Aug 26 18:23:54.355415: FIPS Product: YES Aug 26 18:23:54.355522: FIPS Kernel: NO Aug 26 18:23:54.355526: FIPS Mode: NO Aug 26 18:23:54.355529: NSS DB directory: sql:/etc/ipsec.d Aug 26 18:23:54.355681: Initializing NSS Aug 26 18:23:54.355690: Opening NSS database "sql:/etc/ipsec.d" read-only Aug 26 18:23:54.427142: NSS initialized Aug 26 18:23:54.427160: NSS crypto library initialized Aug 26 18:23:54.427163: FIPS HMAC integrity support [enabled] Aug 26 18:23:54.427165: FIPS mode disabled for pluto daemon Aug 26 18:23:54.564234: FIPS HMAC integrity verification self-test FAILED Aug 26 18:23:54.564401: libcap-ng support [enabled] Aug 26 18:23:54.564413: Linux audit support [enabled] Aug 26 18:23:54.564441: Linux audit activated Aug 26 18:23:54.564449: Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:20083 Aug 26 18:23:54.564452: core dump dir: /tmp Aug 26 18:23:54.564454: secrets file: /etc/ipsec.secrets Aug 26 18:23:54.564457: leak-detective enabled Aug 26 18:23:54.564459: NSS crypto [enabled] Aug 26 18:23:54.564461: XAUTH PAM support [enabled] Aug 26 18:23:54.564536: | libevent is using pluto's memory allocator Aug 26 18:23:54.564545: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Aug 26 18:23:54.564562: | libevent_malloc: new ptr-libevent@0x55647347df78 size 40 Aug 26 18:23:54.564570: | libevent_malloc: new ptr-libevent@0x556473478cd8 size 40 Aug 26 18:23:54.564574: | libevent_malloc: new ptr-libevent@0x556473478dd8 size 40 Aug 26 18:23:54.564577: | creating event base Aug 26 18:23:54.564581: | libevent_malloc: new ptr-libevent@0x5564734fd408 size 56 Aug 26 18:23:54.564585: | libevent_malloc: new ptr-libevent@0x5564734a1c88 size 664 Aug 26 18:23:54.564597: | libevent_malloc: new ptr-libevent@0x5564734fd478 size 24 Aug 26 18:23:54.564600: | libevent_malloc: new ptr-libevent@0x5564734fd4c8 size 384 Aug 26 18:23:54.564611: | libevent_malloc: new ptr-libevent@0x5564734fd3c8 size 16 Aug 26 18:23:54.564615: | libevent_malloc: new ptr-libevent@0x556473478908 size 40 Aug 26 18:23:54.564617: | libevent_malloc: new ptr-libevent@0x556473478d38 size 48 Aug 26 18:23:54.564622: | libevent_realloc: new ptr-libevent@0x5564734a1918 size 256 Aug 26 18:23:54.564625: | libevent_malloc: new ptr-libevent@0x5564734fd678 size 16 Aug 26 18:23:54.564631: | libevent_free: release ptr-libevent@0x5564734fd408 Aug 26 18:23:54.564635: | libevent initialized Aug 26 18:23:54.564639: | libevent_realloc: new ptr-libevent@0x5564734fd408 size 64 Aug 26 18:23:54.564643: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Aug 26 18:23:54.564661: | init_nat_traversal() initialized with keep_alive=0s Aug 26 18:23:54.564664: NAT-Traversal support [enabled] Aug 26 18:23:54.564667: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Aug 26 18:23:54.564676: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Aug 26 18:23:54.564680: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Aug 26 18:23:54.564714: | global one-shot timer EVENT_REVIVE_CONNS initialized Aug 26 18:23:54.564718: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Aug 26 18:23:54.564722: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Aug 26 18:23:54.564771: Encryption algorithms: Aug 26 18:23:54.564783: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Aug 26 18:23:54.564788: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Aug 26 18:23:54.564792: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Aug 26 18:23:54.564796: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Aug 26 18:23:54.564800: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Aug 26 18:23:54.564810: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Aug 26 18:23:54.564815: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Aug 26 18:23:54.564820: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Aug 26 18:23:54.564824: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Aug 26 18:23:54.564828: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Aug 26 18:23:54.564832: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Aug 26 18:23:54.564836: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Aug 26 18:23:54.564840: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Aug 26 18:23:54.564844: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Aug 26 18:23:54.564848: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Aug 26 18:23:54.564852: NULL IKEv1: ESP IKEv2: ESP [] Aug 26 18:23:54.564855: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Aug 26 18:23:54.564863: Hash algorithms: Aug 26 18:23:54.564866: MD5 IKEv1: IKE IKEv2: Aug 26 18:23:54.564869: SHA1 IKEv1: IKE IKEv2: FIPS sha Aug 26 18:23:54.564873: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Aug 26 18:23:54.564876: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Aug 26 18:23:54.564879: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Aug 26 18:23:54.564893: PRF algorithms: Aug 26 18:23:54.564896: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Aug 26 18:23:54.564900: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Aug 26 18:23:54.564904: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Aug 26 18:23:54.564907: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Aug 26 18:23:54.564911: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Aug 26 18:23:54.564914: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Aug 26 18:23:54.564941: Integrity algorithms: Aug 26 18:23:54.564946: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Aug 26 18:23:54.564950: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Aug 26 18:23:54.564954: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Aug 26 18:23:54.564959: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Aug 26 18:23:54.564963: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Aug 26 18:23:54.564966: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Aug 26 18:23:54.564969: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Aug 26 18:23:54.564972: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Aug 26 18:23:54.564974: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Aug 26 18:23:54.564987: DH algorithms: Aug 26 18:23:54.564991: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Aug 26 18:23:54.564994: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Aug 26 18:23:54.564997: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Aug 26 18:23:54.565004: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Aug 26 18:23:54.565007: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Aug 26 18:23:54.565010: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Aug 26 18:23:54.565013: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Aug 26 18:23:54.565016: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Aug 26 18:23:54.565020: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Aug 26 18:23:54.565022: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Aug 26 18:23:54.565026: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Aug 26 18:23:54.565028: testing CAMELLIA_CBC: Aug 26 18:23:54.565031: Camellia: 16 bytes with 128-bit key Aug 26 18:23:54.565162: Camellia: 16 bytes with 128-bit key Aug 26 18:23:54.565197: Camellia: 16 bytes with 256-bit key Aug 26 18:23:54.565230: Camellia: 16 bytes with 256-bit key Aug 26 18:23:54.565262: testing AES_GCM_16: Aug 26 18:23:54.565267: empty string Aug 26 18:23:54.565305: one block Aug 26 18:23:54.565336: two blocks Aug 26 18:23:54.565365: two blocks with associated data Aug 26 18:23:54.565394: testing AES_CTR: Aug 26 18:23:54.565399: Encrypting 16 octets using AES-CTR with 128-bit key Aug 26 18:23:54.565428: Encrypting 32 octets using AES-CTR with 128-bit key Aug 26 18:23:54.565460: Encrypting 36 octets using AES-CTR with 128-bit key Aug 26 18:23:54.565494: Encrypting 16 octets using AES-CTR with 192-bit key Aug 26 18:23:54.565524: Encrypting 32 octets using AES-CTR with 192-bit key Aug 26 18:23:54.565554: Encrypting 36 octets using AES-CTR with 192-bit key Aug 26 18:23:54.565583: Encrypting 16 octets using AES-CTR with 256-bit key Aug 26 18:23:54.565611: Encrypting 32 octets using AES-CTR with 256-bit key Aug 26 18:23:54.565642: Encrypting 36 octets using AES-CTR with 256-bit key Aug 26 18:23:54.565671: testing AES_CBC: Aug 26 18:23:54.565675: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Aug 26 18:23:54.565703: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Aug 26 18:23:54.565733: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Aug 26 18:23:54.565763: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Aug 26 18:23:54.565797: testing AES_XCBC: Aug 26 18:23:54.565801: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Aug 26 18:23:54.565929: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Aug 26 18:23:54.566066: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Aug 26 18:23:54.566193: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Aug 26 18:23:54.566330: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Aug 26 18:23:54.566468: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Aug 26 18:23:54.566600: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Aug 26 18:23:54.566881: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Aug 26 18:23:54.566997: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Aug 26 18:23:54.567138: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Aug 26 18:23:54.567392: testing HMAC_MD5: Aug 26 18:23:54.567403: RFC 2104: MD5_HMAC test 1 Aug 26 18:23:54.567587: RFC 2104: MD5_HMAC test 2 Aug 26 18:23:54.567748: RFC 2104: MD5_HMAC test 3 Aug 26 18:23:54.567950: 8 CPU cores online Aug 26 18:23:54.567957: starting up 7 crypto helpers Aug 26 18:23:54.567997: started thread for crypto helper 0 Aug 26 18:23:54.568003: | starting up helper thread 0 Aug 26 18:23:54.568026: started thread for crypto helper 1 Aug 26 18:23:54.568027: | status value returned by setting the priority of this thread (crypto helper 0) 22 Aug 26 18:23:54.568039: | crypto helper 0 waiting (nothing to do) Aug 26 18:23:54.568052: started thread for crypto helper 2 Aug 26 18:23:54.568055: | starting up helper thread 2 Aug 26 18:23:54.568066: | status value returned by setting the priority of this thread (crypto helper 2) 22 Aug 26 18:23:54.568069: | crypto helper 2 waiting (nothing to do) Aug 26 18:23:54.568095: started thread for crypto helper 3 Aug 26 18:23:54.568115: started thread for crypto helper 4 Aug 26 18:23:54.568134: started thread for crypto helper 5 Aug 26 18:23:54.568152: started thread for crypto helper 6 Aug 26 18:23:54.568159: | checking IKEv1 state table Aug 26 18:23:54.568167: | MAIN_R0: category: half-open IKE SA flags: 0: Aug 26 18:23:54.568170: | -> MAIN_R1 EVENT_SO_DISCARD Aug 26 18:23:54.568173: | MAIN_I1: category: half-open IKE SA flags: 0: Aug 26 18:23:54.568175: | -> MAIN_I2 EVENT_RETRANSMIT Aug 26 18:23:54.568178: | MAIN_R1: category: open IKE SA flags: 200: Aug 26 18:23:54.568181: | -> MAIN_R2 EVENT_RETRANSMIT Aug 26 18:23:54.568184: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:23:54.568186: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:23:54.568189: | MAIN_I2: category: open IKE SA flags: 0: Aug 26 18:23:54.568191: | -> MAIN_I3 EVENT_RETRANSMIT Aug 26 18:23:54.568194: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:23:54.568196: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:23:54.568199: | MAIN_R2: category: open IKE SA flags: 0: Aug 26 18:23:54.568202: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:23:54.568204: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:23:54.568206: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 18:23:54.568209: | MAIN_I3: category: open IKE SA flags: 0: Aug 26 18:23:54.568212: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:23:54.568214: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:23:54.568217: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 18:23:54.568220: | MAIN_R3: category: established IKE SA flags: 200: Aug 26 18:23:54.568222: | -> UNDEFINED EVENT_NULL Aug 26 18:23:54.568225: | MAIN_I4: category: established IKE SA flags: 0: Aug 26 18:23:54.568228: | -> UNDEFINED EVENT_NULL Aug 26 18:23:54.568230: | AGGR_R0: category: half-open IKE SA flags: 0: Aug 26 18:23:54.568233: | -> AGGR_R1 EVENT_SO_DISCARD Aug 26 18:23:54.568236: | AGGR_I1: category: half-open IKE SA flags: 0: Aug 26 18:23:54.568238: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 18:23:54.568241: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 18:23:54.568244: | AGGR_R1: category: open IKE SA flags: 200: Aug 26 18:23:54.568246: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 18:23:54.568249: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 18:23:54.568252: | AGGR_I2: category: established IKE SA flags: 200: Aug 26 18:23:54.568254: | -> UNDEFINED EVENT_NULL Aug 26 18:23:54.568257: | AGGR_R2: category: established IKE SA flags: 0: Aug 26 18:23:54.568260: | -> UNDEFINED EVENT_NULL Aug 26 18:23:54.568263: | QUICK_R0: category: established CHILD SA flags: 0: Aug 26 18:23:54.568265: | -> QUICK_R1 EVENT_RETRANSMIT Aug 26 18:23:54.568268: | QUICK_I1: category: established CHILD SA flags: 0: Aug 26 18:23:54.568271: | -> QUICK_I2 EVENT_SA_REPLACE Aug 26 18:23:54.568274: | QUICK_R1: category: established CHILD SA flags: 0: Aug 26 18:23:54.568277: | -> QUICK_R2 EVENT_SA_REPLACE Aug 26 18:23:54.568280: | QUICK_I2: category: established CHILD SA flags: 200: Aug 26 18:23:54.568282: | -> UNDEFINED EVENT_NULL Aug 26 18:23:54.568285: | QUICK_R2: category: established CHILD SA flags: 0: Aug 26 18:23:54.568292: | -> UNDEFINED EVENT_NULL Aug 26 18:23:54.568299: | INFO: category: informational flags: 0: Aug 26 18:23:54.568302: | -> UNDEFINED EVENT_NULL Aug 26 18:23:54.568305: | INFO_PROTECTED: category: informational flags: 0: Aug 26 18:23:54.568308: | -> UNDEFINED EVENT_NULL Aug 26 18:23:54.568311: | XAUTH_R0: category: established IKE SA flags: 0: Aug 26 18:23:54.568314: | -> XAUTH_R1 EVENT_NULL Aug 26 18:23:54.568317: | XAUTH_R1: category: established IKE SA flags: 0: Aug 26 18:23:54.568320: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:23:54.568323: | MODE_CFG_R0: category: informational flags: 0: Aug 26 18:23:54.568330: | -> MODE_CFG_R1 EVENT_SA_REPLACE Aug 26 18:23:54.568333: | MODE_CFG_R1: category: established IKE SA flags: 0: Aug 26 18:23:54.568336: | -> MODE_CFG_R2 EVENT_SA_REPLACE Aug 26 18:23:54.568339: | MODE_CFG_R2: category: established IKE SA flags: 0: Aug 26 18:23:54.568342: | -> UNDEFINED EVENT_NULL Aug 26 18:23:54.568345: | MODE_CFG_I1: category: established IKE SA flags: 0: Aug 26 18:23:54.568348: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:23:54.568351: | XAUTH_I0: category: established IKE SA flags: 0: Aug 26 18:23:54.568353: | -> XAUTH_I1 EVENT_RETRANSMIT Aug 26 18:23:54.568357: | XAUTH_I1: category: established IKE SA flags: 0: Aug 26 18:23:54.568359: | -> MAIN_I4 EVENT_RETRANSMIT Aug 26 18:23:54.568366: | checking IKEv2 state table Aug 26 18:23:54.568373: | PARENT_I0: category: ignore flags: 0: Aug 26 18:23:54.568376: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Aug 26 18:23:54.568380: | PARENT_I1: category: half-open IKE SA flags: 0: Aug 26 18:23:54.568383: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Aug 26 18:23:54.568386: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Aug 26 18:23:54.568390: | PARENT_I2: category: open IKE SA flags: 0: Aug 26 18:23:54.568393: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Aug 26 18:23:54.568396: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Aug 26 18:23:54.568399: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Aug 26 18:23:54.568402: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Aug 26 18:23:54.568405: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Aug 26 18:23:54.568408: | PARENT_I3: category: established IKE SA flags: 0: Aug 26 18:23:54.568411: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Aug 26 18:23:54.568414: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Aug 26 18:23:54.568417: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Aug 26 18:23:54.568420: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Aug 26 18:23:54.568423: | PARENT_R0: category: half-open IKE SA flags: 0: Aug 26 18:23:54.568426: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Aug 26 18:23:54.568429: | PARENT_R1: category: half-open IKE SA flags: 0: Aug 26 18:23:54.568432: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Aug 26 18:23:54.568435: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Aug 26 18:23:54.568438: | PARENT_R2: category: established IKE SA flags: 0: Aug 26 18:23:54.568441: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Aug 26 18:23:54.568444: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Aug 26 18:23:54.568447: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Aug 26 18:23:54.568450: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Aug 26 18:23:54.568454: | V2_CREATE_I0: category: established IKE SA flags: 0: Aug 26 18:23:54.568456: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Aug 26 18:23:54.568459: | V2_CREATE_I: category: established IKE SA flags: 0: Aug 26 18:23:54.568462: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Aug 26 18:23:54.568466: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Aug 26 18:23:54.568469: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Aug 26 18:23:54.568472: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Aug 26 18:23:54.568475: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Aug 26 18:23:54.568479: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Aug 26 18:23:54.568484: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Aug 26 18:23:54.568488: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Aug 26 18:23:54.568491: | V2_CREATE_R: category: established IKE SA flags: 0: Aug 26 18:23:54.568494: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Aug 26 18:23:54.568497: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Aug 26 18:23:54.568500: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Aug 26 18:23:54.568503: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Aug 26 18:23:54.568506: | V2_IPSEC_I: category: established CHILD SA flags: 0: Aug 26 18:23:54.568509: | V2_IPSEC_R: category: established CHILD SA flags: 0: Aug 26 18:23:54.568512: | IKESA_DEL: category: established IKE SA flags: 0: Aug 26 18:23:54.568515: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Aug 26 18:23:54.568518: | CHILDSA_DEL: category: informational flags: 0: Aug 26 18:23:54.568564: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 Aug 26 18:23:54.568623: | Hard-wiring algorithms Aug 26 18:23:54.568628: | adding AES_CCM_16 to kernel algorithm db Aug 26 18:23:54.568633: | adding AES_CCM_12 to kernel algorithm db Aug 26 18:23:54.568636: | adding AES_CCM_8 to kernel algorithm db Aug 26 18:23:54.568638: | adding 3DES_CBC to kernel algorithm db Aug 26 18:23:54.568641: | adding CAMELLIA_CBC to kernel algorithm db Aug 26 18:23:54.568644: | adding AES_GCM_16 to kernel algorithm db Aug 26 18:23:54.568647: | adding AES_GCM_12 to kernel algorithm db Aug 26 18:23:54.568649: | adding AES_GCM_8 to kernel algorithm db Aug 26 18:23:54.568652: | adding AES_CTR to kernel algorithm db Aug 26 18:23:54.568655: | adding AES_CBC to kernel algorithm db Aug 26 18:23:54.568657: | adding SERPENT_CBC to kernel algorithm db Aug 26 18:23:54.568660: | adding TWOFISH_CBC to kernel algorithm db Aug 26 18:23:54.568663: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Aug 26 18:23:54.568666: | adding NULL to kernel algorithm db Aug 26 18:23:54.568668: | adding CHACHA20_POLY1305 to kernel algorithm db Aug 26 18:23:54.568671: | adding HMAC_MD5_96 to kernel algorithm db Aug 26 18:23:54.568674: | adding HMAC_SHA1_96 to kernel algorithm db Aug 26 18:23:54.568676: | adding HMAC_SHA2_512_256 to kernel algorithm db Aug 26 18:23:54.568679: | adding HMAC_SHA2_384_192 to kernel algorithm db Aug 26 18:23:54.568681: | adding HMAC_SHA2_256_128 to kernel algorithm db Aug 26 18:23:54.568684: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Aug 26 18:23:54.568687: | adding AES_XCBC_96 to kernel algorithm db Aug 26 18:23:54.568689: | adding AES_CMAC_96 to kernel algorithm db Aug 26 18:23:54.568692: | adding NONE to kernel algorithm db Aug 26 18:23:54.568719: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Aug 26 18:23:54.568727: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Aug 26 18:23:54.568730: | setup kernel fd callback Aug 26 18:23:54.568734: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x5564735020d8 Aug 26 18:23:54.568740: | libevent_malloc: new ptr-libevent@0x5564734e6668 size 128 Aug 26 18:23:54.568744: | libevent_malloc: new ptr-libevent@0x5564735021e8 size 16 Aug 26 18:23:54.568752: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x556473502c18 Aug 26 18:23:54.568755: | libevent_malloc: new ptr-libevent@0x5564734a4a28 size 128 Aug 26 18:23:54.568758: | libevent_malloc: new ptr-libevent@0x556473502bd8 size 16 Aug 26 18:23:54.569002: | global one-shot timer EVENT_CHECK_CRLS initialized Aug 26 18:23:54.569012: selinux support is enabled. Aug 26 18:23:54.569246: | unbound context created - setting debug level to 5 Aug 26 18:23:54.569276: | /etc/hosts lookups activated Aug 26 18:23:54.569293: | /etc/resolv.conf usage activated Aug 26 18:23:54.569365: | outgoing-port-avoid set 0-65535 Aug 26 18:23:54.569399: | outgoing-port-permit set 32768-60999 Aug 26 18:23:54.569403: | Loading dnssec root key from:/var/lib/unbound/root.key Aug 26 18:23:54.569407: | No additional dnssec trust anchors defined via dnssec-trusted= option Aug 26 18:23:54.569410: | Setting up events, loop start Aug 26 18:23:54.569414: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x556473502c88 Aug 26 18:23:54.569417: | libevent_malloc: new ptr-libevent@0x55647350ee98 size 128 Aug 26 18:23:54.569420: | libevent_malloc: new ptr-libevent@0x55647351a168 size 16 Aug 26 18:23:54.569427: | libevent_realloc: new ptr-libevent@0x55647351a1a8 size 256 Aug 26 18:23:54.569430: | libevent_malloc: new ptr-libevent@0x55647351a2d8 size 8 Aug 26 18:23:54.569433: | libevent_realloc: new ptr-libevent@0x556473474918 size 144 Aug 26 18:23:54.569436: | libevent_malloc: new ptr-libevent@0x5564734ad588 size 152 Aug 26 18:23:54.569440: | libevent_malloc: new ptr-libevent@0x55647351a318 size 16 Aug 26 18:23:54.569444: | signal event handler PLUTO_SIGCHLD installed Aug 26 18:23:54.569447: | libevent_malloc: new ptr-libevent@0x55647351a358 size 8 Aug 26 18:23:54.569450: | libevent_malloc: new ptr-libevent@0x5564734a5418 size 152 Aug 26 18:23:54.569453: | signal event handler PLUTO_SIGTERM installed Aug 26 18:23:54.569455: | libevent_malloc: new ptr-libevent@0x55647351a398 size 8 Aug 26 18:23:54.569458: | libevent_malloc: new ptr-libevent@0x55647351a3d8 size 152 Aug 26 18:23:54.569461: | signal event handler PLUTO_SIGHUP installed Aug 26 18:23:54.569464: | libevent_malloc: new ptr-libevent@0x55647351a4a8 size 8 Aug 26 18:23:54.569467: | libevent_realloc: release ptr-libevent@0x556473474918 Aug 26 18:23:54.569470: | libevent_realloc: new ptr-libevent@0x55647351a4e8 size 256 Aug 26 18:23:54.569473: | libevent_malloc: new ptr-libevent@0x55647351a618 size 152 Aug 26 18:23:54.569476: | signal event handler PLUTO_SIGSYS installed Aug 26 18:23:54.569857: | created addconn helper (pid:20437) using fork+execve Aug 26 18:23:54.569873: | forked child 20437 Aug 26 18:23:54.569917: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:23:54.569932: listening for IKE messages Aug 26 18:23:54.569964: | Inspecting interface lo Aug 26 18:23:54.569975: | found lo with address 127.0.0.1 Aug 26 18:23:54.569977: | Inspecting interface eth0 Aug 26 18:23:54.569982: | found eth0 with address 192.0.2.254 Aug 26 18:23:54.569986: | Inspecting interface eth1 Aug 26 18:23:54.569990: | found eth1 with address 192.1.2.23 Aug 26 18:23:54.570082: Kernel supports NIC esp-hw-offload Aug 26 18:23:54.570091: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.23:500 Aug 26 18:23:54.570110: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 18:23:54.570115: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 18:23:54.570119: adding interface eth1/eth1 192.1.2.23:4500 Aug 26 18:23:54.570140: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.2.254:500 Aug 26 18:23:54.570157: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 18:23:54.570161: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 18:23:54.570165: adding interface eth0/eth0 192.0.2.254:4500 Aug 26 18:23:54.570185: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Aug 26 18:23:54.570202: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 18:23:54.570205: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 18:23:54.570209: adding interface lo/lo 127.0.0.1:4500 Aug 26 18:23:54.570314: | no interfaces to sort Aug 26 18:23:54.570322: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 18:23:54.570331: | add_fd_read_event_handler: new ethX-pe@0x55647351aae8 Aug 26 18:23:54.570334: | libevent_malloc: new ptr-libevent@0x55647350ede8 size 128 Aug 26 18:23:54.570338: | libevent_malloc: new ptr-libevent@0x55647351ab58 size 16 Aug 26 18:23:54.570344: | setup callback for interface lo 127.0.0.1:4500 fd 22 Aug 26 18:23:54.570350: | add_fd_read_event_handler: new ethX-pe@0x55647351ab98 Aug 26 18:23:54.570355: | libevent_malloc: new ptr-libevent@0x5564734a2078 size 128 Aug 26 18:23:54.570358: | libevent_malloc: new ptr-libevent@0x55647351ac08 size 16 Aug 26 18:23:54.570362: | setup callback for interface lo 127.0.0.1:500 fd 21 Aug 26 18:23:54.570365: | add_fd_read_event_handler: new ethX-pe@0x55647351ac48 Aug 26 18:23:54.570370: | libevent_malloc: new ptr-libevent@0x5564734a50e8 size 128 Aug 26 18:23:54.570373: | libevent_malloc: new ptr-libevent@0x55647351acb8 size 16 Aug 26 18:23:54.570377: | setup callback for interface eth0 192.0.2.254:4500 fd 20 Aug 26 18:23:54.570380: | add_fd_read_event_handler: new ethX-pe@0x55647351acf8 Aug 26 18:23:54.570383: | libevent_malloc: new ptr-libevent@0x5564734a5348 size 128 Aug 26 18:23:54.570385: | libevent_malloc: new ptr-libevent@0x55647351ad68 size 16 Aug 26 18:23:54.570390: | setup callback for interface eth0 192.0.2.254:500 fd 19 Aug 26 18:23:54.570392: | add_fd_read_event_handler: new ethX-pe@0x55647351ada8 Aug 26 18:23:54.570397: | libevent_malloc: new ptr-libevent@0x5564734794e8 size 128 Aug 26 18:23:54.570400: | libevent_malloc: new ptr-libevent@0x55647351ae18 size 16 Aug 26 18:23:54.570404: | setup callback for interface eth1 192.1.2.23:4500 fd 18 Aug 26 18:23:54.570407: | add_fd_read_event_handler: new ethX-pe@0x55647351ae58 Aug 26 18:23:54.570410: | libevent_malloc: new ptr-libevent@0x5564734791d8 size 128 Aug 26 18:23:54.570413: | libevent_malloc: new ptr-libevent@0x55647351aec8 size 16 Aug 26 18:23:54.570417: | setup callback for interface eth1 192.1.2.23:500 fd 17 Aug 26 18:23:54.570423: | certs and keys locked by 'free_preshared_secrets' Aug 26 18:23:54.570425: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 18:23:54.570442: loading secrets from "/etc/ipsec.secrets" Aug 26 18:23:54.570454: | id type added to secret(0x556473474b58) PKK_PSK: @east Aug 26 18:23:54.570457: | id type added to secret(0x556473474b58) PKK_PSK: @west Aug 26 18:23:54.570462: | Processing PSK at line 1: passed Aug 26 18:23:54.570464: | certs and keys locked by 'process_secret' Aug 26 18:23:54.570469: | certs and keys unlocked by 'process_secret' Aug 26 18:23:54.570477: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:23:54.570485: | spent 0.552 milliseconds in whack Aug 26 18:23:54.570500: | starting up helper thread 6 Aug 26 18:23:54.570506: | status value returned by setting the priority of this thread (crypto helper 6) 22 Aug 26 18:23:54.570511: | crypto helper 6 waiting (nothing to do) Aug 26 18:23:54.570522: | starting up helper thread 5 Aug 26 18:23:54.570527: | status value returned by setting the priority of this thread (crypto helper 5) 22 Aug 26 18:23:54.570530: | crypto helper 5 waiting (nothing to do) Aug 26 18:23:54.570640: | starting up helper thread 1 Aug 26 18:23:54.570651: | status value returned by setting the priority of this thread (crypto helper 1) 22 Aug 26 18:23:54.570655: | crypto helper 1 waiting (nothing to do) Aug 26 18:23:54.571178: | starting up helper thread 4 Aug 26 18:23:54.571189: | status value returned by setting the priority of this thread (crypto helper 4) 22 Aug 26 18:23:54.571193: | crypto helper 4 waiting (nothing to do) Aug 26 18:23:54.577609: | starting up helper thread 3 Aug 26 18:23:54.577627: | status value returned by setting the priority of this thread (crypto helper 3) 22 Aug 26 18:23:54.577632: | crypto helper 3 waiting (nothing to do) Aug 26 18:23:54.680450: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:23:54.680480: listening for IKE messages Aug 26 18:23:54.680896: | Inspecting interface lo Aug 26 18:23:54.680904: | found lo with address 127.0.0.1 Aug 26 18:23:54.680907: | Inspecting interface eth0 Aug 26 18:23:54.680912: | found eth0 with address 192.0.2.254 Aug 26 18:23:54.680915: | Inspecting interface eth1 Aug 26 18:23:54.680919: | found eth1 with address 192.1.2.23 Aug 26 18:23:54.680997: | no interfaces to sort Aug 26 18:23:54.681011: | libevent_free: release ptr-libevent@0x55647350ede8 Aug 26 18:23:54.681015: | free_event_entry: release EVENT_NULL-pe@0x55647351aae8 Aug 26 18:23:54.681018: | add_fd_read_event_handler: new ethX-pe@0x55647351aae8 Aug 26 18:23:54.681022: | libevent_malloc: new ptr-libevent@0x55647350ede8 size 128 Aug 26 18:23:54.681028: | setup callback for interface lo 127.0.0.1:4500 fd 22 Aug 26 18:23:54.681033: | libevent_free: release ptr-libevent@0x5564734a2078 Aug 26 18:23:54.681036: | free_event_entry: release EVENT_NULL-pe@0x55647351ab98 Aug 26 18:23:54.681038: | add_fd_read_event_handler: new ethX-pe@0x55647351ab98 Aug 26 18:23:54.681041: | libevent_malloc: new ptr-libevent@0x5564734a2078 size 128 Aug 26 18:23:54.681047: | setup callback for interface lo 127.0.0.1:500 fd 21 Aug 26 18:23:54.681051: | libevent_free: release ptr-libevent@0x5564734a50e8 Aug 26 18:23:54.681054: | free_event_entry: release EVENT_NULL-pe@0x55647351ac48 Aug 26 18:23:54.681056: | add_fd_read_event_handler: new ethX-pe@0x55647351ac48 Aug 26 18:23:54.681059: | libevent_malloc: new ptr-libevent@0x5564734a50e8 size 128 Aug 26 18:23:54.681064: | setup callback for interface eth0 192.0.2.254:4500 fd 20 Aug 26 18:23:54.681068: | libevent_free: release ptr-libevent@0x5564734a5348 Aug 26 18:23:54.681071: | free_event_entry: release EVENT_NULL-pe@0x55647351acf8 Aug 26 18:23:54.681074: | add_fd_read_event_handler: new ethX-pe@0x55647351acf8 Aug 26 18:23:54.681077: | libevent_malloc: new ptr-libevent@0x5564734a5348 size 128 Aug 26 18:23:54.681082: | setup callback for interface eth0 192.0.2.254:500 fd 19 Aug 26 18:23:54.681087: | libevent_free: release ptr-libevent@0x5564734794e8 Aug 26 18:23:54.681090: | free_event_entry: release EVENT_NULL-pe@0x55647351ada8 Aug 26 18:23:54.681093: | add_fd_read_event_handler: new ethX-pe@0x55647351ada8 Aug 26 18:23:54.681096: | libevent_malloc: new ptr-libevent@0x5564734794e8 size 128 Aug 26 18:23:54.681101: | setup callback for interface eth1 192.1.2.23:4500 fd 18 Aug 26 18:23:54.681104: | libevent_free: release ptr-libevent@0x5564734791d8 Aug 26 18:23:54.681107: | free_event_entry: release EVENT_NULL-pe@0x55647351ae58 Aug 26 18:23:54.681110: | add_fd_read_event_handler: new ethX-pe@0x55647351ae58 Aug 26 18:23:54.681113: | libevent_malloc: new ptr-libevent@0x5564734791d8 size 128 Aug 26 18:23:54.681118: | setup callback for interface eth1 192.1.2.23:500 fd 17 Aug 26 18:23:54.681121: | certs and keys locked by 'free_preshared_secrets' Aug 26 18:23:54.681124: forgetting secrets Aug 26 18:23:54.681131: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 18:23:54.681145: loading secrets from "/etc/ipsec.secrets" Aug 26 18:23:54.681152: | id type added to secret(0x556473474b58) PKK_PSK: @east Aug 26 18:23:54.681156: | id type added to secret(0x556473474b58) PKK_PSK: @west Aug 26 18:23:54.681160: | Processing PSK at line 1: passed Aug 26 18:23:54.681163: | certs and keys locked by 'process_secret' Aug 26 18:23:54.681166: | certs and keys unlocked by 'process_secret' Aug 26 18:23:54.681174: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:23:54.681181: | spent 0.732 milliseconds in whack Aug 26 18:23:54.682145: | processing signal PLUTO_SIGCHLD Aug 26 18:23:54.682167: | waitpid returned pid 20437 (exited with status 0) Aug 26 18:23:54.682171: | reaped addconn helper child (status 0) Aug 26 18:23:54.682176: | waitpid returned ECHILD (no child processes left) Aug 26 18:23:54.682182: | spent 0.0219 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 18:23:54.749910: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:23:54.749935: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:23:54.749939: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 18:23:54.749942: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:23:54.749945: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 18:23:54.749949: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:23:54.749957: | Added new connection westnet-eastnet with policy ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 18:23:54.749965: | No AUTH policy was set - defaulting to RSASIG Aug 26 18:23:54.749970: | counting wild cards for @west is 0 Aug 26 18:23:54.749974: | counting wild cards for @east is 0 Aug 26 18:23:54.749986: | connect_to_host_pair: 192.1.2.23:500 192.1.2.45:500 -> hp@(nil): none Aug 26 18:23:54.749989: | new hp@0x55647351bd78 Aug 26 18:23:54.749993: added connection description "westnet-eastnet" Aug 26 18:23:54.750002: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 18:23:54.750014: | 192.0.2.0/24===192.1.2.23<192.1.2.23>[@east]...192.1.2.45<192.1.2.45>[@west]===192.0.1.0/24 Aug 26 18:23:54.750021: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:23:54.750027: | spent 0.126 milliseconds in whack Aug 26 18:23:54.750089: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:23:54.750099: add keyid @west Aug 26 18:23:54.750103: | add pubkey 01 03 a6 f5 d6 3f e3 8f 6c 01 6a fc 7b 7c 6d 57 Aug 26 18:23:54.750105: | add pubkey 8b 49 39 0d 77 f7 ac e2 85 f1 98 1e 4b 6d a5 3e Aug 26 18:23:54.750108: | add pubkey b3 96 9a d1 99 5a bc 10 f2 97 de f2 28 f9 5f 92 Aug 26 18:23:54.750110: | add pubkey 09 f0 c8 d4 12 e4 60 6e 9c 60 98 10 01 7d 26 b7 Aug 26 18:23:54.750113: | add pubkey 8f 95 62 2d 87 dd cd de f6 d3 8f 35 b0 50 d0 18 Aug 26 18:23:54.750116: | add pubkey f5 99 f8 04 f1 ff 61 5b bc 7f 1f c0 04 d8 e4 8c Aug 26 18:23:54.750118: | add pubkey ac 34 ad 7a c1 da 3c 2d 8c 30 ae d6 3c 59 b1 3a Aug 26 18:23:54.750121: | add pubkey 94 d3 d5 2a 73 91 bd 59 5f 3e 72 bf 4a 1b 9d c5 Aug 26 18:23:54.750123: | add pubkey b2 2b 4d e7 0d 24 3e 77 f9 7f 2d d6 9d 29 ef 70 Aug 26 18:23:54.750126: | add pubkey 7d 7a 6d a2 b8 61 0c 4b 09 4a 06 71 84 70 85 9a Aug 26 18:23:54.750129: | add pubkey 8f 52 a1 80 06 fd c6 fc 3e 27 fa 16 fa 32 83 a9 Aug 26 18:23:54.750131: | add pubkey ca 80 db 0f 4a bf f7 e9 55 8e bd 29 4d 23 a6 dc Aug 26 18:23:54.750134: | add pubkey 2a b3 5d 62 a9 21 1e be 83 d8 69 3c 03 0a 48 8e Aug 26 18:23:54.750136: | add pubkey d3 3a 11 f2 86 5a d1 30 65 bd c8 f4 83 87 ff 04 Aug 26 18:23:54.750139: | add pubkey 87 33 05 4f e0 d8 8c fe b3 19 4c dd 85 40 f3 4d Aug 26 18:23:54.750141: | add pubkey 6e e8 49 14 06 2c 1f 59 59 05 8f 20 b0 ca 46 3f Aug 26 18:23:54.750144: | add pubkey c9 20 7e 04 30 7d 9a 80 6c 3f 0a 89 f7 d3 af d8 Aug 26 18:23:54.750146: | add pubkey 15 04 37 f9 Aug 26 18:23:54.750181: | computed rsa CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 Aug 26 18:23:54.750185: | computed rsa CKAID 7f 0f 03 50 Aug 26 18:23:54.750194: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:23:54.750199: | spent 0.114 milliseconds in whack Aug 26 18:23:54.750789: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:23:54.750804: add keyid @east Aug 26 18:23:54.750809: | add pubkey 01 03 bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b Aug 26 18:23:54.750811: | add pubkey e5 16 c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 Aug 26 18:23:54.750814: | add pubkey 85 7a e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c Aug 26 18:23:54.750817: | add pubkey 78 ca 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 Aug 26 18:23:54.750819: | add pubkey 21 c9 f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d Aug 26 18:23:54.750822: | add pubkey d2 67 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 Aug 26 18:23:54.750824: | add pubkey 62 cd 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce Aug 26 18:23:54.750827: | add pubkey 62 b5 af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e Aug 26 18:23:54.750829: | add pubkey bb 23 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d Aug 26 18:23:54.750832: | add pubkey ac 47 f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce Aug 26 18:23:54.750837: | add pubkey e0 98 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a Aug 26 18:23:54.750840: | add pubkey 92 b8 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 Aug 26 18:23:54.750843: | add pubkey 4d 58 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 Aug 26 18:23:54.750845: | add pubkey 5f 56 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 Aug 26 18:23:54.750848: | add pubkey d5 f1 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c Aug 26 18:23:54.750850: | add pubkey 47 cc 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 Aug 26 18:23:54.750853: | add pubkey 07 8f 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 Aug 26 18:23:54.750855: | add pubkey 51 51 48 ef Aug 26 18:23:54.750867: | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Aug 26 18:23:54.750870: | computed rsa CKAID 8a 82 25 f1 Aug 26 18:23:54.750880: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:23:54.750885: | spent 0.1 milliseconds in whack Aug 26 18:23:56.233312: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:56.233348: | *received 88 bytes from 192.1.2.45:57031 on eth1 (192.1.2.23:500) Aug 26 18:23:56.233352: | b9 ce 3e ef c8 b6 61 dd 00 00 00 00 00 00 00 00 Aug 26 18:23:56.233355: | 01 10 02 00 00 00 00 00 00 00 00 58 00 00 00 3c Aug 26 18:23:56.233357: | 00 00 00 01 ff ff ff ff 00 00 00 00 01 01 00 01 Aug 26 18:23:56.233360: | 00 00 00 28 01 01 00 00 80 0b 00 01 00 0c 00 04 Aug 26 18:23:56.233362: | 00 01 51 80 80 01 00 07 80 0e 01 00 80 03 00 03 Aug 26 18:23:56.233365: | 80 02 00 02 80 04 00 05 Aug 26 18:23:56.233373: | start processing: from 192.1.2.45:57031 (in process_md() at demux.c:378) Aug 26 18:23:56.233378: | **parse ISAKMP Message: Aug 26 18:23:56.233382: | initiator cookie: Aug 26 18:23:56.233384: | b9 ce 3e ef c8 b6 61 dd Aug 26 18:23:56.233387: | responder cookie: Aug 26 18:23:56.233389: | 00 00 00 00 00 00 00 00 Aug 26 18:23:56.233392: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:56.233395: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:56.233398: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:56.233401: | flags: none (0x0) Aug 26 18:23:56.233404: | Message ID: 0 (0x0) Aug 26 18:23:56.233407: | length: 88 (0x58) Aug 26 18:23:56.233410: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:56.233415: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:56.233418: | #null state always idle Aug 26 18:23:56.233422: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:56.233426: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:56.233429: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:56.233432: | length: 60 (0x3c) Aug 26 18:23:56.233435: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:56.233438: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:56.233441: | in statetime_start() with no state Aug 26 18:23:56.233447: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:57031 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:56.233453: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:56.233456: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:56.233461: | found policy = RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (westnet-eastnet) Aug 26 18:23:56.233464: | find_next_host_connection returns westnet-eastnet Aug 26 18:23:56.233466: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:56.233469: | find_next_host_connection returns empty Aug 26 18:23:56.233499: | creating state object #1 at 0x55647351dbf8 Aug 26 18:23:56.233503: | State DB: adding IKEv1 state #1 in UNDEFINED Aug 26 18:23:56.233511: | pstats #1 ikev1.isakmp started Aug 26 18:23:56.233517: | #1 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:56.233525: | start processing: state #1 connection "westnet-eastnet" from 192.1.2.45:57031 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:56.233534: | parent state #1: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:56.233539: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:56.233542: "westnet-eastnet" #1: responding to Main Mode Aug 26 18:23:56.233592: | **emit ISAKMP Message: Aug 26 18:23:56.233597: | initiator cookie: Aug 26 18:23:56.233600: | b9 ce 3e ef c8 b6 61 dd Aug 26 18:23:56.233602: | responder cookie: Aug 26 18:23:56.233604: | 9a d0 ba cf b9 72 9e dc Aug 26 18:23:56.233623: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:56.233626: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:56.233629: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:56.233632: | flags: none (0x0) Aug 26 18:23:56.233635: | Message ID: 0 (0x0) Aug 26 18:23:56.233638: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:56.233641: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:56.233645: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:56.233647: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:56.233650: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:56.233653: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:56.233657: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:56.233660: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:56.233669: "westnet-eastnet" #1: bitset IPsec DOI SIT of IPsec DOI SIT has unknown member(s): SIT_IDENTITY_ONLY+SIT_SECRECY+SIT_INTEGRITY+0x8+0x10+0x20+0x40+0x80+0x100+0x200+0x400+0x800+0x1000+0x2000+0x4000+0x8000+0x10000+0x20000+0x40000+0x80000+0x100000+0x200000+0x400000+0x800000+0x1000000+0x2000000+0x4000000+0x8000000+0x10000000+0x20000000+0x40000000+0x80000000 (0xffffffff) Aug 26 18:23:56.233675: | complete v1 state transition with SITUATION_NOT_SUPPORTED Aug 26 18:23:56.233680: | [RE]START processing: state #1 connection "westnet-eastnet" from 192.1.2.45:57031 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:56.233683: | #1 is idle Aug 26 18:23:56.234700: "westnet-eastnet" #1: sending notification SITUATION_NOT_SUPPORTED to 192.1.2.45:57031 Aug 26 18:23:56.234713: | **emit ISAKMP Message: Aug 26 18:23:56.234717: | initiator cookie: Aug 26 18:23:56.234719: | b9 ce 3e ef c8 b6 61 dd Aug 26 18:23:56.234722: | responder cookie: Aug 26 18:23:56.234725: | 9a d0 ba cf b9 72 9e dc Aug 26 18:23:56.234728: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:56.234731: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:56.234734: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:56.234736: | flags: none (0x0) Aug 26 18:23:56.234739: | Message ID: 0 (0x0) Aug 26 18:23:56.234742: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:56.234745: | ***emit ISAKMP Notification Payload: Aug 26 18:23:56.234748: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:56.234751: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:56.234754: | protocol ID: 1 (0x1) Aug 26 18:23:56.234756: | SPI size: 0 (0x0) Aug 26 18:23:56.234759: | Notify Message Type: SITUATION_NOT_SUPPORTED (0x3) Aug 26 18:23:56.234763: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:56.234766: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:56.234769: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:56.234772: | emitting length of ISAKMP Message: 40 Aug 26 18:23:56.234781: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:57031 (using #1) Aug 26 18:23:56.234787: | b9 ce 3e ef c8 b6 61 dd 9a d0 ba cf b9 72 9e dc Aug 26 18:23:56.234790: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:56.234792: | 00 00 00 01 01 00 00 03 Aug 26 18:23:56.234826: | state transition function for STATE_MAIN_R0 failed: SITUATION_NOT_SUPPORTED Aug 26 18:23:56.234833: | stop processing: from 192.1.2.45:57031 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:56.234839: | stop processing: state #1 connection "westnet-eastnet" from 192.1.2.45:57031 (in process_md() at demux.c:382) Aug 26 18:23:56.234842: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:56.234849: | spent 0.532 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:56.234942: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:56.234956: | *received 88 bytes from 192.1.2.45:59795 on eth1 (192.1.2.23:500) Aug 26 18:23:56.234959: | b9 ce 3e ef c8 b6 61 dd 00 00 00 00 00 00 00 00 Aug 26 18:23:56.234961: | 0f 10 02 00 00 00 00 00 00 00 00 58 00 00 00 3c Aug 26 18:23:56.234964: | 00 00 00 01 00 00 00 01 00 00 00 30 01 01 00 01 Aug 26 18:23:56.234967: | 00 00 00 28 01 01 00 00 80 0b 00 01 00 0c 00 04 Aug 26 18:23:56.234969: | 00 01 51 80 80 01 00 07 80 0e 01 00 80 03 00 03 Aug 26 18:23:56.234971: | 80 02 00 02 80 04 00 05 Aug 26 18:23:56.234976: | start processing: from 192.1.2.45:59795 (in process_md() at demux.c:378) Aug 26 18:23:56.234979: | **parse ISAKMP Message: Aug 26 18:23:56.234982: | initiator cookie: Aug 26 18:23:56.234985: | b9 ce 3e ef c8 b6 61 dd Aug 26 18:23:56.234988: | responder cookie: Aug 26 18:23:56.234990: | 00 00 00 00 00 00 00 00 Aug 26 18:23:56.234993: | next payload type: ISAKMP_NEXT_SAK (0xf) Aug 26 18:23:56.234996: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:56.234998: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:56.235001: | flags: none (0x0) Aug 26 18:23:56.235004: | Message ID: 0 (0x0) Aug 26 18:23:56.235006: | length: 88 (0x58) Aug 26 18:23:56.235009: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:56.235013: | State DB: found IKEv1 state #1 in MAIN_R0 (find_state_ikev1_init) Aug 26 18:23:56.235019: | start processing: state #1 connection "westnet-eastnet" from 192.1.2.45:57031 (in process_v1_packet() at ikev1.c:1416) Aug 26 18:23:56.235022: "westnet-eastnet" #1: discarding initial packet; already STATE_MAIN_R0 Aug 26 18:23:56.235027: | stop processing: state #1 connection "westnet-eastnet" from 192.1.2.45:57031 (in process_v1_packet() at ikev1.c:1429) Aug 26 18:23:56.235031: | stop processing: from 192.1.2.45:59795 (in process_md() at demux.c:380) Aug 26 18:23:56.235035: | processing: STOP state #0 (in process_md() at demux.c:382) Aug 26 18:23:56.235037: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:56.235042: | spent 0.0929 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:56.995563: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:23:56.995794: | FOR_EACH_CONNECTION_... in show_connections_status Aug 26 18:23:56.995802: | FOR_EACH_CONNECTION_... in show_connections_status Aug 26 18:23:56.995864: | FOR_EACH_STATE_... in show_states_status (sort_states) Aug 26 18:23:56.995869: | FOR_EACH_STATE_... in sort_states Aug 26 18:23:56.995886: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:23:56.995893: | spent 0.338 milliseconds in whack Aug 26 18:23:59.341502: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:23:59.341530: shutting down Aug 26 18:23:59.341539: | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825) Aug 26 18:23:59.341542: | certs and keys locked by 'free_preshared_secrets' Aug 26 18:23:59.341545: forgetting secrets Aug 26 18:23:59.341549: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 18:23:59.341558: | unreference key: 0x55647351c1b8 @east cnt 1-- Aug 26 18:23:59.341563: | unreference key: 0x556473474c48 @west cnt 1-- Aug 26 18:23:59.341569: | start processing: connection "westnet-eastnet" (in delete_connection() at connections.c:189) Aug 26 18:23:59.341573: | Deleting states for connection - including all other IPsec SA's of this IKE SA Aug 26 18:23:59.341575: | pass 0 Aug 26 18:23:59.341578: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 18:23:59.341581: | state #1 Aug 26 18:23:59.341584: | suspend processing: connection "westnet-eastnet" (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.341590: | start processing: state #1 connection "westnet-eastnet" from 192.1.2.45:57031 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.341593: | pstats #1 ikev1.isakmp deleted other Aug 26 18:23:59.341598: | [RE]START processing: state #1 connection "westnet-eastnet" from 192.1.2.45:57031 (in delete_state() at state.c:879) Aug 26 18:23:59.341603: "westnet-eastnet" #1: deleting state (STATE_MAIN_R0) aged 3.108s and NOT sending notification Aug 26 18:23:59.341607: | parent state #1: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.341670: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.341678: | stop processing: connection "westnet-eastnet" (BACKGROUND) (in update_state_connection() at connections.c:4076) Aug 26 18:23:59.341682: | start processing: connection NULL (in update_state_connection() at connections.c:4077) Aug 26 18:23:59.341685: | in connection_discard for connection westnet-eastnet Aug 26 18:23:59.341688: | State DB: deleting IKEv1 state #1 in MAIN_R0 Aug 26 18:23:59.341692: | parent state #1: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.341703: | stop processing: state #1 from 192.1.2.45:57031 (in delete_state() at state.c:1143) Aug 26 18:23:59.341708: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.341710: | pass 1 Aug 26 18:23:59.341713: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 18:23:59.341717: | free hp@0x55647351bd78 Aug 26 18:23:59.341720: | flush revival: connection 'westnet-eastnet' wasn't on the list Aug 26 18:23:59.341723: | processing: STOP connection NULL (in discard_connection() at connections.c:249) Aug 26 18:23:59.341728: | crl fetch request list locked by 'free_crl_fetch' Aug 26 18:23:59.341730: | crl fetch request list unlocked by 'free_crl_fetch' Aug 26 18:23:59.341740: shutting down interface lo/lo 127.0.0.1:4500 Aug 26 18:23:59.341744: shutting down interface lo/lo 127.0.0.1:500 Aug 26 18:23:59.341748: shutting down interface eth0/eth0 192.0.2.254:4500 Aug 26 18:23:59.341751: shutting down interface eth0/eth0 192.0.2.254:500 Aug 26 18:23:59.341754: shutting down interface eth1/eth1 192.1.2.23:4500 Aug 26 18:23:59.341757: shutting down interface eth1/eth1 192.1.2.23:500 Aug 26 18:23:59.341762: | FOR_EACH_STATE_... in delete_states_dead_interfaces Aug 26 18:23:59.341770: | libevent_free: release ptr-libevent@0x55647350ede8 Aug 26 18:23:59.341774: | free_event_entry: release EVENT_NULL-pe@0x55647351aae8 Aug 26 18:23:59.341785: | libevent_free: release ptr-libevent@0x5564734a2078 Aug 26 18:23:59.341789: | free_event_entry: release EVENT_NULL-pe@0x55647351ab98 Aug 26 18:23:59.341796: | libevent_free: release ptr-libevent@0x5564734a50e8 Aug 26 18:23:59.341800: | free_event_entry: release EVENT_NULL-pe@0x55647351ac48 Aug 26 18:23:59.341806: | libevent_free: release ptr-libevent@0x5564734a5348 Aug 26 18:23:59.341809: | free_event_entry: release EVENT_NULL-pe@0x55647351acf8 Aug 26 18:23:59.341814: | libevent_free: release ptr-libevent@0x5564734794e8 Aug 26 18:23:59.341817: | free_event_entry: release EVENT_NULL-pe@0x55647351ada8 Aug 26 18:23:59.341823: | libevent_free: release ptr-libevent@0x5564734791d8 Aug 26 18:23:59.341826: | free_event_entry: release EVENT_NULL-pe@0x55647351ae58 Aug 26 18:23:59.341832: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 18:23:59.342239: | libevent_free: release ptr-libevent@0x55647350ee98 Aug 26 18:23:59.342248: | free_event_entry: release EVENT_NULL-pe@0x556473502c88 Aug 26 18:23:59.342254: | libevent_free: release ptr-libevent@0x5564734a4a28 Aug 26 18:23:59.342257: | free_event_entry: release EVENT_NULL-pe@0x556473502c18 Aug 26 18:23:59.342262: | libevent_free: release ptr-libevent@0x5564734e6668 Aug 26 18:23:59.342265: | free_event_entry: release EVENT_NULL-pe@0x5564735020d8 Aug 26 18:23:59.342269: | global timer EVENT_REINIT_SECRET uninitialized Aug 26 18:23:59.342272: | global timer EVENT_SHUNT_SCAN uninitialized Aug 26 18:23:59.342274: | global timer EVENT_PENDING_DDNS uninitialized Aug 26 18:23:59.342277: | global timer EVENT_PENDING_PHASE2 uninitialized Aug 26 18:23:59.342279: | global timer EVENT_CHECK_CRLS uninitialized Aug 26 18:23:59.342282: | global timer EVENT_REVIVE_CONNS uninitialized Aug 26 18:23:59.342284: | global timer EVENT_FREE_ROOT_CERTS uninitialized Aug 26 18:23:59.342287: | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized Aug 26 18:23:59.342303: | global timer EVENT_NAT_T_KEEPALIVE uninitialized Aug 26 18:23:59.342308: | libevent_free: release ptr-libevent@0x5564734ad588 Aug 26 18:23:59.342311: | signal event handler PLUTO_SIGCHLD uninstalled Aug 26 18:23:59.342315: | libevent_free: release ptr-libevent@0x5564734a5418 Aug 26 18:23:59.342317: | signal event handler PLUTO_SIGTERM uninstalled Aug 26 18:23:59.342321: | libevent_free: release ptr-libevent@0x55647351a3d8 Aug 26 18:23:59.342323: | signal event handler PLUTO_SIGHUP uninstalled Aug 26 18:23:59.342327: | libevent_free: release ptr-libevent@0x55647351a618 Aug 26 18:23:59.342329: | signal event handler PLUTO_SIGSYS uninstalled Aug 26 18:23:59.342331: | releasing event base Aug 26 18:23:59.342346: | libevent_free: release ptr-libevent@0x55647351a4e8 Aug 26 18:23:59.342349: | libevent_free: release ptr-libevent@0x5564734fd4c8 Aug 26 18:23:59.342353: | libevent_free: release ptr-libevent@0x5564734fd478 Aug 26 18:23:59.342356: | libevent_free: release ptr-libevent@0x5564734fd408 Aug 26 18:23:59.342359: | libevent_free: release ptr-libevent@0x5564734fd3c8 Aug 26 18:23:59.342362: | libevent_free: release ptr-libevent@0x55647351a168 Aug 26 18:23:59.342364: | libevent_free: release ptr-libevent@0x55647351a318 Aug 26 18:23:59.342367: | libevent_free: release ptr-libevent@0x5564734fd678 Aug 26 18:23:59.342370: | libevent_free: release ptr-libevent@0x5564735021e8 Aug 26 18:23:59.342372: | libevent_free: release ptr-libevent@0x556473502bd8 Aug 26 18:23:59.342375: | libevent_free: release ptr-libevent@0x55647351aec8 Aug 26 18:23:59.342378: | libevent_free: release ptr-libevent@0x55647351ae18 Aug 26 18:23:59.342380: | libevent_free: release ptr-libevent@0x55647351ad68 Aug 26 18:23:59.342383: | libevent_free: release ptr-libevent@0x55647351acb8 Aug 26 18:23:59.342385: | libevent_free: release ptr-libevent@0x55647351ac08 Aug 26 18:23:59.342388: | libevent_free: release ptr-libevent@0x55647351ab58 Aug 26 18:23:59.342391: | libevent_free: release ptr-libevent@0x5564734a1918 Aug 26 18:23:59.342393: | libevent_free: release ptr-libevent@0x55647351a398 Aug 26 18:23:59.342396: | libevent_free: release ptr-libevent@0x55647351a358 Aug 26 18:23:59.342399: | libevent_free: release ptr-libevent@0x55647351a2d8 Aug 26 18:23:59.342401: | libevent_free: release ptr-libevent@0x55647351a4a8 Aug 26 18:23:59.342404: | libevent_free: release ptr-libevent@0x55647351a1a8 Aug 26 18:23:59.342407: | libevent_free: release ptr-libevent@0x556473478908 Aug 26 18:23:59.342410: | libevent_free: release ptr-libevent@0x556473478d38 Aug 26 18:23:59.342412: | libevent_free: release ptr-libevent@0x5564734a1c88 Aug 26 18:23:59.342415: | releasing global libevent data Aug 26 18:23:59.342418: | libevent_free: release ptr-libevent@0x55647347df78 Aug 26 18:23:59.342421: | libevent_free: release ptr-libevent@0x556473478cd8 Aug 26 18:23:59.342424: | libevent_free: release ptr-libevent@0x556473478dd8 Aug 26 18:23:59.342462: leak detective found no leaks