7c b0 80 18  bf b1 28 00
Aug 26 18:33:37.675673: |   47 a1 63 7c  3b 61 f8 99  ff 0d a5 1e  ad b8 ff 04
Aug 26 18:33:37.675674: |   d6 d2 6c 49  67 91 e4 00  89 c3 ec db  79 b5 11 8f
Aug 26 18:33:37.675676: |   5a 34 59 95  34 9e 81 1d  23 4c 64 d9  50 ca a4 23
Aug 26 18:33:37.675678: |   30 49 f7 7a  c0 f1 6a 99  fa 87 57 72  a2 b6 bf 4f
Aug 26 18:33:37.675680: |   25 ba cd 8f  1a 88 b9 8c  e2 de 95 af  49 ec f1 72
Aug 26 18:33:37.675681: |   7d e6 62 1e  1c 37 21 35  7b 9c c1 8c  de ed e8 a3
Aug 26 18:33:37.675683: |   bf 48 bd 3d  32 b5 ec 20  69 d0 f7 82  6b 61 16 0f
Aug 26 18:33:37.675685: |   ae da d7 1d  76 bc c6 6d  53 60 fc df  d2 a7 fa 7a
Aug 26 18:33:37.675686: |   94 11 20 50  96 81 c1 75  eb 6f a5 12  d2 7b bc d5
Aug 26 18:33:37.675688: |   16 11 e7 65  16 05 4c ae  8c 16 b0 61  5d 0b 66 6b
Aug 26 18:33:37.675690: |   7f be 48 c0  49 3b c1 12  cf 49 46 29  aa 9c 2c ea
Aug 26 18:33:37.675692: |   7f ce cd 07  23 9c c1 e9  8a 53 5e fe
Aug 26 18:33:37.675738: | state #5 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Aug 26 18:33:37.675743: | libevent_free: release ptr-libevent@0x55c66d967ce8
Aug 26 18:33:37.675745: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fbd18002b78
Aug 26 18:33:37.675748: | event_schedule: new EVENT_RETRANSMIT-pe@0x7fbd18002b78
Aug 26 18:33:37.675752: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #5
Aug 26 18:33:37.675754: | libevent_malloc: new ptr-libevent@0x55c66d960ba8 size 128
Aug 26 18:33:37.675758: | #5 STATE_QUICK_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29703.418215
Aug 26 18:33:37.675761: | resume sending helper answer for #5 suppresed complete_v1_state_transition()
Aug 26 18:33:37.675766: | #5 spent 0.614 milliseconds in resume sending helper answer
Aug 26 18:33:37.675770: | stop processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:833)
Aug 26 18:33:37.675773: | libevent_free: release ptr-libevent@0x7fbd18006378
Aug 26 18:33:37.675775: | processing resume sending helper answer for #4
Aug 26 18:33:37.675779: | start processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:797)
Aug 26 18:33:37.675784: | crypto helper 5 replies to request ID 7
Aug 26 18:33:37.675790: | calling continuation function 0x55c66cb6db50
Aug 26 18:33:37.675794: | quick_outI1_continue for #4: calculated ke+nonce, sending I1
Aug 26 18:33:37.675800: | **emit ISAKMP Message:
Aug 26 18:33:37.675803: |    initiator cookie:
Aug 26 18:33:37.675806: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.675809: |    responder cookie:
Aug 26 18:33:37.675812: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.675816: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.675820: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:37.675823: |    exchange type: ISAKMP_XCHG_QUICK (0x20)
Aug 26 18:33:37.675826: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:37.675830: |    Message ID: 62095166 (0x3b37f3e)
Aug 26 18:33:37.675834: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:37.675837: | ***emit ISAKMP Hash Payload:
Aug 26 18:33:37.675841: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.675844: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:33:37.675848: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.675854: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:33:37.675858: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:33:37.675861: | emitting quick defaults using policy none
Aug 26 18:33:37.675865: | empty esp_info, returning defaults for ENCRYPT
Aug 26 18:33:37.675870: | ***emit ISAKMP Security Association Payload:
Aug 26 18:33:37.675873: |    next payload type: ISAKMP_NEXT_NONCE (0xa)
Aug 26 18:33:37.675876: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:37.675880: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE
Aug 26 18:33:37.675883: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:33:37.675887: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.675889: | ****emit IPsec DOI SIT:
Aug 26 18:33:37.675892: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:33:37.675896: | ikev1_out_sa pcn: 0 has 1 valid proposals
Aug 26 18:33:37.675899: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2
Aug 26 18:33:37.675902: | ****emit ISAKMP Proposal Payload:
Aug 26 18:33:37.675905: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.675908: |    proposal number: 0 (0x0)
Aug 26 18:33:37.675911: |    protocol ID: PROTO_IPSEC_ESP (0x3)
Aug 26 18:33:37.675914: |    SPI size: 4 (0x4)
Aug 26 18:33:37.675917: |    number of transforms: 2 (0x2)
Aug 26 18:33:37.675920: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
Aug 26 18:33:37.675934: | netlink_get_spi: allocated 0xc5a95a57 for esp.0@192.1.3.33
Aug 26 18:33:37.675939: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
Aug 26 18:33:37.675942: | SPI  c5 a9 5a 57
Aug 26 18:33:37.675945: | *****emit ISAKMP Transform Payload (ESP):
Aug 26 18:33:37.675948: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:37.675951: |    ESP transform number: 0 (0x0)
Aug 26 18:33:37.675954: |    ESP transform ID: ESP_AES (0xc)
Aug 26 18:33:37.675957: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type'
Aug 26 18:33:37.675961: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675964: |    af+type: AF+GROUP_DESCRIPTION (0x8003)
Aug 26 18:33:37.675967: |    length/value: 14 (0xe)
Aug 26 18:33:37.675970: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:37.675972: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675974: |    af+type: AF+ENCAPSULATION_MODE (0x8004)
Aug 26 18:33:37.675976: |    length/value: 1 (0x1)
Aug 26 18:33:37.675978: |     [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 26 18:33:37.675979: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675981: |    af+type: AF+SA_LIFE_TYPE (0x8001)
Aug 26 18:33:37.675983: |    length/value: 1 (0x1)
Aug 26 18:33:37.675985: |     [1 is SA_LIFE_TYPE_SECONDS]
Aug 26 18:33:37.675987: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675989: |    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
Aug 26 18:33:37.675990: |    length/value: 28800 (0x7080)
Aug 26 18:33:37.675992: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.675994: |    af+type: AF+AUTH_ALGORITHM (0x8005)
Aug 26 18:33:37.675996: |    length/value: 2 (0x2)
Aug 26 18:33:37.675998: |     [2 is AUTH_ALGORITHM_HMAC_SHA1]
Aug 26 18:33:37.676000: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.676001: |    af+type: AF+KEY_LENGTH (0x8006)
Aug 26 18:33:37.676003: |    length/value: 128 (0x80)
Aug 26 18:33:37.676005: | emitting length of ISAKMP Transform Payload (ESP): 32
Aug 26 18:33:37.676007: | *****emit ISAKMP Transform Payload (ESP):
Aug 26 18:33:37.676009: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.676012: |    ESP transform number: 1 (0x1)
Aug 26 18:33:37.676015: |    ESP transform ID: ESP_3DES (0x3)
Aug 26 18:33:37.676022: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:37.676025: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type'
Aug 26 18:33:37.676029: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.676031: |    af+type: AF+GROUP_DESCRIPTION (0x8003)
Aug 26 18:33:37.676034: |    length/value: 14 (0xe)
Aug 26 18:33:37.676037: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:37.676040: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.676044: |    af+type: AF+ENCAPSULATION_MODE (0x8004)
Aug 26 18:33:37.676047: |    length/value: 1 (0x1)
Aug 26 18:33:37.676050: |     [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 26 18:33:37.676053: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.676056: |    af+type: AF+SA_LIFE_TYPE (0x8001)
Aug 26 18:33:37.676059: |    length/value: 1 (0x1)
Aug 26 18:33:37.676061: |     [1 is SA_LIFE_TYPE_SECONDS]
Aug 26 18:33:37.676066: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.676069: |    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
Aug 26 18:33:37.676072: |    length/value: 28800 (0x7080)
Aug 26 18:33:37.676075: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.676078: |    af+type: AF+AUTH_ALGORITHM (0x8005)
Aug 26 18:33:37.676081: |    length/value: 2 (0x2)
Aug 26 18:33:37.676084: |     [2 is AUTH_ALGORITHM_HMAC_SHA1]
Aug 26 18:33:37.676087: | emitting length of ISAKMP Transform Payload (ESP): 28
Aug 26 18:33:37.676090: | emitting length of ISAKMP Proposal Payload: 72
Aug 26 18:33:37.676093: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0
Aug 26 18:33:37.676096: | emitting length of ISAKMP Security Association Payload: 84
Aug 26 18:33:37.676099: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
Aug 26 18:33:37.676103: | ***emit ISAKMP Nonce Payload:
Aug 26 18:33:37.676106: |    next payload type: ISAKMP_NEXT_KE (0x4)
Aug 26 18:33:37.676110: | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE
Aug 26 18:33:37.676113: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE)
Aug 26 18:33:37.676116: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.676119: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload
Aug 26 18:33:37.676122: | Ni  e6 06 0f 75  0d c3 3c b3  71 fb 30 40  dc 7e a7 e3
Aug 26 18:33:37.676124: | Ni  fb 72 45 f7  60 16 e6 b1  f5 1b 14 6a  cf bd 52 8f
Aug 26 18:33:37.676127: | emitting length of ISAKMP Nonce Payload: 36
Aug 26 18:33:37.676130: | ***emit ISAKMP Key Exchange Payload:
Aug 26 18:33:37.676133: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:33:37.676136: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID
Aug 26 18:33:37.676140: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE)
Aug 26 18:33:37.676143: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.676147: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
Aug 26 18:33:37.676150: | keyex value  70 66 bf 3e  a5 18 87 d5  4d ca a7 05  f2 51 29 80
Aug 26 18:33:37.676153: | keyex value  f7 9b 4a cb  eb 59 aa 00  da a6 bb a1  cd 01 b0 4f
Aug 26 18:33:37.676155: | keyex value  ad 89 00 34  aa 58 70 d0  f5 25 41 b7  52 18 8f 45
Aug 26 18:33:37.676158: | keyex value  af 41 e8 79  60 aa 3c cd  f6 38 ff aa  8c 00 9e 21
Aug 26 18:33:37.676161: | keyex value  ea f3 a3 ca  12 fb da 25  2b 76 33 8e  f4 7f 7a a9
Aug 26 18:33:37.676163: | keyex value  23 f7 b6 bd  45 62 27 01  2e 9d d3 57  e8 7c 29 46
Aug 26 18:33:37.676166: | keyex value  54 89 45 81  5d 5a 42 af  bf da 1a b1  f4 80 80 d5
Aug 26 18:33:37.676171: | keyex value  8c 0f 8a ee  90 81 fc a6  14 b0 e0 2a  1e 93 d9 55
Aug 26 18:33:37.676174: | keyex value  44 f1 fc 43  33 e7 c8 12  79 10 21 9f  e4 df 06 ce
Aug 26 18:33:37.676177: | keyex value  79 34 80 c2  c7 33 71 c6  9d e4 29 29  12 ac b2 8b
Aug 26 18:33:37.676179: | keyex value  98 c5 6b b4  b3 b9 bf 97  78 a7 ab 80  99 f1 e4 13
Aug 26 18:33:37.676182: | keyex value  cb e8 1b c8  81 71 a8 eb  9d df 7f 8e  39 c8 07 54
Aug 26 18:33:37.676186: | keyex value  c9 a1 97 a7  79 6c cc 7e  36 12 04 46  1f e0 40 4e
Aug 26 18:33:37.676189: | keyex value  4c 15 b0 65  6d a2 c1 e7  b1 c9 ee 53  09 6c 70 98
Aug 26 18:33:37.676192: | keyex value  6c be e0 f7  a6 b3 e3 73  61 de c6 80  3d da 96 24
Aug 26 18:33:37.676195: | keyex value  96 3a cd d7  34 12 55 59  15 52 1a df  53 a9 ff f1
Aug 26 18:33:37.676198: | emitting length of ISAKMP Key Exchange Payload: 260
Aug 26 18:33:37.676202: | ***emit ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:33:37.676205: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:33:37.676208: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:33:37.676212: |    Protocol ID: 0 (0x0)
Aug 26 18:33:37.676215: |    port: 0 (0x0)
Aug 26 18:33:37.676218: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID
Aug 26 18:33:37.676223: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
Aug 26 18:33:37.676227: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
Aug 26 18:33:37.676231: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:37.676234: | client network  c0 00 03 00
Aug 26 18:33:37.676238: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:37.676241: | client mask  ff ff ff 00
Aug 26 18:33:37.676245: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16
Aug 26 18:33:37.676248: | ***emit ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:33:37.676251: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.676255: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:33:37.676257: |    Protocol ID: 0 (0x0)
Aug 26 18:33:37.676260: |    port: 0 (0x0)
Aug 26 18:33:37.676264: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
Aug 26 18:33:37.676268: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
Aug 26 18:33:37.676272: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:37.676275: | client network  c0 00 16 00
Aug 26 18:33:37.676278: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:37.676282: | client mask  ff ff ff 00
Aug 26 18:33:37.676285: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16
Aug 26 18:33:37.676319: | outI1 HASH(1):
Aug 26 18:33:37.676328: |   9d 8c 93 1c  ff 2e bc bf  ec 8e 51 89  a4 76 b3 c5
Aug 26 18:33:37.676332: |   83 bb f6 33  40 c7 b3 d3  92 d2 91 e1  af 65 de c3
Aug 26 18:33:37.676341: | no IKEv1 message padding required
Aug 26 18:33:37.676345: | emitting length of ISAKMP Message: 476
Aug 26 18:33:37.676359: | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #4)
Aug 26 18:33:37.676363: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.676366: |   08 10 20 01  03 b3 7f 3e  00 00 01 dc  d6 3a 51 b7
Aug 26 18:33:37.676368: |   ac 87 90 39  04 25 3d de  f1 1d e8 6a  33 e4 70 38
Aug 26 18:33:37.676371: |   02 cb 74 d5  2a 84 a9 ed  f3 e7 ed db  02 5b f0 43
Aug 26 18:33:37.676374: |   2e b8 a9 99  83 27 28 f5  d7 31 b7 ec  44 65 41 1e
Aug 26 18:33:37.676377: |   81 0c d6 8d  6c b8 a6 15  90 85 ef 6e  e7 72 22 b9
Aug 26 18:33:37.676383: |   58 c7 2d c3  07 f4 f2 0d  9e ee 7d af  a2 56 e7 70
Aug 26 18:33:37.676386: |   6c fb 37 91  5d 8b 20 5d  22 3f 2f ca  55 f3 47 c5
Aug 26 18:33:37.676389: |   cf 64 62 6c  d8 79 e2 00  9d 0b 49 f8  25 27 1a 5e
Aug 26 18:33:37.676392: |   dd f3 bd f9  5a 7f 03 4f  dc 47 01 c1  5e 94 a2 44
Aug 26 18:33:37.676395: |   c0 aa 58 fd  35 3d 22 f0  4d bd 58 93  62 c4 8c 61
Aug 26 18:33:37.676397: |   9e 21 1d a9  ee 08 b0 c0  1d 8e 51 37  e9 49 5c 5f
Aug 26 18:33:37.676400: |   d5 c8 bf 4f  88 91 91 d4  1c 41 d6 00  d7 6f 13 dc
Aug 26 18:33:37.676403: |   b1 44 e5 a0  28 36 9b 81  cc 6f 6d ea  bc c4 9c b5
Aug 26 18:33:37.676406: |   d9 b2 5d d5  4a a9 77 94  21 96 74 54  88 b9 ab 75
Aug 26 18:33:37.676409: |   9f db 13 a8  b1 1b e7 15  b8 95 ff f0  1e e8 bb fd
Aug 26 18:33:37.676412: |   6f c4 66 72  cc aa 2b eb  2d 7d 7c e1  a7 06 f6 89
Aug 26 18:33:37.676414: |   89 06 54 6d  31 4c b6 0d  7c ba eb 99  7b 23 cc 22
Aug 26 18:33:37.676417: |   ca 5f 8e ee  1d 6f b6 3c  ee c5 7a 2d  29 15 39 a1
Aug 26 18:33:37.676419: |   d5 a7 6c 8c  29 fe d0 7e  89 48 6e e6  a2 18 f8 56
Aug 26 18:33:37.676421: |   f8 ae af 17  dd 4a 20 6c  36 fb 18 e9  8c f5 19 f8
Aug 26 18:33:37.676424: |   26 57 ba 82  a8 e6 0e f0  a6 02 7b b0  88 f6 83 4c
Aug 26 18:33:37.676426: |   cf 3b a4 7d  47 7b 19 78  37 32 e7 f3  f9 3c 26 7c
Aug 26 18:33:37.676429: |   02 f9 ee 38  a9 6c b9 ee  54 f2 96 59  47 01 62 71
Aug 26 18:33:37.676432: |   87 5f cd d5  ad 60 8a 1f  bd 39 c8 7e  f7 7d 55 e2
Aug 26 18:33:37.676435: |   41 41 27 1d  a3 8f ac 80  0c 1b c2 e7  7c 0e d7 29
Aug 26 18:33:37.676438: |   2e a7 87 8c  1b c5 34 be  7e 67 1d 1d  19 83 93 3a
Aug 26 18:33:37.676440: |   04 f3 2d 57  0a 3f 51 f0  31 91 dd 40  49 bb 46 9c
Aug 26 18:33:37.676443: |   1a 84 31 94  ae f7 83 36  b0 1e 71 d5  b5 b3 c5 39
Aug 26 18:33:37.676445: |   2a 46 8b 4c  4f e0 ac bb  e5 f3 29 07
Aug 26 18:33:37.676473: | state #4 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Aug 26 18:33:37.676479: | libevent_free: release ptr-libevent@0x55c66d974918
Aug 26 18:33:37.676482: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55c66d954c08
Aug 26 18:33:37.676487: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:33:37.676491: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #4
Aug 26 18:33:37.676495: | libevent_malloc: new ptr-libevent@0x7fbd18006378 size 128
Aug 26 18:33:37.676501: | #4 STATE_QUICK_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29703.418953
Aug 26 18:33:37.676506: | resume sending helper answer for #4 suppresed complete_v1_state_transition()
Aug 26 18:33:37.676512: | #4 spent 0.713 milliseconds in resume sending helper answer
Aug 26 18:33:37.676519: | stop processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:833)
Aug 26 18:33:37.676523: | libevent_free: release ptr-libevent@0x7fbd04002888
Aug 26 18:33:37.680412: | spent 0.00311 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:33:37.680433: | *received 460 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:33:37.680436: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.680438: |   08 10 20 01  ee 37 f5 42  00 00 01 cc  79 09 0c dd
Aug 26 18:33:37.680440: |   9a 4b 50 4c  3f a9 4c b5  51 65 da 54  78 67 41 a8
Aug 26 18:33:37.680442: |   4d 27 a3 c0  c7 79 48 b0  1e 5d 55 db  6c c3 a3 02
Aug 26 18:33:37.680443: |   fc 76 6e 51  0f 60 fd 7c  64 dc 52 85  9c 03 47 8a
Aug 26 18:33:37.680445: |   cc cd d3 7e  4c 1e 4b eb  f0 5a a1 9a  ac d4 b5 1a
Aug 26 18:33:37.680447: |   d6 c1 c6 fc  a7 d1 76 e7  bb 4c d7 7c  41 cc 46 d5
Aug 26 18:33:37.680448: |   58 bd 39 9a  56 53 0a 6f  a1 d6 2c 7f  39 80 cd 00
Aug 26 18:33:37.680450: |   21 d6 78 3d  e1 05 ad ec  99 71 62 0c  f5 5e e9 26
Aug 26 18:33:37.680452: |   63 9f d7 20  08 22 c5 5e  f9 3b 6e 53  32 ba ad 07
Aug 26 18:33:37.680454: |   bd b8 cf 7f  56 c1 16 ea  6d 31 68 8e  59 f9 95 ed
Aug 26 18:33:37.680455: |   df 33 f6 c7  d2 04 bc 20  32 92 8a ec  25 86 7e 7c
Aug 26 18:33:37.680460: |   08 5a f5 cf  94 39 7f d1  80 fa 53 09  2c 76 9c 37
Aug 26 18:33:37.680462: |   ec 90 21 2b  b9 7a a4 f7  54 6a 20 39  ef af 11 ba
Aug 26 18:33:37.680463: |   0b d5 5c 38  80 1f 20 e6  f0 e5 b0 29  39 e5 2b e2
Aug 26 18:33:37.680465: |   5d 74 59 1f  55 86 c6 76  da 42 b7 ea  f3 3f 28 25
Aug 26 18:33:37.680467: |   4f 60 b8 8c  e3 38 dc b2  c9 25 8d 7b  38 3d 72 7f
Aug 26 18:33:37.680468: |   93 7c 2a 93  ee be 93 5b  f0 77 90 c8  4a ac 9c 15
Aug 26 18:33:37.680470: |   48 ee 08 61  59 a6 65 3a  b3 1b 30 ec  2b 05 c8 9a
Aug 26 18:33:37.680472: |   75 9f fa 42  5f e1 e0 9a  b1 54 55 68  36 51 11 91
Aug 26 18:33:37.680474: |   5a a8 c8 4c  b6 b8 7d 3c  4a c1 6c 17  8d 08 f0 90
Aug 26 18:33:37.680475: |   e8 8a 39 e9  b2 83 f6 92  c5 be 6b 90  a4 89 55 21
Aug 26 18:33:37.680477: |   f4 d3 c3 c5  1b 1a e4 c2  ef 4d 4c 84  39 5e 62 c9
Aug 26 18:33:37.680479: |   ba 8a 1f d0  5d 05 10 40  d1 b8 6f 64  bd c3 92 ec
Aug 26 18:33:37.680481: |   2e 91 36 0a  9a c4 7e 0e  0b 4b f1 de  66 8a 1c 1b
Aug 26 18:33:37.680482: |   14 7e 32 a2  a4 63 29 2e  86 2d 9c 0c  72 65 93 0b
Aug 26 18:33:37.680484: |   8e 37 25 c7  7e 77 6f 09  04 39 c5 f0  56 16 1f 98
Aug 26 18:33:37.680486: |   4b fe d9 a5  3a 70 6e 13  5b 59 3b 05  cb db 0d bb
Aug 26 18:33:37.680488: |   11 06 32 7a  6e a3 a5 b9  62 66 64 5f
Aug 26 18:33:37.680491: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:33:37.680494: | **parse ISAKMP Message:
Aug 26 18:33:37.680496: |    initiator cookie:
Aug 26 18:33:37.680498: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.680500: |    responder cookie:
Aug 26 18:33:37.680502: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.680504: |    next payload type: ISAKMP_NEXT_HASH (0x8)
Aug 26 18:33:37.680506: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:37.680508: |    exchange type: ISAKMP_XCHG_QUICK (0x20)
Aug 26 18:33:37.680510: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:37.680512: |    Message ID: 3996644674 (0xee37f542)
Aug 26 18:33:37.680514: |    length: 460 (0x1cc)
Aug 26 18:33:37.680516: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
Aug 26 18:33:37.680520: | State DB: found IKEv1 state #5 in QUICK_I1 (find_state_ikev1)
Aug 26 18:33:37.680524: | start processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1633)
Aug 26 18:33:37.680526: | #5 is idle
Aug 26 18:33:37.680528: | #5 idle
Aug 26 18:33:37.680531: | received encrypted packet from 192.1.2.23:500
Aug 26 18:33:37.680545: | got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030
Aug 26 18:33:37.680548: | ***parse ISAKMP Hash Payload:
Aug 26 18:33:37.680550: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:33:37.680552: |    length: 36 (0x24)
Aug 26 18:33:37.680554: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030
Aug 26 18:33:37.680556: | ***parse ISAKMP Security Association Payload:
Aug 26 18:33:37.680558: |    next payload type: ISAKMP_NEXT_NONCE (0xa)
Aug 26 18:33:37.680560: |    length: 56 (0x38)
Aug 26 18:33:37.680562: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:37.680564: | got payload 0x400  (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030
Aug 26 18:33:37.680566: | ***parse ISAKMP Nonce Payload:
Aug 26 18:33:37.680568: |    next payload type: ISAKMP_NEXT_KE (0x4)
Aug 26 18:33:37.680570: |    length: 36 (0x24)
Aug 26 18:33:37.680572: | got payload 0x10  (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030
Aug 26 18:33:37.680574: | ***parse ISAKMP Key Exchange Payload:
Aug 26 18:33:37.680576: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:33:37.680577: |    length: 260 (0x104)
Aug 26 18:33:37.680579: | got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030
Aug 26 18:33:37.680581: | ***parse ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:33:37.680583: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:33:37.680585: |    length: 16 (0x10)
Aug 26 18:33:37.680587: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:33:37.680590: |    Protocol ID: 0 (0x0)
Aug 26 18:33:37.680592: |    port: 0 (0x0)
Aug 26 18:33:37.680594: |      obj:   c0 00 03 00  ff ff ff 00
Aug 26 18:33:37.680596: | got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030
Aug 26 18:33:37.680598: | ***parse ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:33:37.680600: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.680602: |    length: 16 (0x10)
Aug 26 18:33:37.680604: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:33:37.680605: |    Protocol ID: 0 (0x0)
Aug 26 18:33:37.680607: |    port: 0 (0x0)
Aug 26 18:33:37.680609: |      obj:   c0 00 02 00  ff ff ff 00
Aug 26 18:33:37.680611: | removing 12 bytes of padding
Aug 26 18:33:37.680630: | quick_inR1_outI2 HASH(2):
Aug 26 18:33:37.680632: |   9c 6f 2d f9  a2 b3 af d1  2e 3e 86 bc  63 e8 d3 37
Aug 26 18:33:37.680634: |   53 e0 ae 17  08 d2 7d bf  46 ab d0 6a  01 5e 23 02
Aug 26 18:33:37.680636: | received 'quick_inR1_outI2' message HASH(2) data ok
Aug 26 18:33:37.680639: | ****parse IPsec DOI SIT:
Aug 26 18:33:37.680642: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:33:37.680644: | ****parse ISAKMP Proposal Payload:
Aug 26 18:33:37.680646: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.680648: |    length: 44 (0x2c)
Aug 26 18:33:37.680650: |    proposal number: 0 (0x0)
Aug 26 18:33:37.680651: |    protocol ID: PROTO_IPSEC_ESP (0x3)
Aug 26 18:33:37.680653: |    SPI size: 4 (0x4)
Aug 26 18:33:37.680655: |    number of transforms: 1 (0x1)
Aug 26 18:33:37.680657: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
Aug 26 18:33:37.680659: | SPI  af 15 c4 ab
Aug 26 18:33:37.680662: | *****parse ISAKMP Transform Payload (ESP):
Aug 26 18:33:37.680664: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.680665: |    length: 32 (0x20)
Aug 26 18:33:37.680667: |    ESP transform number: 0 (0x0)
Aug 26 18:33:37.680669: |    ESP transform ID: ESP_AES (0xc)
Aug 26 18:33:37.680672: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.680674: |    af+type: AF+GROUP_DESCRIPTION (0x8003)
Aug 26 18:33:37.680676: |    length/value: 14 (0xe)
Aug 26 18:33:37.680678: |    [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:37.680680: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.680682: |    af+type: AF+ENCAPSULATION_MODE (0x8004)
Aug 26 18:33:37.680684: |    length/value: 1 (0x1)
Aug 26 18:33:37.680686: |    [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 26 18:33:37.680688: | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none
Aug 26 18:33:37.680690: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.680692: |    af+type: AF+SA_LIFE_TYPE (0x8001)
Aug 26 18:33:37.680693: |    length/value: 1 (0x1)
Aug 26 18:33:37.680695: |    [1 is SA_LIFE_TYPE_SECONDS]
Aug 26 18:33:37.680697: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.680699: |    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
Aug 26 18:33:37.680701: |    length/value: 28800 (0x7080)
Aug 26 18:33:37.680703: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.680705: |    af+type: AF+AUTH_ALGORITHM (0x8005)
Aug 26 18:33:37.680706: |    length/value: 2 (0x2)
Aug 26 18:33:37.680708: |    [2 is AUTH_ALGORITHM_HMAC_SHA1]
Aug 26 18:33:37.680710: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.680712: |    af+type: AF+KEY_LENGTH (0x8006)
Aug 26 18:33:37.680714: |    length/value: 128 (0x80)
Aug 26 18:33:37.680716: | ESP IPsec Transform verified unconditionally; no alg_info to check against
Aug 26 18:33:37.680728: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK
Aug 26 18:33:37.680734: | actually looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK
Aug 26 18:33:37.680742: | line 0: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA
Aug 26 18:33:37.680745: | line 1: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA
Aug 26 18:33:37.680747: | concluding with best_match=000 best=(nil) (lineno=-1)
Aug 26 18:33:37.680749: | no PreShared Key Found
Aug 26 18:33:37.680752: | adding quick outI2 DH work-order 9 for state #5
Aug 26 18:33:37.680755: | state #5 requesting EVENT_RETRANSMIT to be deleted
Aug 26 18:33:37.680757: | #5 STATE_QUICK_I1: retransmits: cleared
Aug 26 18:33:37.680760: | libevent_free: release ptr-libevent@0x55c66d960ba8
Aug 26 18:33:37.680763: | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fbd18002b78
Aug 26 18:33:37.680765: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fbd18002b78
Aug 26 18:33:37.680768: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #5
Aug 26 18:33:37.680770: | libevent_malloc: new ptr-libevent@0x7fbd04002888 size 128
Aug 26 18:33:37.680778: | complete v1 state transition with STF_SUSPEND
Aug 26 18:33:37.680782: | [RE]START processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648)
Aug 26 18:33:37.680784: | suspending state #5 and saving MD
Aug 26 18:33:37.680786: | #5 is busy; has a suspended MD
Aug 26 18:33:37.680790: | #5 spent 0.15 milliseconds in process_packet_tail()
Aug 26 18:33:37.680794: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:33:37.680797: | stop processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in process_md() at demux.c:382)
Aug 26 18:33:37.680799: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:33:37.680802: | spent 0.378 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:33:37.680817: | crypto helper 2 resuming
Aug 26 18:33:37.680827: | crypto helper 2 starting work-order 9 for state #5
Aug 26 18:33:37.680831: | crypto helper 2 doing compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 9
Aug 26 18:33:37.681182: | spent 0.00191 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:33:37.681196: | *received 460 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:33:37.681199: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.681200: |   08 10 20 01  03 b3 7f 3e  00 00 01 cc  70 f4 64 63
Aug 26 18:33:37.681202: |   98 27 f0 b1  6e ce e3 fa  39 a1 eb 68  5b 3e 88 c6
Aug 26 18:33:37.681204: |   a3 20 32 1d  b4 c4 5e 87  be 5d 87 b7  f2 e9 20 cf
Aug 26 18:33:37.681206: |   57 45 04 ae  b4 f3 73 dc  a7 e2 49 18  76 23 ea 68
Aug 26 18:33:37.681207: |   c9 0e ed 17  32 b3 48 73  28 d9 32 47  20 9f e3 11
Aug 26 18:33:37.681209: |   b8 42 ef 3d  aa 69 aa 1f  ee ad 4f 3a  50 e7 81 f2
Aug 26 18:33:37.681211: |   e5 cb 20 72  fe db 33 ff  a1 24 7f 48  70 ea 8b b4
Aug 26 18:33:37.681212: |   f8 58 3f b8  ec c6 75 6c  cc a9 06 a7  6e 91 a0 36
Aug 26 18:33:37.681214: |   48 89 bf dd  54 45 c1 d0  7a a0 fd b6  52 b5 de 3e
Aug 26 18:33:37.681216: |   d5 72 17 cc  82 14 7f 5e  81 b4 a6 61  6a a7 88 04
Aug 26 18:33:37.681217: |   d7 c2 4b 55  30 8f 23 42  fc e9 03 9e  67 8e 9f 0c
Aug 26 18:33:37.681219: |   e2 6d ef 65  4f 6a b0 40  34 c3 bb ef  f4 a3 2d 69
Aug 26 18:33:37.681221: |   c2 7f 20 08  fe 54 4f d5  dc 58 3a eb  1b ec ed cd
Aug 26 18:33:37.681223: |   e8 3d 36 a3  1a 73 72 87  79 2b a6 eb  3f fa cd a2
Aug 26 18:33:37.681224: |   2f 80 7a ee  7c 98 b1 5b  22 80 7e d5  f5 d4 09 77
Aug 26 18:33:37.681226: |   26 a5 34 df  e4 a4 4c af  f6 66 ac 5a  d5 19 35 7d
Aug 26 18:33:37.681228: |   dc b4 60 cf  4b e2 5e 02  ed e7 9b 67  88 e9 74 ec
Aug 26 18:33:37.681229: |   c2 18 14 31  10 c3 e4 3e  02 3d 20 2f  90 57 6c 76
Aug 26 18:33:37.681231: |   b6 c1 7d 17  c7 95 77 18  c6 5b 85 95  4d 95 f8 45
Aug 26 18:33:37.681235: |   18 84 a2 f4  95 41 5e 4c  71 2a e5 3b  ca 35 8a 8a
Aug 26 18:33:37.681237: |   28 79 2a eb  b5 d5 52 cc  d2 c0 c6 19  9c 82 66 a4
Aug 26 18:33:37.681239: |   51 4a 0e c8  ec d7 f2 21  11 20 62 3a  e5 19 73 1f
Aug 26 18:33:37.681241: |   30 f4 62 9d  4e ad b5 53  13 26 f4 47  d8 88 ca 8b
Aug 26 18:33:37.681242: |   b6 ad ee 7f  2d 09 8e d9  27 f1 78 cb  c0 78 e4 8b
Aug 26 18:33:37.681244: |   36 55 0e f7  0a 1d 5d 7f  99 71 bb 2f  6b 70 70 d5
Aug 26 18:33:37.681246: |   67 fd 0e e1  ae 32 1d bd  77 dc ad 5c  d9 ad 89 d4
Aug 26 18:33:37.681247: |   44 cd 78 90  02 15 82 c6  99 a1 d6 28  21 cf 84 40
Aug 26 18:33:37.681249: |   a6 c9 c6 d8  a4 e0 f5 e5  22 b9 a1 ac
Aug 26 18:33:37.681252: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:33:37.681255: | **parse ISAKMP Message:
Aug 26 18:33:37.681257: |    initiator cookie:
Aug 26 18:33:37.681259: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.681261: |    responder cookie:
Aug 26 18:33:37.681262: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.681264: |    next payload type: ISAKMP_NEXT_HASH (0x8)
Aug 26 18:33:37.681266: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:37.681268: |    exchange type: ISAKMP_XCHG_QUICK (0x20)
Aug 26 18:33:37.681270: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:37.681272: |    Message ID: 62095166 (0x3b37f3e)
Aug 26 18:33:37.681274: |    length: 460 (0x1cc)
Aug 26 18:33:37.681276: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
Aug 26 18:33:37.681279: | State DB: found IKEv1 state #4 in QUICK_I1 (find_state_ikev1)
Aug 26 18:33:37.681283: | start processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1633)
Aug 26 18:33:37.681285: | #4 is idle
Aug 26 18:33:37.681287: | #4 idle
Aug 26 18:33:37.681303: | received encrypted packet from 192.1.2.23:500
Aug 26 18:33:37.681314: | got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030
Aug 26 18:33:37.681318: | ***parse ISAKMP Hash Payload:
Aug 26 18:33:37.681321: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:33:37.681324: |    length: 36 (0x24)
Aug 26 18:33:37.681327: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030
Aug 26 18:33:37.681329: | ***parse ISAKMP Security Association Payload:
Aug 26 18:33:37.681332: |    next payload type: ISAKMP_NEXT_NONCE (0xa)
Aug 26 18:33:37.681335: |    length: 56 (0x38)
Aug 26 18:33:37.681337: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:37.681339: | got payload 0x400  (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030
Aug 26 18:33:37.681341: | ***parse ISAKMP Nonce Payload:
Aug 26 18:33:37.681343: |    next payload type: ISAKMP_NEXT_KE (0x4)
Aug 26 18:33:37.681345: |    length: 36 (0x24)
Aug 26 18:33:37.681347: | got payload 0x10  (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030
Aug 26 18:33:37.681349: | ***parse ISAKMP Key Exchange Payload:
Aug 26 18:33:37.681351: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:33:37.681352: |    length: 260 (0x104)
Aug 26 18:33:37.681354: | got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030
Aug 26 18:33:37.681356: | ***parse ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:33:37.681358: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:33:37.681360: |    length: 16 (0x10)
Aug 26 18:33:37.681362: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:33:37.681363: |    Protocol ID: 0 (0x0)
Aug 26 18:33:37.681365: |    port: 0 (0x0)
Aug 26 18:33:37.681367: |      obj:   c0 00 03 00  ff ff ff 00
Aug 26 18:33:37.681369: | got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030
Aug 26 18:33:37.681371: | ***parse ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:33:37.681373: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.681375: |    length: 16 (0x10)
Aug 26 18:33:37.681376: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:33:37.681378: |    Protocol ID: 0 (0x0)
Aug 26 18:33:37.681380: |    port: 0 (0x0)
Aug 26 18:33:37.681382: |      obj:   c0 00 16 00  ff ff ff 00
Aug 26 18:33:37.681385: | removing 12 bytes of padding
Aug 26 18:33:37.681406: | quick_inR1_outI2 HASH(2):
Aug 26 18:33:37.681409: |   c7 4f 86 e1  ba 6d 0a 52  8f 9f ce e3  91 cb 70 6b
Aug 26 18:33:37.681410: |   66 46 c6 84  8f 68 19 2c  b7 10 f5 31  67 bf e9 5f
Aug 26 18:33:37.681413: | received 'quick_inR1_outI2' message HASH(2) data ok
Aug 26 18:33:37.681416: | ****parse IPsec DOI SIT:
Aug 26 18:33:37.681418: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:33:37.681420: | ****parse ISAKMP Proposal Payload:
Aug 26 18:33:37.681422: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.681424: |    length: 44 (0x2c)
Aug 26 18:33:37.681426: |    proposal number: 0 (0x0)
Aug 26 18:33:37.681428: |    protocol ID: PROTO_IPSEC_ESP (0x3)
Aug 26 18:33:37.681429: |    SPI size: 4 (0x4)
Aug 26 18:33:37.681431: |    number of transforms: 1 (0x1)
Aug 26 18:33:37.681433: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
Aug 26 18:33:37.681435: | SPI  8e ba 5c d1
Aug 26 18:33:37.681438: | *****parse ISAKMP Transform Payload (ESP):
Aug 26 18:33:37.681439: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.681441: |    length: 32 (0x20)
Aug 26 18:33:37.681443: |    ESP transform number: 0 (0x0)
Aug 26 18:33:37.681445: |    ESP transform ID: ESP_AES (0xc)
Aug 26 18:33:37.681447: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.681449: |    af+type: AF+GROUP_DESCRIPTION (0x8003)
Aug 26 18:33:37.681451: |    length/value: 14 (0xe)
Aug 26 18:33:37.681453: |    [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:37.681455: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.681457: |    af+type: AF+ENCAPSULATION_MODE (0x8004)
Aug 26 18:33:37.681459: |    length/value: 1 (0x1)
Aug 26 18:33:37.681461: |    [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 26 18:33:37.681463: | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none
Aug 26 18:33:37.681465: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.681467: |    af+type: AF+SA_LIFE_TYPE (0x8001)
Aug 26 18:33:37.681469: |    length/value: 1 (0x1)
Aug 26 18:33:37.681471: |    [1 is SA_LIFE_TYPE_SECONDS]
Aug 26 18:33:37.681472: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.681474: |    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
Aug 26 18:33:37.681476: |    length/value: 28800 (0x7080)
Aug 26 18:33:37.681478: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.681480: |    af+type: AF+AUTH_ALGORITHM (0x8005)
Aug 26 18:33:37.681482: |    length/value: 2 (0x2)
Aug 26 18:33:37.681484: |    [2 is AUTH_ALGORITHM_HMAC_SHA1]
Aug 26 18:33:37.681486: | ******parse ISAKMP IPsec DOI attribute:
Aug 26 18:33:37.681488: |    af+type: AF+KEY_LENGTH (0x8006)
Aug 26 18:33:37.681489: |    length/value: 128 (0x80)
Aug 26 18:33:37.681491: | ESP IPsec Transform verified unconditionally; no alg_info to check against
Aug 26 18:33:37.681502: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK
Aug 26 18:33:37.681502: | crypto helper 2 finished compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 9 time elapsed 0.00067 seconds
Aug 26 18:33:37.681507: | actually looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK
Aug 26 18:33:37.681510: | (#5) spent 0.655 milliseconds in crypto helper computing work-order 9: quick outI2 DH (pcr)
Aug 26 18:33:37.681513: | crypto helper 2 sending results from work-order 9 for state #5 to event queue
Aug 26 18:33:37.681514: | line 0: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA
Aug 26 18:33:37.681523: | line 1: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA
Aug 26 18:33:37.681526: | concluding with best_match=000 best=(nil) (lineno=-1)
Aug 26 18:33:37.681528: | no PreShared Key Found
Aug 26 18:33:37.681531: | adding quick outI2 DH work-order 10 for state #4
Aug 26 18:33:37.681534: | state #4 requesting EVENT_RETRANSMIT to be deleted
Aug 26 18:33:37.681536: | #4 STATE_QUICK_I1: retransmits: cleared
Aug 26 18:33:37.681539: | libevent_free: release ptr-libevent@0x7fbd18006378
Aug 26 18:33:37.681541: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d954c08
Aug 26 18:33:37.681543: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55c66d954c08
Aug 26 18:33:37.681546: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #4
Aug 26 18:33:37.681548: | libevent_malloc: new ptr-libevent@0x55c66d974918 size 128
Aug 26 18:33:37.681516: | scheduling resume sending helper answer for #5
Aug 26 18:33:37.681554: | complete v1 state transition with STF_SUSPEND
Aug 26 18:33:37.681563: | crypto helper 4 resuming
Aug 26 18:33:37.681578: | [RE]START processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648)
Aug 26 18:33:37.681583: | crypto helper 4 starting work-order 10 for state #4
Aug 26 18:33:37.681583: | suspending state #4 and saving MD
Aug 26 18:33:37.681591: | #4 is busy; has a suspended MD
Aug 26 18:33:37.681591: | crypto helper 4 doing compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 10
Aug 26 18:33:37.681600: | #4 spent 0.176 milliseconds in process_packet_tail()
Aug 26 18:33:37.681605: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:33:37.681610: | stop processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in process_md() at demux.c:382)
Aug 26 18:33:37.681614: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:33:37.681566: | libevent_malloc: new ptr-libevent@0x7fbd10000e98 size 128
Aug 26 18:33:37.681619: | spent 0.415 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:33:37.681630: | crypto helper 2 waiting (nothing to do)
Aug 26 18:33:37.681636: | processing resume sending helper answer for #5
Aug 26 18:33:37.681642: | start processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:797)
Aug 26 18:33:37.681647: | crypto helper 2 replies to request ID 9
Aug 26 18:33:37.681650: | calling continuation function 0x55c66cb6db50
Aug 26 18:33:37.681653: | quick_inR1_outI2_continue for #5: calculated ke+nonce, calculating DH
Aug 26 18:33:37.681658: | **emit ISAKMP Message:
Aug 26 18:33:37.681662: |    initiator cookie:
Aug 26 18:33:37.681664: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.681667: |    responder cookie:
Aug 26 18:33:37.681670: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.681673: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.681676: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:37.681680: |    exchange type: ISAKMP_XCHG_QUICK (0x20)
Aug 26 18:33:37.681683: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:37.681686: |    Message ID: 3996644674 (0xee37f542)
Aug 26 18:33:37.681689: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:37.681694: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address
Aug 26 18:33:37.681697: | ID address  c0 00 03 00
Aug 26 18:33:37.681700: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask
Aug 26 18:33:37.681703: | ID mask  ff ff ff 00
Aug 26 18:33:37.681708: | our client is subnet 192.0.3.0/24
Aug 26 18:33:37.681711: | our client protocol/port is 0/0
Aug 26 18:33:37.681714: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address
Aug 26 18:33:37.681717: | ID address  c0 00 02 00
Aug 26 18:33:37.681720: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask
Aug 26 18:33:37.681726: | ID mask  ff ff ff 00
Aug 26 18:33:37.681731: | peer client is subnet 192.0.2.0/24
Aug 26 18:33:37.681734: | peer client protocol/port is 0/0
Aug 26 18:33:37.681737: | ***emit ISAKMP Hash Payload:
Aug 26 18:33:37.681740: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.681744: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:33:37.681747: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.681751: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:33:37.681754: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:33:37.681778: | quick_inR1_outI2 HASH(3):
Aug 26 18:33:37.681782: |   cb 6f 24 64  01 f3 75 9c  71 e5 86 da  1e 59 a1 ab
Aug 26 18:33:37.681785: |   b8 87 55 63  76 9a ec 4f  30 a8 e6 bc  02 40 63 a6
Aug 26 18:33:37.681789: | compute_proto_keymat: needed_len (after ESP enc)=16
Aug 26 18:33:37.681791: | compute_proto_keymat: needed_len (after ESP auth)=36
Aug 26 18:33:37.681908: | install_ipsec_sa() for #5: inbound and outbound
Aug 26 18:33:37.681913: | could_route called for northnet-eastnet-b (kind=CK_PERMANENT)
Aug 26 18:33:37.681916: | FOR_EACH_CONNECTION_... in route_owner
Aug 26 18:33:37.681920: |  conn northnet-eastnet-b mark 0/00000000, 0/00000000 vs
Aug 26 18:33:37.681923: |  conn north-a-dpd mark 0/00000000, 0/00000000
Aug 26 18:33:37.681927: |  conn northnet-eastnet-b mark 0/00000000, 0/00000000 vs
Aug 26 18:33:37.681930: |  conn northnet-eastnet-b mark 0/00000000, 0/00000000
Aug 26 18:33:37.681935: | route owner of "northnet-eastnet-b" unrouted: NULL; eroute owner: NULL
Aug 26 18:33:37.681938: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96
Aug 26 18:33:37.681942: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12
Aug 26 18:33:37.681945: | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20
Aug 26 18:33:37.681950: | setting IPsec SA replay-window to 32
Aug 26 18:33:37.681953: | NIC esp-hw-offload not for connection 'northnet-eastnet-b' not available on interface eth1
Aug 26 18:33:37.681957: | netlink: enabling tunnel mode
Aug 26 18:33:37.681961: | netlink: setting IPsec SA replay-window to 32 using old-style req
Aug 26 18:33:37.681964: | netlink: esp-hw-offload not set for IPsec SA
Aug 26 18:33:37.682028: | netlink response for Add SA esp.af15c4ab@192.1.2.23 included non-error error
Aug 26 18:33:37.682033: | set up outgoing SA, ref=0/0
Aug 26 18:33:37.682036: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96
Aug 26 18:33:37.682040: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12
Aug 26 18:33:37.682043: | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20
Aug 26 18:33:37.682047: | setting IPsec SA replay-window to 32
Aug 26 18:33:37.682050: | NIC esp-hw-offload not for connection 'northnet-eastnet-b' not available on interface eth1
Aug 26 18:33:37.682054: | netlink: enabling tunnel mode
Aug 26 18:33:37.682057: | netlink: setting IPsec SA replay-window to 32 using old-style req
Aug 26 18:33:37.682060: | netlink: esp-hw-offload not set for IPsec SA
Aug 26 18:33:37.682096: | netlink response for Add SA esp.31a5aad0@192.1.3.33 included non-error error
Aug 26 18:33:37.682101: | priority calculation of connection "northnet-eastnet-b" is 0xfe7e7
Aug 26 18:33:37.682109: | add inbound eroute 192.0.2.0/24:0 --0-> 192.0.3.0/24:0 => tun.10000@192.1.3.33 (raw_eroute)
Aug 26 18:33:37.682113: | IPsec Sa SPD priority set to 1042407
Aug 26 18:33:37.682137: | raw_eroute result=success
Aug 26 18:33:37.682141: | set up incoming SA, ref=0/0
Aug 26 18:33:37.682144: | sr for #5: unrouted
Aug 26 18:33:37.682148: | route_and_eroute() for proto 0, and source port 0 dest port 0
Aug 26 18:33:37.682151: | FOR_EACH_CONNECTION_... in route_owner
Aug 26 18:33:37.682154: |  conn northnet-eastnet-b mark 0/00000000, 0/00000000 vs
Aug 26 18:33:37.682157: |  conn north-a-dpd mark 0/00000000, 0/00000000
Aug 26 18:33:37.682163: |  conn northnet-eastnet-b mark 0/00000000, 0/00000000 vs
Aug 26 18:33:37.682166: |  conn northnet-eastnet-b mark 0/00000000, 0/00000000
Aug 26 18:33:37.682170: | route owner of "northnet-eastnet-b" unrouted: NULL; eroute owner: NULL
Aug 26 18:33:37.682174: | route_and_eroute with c: northnet-eastnet-b (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #5
Aug 26 18:33:37.682178: | priority calculation of connection "northnet-eastnet-b" is 0xfe7e7
Aug 26 18:33:37.682186: | eroute_connection add eroute 192.0.3.0/24:0 --0-> 192.0.2.0/24:0 => tun.0@192.1.2.23 (raw_eroute)
Aug 26 18:33:37.682189: | IPsec Sa SPD priority set to 1042407
Aug 26 18:33:37.682203: | raw_eroute result=success
Aug 26 18:33:37.682207: | running updown command "ipsec _updown" for verb up 
Aug 26 18:33:37.682210: | command executing up-client
Aug 26 18:33:37.682242: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:37.682249: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:37.682270: | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASI
Aug 26 18:33:37.682274: | popen cmd is 1403 chars long
Aug 26 18:33:37.682277: | cmd(   0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-b':
Aug 26 18:33:37.682281: | cmd(  80): PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO:
Aug 26 18:33:37.682284: | cmd( 160):_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.t:
Aug 26 18:33:37.682287: | cmd( 240):esting.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0:
Aug 26 18:33:37.682303: | cmd( 320):.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PL:
Aug 26 18:33:37.682307: | cmd( 400):UTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP':
Aug 26 18:33:37.682310: | cmd( 480): PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan:
Aug 26 18:33:37.682313: | cmd( 560):, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libresw:
Aug 26 18:33:37.682316: | cmd( 640):an.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO:
Aug 26 18:33:37.682319: | cmd( 720):_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PL:
Aug 26 18:33:37.682322: | cmd( 800):UTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Li:
Aug 26 18:33:37.682326: | cmd( 880):breswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_:
Aug 26 18:33:37.682329: | cmd( 960):ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TR:
Aug 26 18:33:37.682332: | cmd(1040):ACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY=:
Aug 26 18:33:37.682335: | cmd(1120):'ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_:
Aug 26 18:33:37.682340: | cmd(1200):DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PL:
Aug 26 18:33:37.682343: | cmd(1280):UTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xaf1:
Aug 26 18:33:37.682346: | cmd(1360):5c4ab SPI_OUT=0x31a5aad0 ipsec _updown 2>&1:
Aug 26 18:33:37.682853: | crypto helper 4 finished compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 10 time elapsed 0.001262 seconds
Aug 26 18:33:37.682867: | (#4) spent 1.08 milliseconds in crypto helper computing work-order 10: quick outI2 DH (pcr)
Aug 26 18:33:37.682873: | crypto helper 4 sending results from work-order 10 for state #4 to event queue
Aug 26 18:33:37.682879: | scheduling resume sending helper answer for #4
Aug 26 18:33:37.682882: | libevent_malloc: new ptr-libevent@0x7fbd14003e78 size 128
Aug 26 18:33:37.682904: | crypto helper 4 waiting (nothing to do)
Aug 26 18:33:37.694934: | route_and_eroute: firewall_notified: true
Aug 26 18:33:37.694948: | running updown command "ipsec _updown" for verb prepare 
Aug 26 18:33:37.694950: | command executing prepare-client
Aug 26 18:33:37.694972: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:37.694976: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:37.694989: | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POL
Aug 26 18:33:37.694991: | popen cmd is 1408 chars long
Aug 26 18:33:37.694993: | cmd(   0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastn:
Aug 26 18:33:37.694995: | cmd(  80):et-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' :
Aug 26 18:33:37.694997: | cmd( 160):PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=no:
Aug 26 18:33:37.694998: | cmd( 240):rth.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT=':
Aug 26 18:33:37.695000: | cmd( 320):192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.:
Aug 26 18:33:37.695002: | cmd( 400):0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE=:
Aug 26 18:33:37.695003: | cmd( 480):'ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libr:
Aug 26 18:33:37.695005: | cmd( 560):eswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.li:
Aug 26 18:33:37.695006: | cmd( 640):breswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' :
Aug 26 18:33:37.695008: | cmd( 720):PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL=':
Aug 26 18:33:37.695010: | cmd( 800):0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, :
Aug 26 18:33:37.695011: | cmd( 880):CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' P:
Aug 26 18:33:37.695013: | cmd( 960):LUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAR:
Aug 26 18:33:37.695017: | cmd(1040):EF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFA:
Aug 26 18:33:37.695019: | cmd(1120):MILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_:
Aug 26 18:33:37.695020: | cmd(1200):PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT=':
Aug 26 18:33:37.695022: | cmd(1280):0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=:
Aug 26 18:33:37.695023: | cmd(1360):0xaf15c4ab SPI_OUT=0x31a5aad0 ipsec _updown 2>&1:
Aug 26 18:33:37.706059: | running updown command "ipsec _updown" for verb route 
Aug 26 18:33:37.706073: | command executing route-client
Aug 26 18:33:37.706095: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:37.706100: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:37.706114: | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY=
Aug 26 18:33:37.706117: | popen cmd is 1406 chars long
Aug 26 18:33:37.706119: | cmd(   0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet:
Aug 26 18:33:37.706121: | cmd(  80):-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PL:
Aug 26 18:33:37.706123: | cmd( 160):UTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=nort:
Aug 26 18:33:37.706124: | cmd( 240):h.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='19:
Aug 26 18:33:37.706126: | cmd( 320):2.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0':
Aug 26 18:33:37.706128: | cmd( 400): PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='E:
Aug 26 18:33:37.706129: | cmd( 480):SP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libres:
Aug 26 18:33:37.706131: | cmd( 560):wan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libr:
Aug 26 18:33:37.706133: | cmd( 640):eswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PL:
Aug 26 18:33:37.706134: | cmd( 720):UTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0':
Aug 26 18:33:37.706136: | cmd( 800): PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN:
Aug 26 18:33:37.706138: | cmd( 880):=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLU:
Aug 26 18:33:37.706139: | cmd( 960):TO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF:
Aug 26 18:33:37.706141: | cmd(1040):_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMI:
Aug 26 18:33:37.706143: | cmd(1120):LY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PE:
Aug 26 18:33:37.706144: | cmd(1200):ER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0':
Aug 26 18:33:37.706146: | cmd(1280): PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x:
Aug 26 18:33:37.706150: | cmd(1360):af15c4ab SPI_OUT=0x31a5aad0 ipsec _updown 2>&1:
Aug 26 18:33:37.717545: | route_and_eroute: instance "northnet-eastnet-b", setting eroute_owner {spd=0x55c66d954fb8,sr=0x55c66d954fb8} to #5 (was #0) (newest_ipsec_sa=#0)
Aug 26 18:33:37.717612: | #3 spent 2.09 milliseconds in install_ipsec_sa()
Aug 26 18:33:37.717641: | emitting 12 zero bytes of encryption padding into ISAKMP Message
Aug 26 18:33:37.717645: | no IKEv1 message padding required
Aug 26 18:33:37.717647: | emitting length of ISAKMP Message: 76
Aug 26 18:33:37.717698: | inR1_outI2: instance northnet-eastnet-b[0], setting IKEv1 newest_ipsec_sa to #5 (was #0) (spd.eroute=#5) cloned from #3
Aug 26 18:33:37.717705: | DPD: dpd_init() called on IPsec SA
Aug 26 18:33:37.717708: | DPD: Peer does not support Dead Peer Detection
Aug 26 18:33:37.717712: | complete v1 state transition with STF_OK
Aug 26 18:33:37.717720: | [RE]START processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:33:37.717738: | #5 is idle
Aug 26 18:33:37.717741: | doing_xauth:no, t_xauth_client_done:no
Aug 26 18:33:37.717748: | IKEv1: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Aug 26 18:33:37.717754: | child state #5: QUICK_I1(established CHILD SA) => QUICK_I2(established CHILD SA)
Aug 26 18:33:37.717757: | event_already_set, deleting event
Aug 26 18:33:37.717759: | state #5 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Aug 26 18:33:37.717765: | libevent_free: release ptr-libevent@0x7fbd04002888
Aug 26 18:33:37.717770: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fbd18002b78
Aug 26 18:33:37.717779: | sending reply packet to 192.1.2.23:500 (from 192.1.3.33:500)
Aug 26 18:33:37.717787: | sending 76 bytes for STATE_QUICK_I1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #5)
Aug 26 18:33:37.717789: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.717791: |   08 10 20 01  ee 37 f5 42  00 00 00 4c  32 c1 d3 7e
Aug 26 18:33:37.717793: |   7c f8 8e 76  47 c5 1d c4  d9 d9 96 4e  07 1b 6d fc
Aug 26 18:33:37.717794: |   ae 10 02 a6  46 f2 39 0b  7b 12 0f 12  dd c8 42 04
Aug 26 18:33:37.717796: |   bc be ec df  2b f1 9a 7c  82 81 1e bc
Aug 26 18:33:37.717839: | !event_already_set at reschedule
Aug 26 18:33:37.717844: | event_schedule: new EVENT_SA_REPLACE-pe@0x7fbd18002b78
Aug 26 18:33:37.717852: | inserting event EVENT_SA_REPLACE, timeout in 27829 seconds for #5
Aug 26 18:33:37.717859: | libevent_malloc: new ptr-libevent@0x55c66d95d888 size 128
Aug 26 18:33:37.717863: | pstats #5 ikev1.ipsec established
Aug 26 18:33:37.717868: | NAT-T: encaps is 'auto'
Aug 26 18:33:37.717873: "northnet-eastnet-b" #5: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0xaf15c4ab <0x31a5aad0 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=passive}
Aug 26 18:33:37.717876: | modecfg pull: noquirk policy:push not-client
Aug 26 18:33:37.717879: | phase 1 is done, looking for phase 2 to unpend
Aug 26 18:33:37.717885: | resume sending helper answer for #5 suppresed complete_v1_state_transition()
Aug 26 18:33:37.717892: | #5 spent 2.61 milliseconds in resume sending helper answer
Aug 26 18:33:37.717897: | stop processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:833)
Aug 26 18:33:37.717902: | libevent_free: release ptr-libevent@0x7fbd10000e98
Aug 26 18:33:37.717920: | processing resume sending helper answer for #4
Aug 26 18:33:37.717938: | start processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:797)
Aug 26 18:33:37.717941: | crypto helper 4 replies to request ID 10
Aug 26 18:33:37.717943: | calling continuation function 0x55c66cb6db50
Aug 26 18:33:37.717945: | quick_inR1_outI2_continue for #4: calculated ke+nonce, calculating DH
Aug 26 18:33:37.717963: | **emit ISAKMP Message:
Aug 26 18:33:37.717965: |    initiator cookie:
Aug 26 18:33:37.717966: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:37.717970: |    responder cookie:
Aug 26 18:33:37.717972: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.717974: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.717975: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:37.717977: |    exchange type: ISAKMP_XCHG_QUICK (0x20)
Aug 26 18:33:37.717980: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:37.717982: |    Message ID: 62095166 (0x3b37f3e)
Aug 26 18:33:37.717984: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:37.717987: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address
Aug 26 18:33:37.717989: | ID address  c0 00 03 00
Aug 26 18:33:37.717992: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask
Aug 26 18:33:37.717993: | ID mask  ff ff ff 00
Aug 26 18:33:37.717996: | our client is subnet 192.0.3.0/24
Aug 26 18:33:37.717998: | our client protocol/port is 0/0
Aug 26 18:33:37.718000: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address
Aug 26 18:33:37.718002: | ID address  c0 00 16 00
Aug 26 18:33:37.718003: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask
Aug 26 18:33:37.718005: | ID mask  ff ff ff 00
Aug 26 18:33:37.718007: | peer client is subnet 192.0.22.0/24
Aug 26 18:33:37.718008: | peer client protocol/port is 0/0
Aug 26 18:33:37.718010: | ***emit ISAKMP Hash Payload:
Aug 26 18:33:37.718012: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:37.718014: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:33:37.718016: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:37.718018: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:33:37.718020: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:33:37.718047: | quick_inR1_outI2 HASH(3):
Aug 26 18:33:37.718049: |   18 f1 6b 0b  8d 0e 28 50  3e 8f c7 b8  7e 41 3f cf
Aug 26 18:33:37.718051: |   c9 4a 6d b2  d1 a5 7a 8c  88 6c 9e 32  6b ef 04 57
Aug 26 18:33:37.718052: | compute_proto_keymat: needed_len (after ESP enc)=16
Aug 26 18:33:37.718054: | compute_proto_keymat: needed_len (after ESP auth)=36
Aug 26 18:33:37.718151: | install_ipsec_sa() for #4: inbound and outbound
Aug 26 18:33:37.718155: | could_route called for north-a-dpd (kind=CK_PERMANENT)
Aug 26 18:33:37.718157: | FOR_EACH_CONNECTION_... in route_owner
Aug 26 18:33:37.718159: |  conn north-a-dpd mark 0/00000000, 0/00000000 vs
Aug 26 18:33:37.718161: |  conn north-a-dpd mark 0/00000000, 0/00000000
Aug 26 18:33:37.718162: |  conn north-a-dpd mark 0/00000000, 0/00000000 vs
Aug 26 18:33:37.718164: |  conn northnet-eastnet-b mark 0/00000000, 0/00000000
Aug 26 18:33:37.718168: | route owner of "north-a-dpd" prospective erouted: self; eroute owner: self
Aug 26 18:33:37.718177: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96
Aug 26 18:33:37.718182: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12
Aug 26 18:33:37.718186: | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20
Aug 26 18:33:37.718191: | setting IPsec SA replay-window to 32
Aug 26 18:33:37.718195: | NIC esp-hw-offload not for connection 'north-a-dpd' not available on interface eth1
Aug 26 18:33:37.718199: | netlink: enabling tunnel mode
Aug 26 18:33:37.718203: | netlink: setting IPsec SA replay-window to 32 using old-style req
Aug 26 18:33:37.718205: | netlink: esp-hw-offload not set for IPsec SA
Aug 26 18:33:37.718264: | netlink response for Add SA esp.8eba5cd1@192.1.2.23 included non-error error
Aug 26 18:33:37.718269: | set up outgoing SA, ref=0/0
Aug 26 18:33:37.718273: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96
Aug 26 18:33:37.718276: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12
Aug 26 18:33:37.718280: | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20
Aug 26 18:33:37.718284: | setting IPsec SA replay-window to 32
Aug 26 18:33:37.718295: | NIC esp-hw-offload not for connection 'north-a-dpd' not available on interface eth1
Aug 26 18:33:37.718301: | netlink: enabling tunnel mode
Aug 26 18:33:37.718305: | netlink: setting IPsec SA replay-window to 32 using old-style req
Aug 26 18:33:37.718308: | netlink: esp-hw-offload not set for IPsec SA
Aug 26 18:33:37.718342: | netlink response for Add SA esp.c5a95a57@192.1.3.33 included non-error error
Aug 26 18:33:37.718346: | priority calculation of connection "north-a-dpd" is 0xfe7e7
Aug 26 18:33:37.718354: | add inbound eroute 192.0.22.0/24:0 --0-> 192.0.3.0/24:0 => tun.10000@192.1.3.33 (raw_eroute)
Aug 26 18:33:37.718358: | IPsec Sa SPD priority set to 1042407
Aug 26 18:33:37.718383: | raw_eroute result=success
Aug 26 18:33:37.718387: | set up incoming SA, ref=0/0
Aug 26 18:33:37.718391: | sr for #4: prospective erouted
Aug 26 18:33:37.718394: | route_and_eroute() for proto 0, and source port 0 dest port 0
Aug 26 18:33:37.718398: | FOR_EACH_CONNECTION_... in route_owner
Aug 26 18:33:37.718402: |  conn north-a-dpd mark 0/00000000, 0/00000000 vs
Aug 26 18:33:37.718405: |  conn north-a-dpd mark 0/00000000, 0/00000000
Aug 26 18:33:37.718409: |  conn north-a-dpd mark 0/00000000, 0/00000000 vs
Aug 26 18:33:37.718413: |  conn northnet-eastnet-b mark 0/00000000, 0/00000000
Aug 26 18:33:37.718417: | route owner of "north-a-dpd" prospective erouted: self; eroute owner: self
Aug 26 18:33:37.718420: | route_and_eroute with c: north-a-dpd (next: none) ero:north-a-dpd esr:{(nil)} ro:north-a-dpd rosr:{(nil)} and state: #4
Aug 26 18:33:37.718422: | priority calculation of connection "north-a-dpd" is 0xfe7e7
Aug 26 18:33:37.718427: | eroute_connection replace eroute 192.0.3.0/24:0 --0-> 192.0.22.0/24:0 => tun.0@192.1.2.23>tun.0@192.1.2.23 (raw_eroute)
Aug 26 18:33:37.718428: | IPsec Sa SPD priority set to 1042407
Aug 26 18:33:37.718440: | raw_eroute result=success
Aug 26 18:33:37.718443: | running updown command "ipsec _updown" for verb up 
Aug 26 18:33:37.718445: | command executing up-client
Aug 26 18:33:37.718472: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:37.718477: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:37.718489: | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENC
Aug 26 18:33:37.718491: | popen cmd is 1398 chars long
Aug 26 18:33:37.718493: | cmd(   0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_:
Aug 26 18:33:37.718495: | cmd(  80):INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID=:
Aug 26 18:33:37.718497: | cmd( 160):'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.:
Aug 26 18:33:37.718499: | cmd( 240):libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24:
Aug 26 18:33:37.718500: | cmd( 320):' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_:
Aug 26 18:33:37.718504: | cmd( 400):PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_:
Aug 26 18:33:37.718506: | cmd( 480):PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Te:
Aug 26 18:33:37.718507: | cmd( 560):st Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org':
Aug 26 18:33:37.718509: | cmd( 640): PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER:
Aug 26 18:33:37.718511: | cmd( 720):_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_P:
Aug 26 18:33:37.718512: | cmd( 800):EER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libresw:
Aug 26 18:33:37.718514: | cmd( 880):an test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTI:
Aug 26 18:33:37.718516: | cmd( 960):ME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+I:
Aug 26 18:33:37.718517: | cmd(1040):KE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4:
Aug 26 18:33:37.718519: | cmd(1120):' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAI:
Aug 26 18:33:37.718521: | cmd(1200):N_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_N:
Aug 26 18:33:37.718522: | cmd(1280):M_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x8eba5cd1:
Aug 26 18:33:37.718524: | cmd(1360): SPI_OUT=0xc5a95a57 ipsec _updown 2>&1:
Aug 26 18:33:37.728140: | route_and_eroute: firewall_notified: true
Aug 26 18:33:37.728162: | route_and_eroute: instance "north-a-dpd", setting eroute_owner {spd=0x55c66d948f98,sr=0x55c66d948f98} to #4 (was #0) (newest_ipsec_sa=#0)
Aug 26 18:33:37.728229: | #3 spent 0.8 milliseconds in install_ipsec_sa()
Aug 26 18:33:37.728238: | emitting 12 zero bytes of encryption padding into ISAKMP Message
Aug 26 18:33:37.728244: | no IKEv1 message padding required
Aug 26 18:33:37.728248: | emitting length of ISAKMP Message: 76
Aug 26 18:33:37.728284: | inR1_outI2: instance north-a-dpd[0], setting IKEv1 newest_ipsec_sa to #4 (was #0) (spd.eroute=#4) cloned from #3
Aug 26 18:33:37.728304: | DPD: dpd_init() called on IPsec SA
Aug 26 18:33:37.728313: | State DB: found IKEv1 state #3 in MAIN_I4 (find_state_ikev1)
Aug 26 18:33:37.728319: | event_schedule: new EVENT_DPD-pe@0x7fbd04002b78
Aug 26 18:33:37.728326: | inserting event EVENT_DPD, timeout in 3 seconds for #4
Aug 26 18:33:37.728343: | libevent_malloc: new ptr-libevent@0x7fbd10000e98 size 128
Aug 26 18:33:37.728355: | complete v1 state transition with STF_OK
Aug 26 18:33:37.728362: | [RE]START processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:33:37.728365: | #4 is idle
Aug 26 18:33:37.728368: | doing_xauth:no, t_xauth_client_done:no
Aug 26 18:33:37.728372: | IKEv1: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Aug 26 18:33:37.728376: | child state #4: QUICK_I1(established CHILD SA) => QUICK_I2(established CHILD SA)
Aug 26 18:33:37.728379: | event_already_set, deleting event
Aug 26 18:33:37.728382: | state #4 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Aug 26 18:33:37.728387: | libevent_free: release ptr-libevent@0x55c66d974918
Aug 26 18:33:37.728394: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55c66d954c08
Aug 26 18:33:37.728401: | sending reply packet to 192.1.2.23:500 (from 192.1.3.33:500)
Aug 26 18:33:37.728409: | sending 76 bytes for STATE_QUICK_I1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #4)
Aug 26 18:33:37.728412: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:37.728413: |   08 10 20 01  03 b3 7f 3e  00 00 00 4c  23 f2 52 4c
Aug 26 18:33:37.728415: |   1a 14 8f 10  ff 11 9d 08  4e 93 32 df  3f 58 84 cc
Aug 26 18:33:37.728416: |   9d ad 6b 36  be 45 c3 d7  62 40 a8 45  c9 0a fe bb
Aug 26 18:33:37.728418: |   98 0e 89 2e  de ef 2d 01  da 65 55 4b
Aug 26 18:33:37.728459: | !event_already_set at reschedule
Aug 26 18:33:37.728462: | event_schedule: new EVENT_SA_REPLACE-pe@0x55c66d954c08
Aug 26 18:33:37.728468: | inserting event EVENT_SA_REPLACE, timeout in 27768 seconds for #4
Aug 26 18:33:37.728470: | libevent_malloc: new ptr-libevent@0x55c66d974918 size 128
Aug 26 18:33:37.728472: | pstats #4 ikev1.ipsec established
Aug 26 18:33:37.728476: | NAT-T: encaps is 'auto'
Aug 26 18:33:37.728479: "north-a-dpd" #4: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x8eba5cd1 <0xc5a95a57 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=active}
Aug 26 18:33:37.728482: | modecfg pull: noquirk policy:push not-client
Aug 26 18:33:37.728483: | phase 1 is done, looking for phase 2 to unpend
Aug 26 18:33:37.728488: | resume sending helper answer for #4 suppresed complete_v1_state_transition()
Aug 26 18:33:37.728494: | #4 spent 1.24 milliseconds in resume sending helper answer
Aug 26 18:33:37.728497: | stop processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:833)
Aug 26 18:33:37.728501: | libevent_free: release ptr-libevent@0x7fbd14003e78
Aug 26 18:33:37.728507: | processing signal PLUTO_SIGCHLD
Aug 26 18:33:37.728511: | waitpid returned ECHILD (no child processes left)
Aug 26 18:33:37.728514: | spent 0.00375 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:33:37.728516: | processing signal PLUTO_SIGCHLD
Aug 26 18:33:37.728518: | waitpid returned ECHILD (no child processes left)
Aug 26 18:33:37.728521: | spent 0.00235 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:33:37.728522: | processing signal PLUTO_SIGCHLD
Aug 26 18:33:37.728525: | waitpid returned ECHILD (no child processes left)
Aug 26 18:33:37.728542: | spent 0.00235 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:33:37.728550: | processing signal PLUTO_SIGCHLD
Aug 26 18:33:37.728552: | waitpid returned ECHILD (no child processes left)
Aug 26 18:33:37.728555: | spent 0.00249 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:33:40.720829: | timer_event_cb: processing event@0x7fbd04002b78
Aug 26 18:33:40.720856: | handling event EVENT_DPD for child state #4
Aug 26 18:33:40.720863: | start processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:40.720868: | [RE]START processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360)
Aug 26 18:33:40.720870: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:33:40.720874: | DPD: no need to send or schedule DPD for replaced IPsec SA
Aug 26 18:33:40.720877: | libevent_free: release ptr-libevent@0x7fbd10000e98
Aug 26 18:33:40.720887: | free_event_entry: release EVENT_DPD-pe@0x7fbd04002b78
Aug 26 18:33:40.720893: | #4 spent 0.0657 milliseconds in timer_event_cb() EVENT_DPD
Aug 26 18:33:40.720897: | stop processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:47.597118: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:33:47.597152: | FOR_EACH_STATE_... in show_traffic_status (sort_states)
Aug 26 18:33:47.597157: | FOR_EACH_STATE_... in sort_states
Aug 26 18:33:47.597164: | get_sa_info esp.c5a95a57@192.1.3.33
Aug 26 18:33:47.597329: | get_sa_info esp.8eba5cd1@192.1.2.23
Aug 26 18:33:47.597354: | get_sa_info esp.31a5aad0@192.1.3.33
Aug 26 18:33:47.597364: | get_sa_info esp.af15c4ab@192.1.2.23
Aug 26 18:33:47.597381: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:33:47.597389: | spent 0.263 milliseconds in whack
Aug 26 18:33:48.409988: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:33:48.410257: | FOR_EACH_CONNECTION_... in show_connections_status
Aug 26 18:33:48.410263: | FOR_EACH_CONNECTION_... in show_connections_status
Aug 26 18:33:48.410436: | FOR_EACH_STATE_... in show_states_status (sort_states)
Aug 26 18:33:48.410444: | FOR_EACH_STATE_... in sort_states
Aug 26 18:33:48.410454: | get_sa_info esp.c5a95a57@192.1.3.33
Aug 26 18:33:48.410475: | get_sa_info esp.8eba5cd1@192.1.2.23
Aug 26 18:33:48.410507: | get_sa_info esp.31a5aad0@192.1.3.33
Aug 26 18:33:48.410517: | get_sa_info esp.af15c4ab@192.1.2.23
Aug 26 18:33:48.410542: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:33:48.410550: | spent 0.541 milliseconds in whack
Aug 26 18:33:48.696393: | spent 0.0029 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:33:48.696415: | *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:33:48.696419: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.696422: |   08 10 05 01  12 95 c6 1a  00 00 00 5c  bb ba 67 4f
Aug 26 18:33:48.696424: |   e0 43 ab 38  81 fe 77 a4  0c 91 d8 81  4d 34 11 a2
Aug 26 18:33:48.696426: |   01 3f 8b 54  58 0b 18 08  3b 81 e7 15  e9 7c 79 cc
Aug 26 18:33:48.696429: |   e5 39 f5 86  63 8a 15 99  36 80 f1 56  fc 7f de e4
Aug 26 18:33:48.696431: |   8f ae d7 29  5a 3c 85 1e  50 77 f8 fc
Aug 26 18:33:48.696436: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:33:48.696440: | **parse ISAKMP Message:
Aug 26 18:33:48.696443: |    initiator cookie:
Aug 26 18:33:48.696446: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:48.696448: |    responder cookie:
Aug 26 18:33:48.696451: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.696454: |    next payload type: ISAKMP_NEXT_HASH (0x8)
Aug 26 18:33:48.696457: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:48.696459: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:33:48.696464: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:48.696466: |    Message ID: 311805466 (0x1295c61a)
Aug 26 18:33:48.696469: |    length: 92 (0x5c)
Aug 26 18:33:48.696472: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
Aug 26 18:33:48.696477: | peer and cookies match on #5; msgid=00000000 st_msgid=ee37f542 st_msgid_phase15=00000000
Aug 26 18:33:48.696481: | peer and cookies match on #4; msgid=00000000 st_msgid=03b37f3e st_msgid_phase15=00000000
Aug 26 18:33:48.696484: | peer and cookies match on #3; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
Aug 26 18:33:48.696487: | p15 state object #3 found, in STATE_MAIN_I4
Aug 26 18:33:48.696490: | State DB: found IKEv1 state #3 in MAIN_I4 (find_v1_info_state)
Aug 26 18:33:48.696496: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479)
Aug 26 18:33:48.696516: | #3 is idle
Aug 26 18:33:48.696519: | #3 idle
Aug 26 18:33:48.696523: | received encrypted packet from 192.1.2.23:500
Aug 26 18:33:48.696535: | got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
Aug 26 18:33:48.696539: | ***parse ISAKMP Hash Payload:
Aug 26 18:33:48.696542: |    next payload type: ISAKMP_NEXT_D (0xc)
Aug 26 18:33:48.696544: |    length: 36 (0x24)
Aug 26 18:33:48.696547: | got payload 0x1000  (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0
Aug 26 18:33:48.696550: | ***parse ISAKMP Delete Payload:
Aug 26 18:33:48.696552: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.696555: |    length: 16 (0x10)
Aug 26 18:33:48.696557: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:48.696559: |    protocol ID: 3 (0x3)
Aug 26 18:33:48.696561: |    SPI size: 4 (0x4)
Aug 26 18:33:48.696563: |    number of SPIs: 1 (0x1)
Aug 26 18:33:48.696566: | removing 12 bytes of padding
Aug 26 18:33:48.696592: | informational HASH(1):
Aug 26 18:33:48.696596: |   b6 82 a7 64  32 16 42 bc  5b 5b b4 d9  8a 97 9b 5f
Aug 26 18:33:48.696598: |   47 f3 af af  31 d7 e7 12  a6 e1 14 2f  6a 27 08 1a
Aug 26 18:33:48.696601: | received 'informational' message HASH(1) data ok
Aug 26 18:33:48.696604: | parsing 4 raw bytes of ISAKMP Delete Payload into SPI
Aug 26 18:33:48.696607: | SPI  8e ba 5c d1
Aug 26 18:33:48.696609: | FOR_EACH_STATE_... in find_phase2_state_to_delete
Aug 26 18:33:48.696614: | start processing: connection "north-a-dpd" (BACKGROUND) (in accept_delete() at ikev1_main.c:2515)
Aug 26 18:33:48.696618: "northnet-eastnet-b" #3: received Delete SA payload: replace IPsec State #4 now
Aug 26 18:33:48.696621: | state #4 requesting EVENT_SA_REPLACE to be deleted
Aug 26 18:33:48.696628: | libevent_free: release ptr-libevent@0x55c66d974918
Aug 26 18:33:48.696632: | free_event_entry: release EVENT_SA_REPLACE-pe@0x55c66d954c08
Aug 26 18:33:48.696635: | event_schedule: new EVENT_SA_REPLACE-pe@0x55c66d954c08
Aug 26 18:33:48.696639: | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #4
Aug 26 18:33:48.696642: | libevent_malloc: new ptr-libevent@0x7fbd14003e78 size 128
Aug 26 18:33:48.696646: | stop processing: connection "north-a-dpd" (BACKGROUND) (in accept_delete() at ikev1_main.c:2559)
Aug 26 18:33:48.696649: | del:
Aug 26 18:33:48.696652: | complete v1 state transition with STF_IGNORE
Aug 26 18:33:48.696657: | #3 spent 0.00402 milliseconds in process_packet_tail()
Aug 26 18:33:48.696662: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:33:48.696666: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_md() at demux.c:382)
Aug 26 18:33:48.696670: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:33:48.696673: | spent 0.268 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:33:48.696680: | timer_event_cb: processing event@0x55c66d954c08
Aug 26 18:33:48.696683: | handling event EVENT_SA_REPLACE for child state #4
Aug 26 18:33:48.696687: | start processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:48.696691: | picked newest_ipsec_sa #4 for #4
Aug 26 18:33:48.696693: | replacing stale IPsec SA
Aug 26 18:33:48.696697: | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351)
Aug 26 18:33:48.696700: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:33:48.696704: | creating state object #6 at 0x55c66d96f0e8
Aug 26 18:33:48.696707: | State DB: adding IKEv1 state #6 in UNDEFINED
Aug 26 18:33:48.696716: | pstats #6 ikev1.ipsec started
Aug 26 18:33:48.696719: | duplicating state object #3 "northnet-eastnet-b" as #6 for IPSEC SA
Aug 26 18:33:48.696725: | #6 setting local endpoint to 192.1.3.33:500 from #3.st_localport (in duplicate_state() at state.c:1484)
Aug 26 18:33:48.696730: | in connection_discard for connection northnet-eastnet-b
Aug 26 18:33:48.696735: | suspend processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685)
Aug 26 18:33:48.696739: | start processing: state #6 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685)
Aug 26 18:33:48.696748: | child state #6: UNDEFINED(ignore) => QUICK_I1(established CHILD SA)
Aug 26 18:33:48.696754: "north-a-dpd" #6: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO to replace #4 {using isakmp#3 msgid:9f5e56e4 proposal=defaults pfsgroup=MODP2048}
Aug 26 18:33:48.696758: | adding quick_outI1 KE work-order 11 for state #6
Aug 26 18:33:48.696761: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fbd04002b78
Aug 26 18:33:48.696764: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #6
Aug 26 18:33:48.696767: | libevent_malloc: new ptr-libevent@0x55c66d957be8 size 128
Aug 26 18:33:48.696776: | stop processing: state #6 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764)
Aug 26 18:33:48.696781: | resume processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764)
Aug 26 18:33:48.696784: | event_schedule: new EVENT_SA_EXPIRE-pe@0x55c66d95ef28
Aug 26 18:33:48.696787: | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #4
Aug 26 18:33:48.696784: | crypto helper 3 resuming
Aug 26 18:33:48.696795: | libevent_malloc: new ptr-libevent@0x55c66d94a328 size 128
Aug 26 18:33:48.696805: | crypto helper 3 starting work-order 11 for state #6
Aug 26 18:33:48.696809: | libevent_free: release ptr-libevent@0x7fbd14003e78
Aug 26 18:33:48.696812: | crypto helper 3 doing build KE and nonce (quick_outI1 KE); request ID 11
Aug 26 18:33:48.696813: | free_event_entry: release EVENT_SA_REPLACE-pe@0x55c66d954c08
Aug 26 18:33:48.696824: | #4 spent 0.137 milliseconds in timer_event_cb() EVENT_SA_REPLACE
Aug 26 18:33:48.696831: | stop processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:48.696836: | timer_event_cb: processing event@0x55c66d95ef28
Aug 26 18:33:48.696840: | handling event EVENT_SA_EXPIRE for child state #4
Aug 26 18:33:48.696844: | start processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:48.696847: | picked newest_ipsec_sa #4 for #4
Aug 26 18:33:48.696850: | un-established partial CHILD SA timeout (SA expired)
Aug 26 18:33:48.696852: | pstats #4 ikev1.ipsec re-failed exchange-timeout
Aug 26 18:33:48.696855: | pstats #4 ikev1.ipsec deleted completed
Aug 26 18:33:48.696859: | [RE]START processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in delete_state() at state.c:879)
Aug 26 18:33:48.696863: "north-a-dpd" #4: deleting state (STATE_QUICK_I2) aged 11.024s and sending notification
Aug 26 18:33:48.696866: | child state #4: QUICK_I2(established CHILD SA) => delete
Aug 26 18:33:48.696870: | get_sa_info esp.8eba5cd1@192.1.2.23
Aug 26 18:33:48.696883: | get_sa_info esp.c5a95a57@192.1.3.33
Aug 26 18:33:48.696891: "north-a-dpd" #4: ESP traffic information: in=0B out=0B
Aug 26 18:33:48.696894: | #4 send IKEv1 delete notification for STATE_QUICK_I2
Aug 26 18:33:48.696897: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:33:48.696902: | **emit ISAKMP Message:
Aug 26 18:33:48.696905: |    initiator cookie:
Aug 26 18:33:48.696907: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:48.696910: |    responder cookie:
Aug 26 18:33:48.696912: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.696915: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.696917: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:48.696920: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:33:48.696923: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:48.696926: |    Message ID: 3310231313 (0xc54e1f11)
Aug 26 18:33:48.696929: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:48.696933: | ***emit ISAKMP Hash Payload:
Aug 26 18:33:48.696936: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.696939: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:33:48.696942: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg'
Aug 26 18:33:48.696946: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:33:48.696949: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:33:48.696952: | ***emit ISAKMP Delete Payload:
Aug 26 18:33:48.696955: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.696958: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:48.696961: |    protocol ID: 3 (0x3)
Aug 26 18:33:48.696963: |    SPI size: 4 (0x4)
Aug 26 18:33:48.696966: |    number of SPIs: 1 (0x1)
Aug 26 18:33:48.696969: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D)
Aug 26 18:33:48.696973: | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg'
Aug 26 18:33:48.696976: | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload
Aug 26 18:33:48.696979: | delete payload  c5 a9 5a 57
Aug 26 18:33:48.696982: | emitting length of ISAKMP Delete Payload: 16
Aug 26 18:33:48.697004: | send delete HASH(1):
Aug 26 18:33:48.697009: |   ba 50 23 93  32 0f 84 ad  05 01 a7 7c  56 5e 59 63
Aug 26 18:33:48.697012: |   48 9b 14 ce  26 44 b6 21  88 67 54 20  5b 5e 17 34
Aug 26 18:33:48.697020: | emitting 12 zero bytes of encryption padding into ISAKMP Message
Aug 26 18:33:48.697023: | no IKEv1 message padding required
Aug 26 18:33:48.697026: | emitting length of ISAKMP Message: 92
Aug 26 18:33:48.697037: | sending 92 bytes for delete notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3)
Aug 26 18:33:48.697040: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.697044: |   08 10 05 01  c5 4e 1f 11  00 00 00 5c  c8 c9 b9 29
Aug 26 18:33:48.697046: |   9d 7b 4e 0f  01 67 d7 1a  d5 1c 39 c6  7a 5e 2c 2b
Aug 26 18:33:48.697048: |   45 ff ba b4  ac e6 95 3c  86 4a d4 04  d4 0c b0 59
Aug 26 18:33:48.697049: |   9a 31 cf 2a  14 95 ce 91  b0 30 8f 7c  c7 d3 19 a6
Aug 26 18:33:48.697051: |   dc 9a 8a f6  55 2f b8 35  ea c9 b2 a3
Aug 26 18:33:48.697118: | running updown command "ipsec _updown" for verb down 
Aug 26 18:33:48.697126: | command executing down-client
Aug 26 18:33:48.697158: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:48.697167: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:48.697184: | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844417' PLUTO_CONN_POLIC
Aug 26 18:33:48.697186: | popen cmd is 1409 chars long
Aug 26 18:33:48.697188: | cmd(   0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUT:
Aug 26 18:33:48.697190: | cmd(  80):O_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_I:
Aug 26 18:33:48.697192: | cmd( 160):D='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testin:
Aug 26 18:33:48.697194: | cmd( 240):g.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/:
Aug 26 18:33:48.697195: | cmd( 320):24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_M:
Aug 26 18:33:48.697197: | cmd( 400):Y_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUT:
Aug 26 18:33:48.697199: | cmd( 480):O_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=:
Aug 26 18:33:48.697200: | cmd( 560):Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.or:
Aug 26 18:33:48.697202: | cmd( 640):g' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PE:
Aug 26 18:33:48.697204: | cmd( 720):ER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO:
Aug 26 18:33:48.697206: | cmd( 800):_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libre:
Aug 26 18:33:48.697207: | cmd( 880):swan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADD:
Aug 26 18:33:48.697209: | cmd( 960):TIME='1566844417' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SA:
Aug 26 18:33:48.697211: | cmd(1040):REF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRF:
Aug 26 18:33:48.697212: | cmd(1120):AMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO:
Aug 26 18:33:48.697214: | cmd(1200):_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT=:
Aug 26 18:33:48.697216: | cmd(1280):'0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN:
Aug 26 18:33:48.697217: | cmd(1360):=0x8eba5cd1 SPI_OUT=0xc5a95a57 ipsec _updown 2>&1:
Aug 26 18:33:48.697671: | crypto helper 3 finished build KE and nonce (quick_outI1 KE); request ID 11 time elapsed 0.000859 seconds
Aug 26 18:33:48.697688: | (#6) spent 0.684 milliseconds in crypto helper computing work-order 11: quick_outI1 KE (pcr)
Aug 26 18:33:48.697692: | crypto helper 3 sending results from work-order 11 for state #6 to event queue
Aug 26 18:33:48.697696: | scheduling resume sending helper answer for #6
Aug 26 18:33:48.697699: | libevent_malloc: new ptr-libevent@0x7fbd08005df8 size 128
Aug 26 18:33:48.697712: | crypto helper 3 waiting (nothing to do)
Aug 26 18:33:48.706044: | shunt_eroute() called for connection 'north-a-dpd' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0
Aug 26 18:33:48.706056: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0
Aug 26 18:33:48.706061: | priority calculation of connection "north-a-dpd" is 0xfe7e7
Aug 26 18:33:48.706065: | IPsec Sa SPD priority set to 1042407
Aug 26 18:33:48.706091: | delete esp.8eba5cd1@192.1.2.23
Aug 26 18:33:48.706106: | netlink response for Del SA esp.8eba5cd1@192.1.2.23 included non-error error
Aug 26 18:33:48.706110: | priority calculation of connection "north-a-dpd" is 0xfe7e7
Aug 26 18:33:48.706114: | delete inbound eroute 192.0.22.0/24:0 --0-> 192.0.3.0/24:0 => unk255.10000@192.1.3.33 (raw_eroute)
Aug 26 18:33:48.706133: | raw_eroute result=success
Aug 26 18:33:48.706137: | delete esp.c5a95a57@192.1.3.33
Aug 26 18:33:48.706146: | netlink response for Del SA esp.c5a95a57@192.1.3.33 included non-error error
Aug 26 18:33:48.706155: | in connection_discard for connection north-a-dpd
Aug 26 18:33:48.706158: | State DB: deleting IKEv1 state #4 in QUICK_I2
Aug 26 18:33:48.706162: | child state #4: QUICK_I2(established CHILD SA) => UNDEFINED(ignore)
Aug 26 18:33:48.706192: | stop processing: state #4 from 192.1.2.23 (in delete_state() at state.c:1143)
Aug 26 18:33:48.706216: | libevent_free: release ptr-libevent@0x55c66d94a328
Aug 26 18:33:48.706220: | free_event_entry: release EVENT_SA_EXPIRE-pe@0x55c66d95ef28
Aug 26 18:33:48.706222: | in statetime_stop() and could not find #4
Aug 26 18:33:48.706224: | processing: STOP state #0 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:48.706236: | processing resume sending helper answer for #6
Aug 26 18:33:48.706241: | start processing: state #6 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:797)
Aug 26 18:33:48.706250: | crypto helper 3 replies to request ID 11
Aug 26 18:33:48.706253: | calling continuation function 0x55c66cb6db50
Aug 26 18:33:48.706257: | quick_outI1_continue for #6: calculated ke+nonce, sending I1
Aug 26 18:33:48.706281: | **emit ISAKMP Message:
Aug 26 18:33:48.706285: |    initiator cookie:
Aug 26 18:33:48.706316: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:48.706322: |    responder cookie:
Aug 26 18:33:48.706325: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.706327: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.706330: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:48.706334: |    exchange type: ISAKMP_XCHG_QUICK (0x20)
Aug 26 18:33:48.706341: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:48.706344: |    Message ID: 2673759972 (0x9f5e56e4)
Aug 26 18:33:48.706348: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:48.706351: | ***emit ISAKMP Hash Payload:
Aug 26 18:33:48.706354: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.706358: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:33:48.706361: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.706365: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:33:48.706368: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:33:48.706371: | emitting quick defaults using policy none
Aug 26 18:33:48.706375: | empty esp_info, returning defaults for ENCRYPT
Aug 26 18:33:48.706382: | ***emit ISAKMP Security Association Payload:
Aug 26 18:33:48.706388: |    next payload type: ISAKMP_NEXT_NONCE (0xa)
Aug 26 18:33:48.706392: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:48.706396: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE
Aug 26 18:33:48.706399: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:33:48.706402: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.706406: | ****emit IPsec DOI SIT:
Aug 26 18:33:48.706409: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:33:48.706412: | ikev1_out_sa pcn: 0 has 1 valid proposals
Aug 26 18:33:48.706415: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2
Aug 26 18:33:48.706418: | ****emit ISAKMP Proposal Payload:
Aug 26 18:33:48.706421: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.706424: |    proposal number: 0 (0x0)
Aug 26 18:33:48.706427: |    protocol ID: PROTO_IPSEC_ESP (0x3)
Aug 26 18:33:48.706429: |    SPI size: 4 (0x4)
Aug 26 18:33:48.706432: |    number of transforms: 2 (0x2)
Aug 26 18:33:48.706435: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
Aug 26 18:33:48.706449: | netlink_get_spi: allocated 0x3775b39e for esp.0@192.1.3.33
Aug 26 18:33:48.706454: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
Aug 26 18:33:48.706456: | SPI  37 75 b3 9e
Aug 26 18:33:48.706460: | *****emit ISAKMP Transform Payload (ESP):
Aug 26 18:33:48.706462: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.706465: |    ESP transform number: 0 (0x0)
Aug 26 18:33:48.706468: |    ESP transform ID: ESP_AES (0xc)
Aug 26 18:33:48.706471: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type'
Aug 26 18:33:48.706474: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.706477: |    af+type: AF+GROUP_DESCRIPTION (0x8003)
Aug 26 18:33:48.706480: |    length/value: 14 (0xe)
Aug 26 18:33:48.706483: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:48.706485: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.706488: |    af+type: AF+ENCAPSULATION_MODE (0x8004)
Aug 26 18:33:48.706490: |    length/value: 1 (0x1)
Aug 26 18:33:48.706492: |     [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 26 18:33:48.706494: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.706496: |    af+type: AF+SA_LIFE_TYPE (0x8001)
Aug 26 18:33:48.706498: |    length/value: 1 (0x1)
Aug 26 18:33:48.706500: |     [1 is SA_LIFE_TYPE_SECONDS]
Aug 26 18:33:48.706503: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.706505: |    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
Aug 26 18:33:48.706507: |    length/value: 28800 (0x7080)
Aug 26 18:33:48.706509: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.706511: |    af+type: AF+AUTH_ALGORITHM (0x8005)
Aug 26 18:33:48.706514: |    length/value: 2 (0x2)
Aug 26 18:33:48.706516: |     [2 is AUTH_ALGORITHM_HMAC_SHA1]
Aug 26 18:33:48.706518: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.706521: |    af+type: AF+KEY_LENGTH (0x8006)
Aug 26 18:33:48.706523: |    length/value: 128 (0x80)
Aug 26 18:33:48.706526: | emitting length of ISAKMP Transform Payload (ESP): 32
Aug 26 18:33:48.706529: | *****emit ISAKMP Transform Payload (ESP):
Aug 26 18:33:48.706531: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.706534: |    ESP transform number: 1 (0x1)
Aug 26 18:33:48.706536: |    ESP transform ID: ESP_3DES (0x3)
Aug 26 18:33:48.706539: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.706542: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type'
Aug 26 18:33:48.706545: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.706547: |    af+type: AF+GROUP_DESCRIPTION (0x8003)
Aug 26 18:33:48.706551: |    length/value: 14 (0xe)
Aug 26 18:33:48.706554: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:48.706557: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.706559: |    af+type: AF+ENCAPSULATION_MODE (0x8004)
Aug 26 18:33:48.706561: |    length/value: 1 (0x1)
Aug 26 18:33:48.706564: |     [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 26 18:33:48.706567: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.706569: |    af+type: AF+SA_LIFE_TYPE (0x8001)
Aug 26 18:33:48.706572: |    length/value: 1 (0x1)
Aug 26 18:33:48.706575: |     [1 is SA_LIFE_TYPE_SECONDS]
Aug 26 18:33:48.706577: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.706580: |    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
Aug 26 18:33:48.706583: |    length/value: 28800 (0x7080)
Aug 26 18:33:48.706586: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.706588: |    af+type: AF+AUTH_ALGORITHM (0x8005)
Aug 26 18:33:48.706591: |    length/value: 2 (0x2)
Aug 26 18:33:48.706594: |     [2 is AUTH_ALGORITHM_HMAC_SHA1]
Aug 26 18:33:48.706597: | emitting length of ISAKMP Transform Payload (ESP): 28
Aug 26 18:33:48.706599: | emitting length of ISAKMP Proposal Payload: 72
Aug 26 18:33:48.706602: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0
Aug 26 18:33:48.706606: | emitting length of ISAKMP Security Association Payload: 84
Aug 26 18:33:48.706609: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
Aug 26 18:33:48.706613: | ***emit ISAKMP Nonce Payload:
Aug 26 18:33:48.706617: |    next payload type: ISAKMP_NEXT_KE (0x4)
Aug 26 18:33:48.706620: | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE
Aug 26 18:33:48.706623: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE)
Aug 26 18:33:48.706626: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.706629: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload
Aug 26 18:33:48.706632: | Ni  f9 ab 0f 76  76 21 95 9e  db 20 01 bd  28 20 d6 c3
Aug 26 18:33:48.706635: | Ni  7a 70 0e f6  37 89 61 26  af 31 6f 42  31 9c 53 e0
Aug 26 18:33:48.706637: | emitting length of ISAKMP Nonce Payload: 36
Aug 26 18:33:48.706640: | ***emit ISAKMP Key Exchange Payload:
Aug 26 18:33:48.706643: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:33:48.706645: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID
Aug 26 18:33:48.706648: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE)
Aug 26 18:33:48.706651: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.706654: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
Aug 26 18:33:48.706657: | keyex value  aa 19 19 68  8c 6d 58 b8  1f 34 ba c2  bb 65 68 7d
Aug 26 18:33:48.706660: | keyex value  4d bb e8 0b  d1 35 9a d5  33 ae 4d e8  7e a9 61 0d
Aug 26 18:33:48.706662: | keyex value  fc 75 ba 99  3c 5e 4c a9  6c 7c d8 70  ec e4 fe e6
Aug 26 18:33:48.706665: | keyex value  28 cd 30 0b  4b 2a cf 0b  c1 8d 8c b0  82 16 9c ba
Aug 26 18:33:48.706667: | keyex value  10 63 f8 b6  7b c3 76 cc  0e 02 c3 9c  94 f7 1a 0c
Aug 26 18:33:48.706669: | keyex value  62 08 d5 1f  ac 6b 1e 47  d8 fe 62 32  ab ee 34 82
Aug 26 18:33:48.706672: | keyex value  fd 73 15 f2  eb 2a bb 7b  da c4 fd 7d  17 be bd e8
Aug 26 18:33:48.706674: | keyex value  6e 80 52 69  e8 2c 49 30  62 9f ce 2e  1f a2 91 bc
Aug 26 18:33:48.706677: | keyex value  ca 5b a5 96  6e df 9a ce  32 7c f7 7b  1c c8 4d b8
Aug 26 18:33:48.706679: | keyex value  90 74 be 0c  e2 e6 33 0e  55 5a e8 3d  0c d3 88 ba
Aug 26 18:33:48.706682: | keyex value  87 b8 08 b0  cc 14 f0 49  35 85 0b 40  c0 7d 2c 86
Aug 26 18:33:48.706686: | keyex value  5c b4 9c a9  34 68 13 29  82 b3 70 79  13 62 32 ee
Aug 26 18:33:48.706688: | keyex value  d1 a1 97 14  25 17 66 2e  95 cc 8e 8f  be 26 24 1f
Aug 26 18:33:48.706691: | keyex value  3c 6c 7e ad  7b 39 da 35  f8 c0 d5 8e  da 00 31 93
Aug 26 18:33:48.706693: | keyex value  18 e6 dd e0  a0 59 90 a3  14 2c c1 57  48 a3 08 ba
Aug 26 18:33:48.706696: | keyex value  0c eb 11 f9  a2 6f 77 9a  23 46 68 b5  05 42 75 d4
Aug 26 18:33:48.706698: | emitting length of ISAKMP Key Exchange Payload: 260
Aug 26 18:33:48.706701: | ***emit ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:33:48.706704: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:33:48.706707: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:33:48.706710: |    Protocol ID: 0 (0x0)
Aug 26 18:33:48.706712: |    port: 0 (0x0)
Aug 26 18:33:48.706716: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID
Aug 26 18:33:48.706719: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
Aug 26 18:33:48.706722: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
Aug 26 18:33:48.706726: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:48.706729: | client network  c0 00 03 00
Aug 26 18:33:48.706732: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:48.706735: | client mask  ff ff ff 00
Aug 26 18:33:48.706737: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16
Aug 26 18:33:48.706740: | ***emit ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:33:48.706742: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.706744: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:33:48.706746: |    Protocol ID: 0 (0x0)
Aug 26 18:33:48.706748: |    port: 0 (0x0)
Aug 26 18:33:48.706751: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
Aug 26 18:33:48.706753: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
Aug 26 18:33:48.706754: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:48.706756: | client network  c0 00 16 00
Aug 26 18:33:48.706758: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:48.706759: | client mask  ff ff ff 00
Aug 26 18:33:48.706761: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16
Aug 26 18:33:48.706783: | outI1 HASH(1):
Aug 26 18:33:48.706786: |   50 6f 07 f4  f5 13 d0 3c  38 74 83 12  ee cd 75 ef
Aug 26 18:33:48.706787: |   8f 6c 10 7a  c8 80 da a3  bc 28 e9 41  ee 49 6b 66
Aug 26 18:33:48.706795: | no IKEv1 message padding required
Aug 26 18:33:48.706797: | emitting length of ISAKMP Message: 476
Aug 26 18:33:48.706812: | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #6)
Aug 26 18:33:48.706814: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.706816: |   08 10 20 01  9f 5e 56 e4  00 00 01 dc  83 77 46 7d
Aug 26 18:33:48.706817: |   29 1e 11 c7  45 50 3b e9  55 68 98 60  19 29 61 4d
Aug 26 18:33:48.706819: |   d9 4a a5 40  af 85 06 98  3d c1 a4 c4  b7 66 7c 1b
Aug 26 18:33:48.706820: |   06 a8 88 ab  94 3d d9 f0  98 4a 62 f3  d0 7c 5a 19
Aug 26 18:33:48.706822: |   f4 6b 3a af  37 cb aa 85  5b 6a cf 42  2e e9 cd e0
Aug 26 18:33:48.706823: |   d1 d8 20 2a  90 22 2b a0  b7 5a b8 5f  41 00 e5 1d
Aug 26 18:33:48.706825: |   76 67 90 dc  67 56 0f f9  e6 40 d5 fa  c9 4b 97 b6
Aug 26 18:33:48.706826: |   0f 1d 23 25  ec 3d 8b e1  a7 d6 46 79  d3 e5 f3 fe
Aug 26 18:33:48.706828: |   ac ef 7b 8e  73 a7 6d 8f  54 e5 f0 67  ba 69 73 3e
Aug 26 18:33:48.706829: |   9b 7a f7 f1  37 50 0a 33  ef 8b 15 d4  ec fd f3 4b
Aug 26 18:33:48.706832: |   86 eb f2 48  0e 36 39 b3  9a 4e 15 de  89 95 3a df
Aug 26 18:33:48.706834: |   e0 02 b4 30  93 70 f6 90  82 6a d3 19  33 64 e9 7a
Aug 26 18:33:48.706835: |   0f d9 a0 fd  1f 6c b1 ec  35 1d b9 1d  6d d9 13 db
Aug 26 18:33:48.706837: |   5c 57 05 04  56 61 3b d4  2e a8 10 90  1a 6c 80 22
Aug 26 18:33:48.706838: |   5a 3c ff 7b  81 df e2 a8  95 3f ef 07  01 74 6f 8e
Aug 26 18:33:48.706840: |   54 e1 d5 bc  65 e7 fb 71  33 cb be e0  f9 50 37 17
Aug 26 18:33:48.706841: |   0a 51 f9 1a  48 e9 57 b4  57 a7 d4 b2  d2 21 39 2f
Aug 26 18:33:48.706843: |   fc 37 6d 04  7c 0b 3e 2e  02 04 c1 d4  e5 75 8b 4d
Aug 26 18:33:48.706844: |   be 2a 74 f9  d8 03 af 05  45 1f 03 d8  78 e2 81 4d
Aug 26 18:33:48.706846: |   93 38 6c 25  1e fb b9 a0  08 61 e4 18  14 44 41 57
Aug 26 18:33:48.706847: |   40 d4 28 5f  ff eb 22 af  88 d5 f1 53  18 1f 1c d7
Aug 26 18:33:48.706849: |   96 36 23 7c  1c d8 05 df  38 fb 7c 51  8c 73 6f 53
Aug 26 18:33:48.706850: |   c4 37 79 78  85 98 14 e5  00 3c 17 85  45 15 91 98
Aug 26 18:33:48.706852: |   54 ad 52 6b  f5 56 f8 56  f1 86 da 1d  73 5d d5 39
Aug 26 18:33:48.706853: |   18 a7 a0 da  c8 5f ba 63  70 c2 48 31  2a be e9 cc
Aug 26 18:33:48.706855: |   81 a0 84 1c  1b 86 38 be  03 13 f4 2e  51 6b b6 d0
Aug 26 18:33:48.706856: |   9f ee 4a 70  3c 63 46 49  4f 0e 63 b8  a4 45 b4 a3
Aug 26 18:33:48.706858: |   f2 7a 46 1b  3a 90 96 6d  e3 8b e0 e0  1c 42 62 96
Aug 26 18:33:48.706859: |   87 a3 b3 59  60 de 98 c9  bf 8a b4 e5
Aug 26 18:33:48.706887: | state #6 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Aug 26 18:33:48.706890: | libevent_free: release ptr-libevent@0x55c66d957be8
Aug 26 18:33:48.706892: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fbd04002b78
Aug 26 18:33:48.706895: | event_schedule: new EVENT_RETRANSMIT-pe@0x7fbd04002b78
Aug 26 18:33:48.706898: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #6
Aug 26 18:33:48.706900: | libevent_malloc: new ptr-libevent@0x55c66d974918 size 128
Aug 26 18:33:48.706905: | #6 STATE_QUICK_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29714.449362
Aug 26 18:33:48.706909: | resume sending helper answer for #6 suppresed complete_v1_state_transition()
Aug 26 18:33:48.706915: | #6 spent 0.622 milliseconds in resume sending helper answer
Aug 26 18:33:48.706918: | stop processing: state #6 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:833)
Aug 26 18:33:48.706920: | libevent_free: release ptr-libevent@0x7fbd08005df8
Aug 26 18:33:48.706922: | processing signal PLUTO_SIGCHLD
Aug 26 18:33:48.706926: | waitpid returned ECHILD (no child processes left)
Aug 26 18:33:48.706930: | spent 0.004 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:33:48.706937: | spent 0.00127 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:33:48.706947: | *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:33:48.706949: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.706951: |   08 10 05 01  27 f6 4b 6c  00 00 00 5c  77 64 14 76
Aug 26 18:33:48.706952: |   70 4b 18 cf  29 6d b0 03  b8 64 92 a3  af f9 8a 86
Aug 26 18:33:48.706954: |   c4 18 7a f9  61 10 6e db  a0 b2 30 e4  ee 31 1f f4
Aug 26 18:33:48.706955: |   3c ba b6 68  06 e6 40 17  24 69 c0 ba  d0 0e 83 81
Aug 26 18:33:48.706957: |   ca ed d6 43  21 a1 54 5f  04 5c 76 f3
Aug 26 18:33:48.706960: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:33:48.706962: | **parse ISAKMP Message:
Aug 26 18:33:48.706964: |    initiator cookie:
Aug 26 18:33:48.706966: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:48.706967: |    responder cookie:
Aug 26 18:33:48.706969: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.706970: |    next payload type: ISAKMP_NEXT_HASH (0x8)
Aug 26 18:33:48.706972: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:48.706974: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:33:48.706976: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:48.706979: |    Message ID: 670452588 (0x27f64b6c)
Aug 26 18:33:48.706981: |    length: 92 (0x5c)
Aug 26 18:33:48.706983: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
Aug 26 18:33:48.706986: | peer and cookies match on #6; msgid=00000000 st_msgid=9f5e56e4 st_msgid_phase15=00000000
Aug 26 18:33:48.706988: | peer and cookies match on #5; msgid=00000000 st_msgid=ee37f542 st_msgid_phase15=00000000
Aug 26 18:33:48.706990: | peer and cookies match on #3; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
Aug 26 18:33:48.706992: | p15 state object #3 found, in STATE_MAIN_I4
Aug 26 18:33:48.706994: | State DB: found IKEv1 state #3 in MAIN_I4 (find_v1_info_state)
Aug 26 18:33:48.706997: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479)
Aug 26 18:33:48.707004: | #3 is idle
Aug 26 18:33:48.707006: | #3 idle
Aug 26 18:33:48.707008: | received encrypted packet from 192.1.2.23:500
Aug 26 18:33:48.707014: | got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
Aug 26 18:33:48.707016: | ***parse ISAKMP Hash Payload:
Aug 26 18:33:48.707018: |    next payload type: ISAKMP_NEXT_D (0xc)
Aug 26 18:33:48.707020: |    length: 36 (0x24)
Aug 26 18:33:48.707022: | got payload 0x1000  (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0
Aug 26 18:33:48.707023: | ***parse ISAKMP Delete Payload:
Aug 26 18:33:48.707025: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.707027: |    length: 16 (0x10)
Aug 26 18:33:48.707028: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:48.707030: |    protocol ID: 3 (0x3)
Aug 26 18:33:48.707031: |    SPI size: 4 (0x4)
Aug 26 18:33:48.707033: |    number of SPIs: 1 (0x1)
Aug 26 18:33:48.707035: | removing 12 bytes of padding
Aug 26 18:33:48.707045: | informational HASH(1):
Aug 26 18:33:48.707048: |   1c d2 7d c4  97 5f e2 8c  69 d2 98 28  af da ab 16
Aug 26 18:33:48.707049: |   35 b2 9d 7e  84 2a 2f 3f  75 fd ef a5  43 a9 84 8c
Aug 26 18:33:48.707051: | received 'informational' message HASH(1) data ok
Aug 26 18:33:48.707053: | parsing 4 raw bytes of ISAKMP Delete Payload into SPI
Aug 26 18:33:48.707055: | SPI  af 15 c4 ab
Aug 26 18:33:48.707057: | FOR_EACH_STATE_... in find_phase2_state_to_delete
Aug 26 18:33:48.707060: | start processing: connection "northnet-eastnet-b" (BACKGROUND) (in accept_delete() at ikev1_main.c:2515)
Aug 26 18:33:48.707062: "northnet-eastnet-b" #3: received Delete SA payload: replace IPsec State #5 now
Aug 26 18:33:48.707065: | state #5 requesting EVENT_SA_REPLACE to be deleted
Aug 26 18:33:48.707067: | libevent_free: release ptr-libevent@0x55c66d95d888
Aug 26 18:33:48.707070: | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fbd18002b78
Aug 26 18:33:48.707072: | event_schedule: new EVENT_SA_REPLACE-pe@0x7fbd18002b78
Aug 26 18:33:48.707075: | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #5
Aug 26 18:33:48.707077: | libevent_malloc: new ptr-libevent@0x7fbd08005df8 size 128
Aug 26 18:33:48.707079: | stop processing: connection "northnet-eastnet-b" (BACKGROUND) (in accept_delete() at ikev1_main.c:2559)
Aug 26 18:33:48.707081: | del:
Aug 26 18:33:48.707085: | complete v1 state transition with STF_IGNORE
Aug 26 18:33:48.707088: | #3 spent 0.00373 milliseconds in process_packet_tail()
Aug 26 18:33:48.707091: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:33:48.707094: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_md() at demux.c:382)
Aug 26 18:33:48.707096: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:33:48.707098: | spent 0.158 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:33:48.707103: | timer_event_cb: processing event@0x7fbd18002b78
Aug 26 18:33:48.707105: | handling event EVENT_SA_REPLACE for child state #5
Aug 26 18:33:48.707107: | start processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:48.707110: | picked newest_ipsec_sa #5 for #5
Aug 26 18:33:48.707113: | replacing stale IPsec SA
Aug 26 18:33:48.707116: | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351)
Aug 26 18:33:48.707118: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:33:48.707121: | creating state object #7 at 0x55c66d96e5f8
Aug 26 18:33:48.707123: | State DB: adding IKEv1 state #7 in UNDEFINED
Aug 26 18:33:48.707128: | pstats #7 ikev1.ipsec started
Aug 26 18:33:48.707130: | duplicating state object #3 "northnet-eastnet-b" as #7 for IPSEC SA
Aug 26 18:33:48.707134: | #7 setting local endpoint to 192.1.3.33:500 from #3.st_localport (in duplicate_state() at state.c:1484)
Aug 26 18:33:48.707138: | suspend processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685)
Aug 26 18:33:48.707141: | start processing: state #7 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685)
Aug 26 18:33:48.707147: | child state #7: UNDEFINED(ignore) => QUICK_I1(established CHILD SA)
Aug 26 18:33:48.707151: "northnet-eastnet-b" #7: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO to replace #5 {using isakmp#3 msgid:b0514738 proposal=defaults pfsgroup=MODP2048}
Aug 26 18:33:48.707154: | adding quick_outI1 KE work-order 12 for state #7
Aug 26 18:33:48.707156: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55c66d95ef28
Aug 26 18:33:48.707158: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #7
Aug 26 18:33:48.707160: | libevent_malloc: new ptr-libevent@0x55c66d976578 size 128
Aug 26 18:33:48.707168: | stop processing: state #7 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764)
Aug 26 18:33:48.707170: | resume processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764)
Aug 26 18:33:48.707173: | event_schedule: new EVENT_SA_EXPIRE-pe@0x55c66d94da38
Aug 26 18:33:48.707174: | crypto helper 1 resuming
Aug 26 18:33:48.707175: | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #5
Aug 26 18:33:48.707193: | crypto helper 1 starting work-order 12 for state #7
Aug 26 18:33:48.707205: | libevent_malloc: new ptr-libevent@0x7fbd14003e78 size 128
Aug 26 18:33:48.707207: | crypto helper 1 doing build KE and nonce (quick_outI1 KE); request ID 12
Aug 26 18:33:48.707210: | libevent_free: release ptr-libevent@0x7fbd08005df8
Aug 26 18:33:48.707213: | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fbd18002b78
Aug 26 18:33:48.707219: | #5 spent 0.105 milliseconds in timer_event_cb() EVENT_SA_REPLACE
Aug 26 18:33:48.707225: | stop processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:48.707231: | timer_event_cb: processing event@0x55c66d94da38
Aug 26 18:33:48.707234: | handling event EVENT_SA_EXPIRE for child state #5
Aug 26 18:33:48.707238: | start processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:48.707242: | picked newest_ipsec_sa #5 for #5
Aug 26 18:33:48.707245: | un-established partial CHILD SA timeout (SA expired)
Aug 26 18:33:48.707248: | pstats #5 ikev1.ipsec re-failed exchange-timeout
Aug 26 18:33:48.707250: | pstats #5 ikev1.ipsec deleted completed
Aug 26 18:33:48.707255: | [RE]START processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in delete_state() at state.c:879)
Aug 26 18:33:48.707259: "northnet-eastnet-b" #5: deleting state (STATE_QUICK_I2) aged 11.034s and sending notification
Aug 26 18:33:48.707262: | child state #5: QUICK_I2(established CHILD SA) => delete
Aug 26 18:33:48.707267: | get_sa_info esp.af15c4ab@192.1.2.23
Aug 26 18:33:48.707280: | get_sa_info esp.31a5aad0@192.1.3.33
Aug 26 18:33:48.707304: "northnet-eastnet-b" #5: ESP traffic information: in=0B out=0B
Aug 26 18:33:48.707312: | #5 send IKEv1 delete notification for STATE_QUICK_I2
Aug 26 18:33:48.707315: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:33:48.707324: | **emit ISAKMP Message:
Aug 26 18:33:48.707328: |    initiator cookie:
Aug 26 18:33:48.707332: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:48.707335: |    responder cookie:
Aug 26 18:33:48.707338: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.707341: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.707344: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:48.707347: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:33:48.707350: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:48.707353: |    Message ID: 2620766481 (0x9c35b911)
Aug 26 18:33:48.707356: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:48.707359: | ***emit ISAKMP Hash Payload:
Aug 26 18:33:48.707362: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.707365: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:33:48.707368: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg'
Aug 26 18:33:48.707372: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:33:48.707374: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:33:48.707377: | ***emit ISAKMP Delete Payload:
Aug 26 18:33:48.707380: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.707383: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:48.707385: |    protocol ID: 3 (0x3)
Aug 26 18:33:48.707388: |    SPI size: 4 (0x4)
Aug 26 18:33:48.707391: |    number of SPIs: 1 (0x1)
Aug 26 18:33:48.707394: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D)
Aug 26 18:33:48.707397: | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg'
Aug 26 18:33:48.707401: | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload
Aug 26 18:33:48.707404: | delete payload  31 a5 aa d0
Aug 26 18:33:48.707406: | emitting length of ISAKMP Delete Payload: 16
Aug 26 18:33:48.707429: | send delete HASH(1):
Aug 26 18:33:48.707434: |   a9 f6 69 aa  b5 ef c5 c0  9c 5c 79 11  6d 49 39 c8
Aug 26 18:33:48.707437: |   40 c2 dd 05  28 06 7e 3e  e8 2f 7a 93  ee 03 e7 2a
Aug 26 18:33:48.707445: | emitting 12 zero bytes of encryption padding into ISAKMP Message
Aug 26 18:33:48.707449: | no IKEv1 message padding required
Aug 26 18:33:48.707452: | emitting length of ISAKMP Message: 92
Aug 26 18:33:48.707468: | sending 92 bytes for delete notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3)
Aug 26 18:33:48.707471: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.707475: |   08 10 05 01  9c 35 b9 11  00 00 00 5c  5e 47 52 6b
Aug 26 18:33:48.707478: |   26 c0 87 68  e3 c3 5a 17  a0 fb 8a b8  1f 1b 49 29
Aug 26 18:33:48.707481: |   d6 74 c0 f5  0d 96 cc c5  e3 31 a6 41  1d 83 b8 49
Aug 26 18:33:48.707483: |   dc 7c 68 6e  77 27 14 0c  da 81 67 cc  11 3a 9a 0a
Aug 26 18:33:48.707486: |   1e a7 e7 0e  a0 e3 f7 91  fe 98 5e 4f
Aug 26 18:33:48.707564: | running updown command "ipsec _updown" for verb down 
Aug 26 18:33:48.707570: | command executing down-client
Aug 26 18:33:48.707598: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:48.707605: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org'
Aug 26 18:33:48.707625: | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844417' PLUTO_CONN_
Aug 26 18:33:48.707632: | popen cmd is 1414 chars long
Aug 26 18:33:48.707635: | cmd(   0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-:
Aug 26 18:33:48.707639: | cmd(  80):b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLU:
Aug 26 18:33:48.707642: | cmd( 160):TO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north:
Aug 26 18:33:48.707645: | cmd( 240):.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192:
Aug 26 18:33:48.707647: | cmd( 320):.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' :
Aug 26 18:33:48.707650: | cmd( 400):PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ES:
Aug 26 18:33:48.707653: | cmd( 480):P' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libresw:
Aug 26 18:33:48.707656: | cmd( 560):an, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libre:
Aug 26 18:33:48.707658: | cmd( 640):swan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLU:
Aug 26 18:33:48.707661: | cmd( 720):TO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' :
Aug 26 18:33:48.707664: | cmd( 800):PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=:
Aug 26 18:33:48.707666: | cmd( 880):Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUT:
Aug 26 18:33:48.707669: | cmd( 960):O_ADDTIME='1566844417' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALL:
Aug 26 18:33:48.707672: | cmd(1040):OW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_:
Aug 26 18:33:48.707675: | cmd(1120):ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' :
Aug 26 18:33:48.707677: | cmd(1200):PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CL:
Aug 26 18:33:48.707680: | cmd(1280):IENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' S:
Aug 26 18:33:48.707683: | cmd(1360):PI_IN=0xaf15c4ab SPI_OUT=0x31a5aad0 ipsec _updown 2>&1:
Aug 26 18:33:48.708193: | crypto helper 1 finished build KE and nonce (quick_outI1 KE); request ID 12 time elapsed 0.000986 seconds
Aug 26 18:33:48.708205: | (#7) spent 0.667 milliseconds in crypto helper computing work-order 12: quick_outI1 KE (pcr)
Aug 26 18:33:48.708207: | crypto helper 1 sending results from work-order 12 for state #7 to event queue
Aug 26 18:33:48.708210: | scheduling resume sending helper answer for #7
Aug 26 18:33:48.708212: | libevent_malloc: new ptr-libevent@0x7fbd0c0072f8 size 128
Aug 26 18:33:48.708223: | crypto helper 1 waiting (nothing to do)
Aug 26 18:33:48.715984: | shunt_eroute() called for connection 'northnet-eastnet-b' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0
Aug 26 18:33:48.716004: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0
Aug 26 18:33:48.716008: | priority calculation of connection "northnet-eastnet-b" is 0xfe7e7
Aug 26 18:33:48.716013: | IPsec Sa SPD priority set to 1042407
Aug 26 18:33:48.716054: | delete esp.af15c4ab@192.1.2.23
Aug 26 18:33:48.716073: | netlink response for Del SA esp.af15c4ab@192.1.2.23 included non-error error
Aug 26 18:33:48.716077: | priority calculation of connection "northnet-eastnet-b" is 0xfe7e7
Aug 26 18:33:48.716084: | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.3.0/24:0 => unk255.10000@192.1.3.33 (raw_eroute)
Aug 26 18:33:48.716107: | raw_eroute result=success
Aug 26 18:33:48.716111: | delete esp.31a5aad0@192.1.3.33
Aug 26 18:33:48.716122: | netlink response for Del SA esp.31a5aad0@192.1.3.33 included non-error error
Aug 26 18:33:48.716138: | in connection_discard for connection northnet-eastnet-b
Aug 26 18:33:48.716142: | State DB: deleting IKEv1 state #5 in QUICK_I2
Aug 26 18:33:48.716147: | child state #5: QUICK_I2(established CHILD SA) => UNDEFINED(ignore)
Aug 26 18:33:48.716188: | stop processing: state #5 from 192.1.2.23 (in delete_state() at state.c:1143)
Aug 26 18:33:48.716213: | libevent_free: release ptr-libevent@0x7fbd14003e78
Aug 26 18:33:48.716219: | free_event_entry: release EVENT_SA_EXPIRE-pe@0x55c66d94da38
Aug 26 18:33:48.716223: | in statetime_stop() and could not find #5
Aug 26 18:33:48.716226: | processing: STOP state #0 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:48.716241: | processing resume sending helper answer for #7
Aug 26 18:33:48.716247: | start processing: state #7 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:797)
Aug 26 18:33:48.716252: | crypto helper 1 replies to request ID 12
Aug 26 18:33:48.716255: | calling continuation function 0x55c66cb6db50
Aug 26 18:33:48.716258: | quick_outI1_continue for #7: calculated ke+nonce, sending I1
Aug 26 18:33:48.716281: | **emit ISAKMP Message:
Aug 26 18:33:48.716285: |    initiator cookie:
Aug 26 18:33:48.716287: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:48.716302: |    responder cookie:
Aug 26 18:33:48.716304: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.716307: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.716310: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:48.716313: |    exchange type: ISAKMP_XCHG_QUICK (0x20)
Aug 26 18:33:48.716318: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:48.716320: |    Message ID: 2958116664 (0xb0514738)
Aug 26 18:33:48.716324: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:48.716327: | ***emit ISAKMP Hash Payload:
Aug 26 18:33:48.716330: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.716333: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:33:48.716336: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.716340: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:33:48.716343: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:33:48.716345: | emitting quick defaults using policy none
Aug 26 18:33:48.716349: | empty esp_info, returning defaults for ENCRYPT
Aug 26 18:33:48.716355: | ***emit ISAKMP Security Association Payload:
Aug 26 18:33:48.716358: |    next payload type: ISAKMP_NEXT_NONCE (0xa)
Aug 26 18:33:48.716361: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:48.716364: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE
Aug 26 18:33:48.716367: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:33:48.716370: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.716373: | ****emit IPsec DOI SIT:
Aug 26 18:33:48.716376: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:33:48.716379: | ikev1_out_sa pcn: 0 has 1 valid proposals
Aug 26 18:33:48.716382: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2
Aug 26 18:33:48.716385: | ****emit ISAKMP Proposal Payload:
Aug 26 18:33:48.716387: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.716390: |    proposal number: 0 (0x0)
Aug 26 18:33:48.716393: |    protocol ID: PROTO_IPSEC_ESP (0x3)
Aug 26 18:33:48.716395: |    SPI size: 4 (0x4)
Aug 26 18:33:48.716398: |    number of transforms: 2 (0x2)
Aug 26 18:33:48.716401: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
Aug 26 18:33:48.716412: | netlink_get_spi: allocated 0x8953f1df for esp.0@192.1.3.33
Aug 26 18:33:48.716418: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
Aug 26 18:33:48.716421: | SPI  89 53 f1 df
Aug 26 18:33:48.716424: | *****emit ISAKMP Transform Payload (ESP):
Aug 26 18:33:48.716426: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.716429: |    ESP transform number: 0 (0x0)
Aug 26 18:33:48.716432: |    ESP transform ID: ESP_AES (0xc)
Aug 26 18:33:48.716435: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type'
Aug 26 18:33:48.716438: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.716441: |    af+type: AF+GROUP_DESCRIPTION (0x8003)
Aug 26 18:33:48.716443: |    length/value: 14 (0xe)
Aug 26 18:33:48.716446: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:48.716449: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.716452: |    af+type: AF+ENCAPSULATION_MODE (0x8004)
Aug 26 18:33:48.716454: |    length/value: 1 (0x1)
Aug 26 18:33:48.716457: |     [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 26 18:33:48.716459: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.716462: |    af+type: AF+SA_LIFE_TYPE (0x8001)
Aug 26 18:33:48.716465: |    length/value: 1 (0x1)
Aug 26 18:33:48.716467: |     [1 is SA_LIFE_TYPE_SECONDS]
Aug 26 18:33:48.716470: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.716473: |    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
Aug 26 18:33:48.716476: |    length/value: 28800 (0x7080)
Aug 26 18:33:48.716478: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.716481: |    af+type: AF+AUTH_ALGORITHM (0x8005)
Aug 26 18:33:48.716484: |    length/value: 2 (0x2)
Aug 26 18:33:48.716486: |     [2 is AUTH_ALGORITHM_HMAC_SHA1]
Aug 26 18:33:48.716489: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.716492: |    af+type: AF+KEY_LENGTH (0x8006)
Aug 26 18:33:48.716494: |    length/value: 128 (0x80)
Aug 26 18:33:48.716497: | emitting length of ISAKMP Transform Payload (ESP): 32
Aug 26 18:33:48.716500: | *****emit ISAKMP Transform Payload (ESP):
Aug 26 18:33:48.716502: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.716505: |    ESP transform number: 1 (0x1)
Aug 26 18:33:48.716508: |    ESP transform ID: ESP_3DES (0x3)
Aug 26 18:33:48.716511: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.716514: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type'
Aug 26 18:33:48.716516: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.716519: |    af+type: AF+GROUP_DESCRIPTION (0x8003)
Aug 26 18:33:48.716522: |    length/value: 14 (0xe)
Aug 26 18:33:48.716524: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:48.716527: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.716530: |    af+type: AF+ENCAPSULATION_MODE (0x8004)
Aug 26 18:33:48.716532: |    length/value: 1 (0x1)
Aug 26 18:33:48.716535: |     [1 is ENCAPSULATION_MODE_TUNNEL]
Aug 26 18:33:48.716538: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.716541: |    af+type: AF+SA_LIFE_TYPE (0x8001)
Aug 26 18:33:48.716543: |    length/value: 1 (0x1)
Aug 26 18:33:48.716546: |     [1 is SA_LIFE_TYPE_SECONDS]
Aug 26 18:33:48.716548: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.716551: |    af+type: AF+SA_LIFE_DURATION (variable length) (0x8002)
Aug 26 18:33:48.716554: |    length/value: 28800 (0x7080)
Aug 26 18:33:48.716556: | ******emit ISAKMP IPsec DOI attribute:
Aug 26 18:33:48.716559: |    af+type: AF+AUTH_ALGORITHM (0x8005)
Aug 26 18:33:48.716561: |    length/value: 2 (0x2)
Aug 26 18:33:48.716564: |     [2 is AUTH_ALGORITHM_HMAC_SHA1]
Aug 26 18:33:48.716567: | emitting length of ISAKMP Transform Payload (ESP): 28
Aug 26 18:33:48.716569: | emitting length of ISAKMP Proposal Payload: 72
Aug 26 18:33:48.716572: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0
Aug 26 18:33:48.716575: | emitting length of ISAKMP Security Association Payload: 84
Aug 26 18:33:48.716579: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
Aug 26 18:33:48.716585: | ***emit ISAKMP Nonce Payload:
Aug 26 18:33:48.716588: |    next payload type: ISAKMP_NEXT_KE (0x4)
Aug 26 18:33:48.716591: | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE
Aug 26 18:33:48.716595: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE)
Aug 26 18:33:48.716598: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.716601: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload
Aug 26 18:33:48.716604: | Ni  a1 53 d2 6f  68 c2 3b b8  6e 85 c4 c0  f6 dd 08 b0
Aug 26 18:33:48.716607: | Ni  e0 68 51 c0  2d 18 87 ba  20 13 ea 62  4d ba 2d de
Aug 26 18:33:48.716609: | emitting length of ISAKMP Nonce Payload: 36
Aug 26 18:33:48.716613: | ***emit ISAKMP Key Exchange Payload:
Aug 26 18:33:48.716615: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:33:48.716618: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID
Aug 26 18:33:48.716622: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE)
Aug 26 18:33:48.716624: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.716628: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
Aug 26 18:33:48.716630: | keyex value  fa d9 57 33  f6 49 6c d2  13 f0 e4 c6  69 cb 15 de
Aug 26 18:33:48.716633: | keyex value  69 9d 3d 9d  29 29 7c 45  27 fc a6 4a  18 17 94 9e
Aug 26 18:33:48.716635: | keyex value  d3 57 18 21  39 10 02 e2  8c e9 0b 7c  c8 11 ad 81
Aug 26 18:33:48.716638: | keyex value  69 c9 dd 9d  02 8e 03 14  c0 44 d5 f6  da 19 c0 77
Aug 26 18:33:48.716641: | keyex value  3b d0 57 c3  7a c0 5a 6d  c6 8f 51 1a  ef c6 50 2a
Aug 26 18:33:48.716643: | keyex value  4b 9d 95 ac  b4 88 ea 62  e4 19 80 cc  eb 3b ab b4
Aug 26 18:33:48.716646: | keyex value  ce 7c 84 c0  48 69 b6 64  e4 96 d9 18  84 54 25 c0
Aug 26 18:33:48.716648: | keyex value  1e 50 8d 3e  fd 66 06 91  df 02 b9 20  18 3e 94 72
Aug 26 18:33:48.716651: | keyex value  d6 a9 5c 9e  8b 81 43 69  2e 95 d1 68  c9 0b 6b 7e
Aug 26 18:33:48.716653: | keyex value  4f 52 1f 33  c9 fb 30 b7  1a 31 05 72  80 cc d9 fd
Aug 26 18:33:48.716656: | keyex value  cb c2 dc ad  4a 52 b3 88  81 b7 fc 55  49 78 08 e8
Aug 26 18:33:48.716658: | keyex value  94 7c 1d 3a  d3 5d 17 11  b8 c3 c0 5b  cc d6 5b 3a
Aug 26 18:33:48.716661: | keyex value  82 d7 52 7a  1e 11 37 94  36 b3 0d 51  e3 a2 6b 2a
Aug 26 18:33:48.716663: | keyex value  8a d9 10 fe  70 dc cc 7b  31 95 ee 46  43 7a d1 2a
Aug 26 18:33:48.716666: | keyex value  e6 60 08 13  ae b3 6a 96  6d cf 9c c9  ee 2a 60 98
Aug 26 18:33:48.716669: | keyex value  96 d9 0c 32  6d 1c de 5e  c7 b2 75 9c  57 7b c4 26
Aug 26 18:33:48.716671: | emitting length of ISAKMP Key Exchange Payload: 260
Aug 26 18:33:48.716674: | ***emit ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:33:48.716677: |    next payload type: ISAKMP_NEXT_ID (0x5)
Aug 26 18:33:48.716680: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:33:48.716682: |    Protocol ID: 0 (0x0)
Aug 26 18:33:48.716685: |    port: 0 (0x0)
Aug 26 18:33:48.716688: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID
Aug 26 18:33:48.716691: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
Aug 26 18:33:48.716694: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
Aug 26 18:33:48.716697: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:48.716700: | client network  c0 00 03 00
Aug 26 18:33:48.716705: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:48.716707: | client mask  ff ff ff 00
Aug 26 18:33:48.716710: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16
Aug 26 18:33:48.716713: | ***emit ISAKMP Identification Payload (IPsec DOI):
Aug 26 18:33:48.716715: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.716718: |    ID type: ID_IPV4_ADDR_SUBNET (0x4)
Aug 26 18:33:48.716720: |    Protocol ID: 0 (0x0)
Aug 26 18:33:48.716723: |    port: 0 (0x0)
Aug 26 18:33:48.716726: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID)
Aug 26 18:33:48.716729: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet'
Aug 26 18:33:48.716732: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:48.716735: | client network  c0 00 02 00
Aug 26 18:33:48.716738: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
Aug 26 18:33:48.716740: | client mask  ff ff ff 00
Aug 26 18:33:48.716743: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16
Aug 26 18:33:48.716781: | outI1 HASH(1):
Aug 26 18:33:48.716785: |   e5 d6 50 0b  98 1a 28 e8  a0 0f e6 6b  eb d1 c9 4a
Aug 26 18:33:48.716787: |   2c be 03 76  95 8e d1 2e  be a6 43 08  56 e7 2b 9d
Aug 26 18:33:48.716800: | no IKEv1 message padding required
Aug 26 18:33:48.716803: | emitting length of ISAKMP Message: 476
Aug 26 18:33:48.716824: | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #7)
Aug 26 18:33:48.716827: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.716829: |   08 10 20 01  b0 51 47 38  00 00 01 dc  7f e3 df 87
Aug 26 18:33:48.716832: |   b4 68 4b f5  34 3c 5e 24  5f b2 80 08  e3 be 45 11
Aug 26 18:33:48.716834: |   12 98 9b 96  c5 48 76 80  89 1f 92 68  df 96 63 58
Aug 26 18:33:48.716837: |   68 70 9b 96  65 86 01 bd  4d f6 bd af  f6 fc 3c 8b
Aug 26 18:33:48.716840: |   69 29 39 c9  67 b8 cd 2a  2e 91 93 c9  df 7b 98 53
Aug 26 18:33:48.716842: |   8d e9 58 9b  4c f0 b4 92  aa 92 d4 eb  ed ec 4b ed
Aug 26 18:33:48.716845: |   c6 83 eb d9  b3 3d 78 d7  ad b6 70 78  d0 c6 db a1
Aug 26 18:33:48.716847: |   b1 57 d5 f9  38 aa 5c 0f  8e 69 c1 33  3b 71 2a 41
Aug 26 18:33:48.716850: |   43 23 c5 1c  19 6f 94 32  8c 8f 2c fe  84 94 2f 0e
Aug 26 18:33:48.716852: |   fd 75 d9 1c  85 95 70 dd  13 71 6b f6  f1 0e 38 44
Aug 26 18:33:48.716855: |   ef 32 74 e0  b6 0a a2 d7  28 96 f8 16  a3 f2 4d 6b
Aug 26 18:33:48.716857: |   d2 81 99 88  4a dc 6e 19  04 a3 a3 5f  bc c2 74 30
Aug 26 18:33:48.716860: |   d9 f3 6f c5  9b 44 09 46  97 2e 23 02  8c 98 a2 cd
Aug 26 18:33:48.716862: |   21 d1 a8 e3  f2 99 8f 92  cf 9d 79 cc  cb f9 b6 1e
Aug 26 18:33:48.716865: |   85 6e ba 72  c1 f5 f3 df  06 c6 73 3b  31 e3 07 83
Aug 26 18:33:48.716867: |   37 d1 31 e3  55 ac e8 08  27 e3 8a 4f  3b a5 35 e5
Aug 26 18:33:48.716870: |   c2 45 5e 37  9c 26 c4 8a  de f6 eb 14  14 d8 8c 37
Aug 26 18:33:48.716872: |   16 9c b1 17  d7 2a fc 94  56 42 06 90  14 96 b3 d0
Aug 26 18:33:48.716875: |   11 02 e1 f5  67 ef 2e 60  15 35 41 fa  5b 51 23 37
Aug 26 18:33:48.716877: |   1d 82 3e e8  8d ca 4d 57  0f 18 66 18  4d a0 e4 08
Aug 26 18:33:48.716879: |   8e 7b f5 d6  af 13 0d 1b  01 a3 5a 1e  12 a9 ae cb
Aug 26 18:33:48.716882: |   ad 3f 22 16  bf 98 f0 ea  90 16 d0 ca  9d 7c 47 4e
Aug 26 18:33:48.716885: |   60 ee 5b 4e  f7 99 a5 e1  80 b1 3b d3  07 3a 23 af
Aug 26 18:33:48.716887: |   4b 91 f1 17  2c 89 a4 ce  52 8c f6 0b  a8 e6 fa 4a
Aug 26 18:33:48.716890: |   9a 25 4a be  fb 16 c6 3c  7b 05 dd 00  fe 6f b8 39
Aug 26 18:33:48.716892: |   09 7a ec e3  1c 3c c3 e1  ff 4d 39 e5  a3 c3 de 3c
Aug 26 18:33:48.716895: |   e5 7f a4 08  18 25 3c ff  13 40 4e 78  13 0e 95 5c
Aug 26 18:33:48.716897: |   5c 7c 2f 18  32 ea 92 16  0e af 37 d1  39 50 64 f9
Aug 26 18:33:48.716901: |   7b 3a 36 e2  6a a1 f6 33  ad 5f 07 16
Aug 26 18:33:48.716952: | state #7 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Aug 26 18:33:48.716958: | libevent_free: release ptr-libevent@0x55c66d976578
Aug 26 18:33:48.716962: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55c66d95ef28
Aug 26 18:33:48.716967: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d95ef28
Aug 26 18:33:48.716971: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #7
Aug 26 18:33:48.716974: | libevent_malloc: new ptr-libevent@0x55c66d957be8 size 128
Aug 26 18:33:48.716980: | #7 STATE_QUICK_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29714.459433
Aug 26 18:33:48.716985: | resume sending helper answer for #7 suppresed complete_v1_state_transition()
Aug 26 18:33:48.716993: | #7 spent 0.704 milliseconds in resume sending helper answer
Aug 26 18:33:48.716998: | stop processing: state #7 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:833)
Aug 26 18:33:48.717001: | libevent_free: release ptr-libevent@0x7fbd0c0072f8
Aug 26 18:33:48.717005: | processing signal PLUTO_SIGCHLD
Aug 26 18:33:48.717011: | waitpid returned ECHILD (no child processes left)
Aug 26 18:33:48.717015: | spent 0.00552 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:33:48.719635: | spent 0.00247 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:33:48.719655: | *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:33:48.719658: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.719660: |   08 10 05 01  3d ee fe 2d  00 00 00 5c  f6 38 0a 6f
Aug 26 18:33:48.719661: |   5d 34 a3 44  77 44 e8 9b  53 cc 89 cc  82 e3 b0 27
Aug 26 18:33:48.719663: |   a0 07 3d 81  4a 64 30 b4  90 7a 62 5a  cd 3b 75 4a
Aug 26 18:33:48.719664: |   86 d4 a3 39  fa 59 10 b2  3f 22 41 72  6a f1 e5 03
Aug 26 18:33:48.719666: |   f2 0b 9b 7e  5a f6 63 8a  d0 f0 da 1b
Aug 26 18:33:48.719669: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:33:48.719672: | **parse ISAKMP Message:
Aug 26 18:33:48.719673: |    initiator cookie:
Aug 26 18:33:48.719675: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:48.719677: |    responder cookie:
Aug 26 18:33:48.719678: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.719680: |    next payload type: ISAKMP_NEXT_HASH (0x8)
Aug 26 18:33:48.719682: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:48.719684: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:33:48.719685: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:48.719687: |    Message ID: 1039072813 (0x3deefe2d)
Aug 26 18:33:48.719689: |    length: 92 (0x5c)
Aug 26 18:33:48.719691: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
Aug 26 18:33:48.719694: | peer and cookies match on #7; msgid=00000000 st_msgid=b0514738 st_msgid_phase15=00000000
Aug 26 18:33:48.719696: | peer and cookies match on #6; msgid=00000000 st_msgid=9f5e56e4 st_msgid_phase15=00000000
Aug 26 18:33:48.719698: | peer and cookies match on #3; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
Aug 26 18:33:48.719700: | p15 state object #3 found, in STATE_MAIN_I4
Aug 26 18:33:48.719702: | State DB: found IKEv1 state #3 in MAIN_I4 (find_v1_info_state)
Aug 26 18:33:48.719706: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479)
Aug 26 18:33:48.719717: | #3 is idle
Aug 26 18:33:48.719719: | #3 idle
Aug 26 18:33:48.719722: | received encrypted packet from 192.1.2.23:500
Aug 26 18:33:48.719729: | got payload 0x100  (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
Aug 26 18:33:48.719732: | ***parse ISAKMP Hash Payload:
Aug 26 18:33:48.719734: |    next payload type: ISAKMP_NEXT_D (0xc)
Aug 26 18:33:48.719735: |    length: 36 (0x24)
Aug 26 18:33:48.719737: | got payload 0x1000  (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0
Aug 26 18:33:48.719739: | ***parse ISAKMP Delete Payload:
Aug 26 18:33:48.719741: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.719745: |    length: 28 (0x1c)
Aug 26 18:33:48.719747: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:48.719749: |    protocol ID: 1 (0x1)
Aug 26 18:33:48.719750: |    SPI size: 16 (0x10)
Aug 26 18:33:48.719752: |    number of SPIs: 1 (0x1)
Aug 26 18:33:48.719765: | informational HASH(1):
Aug 26 18:33:48.719767: |   d7 84 c4 6a  90 c7 4a d1  0f 35 c8 74  05 f5 29 b3
Aug 26 18:33:48.719769: |   75 bb db 26  a1 b9 1e 3c  c5 00 e2 23  a0 85 d0 16
Aug 26 18:33:48.719771: | received 'informational' message HASH(1) data ok
Aug 26 18:33:48.719773: | parsing 8 raw bytes of ISAKMP Delete Payload into iCookie
Aug 26 18:33:48.719774: | iCookie  09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:48.719776: | parsing 8 raw bytes of ISAKMP Delete Payload into rCookie
Aug 26 18:33:48.719778: | rCookie  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.719780: | State DB: found IKEv1 state #3 in MAIN_I4 (find_state_ikev1)
Aug 26 18:33:48.719782: | del:
Aug 26 18:33:48.719784: "northnet-eastnet-b" #3: received Delete SA payload: self-deleting ISAKMP State #3
Aug 26 18:33:48.719786: | pstats #3 ikev1.isakmp deleted completed
Aug 26 18:33:48.719791: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in delete_state() at state.c:879)
Aug 26 18:33:48.719793: "northnet-eastnet-b" #3: deleting state (STATE_MAIN_I4) aged 43.049s and sending notification
Aug 26 18:33:48.719795: | parent state #3: MAIN_I4(established IKE SA) => delete
Aug 26 18:33:48.719831: | #3 send IKEv1 delete notification for STATE_MAIN_I4
Aug 26 18:33:48.719836: | **emit ISAKMP Message:
Aug 26 18:33:48.719838: |    initiator cookie:
Aug 26 18:33:48.719840: |   09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:48.719842: |    responder cookie:
Aug 26 18:33:48.719843: |   3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.719845: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.719847: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:48.719848: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:33:48.719850: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:48.719852: |    Message ID: 862185975 (0x3363e9f7)
Aug 26 18:33:48.719854: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:48.719856: | ***emit ISAKMP Hash Payload:
Aug 26 18:33:48.719857: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.719859: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH)
Aug 26 18:33:48.719861: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg'
Aug 26 18:33:48.719863: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload
Aug 26 18:33:48.719865: | emitting length of ISAKMP Hash Payload: 36
Aug 26 18:33:48.719867: | ***emit ISAKMP Delete Payload:
Aug 26 18:33:48.719868: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.719870: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:48.719872: |    protocol ID: 1 (0x1)
Aug 26 18:33:48.719873: |    SPI size: 16 (0x10)
Aug 26 18:33:48.719875: |    number of SPIs: 1 (0x1)
Aug 26 18:33:48.719877: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D)
Aug 26 18:33:48.719879: | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg'
Aug 26 18:33:48.719881: | emitting 8 raw bytes of initiator SPI into ISAKMP Delete Payload
Aug 26 18:33:48.719882: | initiator SPI  09 eb 5d d0  b4 d5 55 61
Aug 26 18:33:48.719884: | emitting 8 raw bytes of responder SPI into ISAKMP Delete Payload
Aug 26 18:33:48.719886: | responder SPI  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.719887: | emitting length of ISAKMP Delete Payload: 28
Aug 26 18:33:48.719899: | send delete HASH(1):
Aug 26 18:33:48.719901: |   86 dc 44 10  89 6d 6e 0b  00 0a 1a 4f  34 be 4f 51
Aug 26 18:33:48.719903: |   75 df 1f 21  7b 8e 19 fb  9c 45 e3 a0  c8 12 ae e6
Aug 26 18:33:48.719907: | no IKEv1 message padding required
Aug 26 18:33:48.719911: | emitting length of ISAKMP Message: 92
Aug 26 18:33:48.719920: | sending 92 bytes for delete notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3)
Aug 26 18:33:48.719923: |   09 eb 5d d0  b4 d5 55 61  3c fa 15 28  e4 f5 fb 3c
Aug 26 18:33:48.719925: |   08 10 05 01  33 63 e9 f7  00 00 00 5c  3e 8e f4 42
Aug 26 18:33:48.719926: |   4f c7 44 e2  bd f0 92 b5  f2 58 5f 3e  3c 3e f7 57
Aug 26 18:33:48.719928: |   1d 36 d6 4f  47 70 d5 63  0d 17 cf 63  d8 84 48 ec
Aug 26 18:33:48.719929: |   85 b5 ab 24  17 a1 ee 9f  49 8f bb 10  92 a2 53 86
Aug 26 18:33:48.719931: |   85 fe 4b 90  78 fa ba a1  59 bb 1b 55
Aug 26 18:33:48.719953: | state #3 requesting EVENT_SA_REPLACE to be deleted
Aug 26 18:33:48.719956: | libevent_free: release ptr-libevent@0x7fbd00000f48
Aug 26 18:33:48.719961: | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fbd0c002b78
Aug 26 18:33:48.719964: "northnet-eastnet-b" #3: reschedule pending child #7 STATE_QUICK_I1 of connection "northnet-eastnet-b" - the parent is going away
Aug 26 18:33:48.719966: | state #7 requesting EVENT_RETRANSMIT to be deleted
Aug 26 18:33:48.719968: | #7 STATE_QUICK_I1: retransmits: cleared
Aug 26 18:33:48.719970: | libevent_free: release ptr-libevent@0x55c66d957be8
Aug 26 18:33:48.719972: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d95ef28
Aug 26 18:33:48.719974: | event_schedule: new EVENT_SA_REPLACE-pe@0x7fbd0c002b78
Aug 26 18:33:48.719976: | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #7
Aug 26 18:33:48.719978: | libevent_malloc: new ptr-libevent@0x7fbd0c0072f8 size 128
Aug 26 18:33:48.719981: "northnet-eastnet-b" #3: reschedule pending child #6 STATE_QUICK_I1 of connection "north-a-dpd" - the parent is going away
Aug 26 18:33:48.719983: | state #6 requesting EVENT_RETRANSMIT to be deleted
Aug 26 18:33:48.719985: | #6 STATE_QUICK_I1: retransmits: cleared
Aug 26 18:33:48.719986: | libevent_free: release ptr-libevent@0x55c66d974918
Aug 26 18:33:48.719989: | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fbd04002b78
Aug 26 18:33:48.719992: | event_schedule: new EVENT_SA_REPLACE-pe@0x7fbd04002b78
Aug 26 18:33:48.719994: | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #6
Aug 26 18:33:48.719996: | libevent_malloc: new ptr-libevent@0x55c66d974918 size 128
Aug 26 18:33:48.719998: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:33:48.720000: | picked newest_isakmp_sa #0 for #3
Aug 26 18:33:48.720002: "northnet-eastnet-b" #3: deleting IKE SA for connection 'northnet-eastnet-b' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS
Aug 26 18:33:48.720004: | add revival: connection 'northnet-eastnet-b' added to the list and scheduled for 0 seconds
Aug 26 18:33:48.720006: | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds
Aug 26 18:33:48.720010: | in connection_discard for connection northnet-eastnet-b
Aug 26 18:33:48.720011: | State DB: deleting IKEv1 state #3 in MAIN_I4
Aug 26 18:33:48.720016: | parent state #3: MAIN_I4(established IKE SA) => UNDEFINED(ignore)
Aug 26 18:33:48.720023: | unreference key: 0x55c66d973c08 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 2--
Aug 26 18:33:48.720036: | stop processing: state #3 from 192.1.2.23 (in delete_state() at state.c:1143)
Aug 26 18:33:48.720044: | unreference key: 0x55c66d973c08 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1--
Aug 26 18:33:48.720048: | unreference key: 0x55c66d974e78 user-east@testing.libreswan.org cnt 1--
Aug 26 18:33:48.720052: | unreference key: 0x55c66d954b18 @east.testing.libreswan.org cnt 1--
Aug 26 18:33:48.720054: | unreference key: 0x55c66d9630d8 east@testing.libreswan.org cnt 1--
Aug 26 18:33:48.720057: | unreference key: 0x55c66d963328 192.1.2.23 cnt 1--
Aug 26 18:33:48.720068: | in statetime_start() with no state
Aug 26 18:33:48.720071: | complete v1 state transition with STF_IGNORE
Aug 26 18:33:48.720073: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380)
Aug 26 18:33:48.720077: | processing: STOP state #0 (in process_md() at demux.c:382)
Aug 26 18:33:48.720079: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:33:48.720083: | spent 0.425 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:33:48.720090: | spent 0.00128 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:33:48.720097: | *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:33:48.720099: |   35 80 c1 69  e2 a9 e2 31  4b 16 40 1f  95 19 a0 1f
Aug 26 18:33:48.720100: |   08 10 05 01  d5 a5 94 aa  00 00 00 5c  09 d9 b2 7d
Aug 26 18:33:48.720102: |   11 f9 70 88  83 21 b6 ff  46 ba 00 da  11 9e 21 8c
Aug 26 18:33:48.720103: |   96 59 5f 55  71 2f 5a cf  8b 1a 82 92  97 8c 93 ee
Aug 26 18:33:48.720105: |   36 2e b2 8c  63 71 1b d2  37 97 8f 0e  71 cf 2d 22
Aug 26 18:33:48.720106: |   35 2c b1 b7  da 71 f2 af  0a ba 23 18
Aug 26 18:33:48.720109: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:33:48.720111: | **parse ISAKMP Message:
Aug 26 18:33:48.720113: |    initiator cookie:
Aug 26 18:33:48.720115: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:33:48.720116: |    responder cookie:
Aug 26 18:33:48.720118: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:33:48.720119: |    next payload type: ISAKMP_NEXT_HASH (0x8)
Aug 26 18:33:48.720121: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:48.720123: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:33:48.720125: |    flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
Aug 26 18:33:48.720126: |    Message ID: 3584398506 (0xd5a594aa)
Aug 26 18:33:48.720128: |    length: 92 (0x5c)
Aug 26 18:33:48.720130: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
Aug 26 18:33:48.720132: | State DB: IKEv1 state not found (find_v1_info_state)
Aug 26 18:33:48.720134: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:33:48.720136: | Informational Exchange is for an unknown (expired?) SA with MSGID:0xd5a594aa
Aug 26 18:33:48.720138: | - unknown SA's md->hdr.isa_ike_initiator_spi.bytes:
Aug 26 18:33:48.720139: |   35 80 c1 69  e2 a9 e2 31
Aug 26 18:33:48.720141: | - unknown SA's md->hdr.isa_ike_responder_spi.bytes:
Aug 26 18:33:48.720142: |   4b 16 40 1f  95 19 a0 1f
Aug 26 18:33:48.720144: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380)
Aug 26 18:33:48.720146: | processing: STOP state #0 (in process_md() at demux.c:382)
Aug 26 18:33:48.720148: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:33:48.720151: | spent 0.0582 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:33:48.720153: | timer_event_cb: processing event@0x7fbd0c002b78
Aug 26 18:33:48.720155: | handling event EVENT_SA_REPLACE for child state #7
Aug 26 18:33:48.720158: | start processing: state #7 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:48.720161: | picked newest_ipsec_sa #0 for #7
Aug 26 18:33:48.720162: | replacing stale IPsec SA
Aug 26 18:33:48.720165: | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351)
Aug 26 18:33:48.720167: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:33:48.720171: | creating state object #8 at 0x55c66d956938
Aug 26 18:33:48.720173: | State DB: adding IKEv1 state #8 in UNDEFINED
Aug 26 18:33:48.720177: | pstats #8 ikev1.isakmp started
Aug 26 18:33:48.720182: | suspend processing: state #7 connection "northnet-eastnet-b" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118)
Aug 26 18:33:48.720184: | start processing: state #8 connection "northnet-eastnet-b" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118)
Aug 26 18:33:48.720187: | parent state #8: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA)
Aug 26 18:33:48.720189: | dup_any(fd@-1) -> fd@-1 (in main_outI1() at ikev1_main.c:123)
Aug 26 18:33:48.720192: | Queuing pending IPsec SA negotiating with 192.1.2.23 "northnet-eastnet-b" IKE SA #8 "northnet-eastnet-b"
Aug 26 18:33:48.720196: "northnet-eastnet-b" #8: initiating Main Mode
Aug 26 18:33:48.720199: | **emit ISAKMP Message:
Aug 26 18:33:48.720201: |    initiator cookie:
Aug 26 18:33:48.720203: |   cb 9b 9c 83  21 57 56 d4
Aug 26 18:33:48.720204: |    responder cookie:
Aug 26 18:33:48.720206: |   00 00 00 00  00 00 00 00
Aug 26 18:33:48.720208: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:33:48.720209: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:33:48.720211: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:33:48.720213: |    flags: none (0x0)
Aug 26 18:33:48.720214: |    Message ID: 0 (0x0)
Aug 26 18:33:48.720216: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:33:48.720218: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:33:48.720221: | no specific IKE algorithms specified - using defaults
Aug 26 18:33:48.720239: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0
Aug 26 18:33:48.720244: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0
Aug 26 18:33:48.720247: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0
Aug 26 18:33:48.720251: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0
Aug 26 18:33:48.720254: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0
Aug 26 18:33:48.720259: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0
Aug 26 18:33:48.720265: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0
Aug 26 18:33:48.720268: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0
Aug 26 18:33:48.720272: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0
Aug 26 18:33:48.720275: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0
Aug 26 18:33:48.720279: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0
Aug 26 18:33:48.720282: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0
Aug 26 18:33:48.720286: | oakley_alg_makedb() returning 0x55c66d964ae8
Aug 26 18:33:48.720306: | ***emit ISAKMP Security Association Payload:
Aug 26 18:33:48.720311: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:33:48.720313: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:33:48.720315: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:33:48.720317: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:33:48.720319: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.720321: | ****emit IPsec DOI SIT:
Aug 26 18:33:48.720323: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:33:48.720325: | ikev1_out_sa pcn: 0 has 1 valid proposals
Aug 26 18:33:48.720327: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18
Aug 26 18:33:48.720328: | ****emit ISAKMP Proposal Payload:
Aug 26 18:33:48.720330: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.720332: |    proposal number: 0 (0x0)
Aug 26 18:33:48.720333: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:33:48.720335: |    SPI size: 0 (0x0)
Aug 26 18:33:48.720337: |    number of transforms: 18 (0x12)
Aug 26 18:33:48.720339: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type'
Aug 26 18:33:48.720340: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.720342: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720344: |    ISAKMP transform number: 0 (0x0)
Aug 26 18:33:48.720346: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.720347: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.720351: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720353: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.720355: |    length/value: 1 (0x1)
Aug 26 18:33:48.720357: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.720358: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720360: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.720362: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.720364: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720365: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.720367: |    length/value: 7 (0x7)
Aug 26 18:33:48.720369: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:48.720370: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720372: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.720374: |    length/value: 4 (0x4)
Aug 26 18:33:48.720375: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:33:48.720377: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720379: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.720380: |    length/value: 3 (0x3)
Aug 26 18:33:48.720382: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.720383: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720385: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.720387: |    length/value: 14 (0xe)
Aug 26 18:33:48.720388: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:48.720390: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720392: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:48.720393: |    length/value: 256 (0x100)
Aug 26 18:33:48.720395: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:48.720397: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.720398: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720400: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:33:48.720402: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.720404: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720406: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.720407: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720409: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.720411: |    length/value: 1 (0x1)
Aug 26 18:33:48.720412: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.720414: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720415: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.720417: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.720419: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720420: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.720422: |    length/value: 7 (0x7)
Aug 26 18:33:48.720424: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:48.720425: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720427: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.720428: |    length/value: 4 (0x4)
Aug 26 18:33:48.720430: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:33:48.720431: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720433: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.720435: |    length/value: 3 (0x3)
Aug 26 18:33:48.720436: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.720438: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720440: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.720441: |    length/value: 14 (0xe)
Aug 26 18:33:48.720443: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:48.720444: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720446: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:48.720448: |    length/value: 128 (0x80)
Aug 26 18:33:48.720449: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:48.720451: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.720453: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720456: |    ISAKMP transform number: 2 (0x2)
Aug 26 18:33:48.720457: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.720459: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720461: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.720463: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720464: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.720466: |    length/value: 1 (0x1)
Aug 26 18:33:48.720468: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.720469: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720471: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.720472: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.720474: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720476: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.720477: |    length/value: 7 (0x7)
Aug 26 18:33:48.720479: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:48.720480: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720482: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.720484: |    length/value: 6 (0x6)
Aug 26 18:33:48.720485: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:33:48.720487: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720488: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.720490: |    length/value: 3 (0x3)
Aug 26 18:33:48.720492: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.720493: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720495: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.720496: |    length/value: 14 (0xe)
Aug 26 18:33:48.720498: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:48.720499: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720501: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:48.720503: |    length/value: 256 (0x100)
Aug 26 18:33:48.720504: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:48.720506: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.720508: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720509: |    ISAKMP transform number: 3 (0x3)
Aug 26 18:33:48.720511: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.720513: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720515: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.720516: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720518: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.720519: |    length/value: 1 (0x1)
Aug 26 18:33:48.720521: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.720523: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720524: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.720526: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.720527: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720529: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.720531: |    length/value: 7 (0x7)
Aug 26 18:33:48.720532: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:48.720534: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720535: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.720537: |    length/value: 6 (0x6)
Aug 26 18:33:48.720539: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:33:48.720540: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720542: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.720543: |    length/value: 3 (0x3)
Aug 26 18:33:48.720545: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.720546: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720548: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.720550: |    length/value: 14 (0xe)
Aug 26 18:33:48.720551: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:48.720554: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720555: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:48.720557: |    length/value: 128 (0x80)
Aug 26 18:33:48.720559: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:48.720560: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.720562: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720563: |    ISAKMP transform number: 4 (0x4)
Aug 26 18:33:48.720565: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.720567: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720569: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.720570: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720572: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.720573: |    length/value: 1 (0x1)
Aug 26 18:33:48.720575: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.720577: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720578: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.720580: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.720581: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720583: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.720585: |    length/value: 7 (0x7)
Aug 26 18:33:48.720586: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:48.720588: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720589: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.720591: |    length/value: 2 (0x2)
Aug 26 18:33:48.720592: |     [2 is OAKLEY_SHA1]
Aug 26 18:33:48.720594: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720596: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.720597: |    length/value: 3 (0x3)
Aug 26 18:33:48.720599: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.720600: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720602: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.720603: |    length/value: 14 (0xe)
Aug 26 18:33:48.720605: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:48.720607: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720608: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:48.720610: |    length/value: 256 (0x100)
Aug 26 18:33:48.720611: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:48.720613: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.720615: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720616: |    ISAKMP transform number: 5 (0x5)
Aug 26 18:33:48.720618: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.720620: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720622: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.720623: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720625: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.720626: |    length/value: 1 (0x1)
Aug 26 18:33:48.720628: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.720630: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720631: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.720633: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.720634: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720636: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.720638: |    length/value: 7 (0x7)
Aug 26 18:33:48.720639: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:48.720641: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720642: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.720644: |    length/value: 2 (0x2)
Aug 26 18:33:48.720645: |     [2 is OAKLEY_SHA1]
Aug 26 18:33:48.720647: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720649: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.720651: |    length/value: 3 (0x3)
Aug 26 18:33:48.720653: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.720654: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720656: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.720657: |    length/value: 14 (0xe)
Aug 26 18:33:48.720659: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:48.720660: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720662: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:48.720664: |    length/value: 128 (0x80)
Aug 26 18:33:48.720665: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:48.720667: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.720669: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720670: |    ISAKMP transform number: 6 (0x6)
Aug 26 18:33:48.720672: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.720674: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720675: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.720677: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720679: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.720680: |    length/value: 1 (0x1)
Aug 26 18:33:48.720682: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.720683: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720685: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.720687: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.720688: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720690: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.720691: |    length/value: 7 (0x7)
Aug 26 18:33:48.720693: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:48.720694: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720696: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.720698: |    length/value: 4 (0x4)
Aug 26 18:33:48.720699: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:33:48.720701: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720702: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.720704: |    length/value: 3 (0x3)
Aug 26 18:33:48.720706: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.720707: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720709: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.720710: |    length/value: 5 (0x5)
Aug 26 18:33:48.720712: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:48.720713: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720715: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:48.720717: |    length/value: 256 (0x100)
Aug 26 18:33:48.720718: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:48.720720: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.720721: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720723: |    ISAKMP transform number: 7 (0x7)
Aug 26 18:33:48.720725: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.720727: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720728: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.720730: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720732: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.720733: |    length/value: 1 (0x1)
Aug 26 18:33:48.720735: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.720736: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720738: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.720740: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.720741: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720743: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.720745: |    length/value: 7 (0x7)
Aug 26 18:33:48.720747: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:48.720748: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720750: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.720752: |    length/value: 4 (0x4)
Aug 26 18:33:48.720753: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:33:48.720755: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720756: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.720758: |    length/value: 3 (0x3)
Aug 26 18:33:48.720760: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.720763: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720765: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.720767: |    length/value: 5 (0x5)
Aug 26 18:33:48.720770: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:48.720772: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720775: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:48.720777: |    length/value: 128 (0x80)
Aug 26 18:33:48.720780: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:48.720782: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.720785: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720787: |    ISAKMP transform number: 8 (0x8)
Aug 26 18:33:48.720789: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.720792: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720795: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.720798: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720800: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.720802: |    length/value: 1 (0x1)
Aug 26 18:33:48.720805: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.720807: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720809: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.720811: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.720813: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720816: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.720818: |    length/value: 7 (0x7)
Aug 26 18:33:48.720821: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:48.720823: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720825: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.720828: |    length/value: 6 (0x6)
Aug 26 18:33:48.720830: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:33:48.720832: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720835: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.720837: |    length/value: 3 (0x3)
Aug 26 18:33:48.720840: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.720842: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720844: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.720847: |    length/value: 5 (0x5)
Aug 26 18:33:48.720849: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:48.720851: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720854: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:48.720856: |    length/value: 256 (0x100)
Aug 26 18:33:48.720859: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:48.720861: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.720863: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720866: |    ISAKMP transform number: 9 (0x9)
Aug 26 18:33:48.720868: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.720871: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720873: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.720876: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720878: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.720880: |    length/value: 1 (0x1)
Aug 26 18:33:48.720884: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.720886: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720889: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.720891: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.720894: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720896: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.720899: |    length/value: 7 (0x7)
Aug 26 18:33:48.720901: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:48.720903: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720905: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.720908: |    length/value: 6 (0x6)
Aug 26 18:33:48.720910: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:33:48.720912: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720915: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.720917: |    length/value: 3 (0x3)
Aug 26 18:33:48.720920: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.720922: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720924: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.720927: |    length/value: 5 (0x5)
Aug 26 18:33:48.720929: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:48.720932: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720934: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:48.720936: |    length/value: 128 (0x80)
Aug 26 18:33:48.720939: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:48.720941: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.720943: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720945: |    ISAKMP transform number: 10 (0xa)
Aug 26 18:33:48.720948: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.720950: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.720953: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.720956: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720958: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.720960: |    length/value: 1 (0x1)
Aug 26 18:33:48.720963: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.720965: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720967: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.720970: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.720972: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720974: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.720977: |    length/value: 7 (0x7)
Aug 26 18:33:48.720979: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:48.720981: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720984: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.720986: |    length/value: 2 (0x2)
Aug 26 18:33:48.720988: |     [2 is OAKLEY_SHA1]
Aug 26 18:33:48.720990: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.720993: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.720995: |    length/value: 3 (0x3)
Aug 26 18:33:48.720997: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.720999: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721001: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.721004: |    length/value: 5 (0x5)
Aug 26 18:33:48.721006: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:48.721008: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721011: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:48.721013: |    length/value: 256 (0x100)
Aug 26 18:33:48.721015: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:48.721018: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.721020: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.721023: |    ISAKMP transform number: 11 (0xb)
Aug 26 18:33:48.721026: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.721029: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.721033: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.721036: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721039: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.721042: |    length/value: 1 (0x1)
Aug 26 18:33:48.721044: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.721046: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721049: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.721051: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.721054: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721056: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.721059: |    length/value: 7 (0x7)
Aug 26 18:33:48.721061: |     [7 is OAKLEY_AES_CBC]
Aug 26 18:33:48.721063: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721066: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.721068: |    length/value: 2 (0x2)
Aug 26 18:33:48.721071: |     [2 is OAKLEY_SHA1]
Aug 26 18:33:48.721073: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721075: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.721077: |    length/value: 3 (0x3)
Aug 26 18:33:48.721079: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.721082: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721084: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.721086: |    length/value: 5 (0x5)
Aug 26 18:33:48.721089: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:48.721091: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721094: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:33:48.721096: |    length/value: 128 (0x80)
Aug 26 18:33:48.721099: | emitting length of ISAKMP Transform Payload (ISAKMP): 36
Aug 26 18:33:48.721101: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.721104: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.721106: |    ISAKMP transform number: 12 (0xc)
Aug 26 18:33:48.721109: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.721112: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.721115: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.721118: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721121: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.721123: |    length/value: 1 (0x1)
Aug 26 18:33:48.721125: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.721128: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721131: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.721134: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.721136: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721139: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.721142: |    length/value: 5 (0x5)
Aug 26 18:33:48.721144: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:33:48.721146: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721149: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.721151: |    length/value: 4 (0x4)
Aug 26 18:33:48.721154: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:33:48.721156: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721159: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.721162: |    length/value: 3 (0x3)
Aug 26 18:33:48.721164: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.721167: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721169: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.721172: |    length/value: 14 (0xe)
Aug 26 18:33:48.721175: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:48.721177: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:33:48.721179: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.721182: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.721186: |    ISAKMP transform number: 13 (0xd)
Aug 26 18:33:48.721189: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.721193: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.721196: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.721199: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721201: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.721204: |    length/value: 1 (0x1)
Aug 26 18:33:48.721206: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.721209: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721212: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.721215: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.721218: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721221: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.721223: |    length/value: 5 (0x5)
Aug 26 18:33:48.721225: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:33:48.721228: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721231: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.721233: |    length/value: 6 (0x6)
Aug 26 18:33:48.721235: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:33:48.721238: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721241: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.721243: |    length/value: 3 (0x3)
Aug 26 18:33:48.721246: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.721249: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721252: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.721254: |    length/value: 14 (0xe)
Aug 26 18:33:48.721257: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:48.721260: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:33:48.721263: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.721265: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.721268: |    ISAKMP transform number: 14 (0xe)
Aug 26 18:33:48.721270: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.721274: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.721277: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.721279: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721282: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.721285: |    length/value: 1 (0x1)
Aug 26 18:33:48.721292: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.721297: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721300: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.721302: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.721305: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721308: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.721311: |    length/value: 5 (0x5)
Aug 26 18:33:48.721313: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:33:48.721316: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721319: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.721321: |    length/value: 2 (0x2)
Aug 26 18:33:48.721324: |     [2 is OAKLEY_SHA1]
Aug 26 18:33:48.721327: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721329: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.721332: |    length/value: 3 (0x3)
Aug 26 18:33:48.721334: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.721336: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721339: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.721341: |    length/value: 14 (0xe)
Aug 26 18:33:48.721344: |     [14 is OAKLEY_GROUP_MODP2048]
Aug 26 18:33:48.721346: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:33:48.721348: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.721353: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.721355: |    ISAKMP transform number: 15 (0xf)
Aug 26 18:33:48.721358: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.721361: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.721364: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.721367: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721370: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.721372: |    length/value: 1 (0x1)
Aug 26 18:33:48.721375: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.721377: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721380: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.721382: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.721385: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721388: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.721391: |    length/value: 5 (0x5)
Aug 26 18:33:48.721393: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:33:48.721395: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721398: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.721400: |    length/value: 4 (0x4)
Aug 26 18:33:48.721403: |     [4 is OAKLEY_SHA2_256]
Aug 26 18:33:48.721405: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721408: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.721410: |    length/value: 3 (0x3)
Aug 26 18:33:48.721413: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.721415: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721418: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.721420: |    length/value: 5 (0x5)
Aug 26 18:33:48.721423: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:48.721425: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:33:48.721428: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.721430: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.721433: |    ISAKMP transform number: 16 (0x10)
Aug 26 18:33:48.721436: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.721439: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.721442: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.721445: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721448: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.721451: |    length/value: 1 (0x1)
Aug 26 18:33:48.721454: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.721457: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721460: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.721462: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.721465: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721467: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.721470: |    length/value: 5 (0x5)
Aug 26 18:33:48.721472: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:33:48.721475: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721477: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.721480: |    length/value: 6 (0x6)
Aug 26 18:33:48.721482: |     [6 is OAKLEY_SHA2_512]
Aug 26 18:33:48.721484: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721487: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.721490: |    length/value: 3 (0x3)
Aug 26 18:33:48.721492: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.721495: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721497: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.721500: |    length/value: 5 (0x5)
Aug 26 18:33:48.721502: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:48.721505: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:33:48.721507: | *****emit ISAKMP Transform Payload (ISAKMP):
Aug 26 18:33:48.721512: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.721514: |    ISAKMP transform number: 17 (0x11)
Aug 26 18:33:48.721517: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:33:48.721520: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3)
Aug 26 18:33:48.721523: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type'
Aug 26 18:33:48.721525: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721528: |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
Aug 26 18:33:48.721531: |    length/value: 1 (0x1)
Aug 26 18:33:48.721533: |     [1 is OAKLEY_LIFE_SECONDS]
Aug 26 18:33:48.721536: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721539: |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
Aug 26 18:33:48.721541: |    length/value: 3600 (0xe10)
Aug 26 18:33:48.721543: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721546: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:33:48.721549: |    length/value: 5 (0x5)
Aug 26 18:33:48.721551: |     [5 is OAKLEY_3DES_CBC]
Aug 26 18:33:48.721554: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721556: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:33:48.721559: |    length/value: 2 (0x2)
Aug 26 18:33:48.721562: |     [2 is OAKLEY_SHA1]
Aug 26 18:33:48.721564: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721566: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:33:48.721569: |    length/value: 3 (0x3)
Aug 26 18:33:48.721571: |     [3 is OAKLEY_RSA_SIG]
Aug 26 18:33:48.721574: | ******emit ISAKMP Oakley attribute:
Aug 26 18:33:48.721577: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:33:48.721579: |    length/value: 5 (0x5)
Aug 26 18:33:48.721582: |     [5 is OAKLEY_GROUP_MODP1536]
Aug 26 18:33:48.721584: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
Aug 26 18:33:48.721587: | emitting length of ISAKMP Proposal Payload: 632
Aug 26 18:33:48.721590: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0
Aug 26 18:33:48.721592: | emitting length of ISAKMP Security Association Payload: 644
Aug 26 18:33:48.721595: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0
Aug 26 18:33:48.721600: | out_vid(): sending [FRAGMENTATION]
Aug 26 18:33:48.721603: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:33:48.721606: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:33:48.721609: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:33:48.721613: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:33:48.721616: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.721620: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:33:48.721622: | V_ID  40 48 b7 d5  6e bc e8 85  25 e7 de 7f  00 d6 c2 d3
Aug 26 18:33:48.721625: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:33:48.721627: | out_vid(): sending [Dead Peer Detection]
Aug 26 18:33:48.721630: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:33:48.721633: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.721637: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:33:48.721639: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.721642: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:33:48.721645: | V_ID  af ca d7 13  68 a1 f1 c9  6b 86 96 fc  77 57 01 00
Aug 26 18:33:48.721648: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:33:48.721654: | nat add vid
Aug 26 18:33:48.721657: | sending draft and RFC NATT VIDs
Aug 26 18:33:48.721659: | out_vid(): sending [RFC 3947]
Aug 26 18:33:48.721662: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:33:48.721664: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:33:48.721668: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:33:48.721671: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:33:48.721674: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.721677: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:33:48.721680: | V_ID  4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
Aug 26 18:33:48.721683: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:33:48.721685: | skipping VID_NATT_RFC
Aug 26 18:33:48.721688: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03]
Aug 26 18:33:48.721691: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:33:48.721694: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:33:48.721697: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:33:48.721700: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:33:48.721703: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.721706: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:33:48.721709: | V_ID  7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
Aug 26 18:33:48.721712: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:33:48.721715: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n]
Aug 26 18:33:48.721718: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:33:48.721720: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:33:48.721724: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:33:48.721727: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:33:48.721730: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.721733: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:33:48.721736: | V_ID  90 cb 80 91  3e bb 69 6e  08 63 81 b5  ec 42 7b 1f
Aug 26 18:33:48.721739: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:33:48.721741: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02]
Aug 26 18:33:48.721744: | ***emit ISAKMP Vendor ID Payload:
Aug 26 18:33:48.721747: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:33:48.721751: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID)
Aug 26 18:33:48.721754: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet'
Aug 26 18:33:48.721757: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
Aug 26 18:33:48.721760: | V_ID  cd 60 46 43  35 df 21 f8  7c fd b2 fc  68 b6 a4 48
Aug 26 18:33:48.721762: | emitting length of ISAKMP Vendor ID Payload: 20
Aug 26 18:33:48.721765: | no IKEv1 message padding required
Aug 26 18:33:48.721768: | emitting length of ISAKMP Message: 792
Aug 26 18:33:48.721776: | sending 792 bytes for reply packet for main_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #8)
Aug 26 18:33:48.721779: |   cb 9b 9c 83  21 57 56 d4  00 00 00 00  00 00 00 00
Aug 26 18:33:48.721782: |   01 10 02 00  00 00 00 00  00 00 03 18  0d 00 02 84
Aug 26 18:33:48.721784: |   00 00 00 01  00 00 00 01  00 00 02 78  00 01 00 12
Aug 26 18:33:48.721787: |   03 00 00 24  00 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:48.721792: |   80 01 00 07  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:48.721794: |   80 0e 01 00  03 00 00 24  01 01 00 00  80 0b 00 01
Aug 26 18:33:48.721797: |   80 0c 0e 10  80 01 00 07  80 02 00 04  80 03 00 03
Aug 26 18:33:48.721799: |   80 04 00 0e  80 0e 00 80  03 00 00 24  02 01 00 00
Aug 26 18:33:48.721802: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 06
Aug 26 18:33:48.721805: |   80 03 00 03  80 04 00 0e  80 0e 01 00  03 00 00 24
Aug 26 18:33:48.721807: |   03 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:48.721810: |   80 02 00 06  80 03 00 03  80 04 00 0e  80 0e 00 80
Aug 26 18:33:48.721813: |   03 00 00 24  04 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:48.721816: |   80 01 00 07  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:48.721818: |   80 0e 01 00  03 00 00 24  05 01 00 00  80 0b 00 01
Aug 26 18:33:48.721821: |   80 0c 0e 10  80 01 00 07  80 02 00 02  80 03 00 03
Aug 26 18:33:48.721823: |   80 04 00 0e  80 0e 00 80  03 00 00 24  06 01 00 00
Aug 26 18:33:48.721826: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 04
Aug 26 18:33:48.721829: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:48.721832: |   07 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:48.721834: |   80 02 00 04  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:48.721837: |   03 00 00 24  08 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:48.721839: |   80 01 00 07  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:48.721842: |   80 0e 01 00  03 00 00 24  09 01 00 00  80 0b 00 01
Aug 26 18:33:48.721845: |   80 0c 0e 10  80 01 00 07  80 02 00 06  80 03 00 03
Aug 26 18:33:48.721847: |   80 04 00 05  80 0e 00 80  03 00 00 24  0a 01 00 00
Aug 26 18:33:48.721849: |   80 0b 00 01  80 0c 0e 10  80 01 00 07  80 02 00 02
Aug 26 18:33:48.721852: |   80 03 00 03  80 04 00 05  80 0e 01 00  03 00 00 24
Aug 26 18:33:48.721855: |   0b 01 00 00  80 0b 00 01  80 0c 0e 10  80 01 00 07
Aug 26 18:33:48.721857: |   80 02 00 02  80 03 00 03  80 04 00 05  80 0e 00 80
Aug 26 18:33:48.721859: |   03 00 00 20  0c 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:48.721862: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 0e
Aug 26 18:33:48.721864: |   03 00 00 20  0d 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:48.721866: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 0e
Aug 26 18:33:48.721869: |   03 00 00 20  0e 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:48.721872: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 0e
Aug 26 18:33:48.721874: |   03 00 00 20  0f 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:48.721876: |   80 01 00 05  80 02 00 04  80 03 00 03  80 04 00 05
Aug 26 18:33:48.721879: |   03 00 00 20  10 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:48.721881: |   80 01 00 05  80 02 00 06  80 03 00 03  80 04 00 05
Aug 26 18:33:48.721883: |   00 00 00 20  11 01 00 00  80 0b 00 01  80 0c 0e 10
Aug 26 18:33:48.721886: |   80 01 00 05  80 02 00 02  80 03 00 03  80 04 00 05
Aug 26 18:33:48.721888: |   0d 00 00 14  40 48 b7 d5  6e bc e8 85  25 e7 de 7f
Aug 26 18:33:48.721891: |   00 d6 c2 d3  0d 00 00 14  af ca d7 13  68 a1 f1 c9
Aug 26 18:33:48.721894: |   6b 86 96 fc  77 57 01 00  0d 00 00 14  4a 13 1c 81
Aug 26 18:33:48.721896: |   07 03 58 45  5c 57 28 f2  0e 95 45 2f  0d 00 00 14
Aug 26 18:33:48.721899: |   7d 94 19 a6  53 10 ca 6f  2c 17 9d 92  15 52 9d 56
Aug 26 18:33:48.721902: |   0d 00 00 14  90 cb 80 91  3e bb 69 6e  08 63 81 b5
Aug 26 18:33:48.721904: |   ec 42 7b 1f  00 00 00 14  cd 60 46 43  35 df 21 f8
Aug 26 18:33:48.721907: |   7c fd b2 fc  68 b6 a4 48
Aug 26 18:33:48.721933: | event_schedule: new EVENT_RETRANSMIT-pe@0x55c66d94da38
Aug 26 18:33:48.721939: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #8
Aug 26 18:33:48.721942: | libevent_malloc: new ptr-libevent@0x7fbd0c003878 size 128
Aug 26 18:33:48.721948: | #8 STATE_MAIN_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29714.464398
Aug 26 18:33:48.721954: | #8 spent 1.76 milliseconds in main_outI1()
Aug 26 18:33:48.721960: | stop processing: state #8 connection "northnet-eastnet-b" from 192.1.2.23 (in main_outI1() at ikev1_main.c:228)
Aug 26 18:33:48.721966: | event_schedule: new EVENT_SA_EXPIRE-pe@0x55c66d8e2208
Aug 26 18:33:48.721971: | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #7
Aug 26 18:33:48.721974: | libevent_malloc: new ptr-libevent@0x55c66d94a328 size 128
Aug 26 18:33:48.721979: | libevent_free: release ptr-libevent@0x7fbd0c0072f8
Aug 26 18:33:48.721982: | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fbd0c002b78
Aug 26 18:33:48.721986: | #7 spent 1.8 milliseconds in timer_event_cb() EVENT_SA_REPLACE
Aug 26 18:33:48.721990: | processing: STOP state #0 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:48.721994: | timer_event_cb: processing event@0x7fbd04002b78
Aug 26 18:33:48.721997: | handling event EVENT_SA_REPLACE for child state #6
Aug 26 18:33:48.722002: | start processing: state #6 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:48.722006: | picked newest_ipsec_sa #0 for #6
Aug 26 18:33:48.722008: | replacing stale IPsec SA
Aug 26 18:33:48.722012: | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351)
Aug 26 18:33:48.722015: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:33:48.722020: | Queuing pending IPsec SA negotiating with 192.1.2.23 "north-a-dpd" IKE SA #8 "northnet-eastnet-b"
Aug 26 18:33:48.722024: | event_schedule: new EVENT_SA_EXPIRE-pe@0x7fbd0c002b78
Aug 26 18:33:48.722027: | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #6
Aug 26 18:33:48.722030: | libevent_malloc: new ptr-libevent@0x7fbd0c0072f8 size 128
Aug 26 18:33:48.722034: | libevent_free: release ptr-libevent@0x55c66d974918
Aug 26 18:33:48.722037: | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fbd04002b78
Aug 26 18:33:48.722041: | #6 spent 0.0465 milliseconds in timer_event_cb() EVENT_SA_REPLACE
Aug 26 18:33:48.722046: | stop processing: state #6 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:48.722049: | processing global timer EVENT_REVIVE_CONNS
Aug 26 18:33:48.722052: Initiating connection northnet-eastnet-b which received a Delete/Notify but must remain up per local policy
Aug 26 18:33:48.722055: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:33:48.722059: | start processing: connection "northnet-eastnet-b" (in initiate_a_connection() at initiate.c:186)
Aug 26 18:33:48.722063: | empty esp_info, returning defaults for ENCRYPT
Aug 26 18:33:48.722067: | connection 'northnet-eastnet-b' +POLICY_UP
Aug 26 18:33:48.722070: | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342)
Aug 26 18:33:48.722073: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:33:48.722077: | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "northnet-eastnet-b"
Aug 26 18:33:48.722081: | stop processing: connection "northnet-eastnet-b" (in initiate_a_connection() at initiate.c:349)
Aug 26 18:33:48.722086: | spent 0.0329 milliseconds in global timer EVENT_REVIVE_CONNS
Aug 26 18:33:48.722092: | timer_event_cb: processing event@0x55c66d8e2208
Aug 26 18:33:48.722095: | handling event EVENT_SA_EXPIRE for child state #7
Aug 26 18:33:48.722100: | start processing: state #7 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:48.722103: | picked newest_ipsec_sa #0 for #7
Aug 26 18:33:48.722106: | un-established partial CHILD SA timeout (SA expired)
Aug 26 18:33:48.722108: | pstats #7 ikev1.ipsec failed exchange-timeout
Aug 26 18:33:48.722111: | pstats #7 ikev1.ipsec deleted exchange-timeout
Aug 26 18:33:48.722116: | [RE]START processing: state #7 connection "northnet-eastnet-b" from 192.1.2.23 (in delete_state() at state.c:879)
Aug 26 18:33:48.722119: "northnet-eastnet-b" #7: deleting state (STATE_QUICK_I1) aged 0.014s and NOT sending notification
Aug 26 18:33:48.722122: | child state #7: QUICK_I1(established CHILD SA) => delete
Aug 26 18:33:48.722126: | child state #7: QUICK_I1(established CHILD SA) => CHILDSA_DEL(informational)
Aug 26 18:33:48.722130: | priority calculation of connection "northnet-eastnet-b" is 0xfe7e7
Aug 26 18:33:48.722139: | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.3.0/24:0 => unk255.10000@192.1.3.33 (raw_eroute)
Aug 26 18:33:48.722152: | raw_eroute result=success
Aug 26 18:33:48.722156: | in connection_discard for connection northnet-eastnet-b
Aug 26 18:33:48.722158: | State DB: deleting IKEv1 state #7 in CHILDSA_DEL
Aug 26 18:33:48.722162: | child state #7: CHILDSA_DEL(informational) => UNDEFINED(ignore)
Aug 26 18:33:48.722175: | stop processing: state #7 from 192.1.2.23 (in delete_state() at state.c:1143)
Aug 26 18:33:48.722180: | libevent_free: release ptr-libevent@0x55c66d94a328
Aug 26 18:33:48.722183: | free_event_entry: release EVENT_SA_EXPIRE-pe@0x55c66d8e2208
Aug 26 18:33:48.722185: | in statetime_stop() and could not find #7
Aug 26 18:33:48.722188: | processing: STOP state #0 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:48.722191: | timer_event_cb: processing event@0x7fbd0c002b78
Aug 26 18:33:48.722194: | handling event EVENT_SA_EXPIRE for child state #6
Aug 26 18:33:48.722199: | start processing: state #6 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250)
Aug 26 18:33:48.722202: | picked newest_ipsec_sa #0 for #6
Aug 26 18:33:48.722205: | un-established partial CHILD SA timeout (SA expired)
Aug 26 18:33:48.722208: | pstats #6 ikev1.ipsec failed exchange-timeout
Aug 26 18:33:48.722210: | pstats #6 ikev1.ipsec deleted exchange-timeout
Aug 26 18:33:48.722215: | [RE]START processing: state #6 connection "north-a-dpd" from 192.1.2.23 (in delete_state() at state.c:879)
Aug 26 18:33:48.722218: "north-a-dpd" #6: deleting state (STATE_QUICK_I1) aged 0.025s and NOT sending notification
Aug 26 18:33:48.722221: | child state #6: QUICK_I1(established CHILD SA) => delete
Aug 26 18:33:48.722224: | child state #6: QUICK_I1(established CHILD SA) => CHILDSA_DEL(informational)
Aug 26 18:33:48.722228: | priority calculation of connection "north-a-dpd" is 0xfe7e7
Aug 26 18:33:48.722234: | delete inbound eroute 192.0.22.0/24:0 --0-> 192.0.3.0/24:0 => unk255.10000@192.1.3.33 (raw_eroute)
Aug 26 18:33:48.722243: | raw_eroute result=success
Aug 26 18:33:48.722247: | in connection_discard for connection north-a-dpd
Aug 26 18:33:48.722250: | State DB: deleting IKEv1 state #6 in CHILDSA_DEL
Aug 26 18:33:48.722253: | child state #6: CHILDSA_DEL(informational) => UNDEFINED(ignore)
Aug 26 18:33:48.722274: | stop processing: state #6 from 192.1.2.23 (in delete_state() at state.c:1143)
Aug 26 18:33:48.722306: | libevent_free: release ptr-libevent@0x7fbd0c0072f8
Aug 26 18:33:48.722311: | free_event_entry: release EVENT_SA_EXPIRE-pe@0x7fbd0c002b78
Aug 26 18:33:48.722314: | in statetime_stop() and could not find #6
Aug 26 18:33:48.722317: | processing: STOP state #0 (in timer_event_cb() at timer.c:557)
Aug 26 18:33:49.183229: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:33:49.183255: shutting down
Aug 26 18:33:49.183263: | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825)
Aug 26 18:33:49.183265: destroying root certificate cache
Aug 26 18:33:49.183294: | certs and keys locked by 'free_preshared_secrets'
Aug 26 18:33:49.183300: forgetting secrets
Aug 26 18:33:49.183307: | certs and keys unlocked by 'free_preshared_secrets'
Aug 26 18:33:49.183316: | unreference key: 0x55c66d954908 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1--
Aug 26 18:33:49.183321: | unreference key: 0x55c66d9543b8 user-east@testing.libreswan.org cnt 1--
Aug 26 18:33:49.183325: | unreference key: 0x55c66d956848 @east.testing.libreswan.org cnt 1--
Aug 26 18:33:49.183329: | unreference key: 0x55c66d953608 east@testing.libreswan.org cnt 1--
Aug 26 18:33:49.183336: | unreference key: 0x55c66d952218 192.1.2.23 cnt 1--
Aug 26 18:33:49.183344: | unreference key: 0x55c66d94e058 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org cnt 1--
Aug 26 18:33:49.183352: | unreference key: 0x55c66d94de38 user-north@testing.libreswan.org cnt 1--
Aug 26 18:33:49.183357: | unreference key: 0x55c66d94a9e8 @north.testing.libreswan.org cnt 1--
Aug 26 18:33:49.183375: | start processing: connection "northnet-eastnet-b" (in delete_connection() at connections.c:189)
Aug 26 18:33:49.183379: | removing pending policy for no connection {0x55c66d9631c8}
Aug 26 18:33:49.183382: | Deleting states for connection - including all other IPsec SA's of this IKE SA
Aug 26 18:33:49.183384: | pass 0
Aug 26 18:33:49.183387: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
Aug 26 18:33:49.183390: | state #8
Aug 26 18:33:49.183394: | suspend processing: connection "northnet-eastnet-b" (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:33:49.183399: | start processing: state #8 connection "northnet-eastnet-b" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:33:49.183402: | pstats #8 ikev1.isakmp deleted other
Aug 26 18:33:49.183407: | [RE]START processing: state #8 connection "northnet-eastnet-b" from 192.1.2.23 (in delete_state() at state.c:879)
Aug 26 18:33:49.183412: "northnet-eastnet-b" #8: deleting state (STATE_MAIN_I1) aged 0.463s and NOT sending notification
Aug 26 18:33:49.183415: | parent state #8: MAIN_I1(half-open IKE SA) => delete
Aug 26 18:33:49.183500: | state #8 requesting EVENT_RETRANSMIT to be deleted
Aug 26 18:33:49.183506: | #8 STATE_MAIN_I1: retransmits: cleared
Aug 26 18:33:49.183511: | libevent_free: release ptr-libevent@0x7fbd0c003878
Aug 26 18:33:49.183515: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55c66d94da38
Aug 26 18:33:49.183518: | in connection_discard for connection north-a-dpd
Aug 26 18:33:49.183521: | removing pending policy for "north-a-dpd" {0x55c66d974848}
Aug 26 18:33:49.183525: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:33:49.183528: | picked newest_isakmp_sa #0 for #8
Aug 26 18:33:49.183532: "northnet-eastnet-b" #8: deleting IKE SA for connection 'northnet-eastnet-b' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS
Aug 26 18:33:49.183536: | add revival: connection 'northnet-eastnet-b' added to the list and scheduled for 5 seconds
Aug 26 18:33:49.183539: | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds
Aug 26 18:33:49.183546: | stop processing: connection "northnet-eastnet-b" (BACKGROUND) (in update_state_connection() at connections.c:4076)
Aug 26 18:33:49.183549: | start processing: connection NULL (in update_state_connection() at connections.c:4077)
Aug 26 18:33:49.183552: | in connection_discard for connection northnet-eastnet-b
Aug 26 18:33:49.183555: | State DB: deleting IKEv1 state #8 in MAIN_I1
Aug 26 18:33:49.183558: | parent state #8: MAIN_I1(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:33:49.183564: | stop processing: state #8 from 192.1.2.23 (in delete_state() at state.c:1143)
Aug 26 18:33:49.183569: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:33:49.183571: | pass 1
Aug 26 18:33:49.183574: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
Aug 26 18:33:49.183578: | shunt_eroute() called for connection 'northnet-eastnet-b' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
Aug 26 18:33:49.183581: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0
Aug 26 18:33:49.183585: | priority calculation of connection "northnet-eastnet-b" is 0xfe7e7
Aug 26 18:33:49.183617: | priority calculation of connection "northnet-eastnet-b" is 0xfe7e7
Aug 26 18:33:49.183629: | FOR_EACH_CONNECTION_... in route_owner
Aug 26 18:33:49.183633: |  conn northnet-eastnet-b mark 0/00000000, 0/00000000 vs
Aug 26 18:33:49.183637: |  conn northnet-eastnet-b mark 0/00000000, 0/00000000
Aug 26 18:33:49.183640: |  conn northnet-eastnet-b mark 0/00000000, 0/00000000 vs
Aug 26 18:33:49.183643: |  conn north-a-dpd mark 0/00000000, 0/00000000
Aug 26 18:33:49.183647: | route owner of "northnet-eastnet-b" unrouted: NULL
Aug 26 18:33:49.183654: | running updown command "ipsec _updown" for verb unroute 
Aug 26 18:33:49.183657: | command executing unroute-client
Aug 26 18:33:49.183697: | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO
Aug 26 18:33:49.183702: | popen cmd is 1277 chars long
Aug 26 18:33:49.183705: | cmd(   0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastn:
Aug 26 18:33:49.183708: | cmd(  80):et-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' :
Aug 26 18:33:49.183712: | cmd( 160):PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=no:
Aug 26 18:33:49.183714: | cmd( 240):rth.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT=':
Aug 26 18:33:49.183717: | cmd( 320):192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.:
Aug 26 18:33:49.183720: | cmd( 400):0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE=:
Aug 26 18:33:49.183723: | cmd( 480):'none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Lib:
Aug 26 18:33:49.183726: | cmd( 560):reswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.l:
Aug 26 18:33:49.183729: | cmd( 640):ibreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0':
Aug 26 18:33:49.183731: | cmd( 720): PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL=:
Aug 26 18:33:49.183734: | cmd( 800):'0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='R:
Aug 26 18:33:49.183737: | cmd( 880):SASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO:
Aug 26 18:33:49.183740: | cmd( 960):_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_P:
Aug 26 18:33:49.183742: | cmd(1040):EER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER:
Aug 26 18:33:49.183745: | cmd(1120):='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE=:
Aug 26 18:33:49.183748: | cmd(1200):'' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
Aug 26 18:33:49.192420: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192448: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192452: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192456: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192461: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192475: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192489: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192502: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192521: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192548: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192561: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192590: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192604: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192617: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192629: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192642: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192657: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192670: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192683: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192696: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192709: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192724: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192736: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192749: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192762: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192775: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192792: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192805: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192833: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192846: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192860: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192875: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192889: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192903: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192916: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192930: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192946: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192960: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192973: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.192986: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.193001: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.193018: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.193032: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.193045: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.193203: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.193216: unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.200526: | flush revival: connection 'northnet-eastnet-b' revival flushed
Aug 26 18:33:49.200560: | processing: STOP connection NULL (in discard_connection() at connections.c:249)
Aug 26 18:33:49.200575: | start processing: connection "north-a-dpd" (in delete_connection() at connections.c:189)
Aug 26 18:33:49.200580: | Deleting states for connection - including all other IPsec SA's of this IKE SA
Aug 26 18:33:49.200583: | pass 0
Aug 26 18:33:49.200586: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
Aug 26 18:33:49.200588: | pass 1
Aug 26 18:33:49.200591: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
Aug 26 18:33:49.200595: | shunt_eroute() called for connection 'north-a-dpd' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
Aug 26 18:33:49.200599: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0
Aug 26 18:33:49.200603: | priority calculation of connection "north-a-dpd" is 0xfe7e7
Aug 26 18:33:49.200926: | priority calculation of connection "north-a-dpd" is 0xfe7e7
Aug 26 18:33:49.200945: | FOR_EACH_CONNECTION_... in route_owner
Aug 26 18:33:49.200950: |  conn north-a-dpd mark 0/00000000, 0/00000000 vs
Aug 26 18:33:49.200953: |  conn north-a-dpd mark 0/00000000, 0/00000000
Aug 26 18:33:49.200957: | route owner of "north-a-dpd" unrouted: NULL
Aug 26 18:33:49.200960: | running updown command "ipsec _updown" for verb unroute 
Aug 26 18:33:49.200963: | command executing unroute-client
Aug 26 18:33:49.201007: | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN
Aug 26 18:33:49.201012: | popen cmd is 1272 chars long
Aug 26 18:33:49.201016: | cmd(   0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' P:
Aug 26 18:33:49.201019: | cmd(  80):LUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_M:
Aug 26 18:33:49.201022: | cmd( 160):Y_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.tes:
Aug 26 18:33:49.201025: | cmd( 240):ting.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3:
Aug 26 18:33:49.201028: | cmd( 320):.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUT:
Aug 26 18:33:49.201031: | cmd( 400):O_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' :
Aug 26 18:33:49.201034: | cmd( 480):PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan,:
Aug 26 18:33:49.201036: | cmd( 560): OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswa:
Aug 26 18:33:49.201040: | cmd( 640):n.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUT:
Aug 26 18:33:49.201042: | cmd( 720):O_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' P:
Aug 26 18:33:49.201045: | cmd( 800):LUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG:
Aug 26 18:33:49.201048: | cmd( 880):+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN:
Aug 26 18:33:49.201051: | cmd( 960):_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_C:
Aug 26 18:33:49.201054: | cmd(1040):ISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' P:
Aug 26 18:33:49.201057: | cmd(1120):LUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VT:
Aug 26 18:33:49.201060: | cmd(1200):I_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
Aug 26 18:33:49.212950: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.212976: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.212980: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.212983: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.212986: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.212989: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.212993: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213005: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213016: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213023: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213033: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213044: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213054: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213063: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213073: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213082: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213092: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213101: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213111: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213121: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213131: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213142: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213151: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213161: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213170: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213179: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213191: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213200: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213210: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213220: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213230: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213240: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213254: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213263: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213272: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213281: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213299: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213312: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213321: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213330: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213340: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213352: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213362: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213372: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213521: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.213536: "north-a-dpd": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:33:49.218978: | free hp@0x55c66d953128
Aug 26 18:33:49.219001: | flush revival: connection 'north-a-dpd' wasn't on the list
Aug 26 18:33:49.219010: | stop processing: connection "north-a-dpd" (in discard_connection() at connections.c:249)
Aug 26 18:33:49.219047: | crl fetch request list locked by 'free_crl_fetch'
Aug 26 18:33:49.219050: | crl fetch request list unlocked by 'free_crl_fetch'
Aug 26 18:33:49.219065: shutting down interface lo/lo 127.0.0.1:4500
Aug 26 18:33:49.219069: shutting down interface lo/lo 127.0.0.1:500
Aug 26 18:33:49.219072: shutting down interface eth0/eth0 192.0.3.254:4500
Aug 26 18:33:49.219076: shutting down interface eth0/eth0 192.0.3.254:500
Aug 26 18:33:49.219079: shutting down interface eth1/eth1 192.1.3.33:4500
Aug 26 18:33:49.219083: shutting down interface eth1/eth1 192.1.3.33:500
Aug 26 18:33:49.219088: | FOR_EACH_STATE_... in delete_states_dead_interfaces
Aug 26 18:33:49.219104: | libevent_free: release ptr-libevent@0x55c66d93c6c8
Aug 26 18:33:49.219109: | free_event_entry: release EVENT_NULL-pe@0x55c66d9484e8
Aug 26 18:33:49.219121: | libevent_free: release ptr-libevent@0x55c66d8e2f08
Aug 26 18:33:49.219125: | free_event_entry: release EVENT_NULL-pe@0x55c66d948598
Aug 26 18:33:49.219132: | libevent_free: release ptr-libevent@0x55c66d8e2fb8
Aug 26 18:33:49.219136: | free_event_entry: release EVENT_NULL-pe@0x55c66d948648
Aug 26 18:33:49.219144: | libevent_free: release ptr-libevent@0x55c66d8e1f28
Aug 26 18:33:49.219147: | free_event_entry: release EVENT_NULL-pe@0x55c66d9486f8
Aug 26 18:33:49.219154: | libevent_free: release ptr-libevent@0x55c66d8ea238
Aug 26 18:33:49.219157: | free_event_entry: release EVENT_NULL-pe@0x55c66d9487a8
Aug 26 18:33:49.219165: | libevent_free: release ptr-libevent@0x55c66d8ead58
Aug 26 18:33:49.219168: | free_event_entry: release EVENT_NULL-pe@0x55c66d948858
Aug 26 18:33:49.219175: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
Aug 26 18:33:49.219595: | libevent_free: release ptr-libevent@0x55c66d93c778
Aug 26 18:33:49.219604: | free_event_entry: release EVENT_NULL-pe@0x55c66d930918
Aug 26 18:33:49.219611: | libevent_free: release ptr-libevent@0x55c66d929418
Aug 26 18:33:49.219614: | free_event_entry: release EVENT_NULL-pe@0x55c66d930478
Aug 26 18:33:49.219618: | libevent_free: release ptr-libevent@0x55c66d929368
Aug 26 18:33:49.219621: | free_event_entry: release EVENT_NULL-pe@0x55c66d8ea3f8
Aug 26 18:33:49.219626: | global timer EVENT_REINIT_SECRET uninitialized
Aug 26 18:33:49.219629: | global timer EVENT_SHUNT_SCAN uninitialized
Aug 26 18:33:49.219631: | global timer EVENT_PENDING_DDNS uninitialized
Aug 26 18:33:49.219634: | global timer EVENT_PENDING_PHASE2 uninitialized
Aug 26 18:33:49.219637: | global timer EVENT_CHECK_CRLS uninitialized
Aug 26 18:33:49.219640: | global timer EVENT_REVIVE_CONNS uninitialized
Aug 26 18:33:49.219642: | global timer EVENT_FREE_ROOT_CERTS uninitialized
Aug 26 18:33:49.219645: | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized
Aug 26 18:33:49.219647: | global timer EVENT_NAT_T_KEEPALIVE uninitialized
Aug 26 18:33:49.219652: | libevent_free: release ptr-libevent@0x55c66d8ee9c8
Aug 26 18:33:49.219656: | signal event handler PLUTO_SIGCHLD uninstalled
Aug 26 18:33:49.219660: | libevent_free: release ptr-libevent@0x55c66d864c58
Aug 26 18:33:49.219663: | signal event handler PLUTO_SIGTERM uninstalled
Aug 26 18:33:49.219666: | libevent_free: release ptr-libevent@0x55c66d868038
Aug 26 18:33:49.219669: | signal event handler PLUTO_SIGHUP uninstalled
Aug 26 18:33:49.219672: | libevent_free: release ptr-libevent@0x55c66d947f08
Aug 26 18:33:49.219675: | signal event handler PLUTO_SIGSYS uninstalled
Aug 26 18:33:49.219678: | releasing event base
Aug 26 18:33:49.219690: | libevent_free: release ptr-libevent@0x55c66d947dd8
Aug 26 18:33:49.219693: | libevent_free: release ptr-libevent@0x55c66d92ad38
Aug 26 18:33:49.219698: | libevent_free: release ptr-libevent@0x55c66d92ace8
Aug 26 18:33:49.219700: | libevent_free: release ptr-libevent@0x55c66d9494d8
Aug 26 18:33:49.219703: | libevent_free: release ptr-libevent@0x55c66d92aca8
Aug 26 18:33:49.219707: | libevent_free: release ptr-libevent@0x55c66d947a68
Aug 26 18:33:49.219712: | libevent_free: release ptr-libevent@0x55c66d947cd8
Aug 26 18:33:49.219715: | libevent_free: release ptr-libevent@0x55c66d92aee8
Aug 26 18:33:49.219717: | libevent_free: release ptr-libevent@0x55c66d9304e8
Aug 26 18:33:49.219720: | libevent_free: release ptr-libevent@0x55c66d930148
Aug 26 18:33:49.219723: | libevent_free: release ptr-libevent@0x55c66d9488c8
Aug 26 18:33:49.219726: | libevent_free: release ptr-libevent@0x55c66d948818
Aug 26 18:33:49.219728: | libevent_free: release ptr-libevent@0x55c66d948768
Aug 26 18:33:49.219731: | libevent_free: release ptr-libevent@0x55c66d9486b8
Aug 26 18:33:49.219734: | libevent_free: release ptr-libevent@0x55c66d948608
Aug 26 18:33:49.219736: | libevent_free: release ptr-libevent@0x55c66d948558
Aug 26 18:33:49.219739: | libevent_free: release ptr-libevent@0x55c66d8631c8
Aug 26 18:33:49.219742: | libevent_free: release ptr-libevent@0x55c66d947d58
Aug 26 18:33:49.219744: | libevent_free: release ptr-libevent@0x55c66d947d18
Aug 26 18:33:49.219747: | libevent_free: release ptr-libevent@0x55c66d947bd8
Aug 26 18:33:49.219750: | libevent_free: release ptr-libevent@0x55c66d947d98
Aug 26 18:33:49.219752: | libevent_free: release ptr-libevent@0x55c66d947aa8
Aug 26 18:33:49.219755: | libevent_free: release ptr-libevent@0x55c66d8f0558
Aug 26 18:33:49.219758: | libevent_free: release ptr-libevent@0x55c66d8f04d8
Aug 26 18:33:49.219760: | libevent_free: release ptr-libevent@0x55c66d863538
Aug 26 18:33:49.219763: | releasing global libevent data
Aug 26 18:33:49.219766: | libevent_free: release ptr-libevent@0x55c66d8f06d8
Aug 26 18:33:49.219769: | libevent_free: release ptr-libevent@0x55c66d8f0658
Aug 26 18:33:49.219772: | libevent_free: release ptr-libevent@0x55c66d8f05d8
Aug 26 18:33:49.219805: leak detective found no leaks