Aug 26 18:23:55.755845: FIPS Product: YES
Aug 26 18:23:55.755898: FIPS Kernel: NO
Aug 26 18:23:55.755902: FIPS Mode: NO
Aug 26 18:23:55.755906: NSS DB directory: sql:/etc/ipsec.d
Aug 26 18:23:55.756076: Initializing NSS
Aug 26 18:23:55.756085: Opening NSS database "sql:/etc/ipsec.d" read-only
Aug 26 18:23:55.821168: NSS initialized
Aug 26 18:23:55.821184: NSS crypto library initialized
Aug 26 18:23:55.821187: FIPS HMAC integrity support [enabled]
Aug 26 18:23:55.821189: FIPS mode disabled for pluto daemon
Aug 26 18:23:55.931813: FIPS HMAC integrity verification self-test FAILED
Aug 26 18:23:55.931911: libcap-ng support [enabled]
Aug 26 18:23:55.931918: Linux audit support [enabled]
Aug 26 18:23:55.931957: Linux audit activated
Aug 26 18:23:55.931964: Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:23602
Aug 26 18:23:55.931968: core dump dir: /tmp
Aug 26 18:23:55.931971: secrets file: /etc/ipsec.secrets
Aug 26 18:23:55.931973: leak-detective disabled
Aug 26 18:23:55.931975: NSS crypto [enabled]
Aug 26 18:23:55.931977: XAUTH PAM support [enabled]
Aug 26 18:23:55.932050: | libevent is using pluto's memory allocator
Aug 26 18:23:55.932057: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800)
Aug 26 18:23:55.932071: | libevent_malloc: new ptr-libevent@0x55f088abb3e0 size 40
Aug 26 18:23:55.932074: | libevent_malloc: new ptr-libevent@0x55f088abb410 size 40
Aug 26 18:23:55.932078: | libevent_malloc: new ptr-libevent@0x55f088abc700 size 40
Aug 26 18:23:55.932080: | creating event base
Aug 26 18:23:55.932083: | libevent_malloc: new ptr-libevent@0x55f088abc6c0 size 56
Aug 26 18:23:55.932087: | libevent_malloc: new ptr-libevent@0x55f088abc730 size 664
Aug 26 18:23:55.932100: | libevent_malloc: new ptr-libevent@0x55f088abc9d0 size 24
Aug 26 18:23:55.932104: | libevent_malloc: new ptr-libevent@0x55f088aae130 size 384
Aug 26 18:23:55.932113: | libevent_malloc: new ptr-libevent@0x55f088abc9f0 size 16
Aug 26 18:23:55.932116: | libevent_malloc: new ptr-libevent@0x55f088abca10 size 40
Aug 26 18:23:55.932119: | libevent_malloc: new ptr-libevent@0x55f088abca40 size 48
Aug 26 18:23:55.932126: | libevent_realloc: new ptr-libevent@0x55f088a40370 size 256
Aug 26 18:23:55.932129: | libevent_malloc: new ptr-libevent@0x55f088abca80 size 16
Aug 26 18:23:55.932135: | libevent_free: release ptr-libevent@0x55f088abc6c0
Aug 26 18:23:55.932138: | libevent initialized
Aug 26 18:23:55.932142: | libevent_realloc: new ptr-libevent@0x55f088abcaa0 size 64
Aug 26 18:23:55.932146: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds
Aug 26 18:23:55.932161: | init_nat_traversal() initialized with keep_alive=0s
Aug 26 18:23:55.932164: NAT-Traversal support  [enabled]
Aug 26 18:23:55.932167: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized
Aug 26 18:23:55.932173: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized
Aug 26 18:23:55.932177: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds
Aug 26 18:23:55.932208: | global one-shot timer EVENT_REVIVE_CONNS initialized
Aug 26 18:23:55.932212: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds
Aug 26 18:23:55.932216: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds
Aug 26 18:23:55.932268: Encryption algorithms:
Aug 26 18:23:55.932278:   AES_CCM_16              IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm, aes_ccm_c
Aug 26 18:23:55.932283:   AES_CCM_12              IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm_b
Aug 26 18:23:55.932287:   AES_CCM_8               IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm_a
Aug 26 18:23:55.932297:   3DES_CBC                IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  [*192]  3des
Aug 26 18:23:55.932301:   CAMELLIA_CTR            IKEv1:     ESP     IKEv2:     ESP           {256,192,*128}
Aug 26 18:23:55.932310:   CAMELLIA_CBC            IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  camellia
Aug 26 18:23:55.932314:   AES_GCM_16              IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm, aes_gcm_c
Aug 26 18:23:55.932318:   AES_GCM_12              IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm_b
Aug 26 18:23:55.932322:   AES_GCM_8               IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm_a
Aug 26 18:23:55.932326:   AES_CTR                 IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aesctr
Aug 26 18:23:55.932329:   AES_CBC                 IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes
Aug 26 18:23:55.932333:   SERPENT_CBC             IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  serpent
Aug 26 18:23:55.932337:   TWOFISH_CBC             IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  twofish
Aug 26 18:23:55.932341:   TWOFISH_SSH             IKEv1: IKE         IKEv2: IKE ESP           {256,192,*128}  twofish_cbc_ssh
Aug 26 18:23:55.932345:   NULL_AUTH_AES_GMAC      IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_gmac
Aug 26 18:23:55.932348:   NULL                    IKEv1:     ESP     IKEv2:     ESP           []
Aug 26 18:23:55.932351:   CHACHA20_POLY1305       IKEv1:             IKEv2: IKE ESP           [*256]  chacha20poly1305
Aug 26 18:23:55.932358: Hash algorithms:
Aug 26 18:23:55.932361:   MD5                     IKEv1: IKE         IKEv2:                 
Aug 26 18:23:55.932365:   SHA1                    IKEv1: IKE         IKEv2:             FIPS  sha
Aug 26 18:23:55.932368:   SHA2_256                IKEv1: IKE         IKEv2:             FIPS  sha2, sha256
Aug 26 18:23:55.932371:   SHA2_384                IKEv1: IKE         IKEv2:             FIPS  sha384
Aug 26 18:23:55.932374:   SHA2_512                IKEv1: IKE         IKEv2:             FIPS  sha512
Aug 26 18:23:55.932388: PRF algorithms:
Aug 26 18:23:55.932391:   HMAC_MD5                IKEv1: IKE         IKEv2: IKE               md5
Aug 26 18:23:55.932394:   HMAC_SHA1               IKEv1: IKE         IKEv2: IKE         FIPS  sha, sha1
Aug 26 18:23:55.932398:   HMAC_SHA2_256           IKEv1: IKE         IKEv2: IKE         FIPS  sha2, sha256, sha2_256
Aug 26 18:23:55.932402:   HMAC_SHA2_384           IKEv1: IKE         IKEv2: IKE         FIPS  sha384, sha2_384
Aug 26 18:23:55.932405:   HMAC_SHA2_512           IKEv1: IKE         IKEv2: IKE         FIPS  sha512, sha2_512
Aug 26 18:23:55.932408:   AES_XCBC                IKEv1:             IKEv2: IKE               aes128_xcbc
Aug 26 18:23:55.932435: Integrity algorithms:
Aug 26 18:23:55.932438:   HMAC_MD5_96             IKEv1: IKE ESP AH  IKEv2: IKE ESP AH        md5, hmac_md5
Aug 26 18:23:55.932442:   HMAC_SHA1_96            IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha, sha1, sha1_96, hmac_sha1
Aug 26 18:23:55.932447:   HMAC_SHA2_512_256       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha512, sha2_512, sha2_512_256, hmac_sha2_512
Aug 26 18:23:55.932451:   HMAC_SHA2_384_192       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha384, sha2_384, sha2_384_192, hmac_sha2_384
Aug 26 18:23:55.932455:   HMAC_SHA2_256_128       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256
Aug 26 18:23:55.932458:   HMAC_SHA2_256_TRUNCBUG  IKEv1:     ESP AH  IKEv2:         AH      
Aug 26 18:23:55.932462:   AES_XCBC_96             IKEv1:     ESP AH  IKEv2: IKE ESP AH        aes_xcbc, aes128_xcbc, aes128_xcbc_96
Aug 26 18:23:55.932465:   AES_CMAC_96             IKEv1:     ESP AH  IKEv2:     ESP AH  FIPS  aes_cmac
Aug 26 18:23:55.932469:   NONE                    IKEv1:     ESP     IKEv2: IKE ESP     FIPS  null
Aug 26 18:23:55.932481: DH algorithms:
Aug 26 18:23:55.932484:   NONE                    IKEv1:             IKEv2: IKE ESP AH  FIPS  null, dh0
Aug 26 18:23:55.932488:   MODP1536                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH        dh5
Aug 26 18:23:55.932491:   MODP2048                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh14
Aug 26 18:23:55.932496:   MODP3072                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh15
Aug 26 18:23:55.932499:   MODP4096                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh16
Aug 26 18:23:55.932502:   MODP6144                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh17
Aug 26 18:23:55.932505:   MODP8192                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh18
Aug 26 18:23:55.932509:   DH19                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_256, ecp256
Aug 26 18:23:55.932512:   DH20                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_384, ecp384
Aug 26 18:23:55.932516:   DH21                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_521, ecp521
Aug 26 18:23:55.932519:   DH31                    IKEv1: IKE         IKEv2: IKE ESP AH        curve25519
Aug 26 18:23:55.932521: testing CAMELLIA_CBC:
Aug 26 18:23:55.932524:   Camellia: 16 bytes with 128-bit key
Aug 26 18:23:55.932636:   Camellia: 16 bytes with 128-bit key
Aug 26 18:23:55.932667:   Camellia: 16 bytes with 256-bit key
Aug 26 18:23:55.932696:   Camellia: 16 bytes with 256-bit key
Aug 26 18:23:55.932726: testing AES_GCM_16:
Aug 26 18:23:55.932730:   empty string
Aug 26 18:23:55.932757:   one block
Aug 26 18:23:55.932782:   two blocks
Aug 26 18:23:55.932808:   two blocks with associated data
Aug 26 18:23:55.932833: testing AES_CTR:
Aug 26 18:23:55.932836:   Encrypting 16 octets using AES-CTR with 128-bit key
Aug 26 18:23:55.932863:   Encrypting 32 octets using AES-CTR with 128-bit key
Aug 26 18:23:55.932890:   Encrypting 36 octets using AES-CTR with 128-bit key
Aug 26 18:23:55.932918:   Encrypting 16 octets using AES-CTR with 192-bit key
Aug 26 18:23:55.932944:   Encrypting 32 octets using AES-CTR with 192-bit key
Aug 26 18:23:55.932971:   Encrypting 36 octets using AES-CTR with 192-bit key
Aug 26 18:23:55.933000:   Encrypting 16 octets using AES-CTR with 256-bit key
Aug 26 18:23:55.933026:   Encrypting 32 octets using AES-CTR with 256-bit key
Aug 26 18:23:55.933054:   Encrypting 36 octets using AES-CTR with 256-bit key
Aug 26 18:23:55.933082: testing AES_CBC:
Aug 26 18:23:55.933085:   Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key
Aug 26 18:23:55.933111:   Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key
Aug 26 18:23:55.933140:   Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key
Aug 26 18:23:55.933169:   Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key
Aug 26 18:23:55.933202: testing AES_XCBC:
Aug 26 18:23:55.933205:   RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input
Aug 26 18:23:55.933327:   RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input
Aug 26 18:23:55.933461:   RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input
Aug 26 18:23:55.933585:   RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input
Aug 26 18:23:55.933712:   RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input
Aug 26 18:23:55.933840:   RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input
Aug 26 18:23:55.933970:   RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input
Aug 26 18:23:55.934266:   RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16)
Aug 26 18:23:55.934392:   RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10)
Aug 26 18:23:55.934536:   RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18)
Aug 26 18:23:55.934795: testing HMAC_MD5:
Aug 26 18:23:55.934801:   RFC 2104: MD5_HMAC test 1
Aug 26 18:23:55.934988:   RFC 2104: MD5_HMAC test 2
Aug 26 18:23:55.935151:   RFC 2104: MD5_HMAC test 3
Aug 26 18:23:55.935361: 8 CPU cores online
Aug 26 18:23:55.935370: starting up 7 crypto helpers
Aug 26 18:23:55.935403: started thread for crypto helper 0
Aug 26 18:23:55.935408: | starting up helper thread 0
Aug 26 18:23:55.935430: | status value returned by setting the priority of this thread (crypto helper 0) 22
Aug 26 18:23:55.935433: | crypto helper 0 waiting (nothing to do)
Aug 26 18:23:55.935442: started thread for crypto helper 1
Aug 26 18:23:55.935448: | starting up helper thread 1
Aug 26 18:23:55.935464: | status value returned by setting the priority of this thread (crypto helper 1) 22
Aug 26 18:23:55.935467: | crypto helper 1 waiting (nothing to do)
Aug 26 18:23:55.939404: started thread for crypto helper 2
Aug 26 18:23:55.939407: | starting up helper thread 2
Aug 26 18:23:55.939435: | status value returned by setting the priority of this thread (crypto helper 2) 22
Aug 26 18:23:55.939439: | crypto helper 2 waiting (nothing to do)
Aug 26 18:23:55.939449: started thread for crypto helper 3
Aug 26 18:23:55.939451: | starting up helper thread 3
Aug 26 18:23:55.939457: | status value returned by setting the priority of this thread (crypto helper 3) 22
Aug 26 18:23:55.939460: | crypto helper 3 waiting (nothing to do)
Aug 26 18:23:55.939469: started thread for crypto helper 4
Aug 26 18:23:55.939473: | starting up helper thread 4
Aug 26 18:23:55.939489: | status value returned by setting the priority of this thread (crypto helper 4) 22
Aug 26 18:23:55.939492: started thread for crypto helper 5
Aug 26 18:23:55.939495: | starting up helper thread 5
Aug 26 18:23:55.939501: | status value returned by setting the priority of this thread (crypto helper 5) 22
Aug 26 18:23:55.939492: | crypto helper 4 waiting (nothing to do)
Aug 26 18:23:55.939512: | crypto helper 5 waiting (nothing to do)
Aug 26 18:23:55.939515: started thread for crypto helper 6
Aug 26 18:23:55.939518: | starting up helper thread 6
Aug 26 18:23:55.939523: | checking IKEv1 state table
Aug 26 18:23:55.939523: | status value returned by setting the priority of this thread (crypto helper 6) 22
Aug 26 18:23:55.939530: | crypto helper 6 waiting (nothing to do)
Aug 26 18:23:55.939534: |   MAIN_R0: category: half-open IKE SA flags: 0:
Aug 26 18:23:55.939537: |     -> MAIN_R1 EVENT_SO_DISCARD
Aug 26 18:23:55.939540: |   MAIN_I1: category: half-open IKE SA flags: 0:
Aug 26 18:23:55.939543: |     -> MAIN_I2 EVENT_RETRANSMIT
Aug 26 18:23:55.939546: |   MAIN_R1: category: open IKE SA flags: 200:
Aug 26 18:23:55.939548: |     -> MAIN_R2 EVENT_RETRANSMIT
Aug 26 18:23:55.939551: |     -> UNDEFINED EVENT_RETRANSMIT
Aug 26 18:23:55.939553: |     -> UNDEFINED EVENT_RETRANSMIT
Aug 26 18:23:55.939556: |   MAIN_I2: category: open IKE SA flags: 0:
Aug 26 18:23:55.939559: |     -> MAIN_I3 EVENT_RETRANSMIT
Aug 26 18:23:55.939561: |     -> UNDEFINED EVENT_RETRANSMIT
Aug 26 18:23:55.939563: |     -> UNDEFINED EVENT_RETRANSMIT
Aug 26 18:23:55.939566: |   MAIN_R2: category: open IKE SA flags: 0:
Aug 26 18:23:55.939569: |     -> MAIN_R3 EVENT_SA_REPLACE
Aug 26 18:23:55.939571: |     -> MAIN_R3 EVENT_SA_REPLACE
Aug 26 18:23:55.939574: |     -> UNDEFINED EVENT_SA_REPLACE
Aug 26 18:23:55.939576: |   MAIN_I3: category: open IKE SA flags: 0:
Aug 26 18:23:55.939579: |     -> MAIN_I4 EVENT_SA_REPLACE
Aug 26 18:23:55.939581: |     -> MAIN_I4 EVENT_SA_REPLACE
Aug 26 18:23:55.939584: |     -> UNDEFINED EVENT_SA_REPLACE
Aug 26 18:23:55.939587: |   MAIN_R3: category: established IKE SA flags: 200:
Aug 26 18:23:55.939589: |     -> UNDEFINED EVENT_NULL
Aug 26 18:23:55.939592: |   MAIN_I4: category: established IKE SA flags: 0:
Aug 26 18:23:55.939594: |     -> UNDEFINED EVENT_NULL
Aug 26 18:23:55.939597: |   AGGR_R0: category: half-open IKE SA flags: 0:
Aug 26 18:23:55.939600: |     -> AGGR_R1 EVENT_SO_DISCARD
Aug 26 18:23:55.939602: |   AGGR_I1: category: half-open IKE SA flags: 0:
Aug 26 18:23:55.939605: |     -> AGGR_I2 EVENT_SA_REPLACE
Aug 26 18:23:55.939607: |     -> AGGR_I2 EVENT_SA_REPLACE
Aug 26 18:23:55.939610: |   AGGR_R1: category: open IKE SA flags: 200:
Aug 26 18:23:55.939613: |     -> AGGR_R2 EVENT_SA_REPLACE
Aug 26 18:23:55.939615: |     -> AGGR_R2 EVENT_SA_REPLACE
Aug 26 18:23:55.939618: |   AGGR_I2: category: established IKE SA flags: 200:
Aug 26 18:23:55.939620: |     -> UNDEFINED EVENT_NULL
Aug 26 18:23:55.939623: |   AGGR_R2: category: established IKE SA flags: 0:
Aug 26 18:23:55.939625: |     -> UNDEFINED EVENT_NULL
Aug 26 18:23:55.939628: |   QUICK_R0: category: established CHILD SA flags: 0:
Aug 26 18:23:55.939631: |     -> QUICK_R1 EVENT_RETRANSMIT
Aug 26 18:23:55.939638: |   QUICK_I1: category: established CHILD SA flags: 0:
Aug 26 18:23:55.939641: |     -> QUICK_I2 EVENT_SA_REPLACE
Aug 26 18:23:55.939644: |   QUICK_R1: category: established CHILD SA flags: 0:
Aug 26 18:23:55.939647: |     -> QUICK_R2 EVENT_SA_REPLACE
Aug 26 18:23:55.939650: |   QUICK_I2: category: established CHILD SA flags: 200:
Aug 26 18:23:55.939652: |     -> UNDEFINED EVENT_NULL
Aug 26 18:23:55.939655: |   QUICK_R2: category: established CHILD SA flags: 0:
Aug 26 18:23:55.939657: |     -> UNDEFINED EVENT_NULL
Aug 26 18:23:55.939660: |   INFO: category: informational flags: 0:
Aug 26 18:23:55.939663: |     -> UNDEFINED EVENT_NULL
Aug 26 18:23:55.939666: |   INFO_PROTECTED: category: informational flags: 0:
Aug 26 18:23:55.939668: |     -> UNDEFINED EVENT_NULL
Aug 26 18:23:55.939671: |   XAUTH_R0: category: established IKE SA flags: 0:
Aug 26 18:23:55.939673: |     -> XAUTH_R1 EVENT_NULL
Aug 26 18:23:55.939676: |   XAUTH_R1: category: established IKE SA flags: 0:
Aug 26 18:23:55.939678: |     -> MAIN_R3 EVENT_SA_REPLACE
Aug 26 18:23:55.939681: |   MODE_CFG_R0: category: informational flags: 0:
Aug 26 18:23:55.939684: |     -> MODE_CFG_R1 EVENT_SA_REPLACE
Aug 26 18:23:55.939687: |   MODE_CFG_R1: category: established IKE SA flags: 0:
Aug 26 18:23:55.939689: |     -> MODE_CFG_R2 EVENT_SA_REPLACE
Aug 26 18:23:55.939692: |   MODE_CFG_R2: category: established IKE SA flags: 0:
Aug 26 18:23:55.939695: |     -> UNDEFINED EVENT_NULL
Aug 26 18:23:55.939697: |   MODE_CFG_I1: category: established IKE SA flags: 0:
Aug 26 18:23:55.939700: |     -> MAIN_I4 EVENT_SA_REPLACE
Aug 26 18:23:55.939703: |   XAUTH_I0: category: established IKE SA flags: 0:
Aug 26 18:23:55.939705: |     -> XAUTH_I1 EVENT_RETRANSMIT
Aug 26 18:23:55.939708: |   XAUTH_I1: category: established IKE SA flags: 0:
Aug 26 18:23:55.939711: |     -> MAIN_I4 EVENT_RETRANSMIT
Aug 26 18:23:55.939717: | checking IKEv2 state table
Aug 26 18:23:55.939724: |   PARENT_I0: category: ignore flags: 0:
Aug 26 18:23:55.939727: |     -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT)
Aug 26 18:23:55.939730: |   PARENT_I1: category: half-open IKE SA flags: 0:
Aug 26 18:23:55.939733: |     -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification)
Aug 26 18:23:55.939736: |     -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH)
Aug 26 18:23:55.939739: |   PARENT_I2: category: open IKE SA flags: 0:
Aug 26 18:23:55.939742: |     -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification)
Aug 26 18:23:55.939745: |     -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification)
Aug 26 18:23:55.939748: |     -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification)
Aug 26 18:23:55.939750: |     -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response)
Aug 26 18:23:55.939753: |     -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification)
Aug 26 18:23:55.939756: |   PARENT_I3: category: established IKE SA flags: 0:
Aug 26 18:23:55.939759: |     -> PARENT_I3 EVENT_RETAIN (I3: Informational Request)
Aug 26 18:23:55.939762: |     -> PARENT_I3 EVENT_RETAIN (I3: Informational Response)
Aug 26 18:23:55.939764: |     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request)
Aug 26 18:23:55.939767: |     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response)
Aug 26 18:23:55.939770: |   PARENT_R0: category: half-open IKE SA flags: 0:
Aug 26 18:23:55.939773: |     -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT)
Aug 26 18:23:55.939776: |   PARENT_R1: category: half-open IKE SA flags: 0:
Aug 26 18:23:55.939779: |     -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED))
Aug 26 18:23:55.939782: |     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request)
Aug 26 18:23:55.939785: |   PARENT_R2: category: established IKE SA flags: 0:
Aug 26 18:23:55.939788: |     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request)
Aug 26 18:23:55.939792: |     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response)
Aug 26 18:23:55.939795: |     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request)
Aug 26 18:23:55.939798: |     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response)
Aug 26 18:23:55.939801: |   V2_CREATE_I0: category: established IKE SA flags: 0:
Aug 26 18:23:55.939803: |     -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA)
Aug 26 18:23:55.939806: |   V2_CREATE_I: category: established IKE SA flags: 0:
Aug 26 18:23:55.939809: |     -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response)
Aug 26 18:23:55.939812: |   V2_REKEY_IKE_I0: category: established IKE SA flags: 0:
Aug 26 18:23:55.939815: |     -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey)
Aug 26 18:23:55.939818: |   V2_REKEY_IKE_I: category: established IKE SA flags: 0:
Aug 26 18:23:55.939821: |     -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response)
Aug 26 18:23:55.939824: |   V2_REKEY_CHILD_I0: category: established IKE SA flags: 0:
Aug 26 18:23:55.939827: |     -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA)
Aug 26 18:23:55.939830: |   V2_REKEY_CHILD_I: category: established IKE SA flags: 0: <none>
Aug 26 18:23:55.939833: |   V2_CREATE_R: category: established IKE SA flags: 0:
Aug 26 18:23:55.939836: |     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request)
Aug 26 18:23:55.939839: |   V2_REKEY_IKE_R: category: established IKE SA flags: 0:
Aug 26 18:23:55.939842: |     -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey)
Aug 26 18:23:55.939845: |   V2_REKEY_CHILD_R: category: established IKE SA flags: 0: <none>
Aug 26 18:23:55.939848: |   V2_IPSEC_I: category: established CHILD SA flags: 0: <none>
Aug 26 18:23:55.939851: |   V2_IPSEC_R: category: established CHILD SA flags: 0: <none>
Aug 26 18:23:55.939854: |   IKESA_DEL: category: established IKE SA flags: 0:
Aug 26 18:23:55.939857: |     -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL)
Aug 26 18:23:55.939860: |   CHILDSA_DEL: category: informational flags: 0: <none>
Aug 26 18:23:55.939877: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64
Aug 26 18:23:55.940329: | Hard-wiring algorithms
Aug 26 18:23:55.940338: | adding AES_CCM_16 to kernel algorithm db
Aug 26 18:23:55.940343: | adding AES_CCM_12 to kernel algorithm db
Aug 26 18:23:55.940346: | adding AES_CCM_8 to kernel algorithm db
Aug 26 18:23:55.940349: | adding 3DES_CBC to kernel algorithm db
Aug 26 18:23:55.940351: | adding CAMELLIA_CBC to kernel algorithm db
Aug 26 18:23:55.940354: | adding AES_GCM_16 to kernel algorithm db
Aug 26 18:23:55.940357: | adding AES_GCM_12 to kernel algorithm db
Aug 26 18:23:55.940359: | adding AES_GCM_8 to kernel algorithm db
Aug 26 18:23:55.940362: | adding AES_CTR to kernel algorithm db
Aug 26 18:23:55.940365: | adding AES_CBC to kernel algorithm db
Aug 26 18:23:55.940367: | adding SERPENT_CBC to kernel algorithm db
Aug 26 18:23:55.940370: | adding TWOFISH_CBC to kernel algorithm db
Aug 26 18:23:55.940373: | adding NULL_AUTH_AES_GMAC to kernel algorithm db
Aug 26 18:23:55.940375: | adding NULL to kernel algorithm db
Aug 26 18:23:55.940378: | adding CHACHA20_POLY1305 to kernel algorithm db
Aug 26 18:23:55.940381: | adding HMAC_MD5_96 to kernel algorithm db
Aug 26 18:23:55.940383: | adding HMAC_SHA1_96 to kernel algorithm db
Aug 26 18:23:55.940386: | adding HMAC_SHA2_512_256 to kernel algorithm db
Aug 26 18:23:55.940389: | adding HMAC_SHA2_384_192 to kernel algorithm db
Aug 26 18:23:55.940391: | adding HMAC_SHA2_256_128 to kernel algorithm db
Aug 26 18:23:55.940394: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db
Aug 26 18:23:55.940397: | adding AES_XCBC_96 to kernel algorithm db
Aug 26 18:23:55.940399: | adding AES_CMAC_96 to kernel algorithm db
Aug 26 18:23:55.940402: | adding NONE to kernel algorithm db
Aug 26 18:23:55.940435: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes
Aug 26 18:23:55.940442: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds
Aug 26 18:23:55.940445: | setup kernel fd callback
Aug 26 18:23:55.940449: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x55f088ac6e50
Aug 26 18:23:55.940453: | libevent_malloc: new ptr-libevent@0x55f088ace2b0 size 128
Aug 26 18:23:55.940456: | libevent_malloc: new ptr-libevent@0x55f088abcbe0 size 16
Aug 26 18:23:55.940463: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x55f088ac16f0
Aug 26 18:23:55.940466: | libevent_malloc: new ptr-libevent@0x55f088ace340 size 128
Aug 26 18:23:55.940469: | libevent_malloc: new ptr-libevent@0x55f088ac1640 size 16
Aug 26 18:23:55.940710: | global one-shot timer EVENT_CHECK_CRLS initialized
Aug 26 18:23:55.940719: selinux support is enabled.
Aug 26 18:23:55.950256: | unbound context created - setting debug level to 5
Aug 26 18:23:55.950326: | /etc/hosts lookups activated
Aug 26 18:23:55.950346: | /etc/resolv.conf usage activated
Aug 26 18:23:55.950424: | outgoing-port-avoid set 0-65535
Aug 26 18:23:55.950461: | outgoing-port-permit set 32768-60999
Aug 26 18:23:55.950465: | Loading dnssec root key from:/var/lib/unbound/root.key
Aug 26 18:23:55.950469: | No additional dnssec trust anchors defined via dnssec-trusted= option
Aug 26 18:23:55.950472: | Setting up events, loop start
Aug 26 18:23:55.950477: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x55f088ac1440
Aug 26 18:23:55.950482: | libevent_malloc: new ptr-libevent@0x55f088ad8860 size 128
Aug 26 18:23:55.950487: | libevent_malloc: new ptr-libevent@0x55f088ad88f0 size 16
Aug 26 18:23:55.950498: | libevent_realloc: new ptr-libevent@0x55f088a3e5b0 size 256
Aug 26 18:23:55.950501: | libevent_malloc: new ptr-libevent@0x55f088ad8910 size 8
Aug 26 18:23:55.950505: | libevent_realloc: new ptr-libevent@0x55f088acd620 size 144
Aug 26 18:23:55.950508: | libevent_malloc: new ptr-libevent@0x55f088ad8930 size 152
Aug 26 18:23:55.950513: | libevent_malloc: new ptr-libevent@0x55f088ad89d0 size 16
Aug 26 18:23:55.950517: | signal event handler PLUTO_SIGCHLD installed
Aug 26 18:23:55.950521: | libevent_malloc: new ptr-libevent@0x55f088ad89f0 size 8
Aug 26 18:23:55.950524: | libevent_malloc: new ptr-libevent@0x55f088ad8a10 size 152
Aug 26 18:23:55.950528: | signal event handler PLUTO_SIGTERM installed
Aug 26 18:23:55.950531: | libevent_malloc: new ptr-libevent@0x55f088ad8ab0 size 8
Aug 26 18:23:55.950534: | libevent_malloc: new ptr-libevent@0x55f088ad8ad0 size 152
Aug 26 18:23:55.950538: | signal event handler PLUTO_SIGHUP installed
Aug 26 18:23:55.950541: | libevent_malloc: new ptr-libevent@0x55f088ad8b70 size 8
Aug 26 18:23:55.950544: | libevent_realloc: release ptr-libevent@0x55f088acd620
Aug 26 18:23:55.950547: | libevent_realloc: new ptr-libevent@0x55f088ad8b90 size 256
Aug 26 18:23:55.950551: | libevent_malloc: new ptr-libevent@0x55f088acd620 size 152
Aug 26 18:23:55.950554: | signal event handler PLUTO_SIGSYS installed
Aug 26 18:23:55.950990: | created addconn helper (pid:24052) using fork+execve
Aug 26 18:23:55.951009: | forked child 24052
Aug 26 18:23:55.951058: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:23:55.951077: listening for IKE messages
Aug 26 18:23:55.956939: | Inspecting interface lo 
Aug 26 18:23:55.956956: | found lo with address 127.0.0.1
Aug 26 18:23:55.956961: | Inspecting interface eth0 
Aug 26 18:23:55.956966: | found eth0 with address 192.0.2.254
Aug 26 18:23:55.956968: | Inspecting interface eth1 
Aug 26 18:23:55.956972: | found eth1 with address 192.1.2.23
Aug 26 18:23:55.957136: Kernel supports NIC esp-hw-offload
Aug 26 18:23:55.957156: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.23:500
Aug 26 18:23:55.957245: | NAT-Traversal: Trying sockopt style NAT-T
Aug 26 18:23:55.957253: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
Aug 26 18:23:55.957258: adding interface eth1/eth1 192.1.2.23:4500
Aug 26 18:23:55.957302: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.2.254:500
Aug 26 18:23:55.957327: | NAT-Traversal: Trying sockopt style NAT-T
Aug 26 18:23:55.957331: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
Aug 26 18:23:55.957335: adding interface eth0/eth0 192.0.2.254:4500
Aug 26 18:23:55.957357: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500
Aug 26 18:23:55.957376: | NAT-Traversal: Trying sockopt style NAT-T
Aug 26 18:23:55.957380: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
Aug 26 18:23:55.957383: adding interface lo/lo 127.0.0.1:4500
Aug 26 18:23:55.957439: | no interfaces to sort
Aug 26 18:23:55.957444: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
Aug 26 18:23:55.957452: | add_fd_read_event_handler: new ethX-pe@0x55f088ac21c0
Aug 26 18:23:55.957456: | libevent_malloc: new ptr-libevent@0x55f088ad8f00 size 128
Aug 26 18:23:55.957460: | libevent_malloc: new ptr-libevent@0x55f088ad8f90 size 16
Aug 26 18:23:55.957470: | setup callback for interface lo 127.0.0.1:4500 fd 22
Aug 26 18:23:55.957473: | add_fd_read_event_handler: new ethX-pe@0x55f088ad8fb0
Aug 26 18:23:55.957475: | libevent_malloc: new ptr-libevent@0x55f088ad8ff0 size 128
Aug 26 18:23:55.957478: | libevent_malloc: new ptr-libevent@0x55f088ad9080 size 16
Aug 26 18:23:55.957483: | setup callback for interface lo 127.0.0.1:500 fd 21
Aug 26 18:23:55.957485: | add_fd_read_event_handler: new ethX-pe@0x55f088ad90a0
Aug 26 18:23:55.957488: | libevent_malloc: new ptr-libevent@0x55f088ad90e0 size 128
Aug 26 18:23:55.957491: | libevent_malloc: new ptr-libevent@0x55f088ad9170 size 16
Aug 26 18:23:55.957496: | setup callback for interface eth0 192.0.2.254:4500 fd 20
Aug 26 18:23:55.957499: | add_fd_read_event_handler: new ethX-pe@0x55f088ad9190
Aug 26 18:23:55.957502: | libevent_malloc: new ptr-libevent@0x55f088ad91d0 size 128
Aug 26 18:23:55.957505: | libevent_malloc: new ptr-libevent@0x55f088ad9260 size 16
Aug 26 18:23:55.957510: | setup callback for interface eth0 192.0.2.254:500 fd 19
Aug 26 18:23:55.957514: | add_fd_read_event_handler: new ethX-pe@0x55f088ad9280
Aug 26 18:23:55.957517: | libevent_malloc: new ptr-libevent@0x55f088ad92c0 size 128
Aug 26 18:23:55.957519: | libevent_malloc: new ptr-libevent@0x55f088ad9350 size 16
Aug 26 18:23:55.957524: | setup callback for interface eth1 192.1.2.23:4500 fd 18
Aug 26 18:23:55.957527: | add_fd_read_event_handler: new ethX-pe@0x55f088ad9370
Aug 26 18:23:55.957530: | libevent_malloc: new ptr-libevent@0x55f088ad93b0 size 128
Aug 26 18:23:55.957533: | libevent_malloc: new ptr-libevent@0x55f088ad9440 size 16
Aug 26 18:23:55.957538: | setup callback for interface eth1 192.1.2.23:500 fd 17
Aug 26 18:23:55.957543: | certs and keys locked by 'free_preshared_secrets'
Aug 26 18:23:55.957546: | certs and keys unlocked by 'free_preshared_secrets'
Aug 26 18:23:55.957569: loading secrets from "/etc/ipsec.secrets"
Aug 26 18:23:55.957581: | Processing PSK at line 1: passed
Aug 26 18:23:55.957585: | certs and keys locked by 'process_secret'
Aug 26 18:23:55.957588: | certs and keys unlocked by 'process_secret'
Aug 26 18:23:55.957599: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:23:55.957609: | spent 1.32 milliseconds in whack
Aug 26 18:23:56.105558: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:23:56.105586: listening for IKE messages
Aug 26 18:23:56.106023: | Inspecting interface lo 
Aug 26 18:23:56.106032: | found lo with address 127.0.0.1
Aug 26 18:23:56.106036: | Inspecting interface eth0 
Aug 26 18:23:56.106040: | found eth0 with address 192.0.2.254
Aug 26 18:23:56.106043: | Inspecting interface eth1 
Aug 26 18:23:56.106047: | found eth1 with address 192.1.2.23
Aug 26 18:23:56.106100: | no interfaces to sort
Aug 26 18:23:56.106111: | libevent_free: release ptr-libevent@0x55f088ad8f00
Aug 26 18:23:56.106114: | free_event_entry: release EVENT_NULL-pe@0x55f088ac21c0
Aug 26 18:23:56.106123: | add_fd_read_event_handler: new ethX-pe@0x55f088ac21c0
Aug 26 18:23:56.106127: | libevent_malloc: new ptr-libevent@0x55f088ad8f00 size 128
Aug 26 18:23:56.106135: | setup callback for interface lo 127.0.0.1:4500 fd 22
Aug 26 18:23:56.106139: | libevent_free: release ptr-libevent@0x55f088ad8ff0
Aug 26 18:23:56.106142: | free_event_entry: release EVENT_NULL-pe@0x55f088ad8fb0
Aug 26 18:23:56.106145: | add_fd_read_event_handler: new ethX-pe@0x55f088ad8fb0
Aug 26 18:23:56.106148: | libevent_malloc: new ptr-libevent@0x55f088ad8ff0 size 128
Aug 26 18:23:56.106153: | setup callback for interface lo 127.0.0.1:500 fd 21
Aug 26 18:23:56.106156: | libevent_free: release ptr-libevent@0x55f088ad90e0
Aug 26 18:23:56.106159: | free_event_entry: release EVENT_NULL-pe@0x55f088ad90a0
Aug 26 18:23:56.106162: | add_fd_read_event_handler: new ethX-pe@0x55f088ad90a0
Aug 26 18:23:56.106165: | libevent_malloc: new ptr-libevent@0x55f088ad90e0 size 128
Aug 26 18:23:56.106170: | setup callback for interface eth0 192.0.2.254:4500 fd 20
Aug 26 18:23:56.106174: | libevent_free: release ptr-libevent@0x55f088ad91d0
Aug 26 18:23:56.106176: | free_event_entry: release EVENT_NULL-pe@0x55f088ad9190
Aug 26 18:23:56.106179: | add_fd_read_event_handler: new ethX-pe@0x55f088ad9190
Aug 26 18:23:56.106182: | libevent_malloc: new ptr-libevent@0x55f088ad91d0 size 128
Aug 26 18:23:56.106187: | setup callback for interface eth0 192.0.2.254:500 fd 19
Aug 26 18:23:56.106191: | libevent_free: release ptr-libevent@0x55f088ad92c0
Aug 26 18:23:56.106193: | free_event_entry: release EVENT_NULL-pe@0x55f088ad9280
Aug 26 18:23:56.106196: | add_fd_read_event_handler: new ethX-pe@0x55f088ad9280
Aug 26 18:23:56.106199: | libevent_malloc: new ptr-libevent@0x55f088ad92c0 size 128
Aug 26 18:23:56.106204: | setup callback for interface eth1 192.1.2.23:4500 fd 18
Aug 26 18:23:56.106207: | libevent_free: release ptr-libevent@0x55f088ad93b0
Aug 26 18:23:56.106210: | free_event_entry: release EVENT_NULL-pe@0x55f088ad9370
Aug 26 18:23:56.106213: | add_fd_read_event_handler: new ethX-pe@0x55f088ad9370
Aug 26 18:23:56.106215: | libevent_malloc: new ptr-libevent@0x55f088ad93b0 size 128
Aug 26 18:23:56.106220: | setup callback for interface eth1 192.1.2.23:500 fd 17
Aug 26 18:23:56.106224: | certs and keys locked by 'free_preshared_secrets'
Aug 26 18:23:56.106226: forgetting secrets
Aug 26 18:23:56.106232: | certs and keys unlocked by 'free_preshared_secrets'
Aug 26 18:23:56.106245: loading secrets from "/etc/ipsec.secrets"
Aug 26 18:23:56.106252: | Processing PSK at line 1: passed
Aug 26 18:23:56.106255: | certs and keys locked by 'process_secret'
Aug 26 18:23:56.106257: | certs and keys unlocked by 'process_secret'
Aug 26 18:23:56.106265: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:23:56.106272: | spent 0.722 milliseconds in whack
Aug 26 18:23:56.112069: | processing signal PLUTO_SIGCHLD
Aug 26 18:23:56.112096: | waitpid returned pid 24052 (exited with status 0)
Aug 26 18:23:56.112101: | reaped addconn helper child (status 0)
Aug 26 18:23:56.112107: | waitpid returned ECHILD (no child processes left)
Aug 26 18:23:56.112114: | spent 0.0255 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:23:56.119831: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:23:56.124317: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:23:56.124341: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias
Aug 26 18:23:56.124345: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:23:56.124347: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias
Aug 26 18:23:56.124352: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:23:56.124360: | Added new connection test with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
Aug 26 18:23:56.124363: | from whack: got --esp=aes256-sha1,aes-sha1
Aug 26 18:23:56.124389: | ESP/AH string values: AES_CBC_256-HMAC_SHA1_96, AES_CBC-HMAC_SHA1_96
Aug 26 18:23:56.124396: | counting wild cards for 192.1.2.23 is 0
Aug 26 18:23:56.124408: | counting wild cards for 192.1.2.45 is 0
Aug 26 18:23:56.124421: | connect_to_host_pair: 192.1.2.23:500 192.1.2.45:500 -> hp@(nil): none
Aug 26 18:23:56.124427: | new hp@0x55f088aa5920
Aug 26 18:23:56.124431: added connection description "test"
Aug 26 18:23:56.124440: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
Aug 26 18:23:56.124453: | 192.1.2.23/32===192.1.2.23<192.1.2.23>...192.1.2.45<192.1.2.45>===10.1.1.0/29
Aug 26 18:23:56.124462: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:23:56.124471: | spent 0.2 milliseconds in whack
Aug 26 18:23:57.204536: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:57.204575: | *received 92 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:57.204581: |   63 23 89 df  d6 98 a7 ca  00 00 00 00  00 00 00 00
Aug 26 18:23:57.204586: |   01 10 02 00  00 00 00 00  00 00 00 5c  00 00 00 40
Aug 26 18:23:57.204589: |   00 00 00 01  00 00 00 01  00 00 00 34  01 01 00 02
Aug 26 18:23:57.204592: |   03 00 00 1c  01 01 00 00  80 01 00 07  80 0e 00 80
Aug 26 18:23:57.204595: |   80 02 00 01  80 03 00 01  80 04 00 04  00 00 00 10
Aug 26 18:23:57.204597: |   02 01 00 00  80 03 00 01  80 04 00 04
Aug 26 18:23:57.204605: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:57.204611: | **parse ISAKMP Message:
Aug 26 18:23:57.204614: |    initiator cookie:
Aug 26 18:23:57.204617: |   63 23 89 df  d6 98 a7 ca
Aug 26 18:23:57.204620: |    responder cookie:
Aug 26 18:23:57.204622: |   00 00 00 00  00 00 00 00
Aug 26 18:23:57.204626: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.204629: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.204632: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.204635: |    flags: none (0x0)
Aug 26 18:23:57.204637: |    Message ID: 0 (0x0)
Aug 26 18:23:57.204640: |    length: 92 (0x5c)
Aug 26 18:23:57.204644: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:57.204649: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:57.204653: | #null state always idle
Aug 26 18:23:57.204657: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:57.204661: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:57.204665: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.204668: |    length: 64 (0x40)
Aug 26 18:23:57.204671: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.204674: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:57.204678: | in statetime_start() with no state
Aug 26 18:23:57.204684: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:57.204693: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:57.204699: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.204704: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:57.204707: | find_next_host_connection returns test
Aug 26 18:23:57.204710: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.204713: | find_next_host_connection returns empty
Aug 26 18:23:57.204743: | creating state object #1 at 0x55f088adb960
Aug 26 18:23:57.204748: | State DB: adding IKEv1 state #1 in UNDEFINED
Aug 26 18:23:57.204757: | pstats #1 ikev1.isakmp started
Aug 26 18:23:57.204762: | #1 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:57.204773: | start processing: state #1 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:57.204779: | parent state #1: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:57.204783: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:57.204787: "test" #1: responding to Main Mode
Aug 26 18:23:57.204823: | **emit ISAKMP Message:
Aug 26 18:23:57.204827: |    initiator cookie:
Aug 26 18:23:57.204830: |   63 23 89 df  d6 98 a7 ca
Aug 26 18:23:57.204833: |    responder cookie:
Aug 26 18:23:57.204835: |   cb 02 21 9c  6c 89 da 94
Aug 26 18:23:57.204838: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.204841: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.204844: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.204846: |    flags: none (0x0)
Aug 26 18:23:57.204849: |    Message ID: 0 (0x0)
Aug 26 18:23:57.204852: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.204855: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:57.204859: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:57.204861: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:57.204864: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.204867: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:57.204871: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:57.204874: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:57.204878: | ****parse IPsec DOI SIT:
Aug 26 18:23:57.204881: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:57.204884: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:57.204887: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.204890: |    length: 52 (0x34)
Aug 26 18:23:57.204892: |    proposal number: 1 (0x1)
Aug 26 18:23:57.204895: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:57.204898: |    SPI size: 0 (0x0)
Aug 26 18:23:57.204901: |    number of transforms: 2 (0x2)
Aug 26 18:23:57.204904: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.204906: |    next payload type: ISAKMP_NEXT_T (0x3)
Aug 26 18:23:57.204909: |    length: 28 (0x1c)
Aug 26 18:23:57.204912: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:57.204915: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.204918: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.204921: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:57.204924: |    length/value: 7 (0x7)
Aug 26 18:23:57.204927: |    [7 is OAKLEY_AES_CBC]
Aug 26 18:23:57.204930: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.204933: |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
Aug 26 18:23:57.204936: |    length/value: 128 (0x80)
Aug 26 18:23:57.204939: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.204942: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:23:57.204944: |    length/value: 1 (0x1)
Aug 26 18:23:57.204947: |    [1 is OAKLEY_MD5]
Aug 26 18:23:57.204950: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.204953: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:23:57.204955: |    length/value: 1 (0x1)
Aug 26 18:23:57.204958: |    [1 is OAKLEY_PRESHARED_KEY]
Aug 26 18:23:57.204963: | started looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK
Aug 26 18:23:57.204967: | actually looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK
Aug 26 18:23:57.204973: | line 1: key type PKK_PSK(192.1.2.23) to type PKK_PSK
Aug 26 18:23:57.204977: | 1: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002
Aug 26 18:23:57.204980: | 2: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002
Aug 26 18:23:57.204983: | line 1: match=002
Aug 26 18:23:57.204986: | match 002 beats previous best_match 000 match=0x55f088ace490 (line=1)
Aug 26 18:23:57.204989: | concluding with best_match=002 best=0x55f088ace490 (lineno=1)
Aug 26 18:23:57.204992: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.204995: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:23:57.204998: |    length/value: 4 (0x4)
Aug 26 18:23:57.205001: |    [4 is OAKLEY_GROUP_GP185(UNUSED)]
Aug 26 18:23:57.205008: "test" #1: OAKLEY_GROUP 4 not supported.  Attribute OAKLEY_GROUP_DESCRIPTION
Aug 26 18:23:57.205012: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.205015: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.205017: |    length: 16 (0x10)
Aug 26 18:23:57.205020: |    ISAKMP transform number: 2 (0x2)
Aug 26 18:23:57.205023: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.205025: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.205028: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:23:57.205031: |    length/value: 1 (0x1)
Aug 26 18:23:57.205034: |    [1 is OAKLEY_PRESHARED_KEY]
Aug 26 18:23:57.205038: | started looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK
Aug 26 18:23:57.205041: | actually looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK
Aug 26 18:23:57.205046: | line 1: key type PKK_PSK(192.1.2.23) to type PKK_PSK
Aug 26 18:23:57.205050: | 1: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002
Aug 26 18:23:57.205053: | 2: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002
Aug 26 18:23:57.205055: | line 1: match=002
Aug 26 18:23:57.205059: | match 002 beats previous best_match 000 match=0x55f088ace490 (line=1)
Aug 26 18:23:57.205062: | concluding with best_match=002 best=0x55f088ace490 (lineno=1)
Aug 26 18:23:57.205064: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.205067: |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
Aug 26 18:23:57.205070: |    length/value: 4 (0x4)
Aug 26 18:23:57.205072: |    [4 is OAKLEY_GROUP_GP185(UNUSED)]
Aug 26 18:23:57.205076: "test" #1: OAKLEY_GROUP 4 not supported.  Attribute OAKLEY_GROUP_DESCRIPTION
Aug 26 18:23:57.205078: "test" #1: no acceptable Oakley Transform
Aug 26 18:23:57.205083: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.205088: | [RE]START processing: state #1 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:57.205090: | #1 is idle
Aug 26 18:23:57.205417: "test" #1: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:57.205427: | **emit ISAKMP Message:
Aug 26 18:23:57.205430: |    initiator cookie:
Aug 26 18:23:57.205433: |   63 23 89 df  d6 98 a7 ca
Aug 26 18:23:57.205435: |    responder cookie:
Aug 26 18:23:57.205438: |   cb 02 21 9c  6c 89 da 94
Aug 26 18:23:57.205441: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.205444: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.205446: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:57.205449: |    flags: none (0x0)
Aug 26 18:23:57.205451: |    Message ID: 0 (0x0)
Aug 26 18:23:57.205455: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.205458: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:57.205461: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.205463: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.205466: |    protocol ID: 1 (0x1)
Aug 26 18:23:57.205469: |    SPI size: 0 (0x0)
Aug 26 18:23:57.205471: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:57.205475: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:57.205478: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:57.205481: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:57.205483: | emitting length of ISAKMP Message: 40
Aug 26 18:23:57.205491: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1)
Aug 26 18:23:57.205494: |   63 23 89 df  d6 98 a7 ca  cb 02 21 9c  6c 89 da 94
Aug 26 18:23:57.205497: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:57.205500: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:57.205531: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.205539: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:57.205548: | stop processing: state #1 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:57.205553: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:57.205560: | spent 0.758 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:57.393371: | spent 0.00345 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:57.393405: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:57.393409: |   2f 15 08 dd  a1 29 7a 4a  00 00 00 00  00 00 00 00
Aug 26 18:23:57.393412: |   01 10 02 00  00 00 00 00  00 00 00 48  00 00 00 2c
Aug 26 18:23:57.393414: |   00 00 00 01  00 00 00 01  00 00 00 20  01 01 00 01
Aug 26 18:23:57.393417: |   00 00 00 18  01 01 00 00  80 01 00 1d  80 02 00 0b
Aug 26 18:23:57.393419: |   80 03 00 0c  80 04 00 16
Aug 26 18:23:57.393425: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:57.393428: | **parse ISAKMP Message:
Aug 26 18:23:57.393431: |    initiator cookie:
Aug 26 18:23:57.393434: |   2f 15 08 dd  a1 29 7a 4a
Aug 26 18:23:57.393436: |    responder cookie:
Aug 26 18:23:57.393439: |   00 00 00 00  00 00 00 00
Aug 26 18:23:57.393442: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.393445: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.393448: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.393450: |    flags: none (0x0)
Aug 26 18:23:57.393453: |    Message ID: 0 (0x0)
Aug 26 18:23:57.393456: |    length: 72 (0x48)
Aug 26 18:23:57.393459: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:57.393463: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:57.393466: | #null state always idle
Aug 26 18:23:57.393469: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:57.393473: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:57.393475: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.393478: |    length: 44 (0x2c)
Aug 26 18:23:57.393480: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.393483: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:57.393486: | in statetime_start() with no state
Aug 26 18:23:57.393492: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:57.393498: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:57.393501: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.393505: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:57.393507: | find_next_host_connection returns test
Aug 26 18:23:57.393510: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.393513: | find_next_host_connection returns empty
Aug 26 18:23:57.393539: | creating state object #2 at 0x55f088adc420
Aug 26 18:23:57.393543: | State DB: adding IKEv1 state #2 in UNDEFINED
Aug 26 18:23:57.393549: | pstats #2 ikev1.isakmp started
Aug 26 18:23:57.393554: | #2 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:57.393560: | start processing: state #2 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:57.393563: | parent state #2: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:57.393567: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:57.393570: "test" #2: responding to Main Mode
Aug 26 18:23:57.393575: | **emit ISAKMP Message:
Aug 26 18:23:57.393578: |    initiator cookie:
Aug 26 18:23:57.393580: |   2f 15 08 dd  a1 29 7a 4a
Aug 26 18:23:57.393583: |    responder cookie:
Aug 26 18:23:57.393585: |   19 b6 fe 0b  33 ce 79 c7
Aug 26 18:23:57.393588: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.393591: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.393593: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.393601: |    flags: none (0x0)
Aug 26 18:23:57.393604: |    Message ID: 0 (0x0)
Aug 26 18:23:57.393607: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.393610: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:57.393613: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:57.393616: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:57.393618: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.393621: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:57.393624: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:57.393628: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:57.393631: | ****parse IPsec DOI SIT:
Aug 26 18:23:57.393634: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:57.393637: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:57.393640: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.393642: |    length: 32 (0x20)
Aug 26 18:23:57.393645: |    proposal number: 1 (0x1)
Aug 26 18:23:57.393648: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:57.393650: |    SPI size: 0 (0x0)
Aug 26 18:23:57.393653: |    number of transforms: 1 (0x1)
Aug 26 18:23:57.393656: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.393658: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.393661: |    length: 24 (0x18)
Aug 26 18:23:57.393663: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:57.393666: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.393669: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.393672: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:57.393675: |    length/value: 29 (0x1d)
Aug 26 18:23:57.393679: "test" #2: 29?? is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:57.393682: "test" #2: no acceptable Oakley Transform
Aug 26 18:23:57.393685: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.393690: | [RE]START processing: state #2 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:57.393693: | #2 is idle
Aug 26 18:23:57.395000: "test" #2: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:57.395015: | **emit ISAKMP Message:
Aug 26 18:23:57.395019: |    initiator cookie:
Aug 26 18:23:57.395022: |   2f 15 08 dd  a1 29 7a 4a
Aug 26 18:23:57.395025: |    responder cookie:
Aug 26 18:23:57.395027: |   19 b6 fe 0b  33 ce 79 c7
Aug 26 18:23:57.395030: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.395033: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.395035: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:57.395038: |    flags: none (0x0)
Aug 26 18:23:57.395041: |    Message ID: 0 (0x0)
Aug 26 18:23:57.395044: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.395048: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:57.395051: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.395054: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.395057: |    protocol ID: 1 (0x1)
Aug 26 18:23:57.395059: |    SPI size: 0 (0x0)
Aug 26 18:23:57.395062: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:57.395065: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:57.395069: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:57.395072: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:57.395075: | emitting length of ISAKMP Message: 40
Aug 26 18:23:57.395083: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #2)
Aug 26 18:23:57.395089: |   2f 15 08 dd  a1 29 7a 4a  19 b6 fe 0b  33 ce 79 c7
Aug 26 18:23:57.395092: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:57.395094: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:57.395138: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.395146: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:57.395153: | stop processing: state #2 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:57.395157: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:57.395165: | spent 0.954 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:57.442268: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:57.442311: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:57.442319: |   36 cb 48 34  2a 0f 8d 22  00 00 00 00  00 00 00 00
Aug 26 18:23:57.442321: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:57.442324: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:57.442326: |   00 00 00 14  01 01 00 00  80 02 00 0b  80 03 00 0c
Aug 26 18:23:57.442329: |   80 04 00 16
Aug 26 18:23:57.442334: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:57.442340: | **parse ISAKMP Message:
Aug 26 18:23:57.442343: |    initiator cookie:
Aug 26 18:23:57.442346: |   36 cb 48 34  2a 0f 8d 22
Aug 26 18:23:57.442348: |    responder cookie:
Aug 26 18:23:57.442351: |   00 00 00 00  00 00 00 00
Aug 26 18:23:57.442354: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.442357: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.442360: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.442363: |    flags: none (0x0)
Aug 26 18:23:57.442365: |    Message ID: 0 (0x0)
Aug 26 18:23:57.442368: |    length: 68 (0x44)
Aug 26 18:23:57.442371: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:57.442375: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:57.442378: | #null state always idle
Aug 26 18:23:57.442382: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:57.442385: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:57.442388: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.442390: |    length: 40 (0x28)
Aug 26 18:23:57.442393: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.442396: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:57.442399: | in statetime_start() with no state
Aug 26 18:23:57.442405: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:57.442410: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:57.442414: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.442418: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:57.442421: | find_next_host_connection returns test
Aug 26 18:23:57.442424: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.442426: | find_next_host_connection returns empty
Aug 26 18:23:57.442457: | creating state object #3 at 0x55f088adcee0
Aug 26 18:23:57.442462: | State DB: adding IKEv1 state #3 in UNDEFINED
Aug 26 18:23:57.442469: | pstats #3 ikev1.isakmp started
Aug 26 18:23:57.442474: | #3 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:57.442480: | start processing: state #3 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:57.442484: | parent state #3: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:57.442488: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:57.442491: "test" #3: responding to Main Mode
Aug 26 18:23:57.442497: | **emit ISAKMP Message:
Aug 26 18:23:57.442505: |    initiator cookie:
Aug 26 18:23:57.442508: |   36 cb 48 34  2a 0f 8d 22
Aug 26 18:23:57.442510: |    responder cookie:
Aug 26 18:23:57.442512: |   ef 5b d0 b4  3a 87 67 de
Aug 26 18:23:57.442515: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.442517: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.442520: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.442523: |    flags: none (0x0)
Aug 26 18:23:57.442526: |    Message ID: 0 (0x0)
Aug 26 18:23:57.442529: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.442532: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:57.442535: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:57.442538: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:57.442541: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.442544: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:57.442548: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:57.442551: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:57.442555: | ****parse IPsec DOI SIT:
Aug 26 18:23:57.442558: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:57.442561: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:57.442563: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.442566: |    length: 28 (0x1c)
Aug 26 18:23:57.442569: |    proposal number: 1 (0x1)
Aug 26 18:23:57.442571: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:57.442574: |    SPI size: 0 (0x0)
Aug 26 18:23:57.442576: |    number of transforms: 1 (0x1)
Aug 26 18:23:57.442579: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.442582: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.442585: |    length: 20 (0x14)
Aug 26 18:23:57.442587: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:57.442590: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.442593: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.442596: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:23:57.442599: |    length/value: 11 (0xb)
Aug 26 18:23:57.442603: "test" #3: 11?? is not supported.  Attribute OAKLEY_HASH_ALGORITHM
Aug 26 18:23:57.442607: "test" #3: no acceptable Oakley Transform
Aug 26 18:23:57.442611: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.442616: | [RE]START processing: state #3 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:57.442619: | #3 is idle
Aug 26 18:23:57.442706: "test" #3: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:57.442712: | **emit ISAKMP Message:
Aug 26 18:23:57.442715: |    initiator cookie:
Aug 26 18:23:57.442718: |   36 cb 48 34  2a 0f 8d 22
Aug 26 18:23:57.442720: |    responder cookie:
Aug 26 18:23:57.442723: |   ef 5b d0 b4  3a 87 67 de
Aug 26 18:23:57.442726: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.442729: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.442731: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:57.442734: |    flags: none (0x0)
Aug 26 18:23:57.442736: |    Message ID: 0 (0x0)
Aug 26 18:23:57.442739: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.442743: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:57.442745: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.442748: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.442750: |    protocol ID: 1 (0x1)
Aug 26 18:23:57.442753: |    SPI size: 0 (0x0)
Aug 26 18:23:57.442756: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:57.442759: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:57.442767: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:57.442771: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:57.442774: | emitting length of ISAKMP Message: 40
Aug 26 18:23:57.442780: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3)
Aug 26 18:23:57.442784: |   36 cb 48 34  2a 0f 8d 22  ef 5b d0 b4  3a 87 67 de
Aug 26 18:23:57.442787: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:57.442789: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:57.442819: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.442825: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:57.442831: | stop processing: state #3 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:57.442835: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:57.442842: | spent 0.53 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:57.501714: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:57.501743: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:57.501747: |   e6 8f a8 c7  e0 8d e6 22  00 00 00 00  00 00 00 00
Aug 26 18:23:57.501749: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:57.501752: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:57.501755: |   00 00 00 14  01 01 00 00  80 01 00 1d  80 03 00 0c
Aug 26 18:23:57.501757: |   80 04 00 16
Aug 26 18:23:57.501762: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:57.501767: | **parse ISAKMP Message:
Aug 26 18:23:57.501770: |    initiator cookie:
Aug 26 18:23:57.501772: |   e6 8f a8 c7  e0 8d e6 22
Aug 26 18:23:57.501775: |    responder cookie:
Aug 26 18:23:57.501777: |   00 00 00 00  00 00 00 00
Aug 26 18:23:57.501780: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.501783: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.501786: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.501789: |    flags: none (0x0)
Aug 26 18:23:57.501792: |    Message ID: 0 (0x0)
Aug 26 18:23:57.501794: |    length: 68 (0x44)
Aug 26 18:23:57.501798: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:57.501802: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:57.501805: | #null state always idle
Aug 26 18:23:57.501808: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:57.501812: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:57.501814: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.501817: |    length: 40 (0x28)
Aug 26 18:23:57.501820: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.501823: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:57.501825: | in statetime_start() with no state
Aug 26 18:23:57.501831: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:57.501837: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:57.501840: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.501844: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:57.501847: | find_next_host_connection returns test
Aug 26 18:23:57.501850: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.501852: | find_next_host_connection returns empty
Aug 26 18:23:57.501879: | creating state object #4 at 0x55f088add9a0
Aug 26 18:23:57.501883: | State DB: adding IKEv1 state #4 in UNDEFINED
Aug 26 18:23:57.501887: | pstats #4 ikev1.isakmp started
Aug 26 18:23:57.501892: | #4 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:57.501902: | start processing: state #4 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:57.501906: | parent state #4: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:57.501909: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:57.501913: "test" #4: responding to Main Mode
Aug 26 18:23:57.501918: | **emit ISAKMP Message:
Aug 26 18:23:57.501921: |    initiator cookie:
Aug 26 18:23:57.501923: |   e6 8f a8 c7  e0 8d e6 22
Aug 26 18:23:57.501926: |    responder cookie:
Aug 26 18:23:57.501928: |   91 01 b9 b6  af 4d d5 69
Aug 26 18:23:57.501931: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.501934: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.501937: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.501939: |    flags: none (0x0)
Aug 26 18:23:57.501942: |    Message ID: 0 (0x0)
Aug 26 18:23:57.501945: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.501948: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:57.501951: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:57.501954: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:57.501956: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.501960: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:57.501963: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:57.501966: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:57.501969: | ****parse IPsec DOI SIT:
Aug 26 18:23:57.501972: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:57.501975: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:57.501978: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.501981: |    length: 28 (0x1c)
Aug 26 18:23:57.501983: |    proposal number: 1 (0x1)
Aug 26 18:23:57.501986: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:57.501989: |    SPI size: 0 (0x0)
Aug 26 18:23:57.501991: |    number of transforms: 1 (0x1)
Aug 26 18:23:57.501994: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.501997: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.502000: |    length: 20 (0x14)
Aug 26 18:23:57.502002: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:57.502005: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.502008: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.502011: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:57.502013: |    length/value: 29 (0x1d)
Aug 26 18:23:57.502018: "test" #4: 29?? is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:57.502021: "test" #4: no acceptable Oakley Transform
Aug 26 18:23:57.502024: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.502029: | [RE]START processing: state #4 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:57.502032: | #4 is idle
Aug 26 18:23:57.502116: "test" #4: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:57.502121: | **emit ISAKMP Message:
Aug 26 18:23:57.502124: |    initiator cookie:
Aug 26 18:23:57.502126: |   e6 8f a8 c7  e0 8d e6 22
Aug 26 18:23:57.502129: |    responder cookie:
Aug 26 18:23:57.502131: |   91 01 b9 b6  af 4d d5 69
Aug 26 18:23:57.502134: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.502137: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.502140: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:57.502142: |    flags: none (0x0)
Aug 26 18:23:57.502145: |    Message ID: 0 (0x0)
Aug 26 18:23:57.502148: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.502151: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:57.502154: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.502160: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.502163: |    protocol ID: 1 (0x1)
Aug 26 18:23:57.502165: |    SPI size: 0 (0x0)
Aug 26 18:23:57.502168: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:57.502171: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:57.502175: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:57.502178: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:57.502180: | emitting length of ISAKMP Message: 40
Aug 26 18:23:57.502187: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #4)
Aug 26 18:23:57.502190: |   e6 8f a8 c7  e0 8d e6 22  91 01 b9 b6  af 4d d5 69
Aug 26 18:23:57.502192: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:57.502195: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:57.502219: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.502225: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:57.502230: | stop processing: state #4 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:57.502234: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:57.502240: | spent 0.497 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:57.549846: | spent 0.00343 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:57.549881: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:57.549886: |   ca ac 01 06  8c a1 c7 f7  00 00 00 00  00 00 00 00
Aug 26 18:23:57.549890: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:57.549892: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:57.549895: |   00 00 00 14  01 01 00 00  80 01 00 1d  80 02 00 0b
Aug 26 18:23:57.549897: |   80 04 00 16
Aug 26 18:23:57.549903: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:57.549908: | **parse ISAKMP Message:
Aug 26 18:23:57.549912: |    initiator cookie:
Aug 26 18:23:57.549914: |   ca ac 01 06  8c a1 c7 f7
Aug 26 18:23:57.549917: |    responder cookie:
Aug 26 18:23:57.549920: |   00 00 00 00  00 00 00 00
Aug 26 18:23:57.549923: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.549926: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.549929: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.549932: |    flags: none (0x0)
Aug 26 18:23:57.549935: |    Message ID: 0 (0x0)
Aug 26 18:23:57.549938: |    length: 68 (0x44)
Aug 26 18:23:57.549942: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:57.549946: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:57.549949: | #null state always idle
Aug 26 18:23:57.549953: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:57.549956: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:57.549959: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.549962: |    length: 40 (0x28)
Aug 26 18:23:57.549965: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.549968: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:57.549971: | in statetime_start() with no state
Aug 26 18:23:57.549977: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:57.549983: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:57.549987: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.549991: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:57.549995: | find_next_host_connection returns test
Aug 26 18:23:57.549998: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.550004: | find_next_host_connection returns empty
Aug 26 18:23:57.550029: | creating state object #5 at 0x55f088ade460
Aug 26 18:23:57.550034: | State DB: adding IKEv1 state #5 in UNDEFINED
Aug 26 18:23:57.550042: | pstats #5 ikev1.isakmp started
Aug 26 18:23:57.550048: | #5 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:57.550055: | start processing: state #5 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:57.550059: | parent state #5: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:57.550063: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:57.550066: "test" #5: responding to Main Mode
Aug 26 18:23:57.550072: | **emit ISAKMP Message:
Aug 26 18:23:57.550075: |    initiator cookie:
Aug 26 18:23:57.550078: |   ca ac 01 06  8c a1 c7 f7
Aug 26 18:23:57.550080: |    responder cookie:
Aug 26 18:23:57.550083: |   83 2e 78 05  94 f8 57 09
Aug 26 18:23:57.550086: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.550089: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.550092: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.550094: |    flags: none (0x0)
Aug 26 18:23:57.550097: |    Message ID: 0 (0x0)
Aug 26 18:23:57.550101: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.550104: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:57.550108: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:57.550111: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:57.550114: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.550117: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:57.550121: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:57.550124: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:57.550127: | ****parse IPsec DOI SIT:
Aug 26 18:23:57.550129: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:57.550132: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:57.550135: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.550138: |    length: 28 (0x1c)
Aug 26 18:23:57.550140: |    proposal number: 1 (0x1)
Aug 26 18:23:57.550143: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:57.550146: |    SPI size: 0 (0x0)
Aug 26 18:23:57.550148: |    number of transforms: 1 (0x1)
Aug 26 18:23:57.550151: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.550154: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.550156: |    length: 20 (0x14)
Aug 26 18:23:57.550159: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:57.550162: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.550165: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.550168: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:57.550171: |    length/value: 29 (0x1d)
Aug 26 18:23:57.550176: "test" #5: 29?? is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:57.550180: "test" #5: no acceptable Oakley Transform
Aug 26 18:23:57.550183: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.550189: | [RE]START processing: state #5 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:57.550193: | #5 is idle
Aug 26 18:23:57.550282: "test" #5: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:57.550292: | **emit ISAKMP Message:
Aug 26 18:23:57.550298: |    initiator cookie:
Aug 26 18:23:57.550301: |   ca ac 01 06  8c a1 c7 f7
Aug 26 18:23:57.550304: |    responder cookie:
Aug 26 18:23:57.550306: |   83 2e 78 05  94 f8 57 09
Aug 26 18:23:57.550309: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.550312: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.550318: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:57.550321: |    flags: none (0x0)
Aug 26 18:23:57.550323: |    Message ID: 0 (0x0)
Aug 26 18:23:57.550326: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.550330: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:57.550333: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.550336: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.550338: |    protocol ID: 1 (0x1)
Aug 26 18:23:57.550341: |    SPI size: 0 (0x0)
Aug 26 18:23:57.550343: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:57.550347: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:57.550350: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:57.550353: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:57.550355: | emitting length of ISAKMP Message: 40
Aug 26 18:23:57.550363: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #5)
Aug 26 18:23:57.550366: |   ca ac 01 06  8c a1 c7 f7  83 2e 78 05  94 f8 57 09
Aug 26 18:23:57.550368: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:57.550370: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:57.550400: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.550406: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:57.550411: | stop processing: state #5 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:57.550415: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:57.550420: | spent 0.534 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:57.592870: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:57.592903: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:57.592908: |   f7 07 b8 9c  cc 19 b2 35  00 00 00 00  00 00 00 00
Aug 26 18:23:57.592911: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:57.592913: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:57.592916: |   00 00 00 14  01 01 00 00  80 01 00 1d  80 02 00 0b
Aug 26 18:23:57.592918: |   80 03 00 0c
Aug 26 18:23:57.592924: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:57.592929: | **parse ISAKMP Message:
Aug 26 18:23:57.592932: |    initiator cookie:
Aug 26 18:23:57.592935: |   f7 07 b8 9c  cc 19 b2 35
Aug 26 18:23:57.592937: |    responder cookie:
Aug 26 18:23:57.592940: |   00 00 00 00  00 00 00 00
Aug 26 18:23:57.592943: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.592946: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.592948: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.592951: |    flags: none (0x0)
Aug 26 18:23:57.592954: |    Message ID: 0 (0x0)
Aug 26 18:23:57.592957: |    length: 68 (0x44)
Aug 26 18:23:57.592960: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:57.592964: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:57.592967: | #null state always idle
Aug 26 18:23:57.592971: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:57.592974: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:57.592977: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.592980: |    length: 40 (0x28)
Aug 26 18:23:57.592982: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.592985: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:57.592988: | in statetime_start() with no state
Aug 26 18:23:57.592994: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:57.592999: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:57.593006: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.593011: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:57.593013: | find_next_host_connection returns test
Aug 26 18:23:57.593016: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.593019: | find_next_host_connection returns empty
Aug 26 18:23:57.593044: | creating state object #6 at 0x55f088adef20
Aug 26 18:23:57.593049: | State DB: adding IKEv1 state #6 in UNDEFINED
Aug 26 18:23:57.593053: | pstats #6 ikev1.isakmp started
Aug 26 18:23:57.593058: | #6 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:57.593065: | start processing: state #6 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:57.593069: | parent state #6: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:57.593073: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:57.593076: "test" #6: responding to Main Mode
Aug 26 18:23:57.593082: | **emit ISAKMP Message:
Aug 26 18:23:57.593085: |    initiator cookie:
Aug 26 18:23:57.593087: |   f7 07 b8 9c  cc 19 b2 35
Aug 26 18:23:57.593090: |    responder cookie:
Aug 26 18:23:57.593093: |   9a ca 6b 7d  c0 ac c0 94
Aug 26 18:23:57.593095: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.593098: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.593100: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.593103: |    flags: none (0x0)
Aug 26 18:23:57.593106: |    Message ID: 0 (0x0)
Aug 26 18:23:57.593109: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.593112: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:57.593115: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:57.593118: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:57.593121: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.593124: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:57.593128: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:57.593131: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:57.593134: | ****parse IPsec DOI SIT:
Aug 26 18:23:57.593137: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:57.593140: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:57.593143: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.593146: |    length: 28 (0x1c)
Aug 26 18:23:57.593149: |    proposal number: 1 (0x1)
Aug 26 18:23:57.593151: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:57.593154: |    SPI size: 0 (0x0)
Aug 26 18:23:57.593157: |    number of transforms: 1 (0x1)
Aug 26 18:23:57.593160: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.593163: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.593165: |    length: 20 (0x14)
Aug 26 18:23:57.593168: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:57.593171: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.593174: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.593177: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:57.593180: |    length/value: 29 (0x1d)
Aug 26 18:23:57.593184: "test" #6: 29?? is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:57.593187: "test" #6: no acceptable Oakley Transform
Aug 26 18:23:57.593191: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.593196: | [RE]START processing: state #6 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:57.593199: | #6 is idle
Aug 26 18:23:57.593279: "test" #6: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:57.593287: | **emit ISAKMP Message:
Aug 26 18:23:57.593297: |    initiator cookie:
Aug 26 18:23:57.593300: |   f7 07 b8 9c  cc 19 b2 35
Aug 26 18:23:57.593303: |    responder cookie:
Aug 26 18:23:57.593305: |   9a ca 6b 7d  c0 ac c0 94
Aug 26 18:23:57.593308: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.593311: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.593314: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:57.593316: |    flags: none (0x0)
Aug 26 18:23:57.593319: |    Message ID: 0 (0x0)
Aug 26 18:23:57.593322: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.593325: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:57.593328: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.593331: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.593333: |    protocol ID: 1 (0x1)
Aug 26 18:23:57.593336: |    SPI size: 0 (0x0)
Aug 26 18:23:57.593339: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:57.593342: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:57.593345: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:57.593348: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:57.593351: | emitting length of ISAKMP Message: 40
Aug 26 18:23:57.593358: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #6)
Aug 26 18:23:57.593361: |   f7 07 b8 9c  cc 19 b2 35  9a ca 6b 7d  c0 ac c0 94
Aug 26 18:23:57.593363: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:57.593366: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:57.593389: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.593395: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:57.593401: | stop processing: state #6 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:57.593404: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:57.593410: | spent 0.492 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:57.639949: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:57.639978: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:57.639982: |   e4 e1 8b 11  04 6d 0c b0  00 00 00 00  00 00 00 00
Aug 26 18:23:57.639985: |   01 10 02 00  00 00 00 00  00 00 00 48  00 00 00 2c
Aug 26 18:23:57.639987: |   00 00 00 01  00 00 00 01  00 00 00 20  01 01 00 01
Aug 26 18:23:57.639990: |   00 00 00 18  01 01 00 00  80 01 00 12  80 02 00 06
Aug 26 18:23:57.639992: |   80 03 00 1f  80 04 00 08
Aug 26 18:23:57.639997: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:57.640002: | **parse ISAKMP Message:
Aug 26 18:23:57.640005: |    initiator cookie:
Aug 26 18:23:57.640007: |   e4 e1 8b 11  04 6d 0c b0
Aug 26 18:23:57.640010: |    responder cookie:
Aug 26 18:23:57.640012: |   00 00 00 00  00 00 00 00
Aug 26 18:23:57.640015: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.640018: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.640021: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.640024: |    flags: none (0x0)
Aug 26 18:23:57.640026: |    Message ID: 0 (0x0)
Aug 26 18:23:57.640029: |    length: 72 (0x48)
Aug 26 18:23:57.640032: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:57.640036: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:57.640039: | #null state always idle
Aug 26 18:23:57.640043: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:57.640046: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:57.640049: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.640055: |    length: 44 (0x2c)
Aug 26 18:23:57.640058: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.640061: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:57.640063: | in statetime_start() with no state
Aug 26 18:23:57.640070: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:57.640075: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:57.640079: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.640083: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:57.640085: | find_next_host_connection returns test
Aug 26 18:23:57.640088: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.640091: | find_next_host_connection returns empty
Aug 26 18:23:57.640115: | creating state object #7 at 0x55f088adf9e0
Aug 26 18:23:57.640119: | State DB: adding IKEv1 state #7 in UNDEFINED
Aug 26 18:23:57.640123: | pstats #7 ikev1.isakmp started
Aug 26 18:23:57.640128: | #7 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:57.640134: | start processing: state #7 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:57.640138: | parent state #7: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:57.640142: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:57.640145: "test" #7: responding to Main Mode
Aug 26 18:23:57.640150: | **emit ISAKMP Message:
Aug 26 18:23:57.640153: |    initiator cookie:
Aug 26 18:23:57.640155: |   e4 e1 8b 11  04 6d 0c b0
Aug 26 18:23:57.640158: |    responder cookie:
Aug 26 18:23:57.640160: |   06 27 b2 a1  ff 2b 9a 58
Aug 26 18:23:57.640163: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.640166: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.640168: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.640171: |    flags: none (0x0)
Aug 26 18:23:57.640174: |    Message ID: 0 (0x0)
Aug 26 18:23:57.640177: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.640180: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:57.640183: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:57.640186: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:57.640188: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.640191: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:57.640195: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:57.640198: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:57.640201: | ****parse IPsec DOI SIT:
Aug 26 18:23:57.640204: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:57.640207: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:57.640210: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.640212: |    length: 32 (0x20)
Aug 26 18:23:57.640215: |    proposal number: 1 (0x1)
Aug 26 18:23:57.640218: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:57.640220: |    SPI size: 0 (0x0)
Aug 26 18:23:57.640223: |    number of transforms: 1 (0x1)
Aug 26 18:23:57.640226: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.640229: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.640231: |    length: 24 (0x18)
Aug 26 18:23:57.640234: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:57.640237: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.640240: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.640243: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:57.640245: |    length/value: 18 (0x12)
Aug 26 18:23:57.640248: |    [18 is OAKLEY_AES_GCM_A]
Aug 26 18:23:57.640255: "test" #7: OAKLEY_AES_GCM_A is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:57.640259: "test" #7: no acceptable Oakley Transform
Aug 26 18:23:57.640262: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.640267: | [RE]START processing: state #7 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:57.640270: | #7 is idle
Aug 26 18:23:57.640357: "test" #7: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:57.640364: | **emit ISAKMP Message:
Aug 26 18:23:57.640367: |    initiator cookie:
Aug 26 18:23:57.640369: |   e4 e1 8b 11  04 6d 0c b0
Aug 26 18:23:57.640372: |    responder cookie:
Aug 26 18:23:57.640374: |   06 27 b2 a1  ff 2b 9a 58
Aug 26 18:23:57.640377: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.640380: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.640382: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:57.640385: |    flags: none (0x0)
Aug 26 18:23:57.640388: |    Message ID: 0 (0x0)
Aug 26 18:23:57.640391: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.640394: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:57.640396: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.640399: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.640402: |    protocol ID: 1 (0x1)
Aug 26 18:23:57.640404: |    SPI size: 0 (0x0)
Aug 26 18:23:57.640407: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:57.640410: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:57.640414: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:57.640417: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:57.640419: | emitting length of ISAKMP Message: 40
Aug 26 18:23:57.640426: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #7)
Aug 26 18:23:57.640429: |   e4 e1 8b 11  04 6d 0c b0  06 27 b2 a1  ff 2b 9a 58
Aug 26 18:23:57.640431: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:57.640434: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:57.640457: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.640463: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:57.640468: | stop processing: state #7 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:57.640471: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:57.640476: | spent 0.496 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:57.681089: | spent 0.00356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:57.681121: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:57.681125: |   00 65 84 a9  f5 35 29 a8  00 00 00 00  00 00 00 00
Aug 26 18:23:57.681128: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:57.681130: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:57.681133: |   00 00 00 14  01 01 00 00  80 02 00 06  80 03 00 1f
Aug 26 18:23:57.681135: |   80 04 00 08
Aug 26 18:23:57.681141: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:57.681145: | **parse ISAKMP Message:
Aug 26 18:23:57.681148: |    initiator cookie:
Aug 26 18:23:57.681151: |   00 65 84 a9  f5 35 29 a8
Aug 26 18:23:57.681153: |    responder cookie:
Aug 26 18:23:57.681155: |   00 00 00 00  00 00 00 00
Aug 26 18:23:57.681158: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.681160: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.681163: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.681166: |    flags: none (0x0)
Aug 26 18:23:57.681169: |    Message ID: 0 (0x0)
Aug 26 18:23:57.681175: |    length: 68 (0x44)
Aug 26 18:23:57.681178: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:57.681182: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:57.681184: | #null state always idle
Aug 26 18:23:57.681188: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:57.681191: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:57.681194: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.681197: |    length: 40 (0x28)
Aug 26 18:23:57.681199: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.681202: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:57.681205: | in statetime_start() with no state
Aug 26 18:23:57.681211: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:57.681216: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:57.681220: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.681223: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:57.681226: | find_next_host_connection returns test
Aug 26 18:23:57.681229: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.681231: | find_next_host_connection returns empty
Aug 26 18:23:57.681252: | creating state object #8 at 0x55f088ae04a0
Aug 26 18:23:57.681256: | State DB: adding IKEv1 state #8 in UNDEFINED
Aug 26 18:23:57.681260: | pstats #8 ikev1.isakmp started
Aug 26 18:23:57.681265: | #8 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:57.681272: | start processing: state #8 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:57.681275: | parent state #8: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:57.681279: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:57.681282: "test" #8: responding to Main Mode
Aug 26 18:23:57.681287: | **emit ISAKMP Message:
Aug 26 18:23:57.681297: |    initiator cookie:
Aug 26 18:23:57.681300: |   00 65 84 a9  f5 35 29 a8
Aug 26 18:23:57.681302: |    responder cookie:
Aug 26 18:23:57.681305: |   9b a8 04 42  1b 54 7d cd
Aug 26 18:23:57.681307: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.681310: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.681313: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.681315: |    flags: none (0x0)
Aug 26 18:23:57.681318: |    Message ID: 0 (0x0)
Aug 26 18:23:57.681321: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.681324: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:57.681327: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:57.681330: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:57.681333: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.681336: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:57.681339: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:57.681342: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:57.681345: | ****parse IPsec DOI SIT:
Aug 26 18:23:57.681348: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:57.681351: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:57.681354: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.681356: |    length: 28 (0x1c)
Aug 26 18:23:57.681359: |    proposal number: 1 (0x1)
Aug 26 18:23:57.681362: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:57.681364: |    SPI size: 0 (0x0)
Aug 26 18:23:57.681367: |    number of transforms: 1 (0x1)
Aug 26 18:23:57.681370: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.681375: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.681377: |    length: 20 (0x14)
Aug 26 18:23:57.681380: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:57.681382: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.681386: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.681389: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:23:57.681391: |    length/value: 6 (0x6)
Aug 26 18:23:57.681394: |    [6 is OAKLEY_SHA2_512]
Aug 26 18:23:57.681398: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.681400: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:23:57.681403: |    length/value: 31 (0x1f)
Aug 26 18:23:57.681407: "test" #8: Pluto does not support 31?? authentication.  Attribute OAKLEY_AUTHENTICATION_METHOD
Aug 26 18:23:57.681410: "test" #8: no acceptable Oakley Transform
Aug 26 18:23:57.681412: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.681417: | [RE]START processing: state #8 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:57.681420: | #8 is idle
Aug 26 18:23:57.681501: "test" #8: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:57.681506: | **emit ISAKMP Message:
Aug 26 18:23:57.681508: |    initiator cookie:
Aug 26 18:23:57.681511: |   00 65 84 a9  f5 35 29 a8
Aug 26 18:23:57.681513: |    responder cookie:
Aug 26 18:23:57.681516: |   9b a8 04 42  1b 54 7d cd
Aug 26 18:23:57.681518: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.681521: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.681524: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:57.681526: |    flags: none (0x0)
Aug 26 18:23:57.681529: |    Message ID: 0 (0x0)
Aug 26 18:23:57.681532: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.681535: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:57.681537: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.681540: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.681542: |    protocol ID: 1 (0x1)
Aug 26 18:23:57.681545: |    SPI size: 0 (0x0)
Aug 26 18:23:57.681548: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:57.681551: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:57.681554: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:57.681557: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:57.681560: | emitting length of ISAKMP Message: 40
Aug 26 18:23:57.681566: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #8)
Aug 26 18:23:57.681569: |   00 65 84 a9  f5 35 29 a8  9b a8 04 42  1b 54 7d cd
Aug 26 18:23:57.681572: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:57.681574: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:57.681600: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.681606: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:57.681611: | stop processing: state #8 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:57.681614: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:57.681619: | spent 0.494 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:57.735646: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:57.735678: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:57.735683: |   35 b3 cb bd  00 67 dc 87  00 00 00 00  00 00 00 00
Aug 26 18:23:57.735686: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:57.735689: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:57.735692: |   00 00 00 14  01 01 00 00  80 01 00 12  80 03 00 1f
Aug 26 18:23:57.735695: |   80 04 00 08
Aug 26 18:23:57.735705: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:57.735711: | **parse ISAKMP Message:
Aug 26 18:23:57.735715: |    initiator cookie:
Aug 26 18:23:57.735718: |   35 b3 cb bd  00 67 dc 87
Aug 26 18:23:57.735721: |    responder cookie:
Aug 26 18:23:57.735724: |   00 00 00 00  00 00 00 00
Aug 26 18:23:57.735728: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.735732: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.735735: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.735739: |    flags: none (0x0)
Aug 26 18:23:57.735742: |    Message ID: 0 (0x0)
Aug 26 18:23:57.735745: |    length: 68 (0x44)
Aug 26 18:23:57.735750: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:57.735754: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:57.735758: | #null state always idle
Aug 26 18:23:57.735762: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:57.735766: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:57.735769: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.735772: |    length: 40 (0x28)
Aug 26 18:23:57.735775: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.735779: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:57.735782: | in statetime_start() with no state
Aug 26 18:23:57.735789: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:57.735795: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:57.735799: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.735804: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:57.735807: | find_next_host_connection returns test
Aug 26 18:23:57.735810: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.735813: | find_next_host_connection returns empty
Aug 26 18:23:57.735839: | creating state object #9 at 0x55f088ae0f60
Aug 26 18:23:57.735843: | State DB: adding IKEv1 state #9 in UNDEFINED
Aug 26 18:23:57.735851: | pstats #9 ikev1.isakmp started
Aug 26 18:23:57.735857: | #9 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:57.735866: | start processing: state #9 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:57.735870: | parent state #9: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:57.735874: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:57.735878: "test" #9: responding to Main Mode
Aug 26 18:23:57.735884: | **emit ISAKMP Message:
Aug 26 18:23:57.735888: |    initiator cookie:
Aug 26 18:23:57.735891: |   35 b3 cb bd  00 67 dc 87
Aug 26 18:23:57.735894: |    responder cookie:
Aug 26 18:23:57.735897: |   2a 81 3d b8  cf 70 a2 fb
Aug 26 18:23:57.735901: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.735904: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.735908: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.735911: |    flags: none (0x0)
Aug 26 18:23:57.735914: |    Message ID: 0 (0x0)
Aug 26 18:23:57.735918: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.735922: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:57.735926: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:57.735929: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:57.735932: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.735937: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:57.735942: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:57.735946: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:57.735953: | ****parse IPsec DOI SIT:
Aug 26 18:23:57.735957: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:57.735961: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:57.735964: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.735967: |    length: 28 (0x1c)
Aug 26 18:23:57.735970: |    proposal number: 1 (0x1)
Aug 26 18:23:57.735973: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:57.735976: |    SPI size: 0 (0x0)
Aug 26 18:23:57.735979: |    number of transforms: 1 (0x1)
Aug 26 18:23:57.735983: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.735986: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.735990: |    length: 20 (0x14)
Aug 26 18:23:57.735993: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:57.735996: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.735999: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.736003: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:57.736006: |    length/value: 18 (0x12)
Aug 26 18:23:57.736009: |    [18 is OAKLEY_AES_GCM_A]
Aug 26 18:23:57.736014: "test" #9: OAKLEY_AES_GCM_A is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:57.736017: "test" #9: no acceptable Oakley Transform
Aug 26 18:23:57.736021: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.736027: | [RE]START processing: state #9 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:57.736031: | #9 is idle
Aug 26 18:23:57.736657: "test" #9: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:57.736670: | **emit ISAKMP Message:
Aug 26 18:23:57.736674: |    initiator cookie:
Aug 26 18:23:57.736677: |   35 b3 cb bd  00 67 dc 87
Aug 26 18:23:57.736680: |    responder cookie:
Aug 26 18:23:57.736682: |   2a 81 3d b8  cf 70 a2 fb
Aug 26 18:23:57.736685: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.736688: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.736691: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:57.736694: |    flags: none (0x0)
Aug 26 18:23:57.736696: |    Message ID: 0 (0x0)
Aug 26 18:23:57.736699: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.736703: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:57.736706: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.736708: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.736711: |    protocol ID: 1 (0x1)
Aug 26 18:23:57.736714: |    SPI size: 0 (0x0)
Aug 26 18:23:57.736716: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:57.736719: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:57.736722: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:57.736725: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:57.736728: | emitting length of ISAKMP Message: 40
Aug 26 18:23:57.736735: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #9)
Aug 26 18:23:57.736738: |   35 b3 cb bd  00 67 dc 87  2a 81 3d b8  cf 70 a2 fb
Aug 26 18:23:57.736741: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:57.736743: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:57.736779: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.736787: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:57.736793: | stop processing: state #9 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:57.736797: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:57.736805: | spent 0.591 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:57.786974: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:57.787006: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:57.787012: |   f5 f0 09 ff  44 56 cb 74  00 00 00 00  00 00 00 00
Aug 26 18:23:57.787015: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:57.787017: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:57.787020: |   00 00 00 14  01 01 00 00  80 01 00 12  80 02 00 06
Aug 26 18:23:57.787023: |   80 04 00 08
Aug 26 18:23:57.787029: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:57.787034: | **parse ISAKMP Message:
Aug 26 18:23:57.787037: |    initiator cookie:
Aug 26 18:23:57.787040: |   f5 f0 09 ff  44 56 cb 74
Aug 26 18:23:57.787042: |    responder cookie:
Aug 26 18:23:57.787045: |   00 00 00 00  00 00 00 00
Aug 26 18:23:57.787048: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.787051: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.787055: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.787058: |    flags: none (0x0)
Aug 26 18:23:57.787061: |    Message ID: 0 (0x0)
Aug 26 18:23:57.787064: |    length: 68 (0x44)
Aug 26 18:23:57.787068: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:57.787072: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:57.787075: | #null state always idle
Aug 26 18:23:57.787079: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:57.787083: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:57.787086: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.787089: |    length: 40 (0x28)
Aug 26 18:23:57.787091: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.787095: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:57.787098: | in statetime_start() with no state
Aug 26 18:23:57.787104: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:57.787110: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:57.787114: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.787118: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:57.787121: | find_next_host_connection returns test
Aug 26 18:23:57.787124: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.787127: | find_next_host_connection returns empty
Aug 26 18:23:57.787153: | creating state object #10 at 0x55f088ae1a20
Aug 26 18:23:57.787157: | State DB: adding IKEv1 state #10 in UNDEFINED
Aug 26 18:23:57.787163: | pstats #10 ikev1.isakmp started
Aug 26 18:23:57.787168: | #10 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:57.787175: | start processing: state #10 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:57.787179: | parent state #10: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:57.787183: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:57.787186: "test" #10: responding to Main Mode
Aug 26 18:23:57.787191: | **emit ISAKMP Message:
Aug 26 18:23:57.787194: |    initiator cookie:
Aug 26 18:23:57.787197: |   f5 f0 09 ff  44 56 cb 74
Aug 26 18:23:57.787199: |    responder cookie:
Aug 26 18:23:57.787202: |   c9 2a b5 26  a3 5e 6c 72
Aug 26 18:23:57.787204: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.787207: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.787210: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.787213: |    flags: none (0x0)
Aug 26 18:23:57.787215: |    Message ID: 0 (0x0)
Aug 26 18:23:57.787219: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.787222: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:57.787225: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:57.787228: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:57.787233: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.787236: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:57.787240: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:57.787243: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:57.787247: | ****parse IPsec DOI SIT:
Aug 26 18:23:57.787250: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:57.787253: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:57.787256: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.787258: |    length: 28 (0x1c)
Aug 26 18:23:57.787261: |    proposal number: 1 (0x1)
Aug 26 18:23:57.787263: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:57.787266: |    SPI size: 0 (0x0)
Aug 26 18:23:57.787269: |    number of transforms: 1 (0x1)
Aug 26 18:23:57.787272: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.787274: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.787277: |    length: 20 (0x14)
Aug 26 18:23:57.787280: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:57.787282: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.787285: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.787293: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:57.787298: |    length/value: 18 (0x12)
Aug 26 18:23:57.787301: |    [18 is OAKLEY_AES_GCM_A]
Aug 26 18:23:57.787305: "test" #10: OAKLEY_AES_GCM_A is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:57.787308: "test" #10: no acceptable Oakley Transform
Aug 26 18:23:57.787312: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.787317: | [RE]START processing: state #10 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:57.787320: | #10 is idle
Aug 26 18:23:57.787409: "test" #10: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:57.787415: | **emit ISAKMP Message:
Aug 26 18:23:57.787418: |    initiator cookie:
Aug 26 18:23:57.787421: |   f5 f0 09 ff  44 56 cb 74
Aug 26 18:23:57.787423: |    responder cookie:
Aug 26 18:23:57.787426: |   c9 2a b5 26  a3 5e 6c 72
Aug 26 18:23:57.787429: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.787432: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.787435: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:57.787437: |    flags: none (0x0)
Aug 26 18:23:57.787440: |    Message ID: 0 (0x0)
Aug 26 18:23:57.787443: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.787447: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:57.787450: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.787452: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.787455: |    protocol ID: 1 (0x1)
Aug 26 18:23:57.787458: |    SPI size: 0 (0x0)
Aug 26 18:23:57.787460: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:57.787464: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:57.787468: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:57.787471: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:57.787474: | emitting length of ISAKMP Message: 40
Aug 26 18:23:57.787482: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #10)
Aug 26 18:23:57.787485: |   f5 f0 09 ff  44 56 cb 74  c9 2a b5 26  a3 5e 6c 72
Aug 26 18:23:57.787488: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:57.787491: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:57.787515: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.787522: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:57.787530: | stop processing: state #10 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:57.787534: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:57.787541: | spent 0.527 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:57.846249: | spent 0.00333 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:57.846285: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:57.846294: |   d1 95 1e 5f  76 20 84 4d  00 00 00 00  00 00 00 00
Aug 26 18:23:57.846298: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:57.846300: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:57.846303: |   00 00 00 14  01 01 00 00  80 01 00 12  80 02 00 06
Aug 26 18:23:57.846306: |   80 03 00 1f
Aug 26 18:23:57.846312: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:57.846316: | **parse ISAKMP Message:
Aug 26 18:23:57.846320: |    initiator cookie:
Aug 26 18:23:57.846322: |   d1 95 1e 5f  76 20 84 4d
Aug 26 18:23:57.846325: |    responder cookie:
Aug 26 18:23:57.846328: |   00 00 00 00  00 00 00 00
Aug 26 18:23:57.846331: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.846334: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.846337: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.846340: |    flags: none (0x0)
Aug 26 18:23:57.846343: |    Message ID: 0 (0x0)
Aug 26 18:23:57.846346: |    length: 68 (0x44)
Aug 26 18:23:57.846350: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:57.846354: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:57.846357: | #null state always idle
Aug 26 18:23:57.846361: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:57.846364: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:57.846367: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.846370: |    length: 40 (0x28)
Aug 26 18:23:57.846373: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.846376: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:57.846379: | in statetime_start() with no state
Aug 26 18:23:57.846385: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:57.846392: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:57.846395: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.846399: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:57.846403: | find_next_host_connection returns test
Aug 26 18:23:57.846406: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.846409: | find_next_host_connection returns empty
Aug 26 18:23:57.846430: | creating state object #11 at 0x55f088ae24e0
Aug 26 18:23:57.846434: | State DB: adding IKEv1 state #11 in UNDEFINED
Aug 26 18:23:57.846441: | pstats #11 ikev1.isakmp started
Aug 26 18:23:57.846446: | #11 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:57.846453: | start processing: state #11 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:57.846457: | parent state #11: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:57.846461: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:57.846464: "test" #11: responding to Main Mode
Aug 26 18:23:57.846470: | **emit ISAKMP Message:
Aug 26 18:23:57.846473: |    initiator cookie:
Aug 26 18:23:57.846476: |   d1 95 1e 5f  76 20 84 4d
Aug 26 18:23:57.846478: |    responder cookie:
Aug 26 18:23:57.846481: |   95 38 a9 b1  e3 2c 56 0f
Aug 26 18:23:57.846484: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.846487: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.846494: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.846497: |    flags: none (0x0)
Aug 26 18:23:57.846500: |    Message ID: 0 (0x0)
Aug 26 18:23:57.846503: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.846507: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:57.846510: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:57.846513: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:57.846516: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.846520: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:57.846523: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:57.846527: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:57.846530: | ****parse IPsec DOI SIT:
Aug 26 18:23:57.846533: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:57.846537: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:57.846540: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.846543: |    length: 28 (0x1c)
Aug 26 18:23:57.846546: |    proposal number: 1 (0x1)
Aug 26 18:23:57.846549: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:57.846552: |    SPI size: 0 (0x0)
Aug 26 18:23:57.846555: |    number of transforms: 1 (0x1)
Aug 26 18:23:57.846558: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.846561: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.846564: |    length: 20 (0x14)
Aug 26 18:23:57.846566: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:57.846569: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.846572: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.846576: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:57.846579: |    length/value: 18 (0x12)
Aug 26 18:23:57.846582: |    [18 is OAKLEY_AES_GCM_A]
Aug 26 18:23:57.846586: "test" #11: OAKLEY_AES_GCM_A is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:57.846589: "test" #11: no acceptable Oakley Transform
Aug 26 18:23:57.846592: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.846598: | [RE]START processing: state #11 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:57.846601: | #11 is idle
Aug 26 18:23:57.846698: "test" #11: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:57.846703: | **emit ISAKMP Message:
Aug 26 18:23:57.846706: |    initiator cookie:
Aug 26 18:23:57.846709: |   d1 95 1e 5f  76 20 84 4d
Aug 26 18:23:57.846711: |    responder cookie:
Aug 26 18:23:57.846714: |   95 38 a9 b1  e3 2c 56 0f
Aug 26 18:23:57.846717: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.846720: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.846723: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:57.846726: |    flags: none (0x0)
Aug 26 18:23:57.846729: |    Message ID: 0 (0x0)
Aug 26 18:23:57.846732: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.846735: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:57.846738: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.846741: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.846744: |    protocol ID: 1 (0x1)
Aug 26 18:23:57.846747: |    SPI size: 0 (0x0)
Aug 26 18:23:57.846750: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:57.846754: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:57.846757: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:57.846760: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:57.846764: | emitting length of ISAKMP Message: 40
Aug 26 18:23:57.846772: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #11)
Aug 26 18:23:57.846776: |   d1 95 1e 5f  76 20 84 4d  95 38 a9 b1  e3 2c 56 0f
Aug 26 18:23:57.846779: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:57.846781: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:57.846809: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.846816: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:57.846822: | stop processing: state #11 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:57.846825: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:57.846831: | spent 0.535 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:57.887410: | spent 0.00351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:57.887435: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:57.887439: |   f0 f0 5d 5d  2f ea 44 ac  00 00 00 00  00 00 00 00
Aug 26 18:23:57.887441: |   01 10 02 00  00 00 00 00  00 00 00 48  00 00 00 2c
Aug 26 18:23:57.887444: |   00 00 00 01  00 00 00 01  00 00 00 20  01 01 00 01
Aug 26 18:23:57.887446: |   00 00 00 18  01 01 00 00  80 01 00 13  80 02 00 16
Aug 26 18:23:57.887449: |   80 03 00 15  80 04 00 01
Aug 26 18:23:57.887454: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:57.887458: | **parse ISAKMP Message:
Aug 26 18:23:57.887461: |    initiator cookie:
Aug 26 18:23:57.887463: |   f0 f0 5d 5d  2f ea 44 ac
Aug 26 18:23:57.887466: |    responder cookie:
Aug 26 18:23:57.887468: |   00 00 00 00  00 00 00 00
Aug 26 18:23:57.887471: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.887474: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.887477: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.887480: |    flags: none (0x0)
Aug 26 18:23:57.887482: |    Message ID: 0 (0x0)
Aug 26 18:23:57.887485: |    length: 72 (0x48)
Aug 26 18:23:57.887488: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:57.887492: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:57.887495: | #null state always idle
Aug 26 18:23:57.887498: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:57.887502: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:57.887504: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.887507: |    length: 44 (0x2c)
Aug 26 18:23:57.887509: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.887512: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:57.887515: | in statetime_start() with no state
Aug 26 18:23:57.887520: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:57.887526: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:57.887529: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.887532: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:57.887535: | find_next_host_connection returns test
Aug 26 18:23:57.887538: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.887540: | find_next_host_connection returns empty
Aug 26 18:23:57.887561: | creating state object #12 at 0x55f088ae2fa0
Aug 26 18:23:57.887565: | State DB: adding IKEv1 state #12 in UNDEFINED
Aug 26 18:23:57.887569: | pstats #12 ikev1.isakmp started
Aug 26 18:23:57.887573: | #12 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:57.887579: | start processing: state #12 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:57.887583: | parent state #12: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:57.887587: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:57.887592: "test" #12: responding to Main Mode
Aug 26 18:23:57.887597: | **emit ISAKMP Message:
Aug 26 18:23:57.887600: |    initiator cookie:
Aug 26 18:23:57.887602: |   f0 f0 5d 5d  2f ea 44 ac
Aug 26 18:23:57.887605: |    responder cookie:
Aug 26 18:23:57.887607: |   be 05 21 45  4f e5 ad 66
Aug 26 18:23:57.887610: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.887613: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.887615: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.887618: |    flags: none (0x0)
Aug 26 18:23:57.887620: |    Message ID: 0 (0x0)
Aug 26 18:23:57.887623: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.887626: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:57.887630: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:57.887632: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:57.887635: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.887638: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:57.887641: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:57.887644: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:57.887648: | ****parse IPsec DOI SIT:
Aug 26 18:23:57.887650: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:57.887653: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:57.887656: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.887658: |    length: 32 (0x20)
Aug 26 18:23:57.887661: |    proposal number: 1 (0x1)
Aug 26 18:23:57.887664: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:57.887666: |    SPI size: 0 (0x0)
Aug 26 18:23:57.887669: |    number of transforms: 1 (0x1)
Aug 26 18:23:57.887671: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.887674: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.887677: |    length: 24 (0x18)
Aug 26 18:23:57.887679: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:57.887682: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.887685: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.887688: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:57.887690: |    length/value: 19 (0x13)
Aug 26 18:23:57.887693: |    [19 is OAKLEY_AES_GCM_B]
Aug 26 18:23:57.887697: "test" #12: OAKLEY_AES_GCM_B is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:57.887700: "test" #12: no acceptable Oakley Transform
Aug 26 18:23:57.887703: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.887708: | [RE]START processing: state #12 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:57.887710: | #12 is idle
Aug 26 18:23:57.887788: "test" #12: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:57.887792: | **emit ISAKMP Message:
Aug 26 18:23:57.887795: |    initiator cookie:
Aug 26 18:23:57.887797: |   f0 f0 5d 5d  2f ea 44 ac
Aug 26 18:23:57.887800: |    responder cookie:
Aug 26 18:23:57.887802: |   be 05 21 45  4f e5 ad 66
Aug 26 18:23:57.887805: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.887807: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.887810: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:57.887813: |    flags: none (0x0)
Aug 26 18:23:57.887815: |    Message ID: 0 (0x0)
Aug 26 18:23:57.887818: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.887821: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:57.887823: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.887826: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.887828: |    protocol ID: 1 (0x1)
Aug 26 18:23:57.887831: |    SPI size: 0 (0x0)
Aug 26 18:23:57.887835: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:57.887839: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:57.887842: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:57.887845: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:57.887847: | emitting length of ISAKMP Message: 40
Aug 26 18:23:57.887853: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #12)
Aug 26 18:23:57.887856: |   f0 f0 5d 5d  2f ea 44 ac  be 05 21 45  4f e5 ad 66
Aug 26 18:23:57.887859: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:57.887861: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:57.887888: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.887894: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:57.887899: | stop processing: state #12 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:57.887903: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:57.887908: | spent 0.469 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:57.948135: | spent 0.00343 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:57.948171: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:57.948176: |   92 3e 05 7c  ce 53 0b 5a  00 00 00 00  00 00 00 00
Aug 26 18:23:57.948178: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:57.948181: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:57.948184: |   00 00 00 14  01 01 00 00  80 02 00 16  80 03 00 15
Aug 26 18:23:57.948186: |   80 04 00 01
Aug 26 18:23:57.948192: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:57.948197: | **parse ISAKMP Message:
Aug 26 18:23:57.948200: |    initiator cookie:
Aug 26 18:23:57.948203: |   92 3e 05 7c  ce 53 0b 5a
Aug 26 18:23:57.948205: |    responder cookie:
Aug 26 18:23:57.948208: |   00 00 00 00  00 00 00 00
Aug 26 18:23:57.948211: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.948214: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.948217: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.948220: |    flags: none (0x0)
Aug 26 18:23:57.948222: |    Message ID: 0 (0x0)
Aug 26 18:23:57.948225: |    length: 68 (0x44)
Aug 26 18:23:57.948228: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:57.948232: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:57.948235: | #null state always idle
Aug 26 18:23:57.948239: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:57.948242: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:57.948245: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.948248: |    length: 40 (0x28)
Aug 26 18:23:57.948250: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.948254: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:57.948256: | in statetime_start() with no state
Aug 26 18:23:57.948262: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:57.948268: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:57.948271: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.948276: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:57.948279: | find_next_host_connection returns test
Aug 26 18:23:57.948282: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.948284: | find_next_host_connection returns empty
Aug 26 18:23:57.948320: | creating state object #13 at 0x55f088ae3a60
Aug 26 18:23:57.948328: | State DB: adding IKEv1 state #13 in UNDEFINED
Aug 26 18:23:57.948338: | pstats #13 ikev1.isakmp started
Aug 26 18:23:57.948344: | #13 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:57.948350: | start processing: state #13 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:57.948354: | parent state #13: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:57.948357: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:57.948360: "test" #13: responding to Main Mode
Aug 26 18:23:57.948365: | **emit ISAKMP Message:
Aug 26 18:23:57.948368: |    initiator cookie:
Aug 26 18:23:57.948371: |   92 3e 05 7c  ce 53 0b 5a
Aug 26 18:23:57.948373: |    responder cookie:
Aug 26 18:23:57.948375: |   fa 9d 9d 4e  11 08 d7 04
Aug 26 18:23:57.948378: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.948380: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.948383: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.948385: |    flags: none (0x0)
Aug 26 18:23:57.948388: |    Message ID: 0 (0x0)
Aug 26 18:23:57.948391: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.948394: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:57.948397: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:57.948399: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:57.948402: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.948405: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:57.948408: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:57.948411: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:57.948414: | ****parse IPsec DOI SIT:
Aug 26 18:23:57.948417: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:57.948420: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:57.948423: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.948426: |    length: 28 (0x1c)
Aug 26 18:23:57.948428: |    proposal number: 1 (0x1)
Aug 26 18:23:57.948431: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:57.948433: |    SPI size: 0 (0x0)
Aug 26 18:23:57.948435: |    number of transforms: 1 (0x1)
Aug 26 18:23:57.948439: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.948441: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.948444: |    length: 20 (0x14)
Aug 26 18:23:57.948447: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:57.948449: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.948452: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.948455: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:23:57.948458: |    length/value: 22 (0x16)
Aug 26 18:23:57.948463: "test" #13: 22?? is not supported.  Attribute OAKLEY_HASH_ALGORITHM
Aug 26 18:23:57.948466: "test" #13: no acceptable Oakley Transform
Aug 26 18:23:57.948469: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.948474: | [RE]START processing: state #13 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:57.948477: | #13 is idle
Aug 26 18:23:57.948570: "test" #13: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:57.948575: | **emit ISAKMP Message:
Aug 26 18:23:57.948579: |    initiator cookie:
Aug 26 18:23:57.948581: |   92 3e 05 7c  ce 53 0b 5a
Aug 26 18:23:57.948584: |    responder cookie:
Aug 26 18:23:57.948587: |   fa 9d 9d 4e  11 08 d7 04
Aug 26 18:23:57.948590: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.948593: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.948595: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:57.948598: |    flags: none (0x0)
Aug 26 18:23:57.948603: |    Message ID: 0 (0x0)
Aug 26 18:23:57.948606: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.948609: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:57.948612: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.948615: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.948617: |    protocol ID: 1 (0x1)
Aug 26 18:23:57.948620: |    SPI size: 0 (0x0)
Aug 26 18:23:57.948622: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:57.948626: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:57.948629: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:57.948632: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:57.948635: | emitting length of ISAKMP Message: 40
Aug 26 18:23:57.948642: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #13)
Aug 26 18:23:57.948645: |   92 3e 05 7c  ce 53 0b 5a  fa 9d 9d 4e  11 08 d7 04
Aug 26 18:23:57.948647: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:57.948649: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:57.948680: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.948686: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:57.948692: | stop processing: state #13 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:57.948695: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:57.948700: | spent 0.514 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:57.980987: | spent 0.003 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:57.981020: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:57.981024: |   2e 9f f3 be  ca ff 1d 00  00 00 00 00  00 00 00 00
Aug 26 18:23:57.981026: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:57.981029: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:57.981032: |   00 00 00 14  01 01 00 00  80 01 00 13  80 03 00 15
Aug 26 18:23:57.981034: |   80 04 00 01
Aug 26 18:23:57.981040: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:57.981045: | **parse ISAKMP Message:
Aug 26 18:23:57.981048: |    initiator cookie:
Aug 26 18:23:57.981050: |   2e 9f f3 be  ca ff 1d 00
Aug 26 18:23:57.981053: |    responder cookie:
Aug 26 18:23:57.981055: |   00 00 00 00  00 00 00 00
Aug 26 18:23:57.981058: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.981061: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.981064: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.981067: |    flags: none (0x0)
Aug 26 18:23:57.981070: |    Message ID: 0 (0x0)
Aug 26 18:23:57.981072: |    length: 68 (0x44)
Aug 26 18:23:57.981076: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:57.981080: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:57.981083: | #null state always idle
Aug 26 18:23:57.981086: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:57.981090: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:57.981092: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.981095: |    length: 40 (0x28)
Aug 26 18:23:57.981098: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.981101: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:57.981104: | in statetime_start() with no state
Aug 26 18:23:57.981110: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:57.981115: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:57.981118: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.981126: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:57.981129: | find_next_host_connection returns test
Aug 26 18:23:57.981132: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:57.981135: | find_next_host_connection returns empty
Aug 26 18:23:57.981157: | creating state object #14 at 0x55f088ae4520
Aug 26 18:23:57.981161: | State DB: adding IKEv1 state #14 in UNDEFINED
Aug 26 18:23:57.981166: | pstats #14 ikev1.isakmp started
Aug 26 18:23:57.981171: | #14 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:57.981177: | start processing: state #14 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:57.981181: | parent state #14: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:57.981185: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:57.981188: "test" #14: responding to Main Mode
Aug 26 18:23:57.981194: | **emit ISAKMP Message:
Aug 26 18:23:57.981196: |    initiator cookie:
Aug 26 18:23:57.981199: |   2e 9f f3 be  ca ff 1d 00
Aug 26 18:23:57.981202: |    responder cookie:
Aug 26 18:23:57.981204: |   18 5c 4d 8b  c2 c4 47 c5
Aug 26 18:23:57.981207: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:57.981210: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.981212: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:57.981215: |    flags: none (0x0)
Aug 26 18:23:57.981218: |    Message ID: 0 (0x0)
Aug 26 18:23:57.981221: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.981224: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:57.981227: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:57.981230: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:57.981233: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.981236: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:57.981239: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:57.981243: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:57.981246: | ****parse IPsec DOI SIT:
Aug 26 18:23:57.981249: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:57.981252: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:57.981255: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.981257: |    length: 28 (0x1c)
Aug 26 18:23:57.981260: |    proposal number: 1 (0x1)
Aug 26 18:23:57.981263: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:57.981266: |    SPI size: 0 (0x0)
Aug 26 18:23:57.981268: |    number of transforms: 1 (0x1)
Aug 26 18:23:57.981271: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:57.981274: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.981277: |    length: 20 (0x14)
Aug 26 18:23:57.981279: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:57.981282: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:57.981285: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:57.981292: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:57.981297: |    length/value: 19 (0x13)
Aug 26 18:23:57.981301: |    [19 is OAKLEY_AES_GCM_B]
Aug 26 18:23:57.981305: "test" #14: OAKLEY_AES_GCM_B is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:57.981307: "test" #14: no acceptable Oakley Transform
Aug 26 18:23:57.981310: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.981316: | [RE]START processing: state #14 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:57.981318: | #14 is idle
Aug 26 18:23:57.981386: "test" #14: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:57.981391: | **emit ISAKMP Message:
Aug 26 18:23:57.981396: |    initiator cookie:
Aug 26 18:23:57.981399: |   2e 9f f3 be  ca ff 1d 00
Aug 26 18:23:57.981402: |    responder cookie:
Aug 26 18:23:57.981404: |   18 5c 4d 8b  c2 c4 47 c5
Aug 26 18:23:57.981407: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.981410: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:57.981412: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:57.981415: |    flags: none (0x0)
Aug 26 18:23:57.981418: |    Message ID: 0 (0x0)
Aug 26 18:23:57.981421: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:57.981424: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:57.981427: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:57.981430: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:57.981432: |    protocol ID: 1 (0x1)
Aug 26 18:23:57.981435: |    SPI size: 0 (0x0)
Aug 26 18:23:57.981438: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:57.981441: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:57.981445: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:57.981448: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:57.981451: | emitting length of ISAKMP Message: 40
Aug 26 18:23:57.981457: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #14)
Aug 26 18:23:57.981460: |   2e 9f f3 be  ca ff 1d 00  18 5c 4d 8b  c2 c4 47 c5
Aug 26 18:23:57.981463: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:57.981465: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:57.981493: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:57.981500: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:57.981506: | stop processing: state #14 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:57.981509: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:57.981515: | spent 0.49 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.030173: | spent 0.00329 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.030207: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.030211: |   47 f3 8b 00  b2 a7 f2 b9  00 00 00 00  00 00 00 00
Aug 26 18:23:58.030214: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.030217: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.030219: |   00 00 00 14  01 01 00 00  80 01 00 13  80 02 00 16
Aug 26 18:23:58.030222: |   80 04 00 01
Aug 26 18:23:58.030227: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.030232: | **parse ISAKMP Message:
Aug 26 18:23:58.030235: |    initiator cookie:
Aug 26 18:23:58.030237: |   47 f3 8b 00  b2 a7 f2 b9
Aug 26 18:23:58.030240: |    responder cookie:
Aug 26 18:23:58.030242: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.030246: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.030249: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.030252: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.030254: |    flags: none (0x0)
Aug 26 18:23:58.030257: |    Message ID: 0 (0x0)
Aug 26 18:23:58.030260: |    length: 68 (0x44)
Aug 26 18:23:58.030263: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.030267: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.030270: | #null state always idle
Aug 26 18:23:58.030274: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.030277: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.030279: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.030282: |    length: 40 (0x28)
Aug 26 18:23:58.030285: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.030320: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.030326: | in statetime_start() with no state
Aug 26 18:23:58.030332: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.030338: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.030341: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.030345: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.030348: | find_next_host_connection returns test
Aug 26 18:23:58.030350: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.030353: | find_next_host_connection returns empty
Aug 26 18:23:58.030379: | creating state object #15 at 0x55f088ae4fe0
Aug 26 18:23:58.030383: | State DB: adding IKEv1 state #15 in UNDEFINED
Aug 26 18:23:58.030387: | pstats #15 ikev1.isakmp started
Aug 26 18:23:58.030391: | #15 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.030396: | start processing: state #15 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.030399: | parent state #15: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.030402: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.030405: "test" #15: responding to Main Mode
Aug 26 18:23:58.030410: | **emit ISAKMP Message:
Aug 26 18:23:58.030412: |    initiator cookie:
Aug 26 18:23:58.030414: |   47 f3 8b 00  b2 a7 f2 b9
Aug 26 18:23:58.030417: |    responder cookie:
Aug 26 18:23:58.030418: |   1b 1d 45 77  94 11 ae 5e
Aug 26 18:23:58.030421: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.030423: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.030425: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.030427: |    flags: none (0x0)
Aug 26 18:23:58.030429: |    Message ID: 0 (0x0)
Aug 26 18:23:58.030432: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.030434: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.030437: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.030440: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.030442: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.030444: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.030447: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.030450: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.030453: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.030455: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.030458: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.030460: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.030462: |    length: 28 (0x1c)
Aug 26 18:23:58.030464: |    proposal number: 1 (0x1)
Aug 26 18:23:58.030467: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.030469: |    SPI size: 0 (0x0)
Aug 26 18:23:58.030471: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.030474: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.030476: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.030478: |    length: 20 (0x14)
Aug 26 18:23:58.030480: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.030482: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.030485: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.030487: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.030489: |    length/value: 19 (0x13)
Aug 26 18:23:58.030492: |    [19 is OAKLEY_AES_GCM_B]
Aug 26 18:23:58.030495: "test" #15: OAKLEY_AES_GCM_B is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.030500: "test" #15: no acceptable Oakley Transform
Aug 26 18:23:58.030502: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.030507: | [RE]START processing: state #15 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.030509: | #15 is idle
Aug 26 18:23:58.030580: "test" #15: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.030584: | **emit ISAKMP Message:
Aug 26 18:23:58.030587: |    initiator cookie:
Aug 26 18:23:58.030589: |   47 f3 8b 00  b2 a7 f2 b9
Aug 26 18:23:58.030592: |    responder cookie:
Aug 26 18:23:58.030594: |   1b 1d 45 77  94 11 ae 5e
Aug 26 18:23:58.030596: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.030598: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.030601: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.030603: |    flags: none (0x0)
Aug 26 18:23:58.030605: |    Message ID: 0 (0x0)
Aug 26 18:23:58.030608: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.030611: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.030613: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.030616: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.030618: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.030621: |    SPI size: 0 (0x0)
Aug 26 18:23:58.030623: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.030626: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.030629: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.030632: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.030634: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.030641: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #15)
Aug 26 18:23:58.030644: |   47 f3 8b 00  b2 a7 f2 b9  1b 1d 45 77  94 11 ae 5e
Aug 26 18:23:58.030646: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.030649: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.030665: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.030671: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.030675: | stop processing: state #15 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.030679: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.030684: | spent 0.461 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.069962: | spent 0.00375 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.069996: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.070000: |   c3 e7 5e 3a  93 01 39 85  00 00 00 00  00 00 00 00
Aug 26 18:23:58.070003: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.070006: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.070009: |   00 00 00 14  01 01 00 00  80 01 00 13  80 02 00 16
Aug 26 18:23:58.070011: |   80 03 00 15
Aug 26 18:23:58.070016: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.070021: | **parse ISAKMP Message:
Aug 26 18:23:58.070024: |    initiator cookie:
Aug 26 18:23:58.070027: |   c3 e7 5e 3a  93 01 39 85
Aug 26 18:23:58.070029: |    responder cookie:
Aug 26 18:23:58.070032: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.070035: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.070038: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.070041: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.070044: |    flags: none (0x0)
Aug 26 18:23:58.070047: |    Message ID: 0 (0x0)
Aug 26 18:23:58.070050: |    length: 68 (0x44)
Aug 26 18:23:58.070053: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.070060: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.070064: | #null state always idle
Aug 26 18:23:58.070067: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.070071: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.070074: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.070077: |    length: 40 (0x28)
Aug 26 18:23:58.070079: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.070082: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.070085: | in statetime_start() with no state
Aug 26 18:23:58.070091: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.070097: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.070100: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.070104: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.070107: | find_next_host_connection returns test
Aug 26 18:23:58.070110: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.070113: | find_next_host_connection returns empty
Aug 26 18:23:58.070139: | creating state object #16 at 0x55f088ae5aa0
Aug 26 18:23:58.070143: | State DB: adding IKEv1 state #16 in UNDEFINED
Aug 26 18:23:58.070148: | pstats #16 ikev1.isakmp started
Aug 26 18:23:58.070153: | #16 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.070160: | start processing: state #16 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.070164: | parent state #16: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.070168: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.070171: "test" #16: responding to Main Mode
Aug 26 18:23:58.070176: | **emit ISAKMP Message:
Aug 26 18:23:58.070179: |    initiator cookie:
Aug 26 18:23:58.070182: |   c3 e7 5e 3a  93 01 39 85
Aug 26 18:23:58.070184: |    responder cookie:
Aug 26 18:23:58.070187: |   45 e2 45 77  a6 ad 6a b5
Aug 26 18:23:58.070190: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.070192: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.070195: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.070198: |    flags: none (0x0)
Aug 26 18:23:58.070201: |    Message ID: 0 (0x0)
Aug 26 18:23:58.070204: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.070207: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.070211: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.070213: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.070216: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.070219: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.070223: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.070226: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.070229: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.070232: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.070235: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.070238: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.070241: |    length: 28 (0x1c)
Aug 26 18:23:58.070244: |    proposal number: 1 (0x1)
Aug 26 18:23:58.070247: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.070249: |    SPI size: 0 (0x0)
Aug 26 18:23:58.070252: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.070255: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.070258: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.070262: |    length: 20 (0x14)
Aug 26 18:23:58.070265: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.070268: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.070271: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.070274: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.070277: |    length/value: 19 (0x13)
Aug 26 18:23:58.070280: |    [19 is OAKLEY_AES_GCM_B]
Aug 26 18:23:58.070284: "test" #16: OAKLEY_AES_GCM_B is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.070287: "test" #16: no acceptable Oakley Transform
Aug 26 18:23:58.070297: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.070302: | [RE]START processing: state #16 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.070305: | #16 is idle
Aug 26 18:23:58.070775: "test" #16: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.070784: | **emit ISAKMP Message:
Aug 26 18:23:58.070787: |    initiator cookie:
Aug 26 18:23:58.070790: |   c3 e7 5e 3a  93 01 39 85
Aug 26 18:23:58.070793: |    responder cookie:
Aug 26 18:23:58.070795: |   45 e2 45 77  a6 ad 6a b5
Aug 26 18:23:58.070798: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.070801: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.070804: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.070807: |    flags: none (0x0)
Aug 26 18:23:58.070810: |    Message ID: 0 (0x0)
Aug 26 18:23:58.070813: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.070816: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.070819: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.070822: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.070825: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.070828: |    SPI size: 0 (0x0)
Aug 26 18:23:58.070830: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.070834: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.070837: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.070841: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.070843: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.070850: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #16)
Aug 26 18:23:58.070853: |   c3 e7 5e 3a  93 01 39 85  45 e2 45 77  a6 ad 6a b5
Aug 26 18:23:58.070856: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.070858: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.070889: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.070897: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.070902: | stop processing: state #16 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.070906: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.070912: | spent 0.909 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.111361: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.111388: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.111392: |   26 56 f6 a9  98 27 88 c9  00 00 00 00  00 00 00 00
Aug 26 18:23:58.111395: |   01 10 02 00  00 00 00 00  00 00 00 48  00 00 00 2c
Aug 26 18:23:58.111398: |   00 00 00 01  00 00 00 01  00 00 00 20  01 01 00 01
Aug 26 18:23:58.111400: |   00 00 00 18  01 01 00 00  80 01 00 12  80 02 00 11
Aug 26 18:23:58.111403: |   80 03 00 16  80 04 00 15
Aug 26 18:23:58.111408: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.111413: | **parse ISAKMP Message:
Aug 26 18:23:58.111416: |    initiator cookie:
Aug 26 18:23:58.111418: |   26 56 f6 a9  98 27 88 c9
Aug 26 18:23:58.111424: |    responder cookie:
Aug 26 18:23:58.111426: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.111429: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.111432: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.111435: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.111437: |    flags: none (0x0)
Aug 26 18:23:58.111440: |    Message ID: 0 (0x0)
Aug 26 18:23:58.111443: |    length: 72 (0x48)
Aug 26 18:23:58.111445: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.111450: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.111452: | #null state always idle
Aug 26 18:23:58.111456: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.111459: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.111462: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.111464: |    length: 44 (0x2c)
Aug 26 18:23:58.111466: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.111469: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.111471: | in statetime_start() with no state
Aug 26 18:23:58.111477: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.111482: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.111485: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.111489: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.111491: | find_next_host_connection returns test
Aug 26 18:23:58.111494: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.111496: | find_next_host_connection returns empty
Aug 26 18:23:58.111522: | creating state object #17 at 0x55f088ae6560
Aug 26 18:23:58.111526: | State DB: adding IKEv1 state #17 in UNDEFINED
Aug 26 18:23:58.111533: | pstats #17 ikev1.isakmp started
Aug 26 18:23:58.111538: | #17 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.111544: | start processing: state #17 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.111548: | parent state #17: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.111551: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.111555: "test" #17: responding to Main Mode
Aug 26 18:23:58.111560: | **emit ISAKMP Message:
Aug 26 18:23:58.111563: |    initiator cookie:
Aug 26 18:23:58.111566: |   26 56 f6 a9  98 27 88 c9
Aug 26 18:23:58.111568: |    responder cookie:
Aug 26 18:23:58.111570: |   2e 09 4e ca  87 ba 8c 01
Aug 26 18:23:58.111573: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.111576: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.111578: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.111581: |    flags: none (0x0)
Aug 26 18:23:58.111583: |    Message ID: 0 (0x0)
Aug 26 18:23:58.111586: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.111589: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.111592: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.111595: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.111597: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.111600: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.111603: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.111606: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.111610: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.111613: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.111615: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.111620: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.111623: |    length: 32 (0x20)
Aug 26 18:23:58.111626: |    proposal number: 1 (0x1)
Aug 26 18:23:58.111628: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.111630: |    SPI size: 0 (0x0)
Aug 26 18:23:58.111633: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.111636: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.111638: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.111640: |    length: 24 (0x18)
Aug 26 18:23:58.111643: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.111645: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.111648: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.111650: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.111653: |    length/value: 18 (0x12)
Aug 26 18:23:58.111655: |    [18 is OAKLEY_AES_GCM_A]
Aug 26 18:23:58.111659: "test" #17: OAKLEY_AES_GCM_A is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.111662: "test" #17: no acceptable Oakley Transform
Aug 26 18:23:58.111665: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.111670: | [RE]START processing: state #17 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.111673: | #17 is idle
Aug 26 18:23:58.111744: "test" #17: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.111750: | **emit ISAKMP Message:
Aug 26 18:23:58.111753: |    initiator cookie:
Aug 26 18:23:58.111756: |   26 56 f6 a9  98 27 88 c9
Aug 26 18:23:58.111758: |    responder cookie:
Aug 26 18:23:58.111761: |   2e 09 4e ca  87 ba 8c 01
Aug 26 18:23:58.111764: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.111767: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.111769: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.111772: |    flags: none (0x0)
Aug 26 18:23:58.111775: |    Message ID: 0 (0x0)
Aug 26 18:23:58.111778: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.111781: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.111784: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.111787: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.111790: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.111792: |    SPI size: 0 (0x0)
Aug 26 18:23:58.111795: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.111798: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.111802: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.111805: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.111808: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.111815: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #17)
Aug 26 18:23:58.111819: |   26 56 f6 a9  98 27 88 c9  2e 09 4e ca  87 ba 8c 01
Aug 26 18:23:58.111821: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.111824: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.111842: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.111848: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.111854: | stop processing: state #17 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.111857: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.111864: | spent 0.484 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.153729: | spent 0.00383 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.153757: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.153762: |   a4 85 27 5a  e4 56 a8 0b  00 00 00 00  00 00 00 00
Aug 26 18:23:58.153765: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.153771: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.153774: |   00 00 00 14  01 01 00 00  80 02 00 11  80 03 00 16
Aug 26 18:23:58.153777: |   80 04 00 15
Aug 26 18:23:58.153783: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.153788: | **parse ISAKMP Message:
Aug 26 18:23:58.153791: |    initiator cookie:
Aug 26 18:23:58.153794: |   a4 85 27 5a  e4 56 a8 0b
Aug 26 18:23:58.153797: |    responder cookie:
Aug 26 18:23:58.153799: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.153803: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.153806: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.153809: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.153812: |    flags: none (0x0)
Aug 26 18:23:58.153815: |    Message ID: 0 (0x0)
Aug 26 18:23:58.153818: |    length: 68 (0x44)
Aug 26 18:23:58.153822: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.153826: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.153829: | #null state always idle
Aug 26 18:23:58.153833: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.153837: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.153840: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.153843: |    length: 40 (0x28)
Aug 26 18:23:58.153846: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.153849: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.153852: | in statetime_start() with no state
Aug 26 18:23:58.153858: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.153864: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.153868: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.153872: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.153875: | find_next_host_connection returns test
Aug 26 18:23:58.153878: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.153881: | find_next_host_connection returns empty
Aug 26 18:23:58.153902: | creating state object #18 at 0x55f088ae7020
Aug 26 18:23:58.153906: | State DB: adding IKEv1 state #18 in UNDEFINED
Aug 26 18:23:58.153911: | pstats #18 ikev1.isakmp started
Aug 26 18:23:58.153916: | #18 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.153923: | start processing: state #18 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.153927: | parent state #18: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.153931: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.153934: "test" #18: responding to Main Mode
Aug 26 18:23:58.153940: | **emit ISAKMP Message:
Aug 26 18:23:58.153943: |    initiator cookie:
Aug 26 18:23:58.153946: |   a4 85 27 5a  e4 56 a8 0b
Aug 26 18:23:58.153948: |    responder cookie:
Aug 26 18:23:58.153951: |   5d 4e 2d ba  80 bb 52 a5
Aug 26 18:23:58.153954: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.153957: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.153960: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.153963: |    flags: none (0x0)
Aug 26 18:23:58.153966: |    Message ID: 0 (0x0)
Aug 26 18:23:58.153969: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.153972: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.153976: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.153979: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.153982: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.153985: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.153991: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.153994: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.153998: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.154001: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.154004: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.154007: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.154010: |    length: 28 (0x1c)
Aug 26 18:23:58.154013: |    proposal number: 1 (0x1)
Aug 26 18:23:58.154016: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.154019: |    SPI size: 0 (0x0)
Aug 26 18:23:58.154022: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.154025: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.154028: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.154031: |    length: 20 (0x14)
Aug 26 18:23:58.154034: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.154037: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.154040: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.154044: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:23:58.154046: |    length/value: 17 (0x11)
Aug 26 18:23:58.154051: "test" #18: 17?? is not supported.  Attribute OAKLEY_HASH_ALGORITHM
Aug 26 18:23:58.154055: "test" #18: no acceptable Oakley Transform
Aug 26 18:23:58.154058: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.154063: | [RE]START processing: state #18 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.154066: | #18 is idle
Aug 26 18:23:58.155257: "test" #18: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.155270: | **emit ISAKMP Message:
Aug 26 18:23:58.155274: |    initiator cookie:
Aug 26 18:23:58.155276: |   a4 85 27 5a  e4 56 a8 0b
Aug 26 18:23:58.155279: |    responder cookie:
Aug 26 18:23:58.155281: |   5d 4e 2d ba  80 bb 52 a5
Aug 26 18:23:58.155284: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.155291: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.155295: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.155298: |    flags: none (0x0)
Aug 26 18:23:58.155301: |    Message ID: 0 (0x0)
Aug 26 18:23:58.155304: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.155307: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.155310: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.155313: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.155316: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.155318: |    SPI size: 0 (0x0)
Aug 26 18:23:58.155321: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.155324: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.155327: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.155330: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.155333: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.155340: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #18)
Aug 26 18:23:58.155343: |   a4 85 27 5a  e4 56 a8 0b  5d 4e 2d ba  80 bb 52 a5
Aug 26 18:23:58.155345: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.155348: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.155387: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.155393: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.155399: | stop processing: state #18 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.155403: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.155412: | spent 0.547 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.209762: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.209790: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.209794: |   c1 bb bf 58  5e d9 4b b3  00 00 00 00  00 00 00 00
Aug 26 18:23:58.209797: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.209799: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.209802: |   00 00 00 14  01 01 00 00  80 01 00 12  80 03 00 16
Aug 26 18:23:58.209804: |   80 04 00 15
Aug 26 18:23:58.209810: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.209814: | **parse ISAKMP Message:
Aug 26 18:23:58.209817: |    initiator cookie:
Aug 26 18:23:58.209820: |   c1 bb bf 58  5e d9 4b b3
Aug 26 18:23:58.209822: |    responder cookie:
Aug 26 18:23:58.209825: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.209828: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.209831: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.209833: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.209837: |    flags: none (0x0)
Aug 26 18:23:58.209839: |    Message ID: 0 (0x0)
Aug 26 18:23:58.209842: |    length: 68 (0x44)
Aug 26 18:23:58.209845: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.209849: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.209852: | #null state always idle
Aug 26 18:23:58.209855: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.209859: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.209861: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.209864: |    length: 40 (0x28)
Aug 26 18:23:58.209867: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.209870: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.209872: | in statetime_start() with no state
Aug 26 18:23:58.209878: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.209883: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.209886: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.209890: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.209893: | find_next_host_connection returns test
Aug 26 18:23:58.209896: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.209899: | find_next_host_connection returns empty
Aug 26 18:23:58.209923: | creating state object #19 at 0x55f088ae7ae0
Aug 26 18:23:58.209927: | State DB: adding IKEv1 state #19 in UNDEFINED
Aug 26 18:23:58.209931: | pstats #19 ikev1.isakmp started
Aug 26 18:23:58.209936: | #19 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.209942: | start processing: state #19 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.209946: | parent state #19: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.209949: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.209953: "test" #19: responding to Main Mode
Aug 26 18:23:58.209958: | **emit ISAKMP Message:
Aug 26 18:23:58.209961: |    initiator cookie:
Aug 26 18:23:58.209963: |   c1 bb bf 58  5e d9 4b b3
Aug 26 18:23:58.209966: |    responder cookie:
Aug 26 18:23:58.209968: |   75 1c dd 87  ba 97 00 de
Aug 26 18:23:58.209971: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.209973: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.209976: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.209979: |    flags: none (0x0)
Aug 26 18:23:58.209981: |    Message ID: 0 (0x0)
Aug 26 18:23:58.209984: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.209987: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.209993: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.209996: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.209999: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.210002: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.210005: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.210008: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.210012: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.210015: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.210018: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.210020: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.210023: |    length: 28 (0x1c)
Aug 26 18:23:58.210026: |    proposal number: 1 (0x1)
Aug 26 18:23:58.210028: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.210031: |    SPI size: 0 (0x0)
Aug 26 18:23:58.210033: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.210036: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.210039: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.210041: |    length: 20 (0x14)
Aug 26 18:23:58.210044: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.210046: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.210049: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.210052: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.210055: |    length/value: 18 (0x12)
Aug 26 18:23:58.210058: |    [18 is OAKLEY_AES_GCM_A]
Aug 26 18:23:58.210062: "test" #19: OAKLEY_AES_GCM_A is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.210064: "test" #19: no acceptable Oakley Transform
Aug 26 18:23:58.210067: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.210072: | [RE]START processing: state #19 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.210075: | #19 is idle
Aug 26 18:23:58.210142: "test" #19: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.210146: | **emit ISAKMP Message:
Aug 26 18:23:58.210149: |    initiator cookie:
Aug 26 18:23:58.210152: |   c1 bb bf 58  5e d9 4b b3
Aug 26 18:23:58.210154: |    responder cookie:
Aug 26 18:23:58.210156: |   75 1c dd 87  ba 97 00 de
Aug 26 18:23:58.210159: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.210162: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.210164: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.210167: |    flags: none (0x0)
Aug 26 18:23:58.210169: |    Message ID: 0 (0x0)
Aug 26 18:23:58.210172: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.210175: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.210178: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.210181: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.210183: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.210186: |    SPI size: 0 (0x0)
Aug 26 18:23:58.210188: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.210192: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.210195: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.210198: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.210201: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.210207: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #19)
Aug 26 18:23:58.210210: |   c1 bb bf 58  5e d9 4b b3  75 1c dd 87  ba 97 00 de
Aug 26 18:23:58.210212: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.210217: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.210238: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.210244: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.210249: | stop processing: state #19 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.210252: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.210258: | spent 0.47 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.257760: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.257791: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.257797: |   6c 8a 09 03  14 76 2a 9e  00 00 00 00  00 00 00 00
Aug 26 18:23:58.257800: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.257802: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.257805: |   00 00 00 14  01 01 00 00  80 01 00 12  80 02 00 11
Aug 26 18:23:58.257808: |   80 04 00 15
Aug 26 18:23:58.257813: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.257818: | **parse ISAKMP Message:
Aug 26 18:23:58.257821: |    initiator cookie:
Aug 26 18:23:58.257824: |   6c 8a 09 03  14 76 2a 9e
Aug 26 18:23:58.257826: |    responder cookie:
Aug 26 18:23:58.257828: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.257831: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.257834: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.257837: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.257840: |    flags: none (0x0)
Aug 26 18:23:58.257843: |    Message ID: 0 (0x0)
Aug 26 18:23:58.257845: |    length: 68 (0x44)
Aug 26 18:23:58.257849: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.257853: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.257855: | #null state always idle
Aug 26 18:23:58.257859: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.257862: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.257865: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.257868: |    length: 40 (0x28)
Aug 26 18:23:58.257870: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.257873: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.257876: | in statetime_start() with no state
Aug 26 18:23:58.257882: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.257888: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.257891: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.257895: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.257898: | find_next_host_connection returns test
Aug 26 18:23:58.257901: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.257904: | find_next_host_connection returns empty
Aug 26 18:23:58.257933: | creating state object #20 at 0x55f088ae85a0
Aug 26 18:23:58.257937: | State DB: adding IKEv1 state #20 in UNDEFINED
Aug 26 18:23:58.257942: | pstats #20 ikev1.isakmp started
Aug 26 18:23:58.257948: | #20 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.257955: | start processing: state #20 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.257960: | parent state #20: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.257964: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.257967: "test" #20: responding to Main Mode
Aug 26 18:23:58.257974: | **emit ISAKMP Message:
Aug 26 18:23:58.257977: |    initiator cookie:
Aug 26 18:23:58.257980: |   6c 8a 09 03  14 76 2a 9e
Aug 26 18:23:58.257982: |    responder cookie:
Aug 26 18:23:58.257985: |   e7 ff 50 8f  21 a6 86 1d
Aug 26 18:23:58.257992: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.257996: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.257999: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.258001: |    flags: none (0x0)
Aug 26 18:23:58.258004: |    Message ID: 0 (0x0)
Aug 26 18:23:58.258007: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.258010: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.258014: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.258018: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.258021: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.258024: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.258028: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.258031: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.258034: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.258037: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.258040: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.258042: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.258045: |    length: 28 (0x1c)
Aug 26 18:23:58.258047: |    proposal number: 1 (0x1)
Aug 26 18:23:58.258050: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.258053: |    SPI size: 0 (0x0)
Aug 26 18:23:58.258055: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.258058: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.258061: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.258063: |    length: 20 (0x14)
Aug 26 18:23:58.258066: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.258068: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.258072: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.258075: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.258077: |    length/value: 18 (0x12)
Aug 26 18:23:58.258080: |    [18 is OAKLEY_AES_GCM_A]
Aug 26 18:23:58.258084: "test" #20: OAKLEY_AES_GCM_A is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.258087: "test" #20: no acceptable Oakley Transform
Aug 26 18:23:58.258090: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.258095: | [RE]START processing: state #20 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.258099: | #20 is idle
Aug 26 18:23:58.258183: "test" #20: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.258188: | **emit ISAKMP Message:
Aug 26 18:23:58.258191: |    initiator cookie:
Aug 26 18:23:58.258193: |   6c 8a 09 03  14 76 2a 9e
Aug 26 18:23:58.258196: |    responder cookie:
Aug 26 18:23:58.258198: |   e7 ff 50 8f  21 a6 86 1d
Aug 26 18:23:58.258201: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.258204: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.258207: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.258209: |    flags: none (0x0)
Aug 26 18:23:58.258212: |    Message ID: 0 (0x0)
Aug 26 18:23:58.258215: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.258218: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.258221: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.258223: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.258226: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.258228: |    SPI size: 0 (0x0)
Aug 26 18:23:58.258231: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.258234: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.258238: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.258243: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.258246: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.258253: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #20)
Aug 26 18:23:58.258256: |   6c 8a 09 03  14 76 2a 9e  e7 ff 50 8f  21 a6 86 1d
Aug 26 18:23:58.258258: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.258261: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.258294: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.258303: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.258308: | stop processing: state #20 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.258311: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.258317: | spent 0.514 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.292487: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.292519: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.292524: |   aa 1e c1 9f  53 d9 f6 e6  00 00 00 00  00 00 00 00
Aug 26 18:23:58.292526: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.292529: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.292531: |   00 00 00 14  01 01 00 00  80 01 00 12  80 02 00 11
Aug 26 18:23:58.292534: |   80 03 00 16
Aug 26 18:23:58.292539: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.292544: | **parse ISAKMP Message:
Aug 26 18:23:58.292547: |    initiator cookie:
Aug 26 18:23:58.292550: |   aa 1e c1 9f  53 d9 f6 e6
Aug 26 18:23:58.292553: |    responder cookie:
Aug 26 18:23:58.292555: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.292558: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.292561: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.292564: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.292566: |    flags: none (0x0)
Aug 26 18:23:58.292569: |    Message ID: 0 (0x0)
Aug 26 18:23:58.292571: |    length: 68 (0x44)
Aug 26 18:23:58.292575: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.292579: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.292582: | #null state always idle
Aug 26 18:23:58.292586: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.292589: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.292592: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.292594: |    length: 40 (0x28)
Aug 26 18:23:58.292597: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.292600: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.292603: | in statetime_start() with no state
Aug 26 18:23:58.292609: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.292615: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.292619: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.292623: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.292625: | find_next_host_connection returns test
Aug 26 18:23:58.292628: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.292631: | find_next_host_connection returns empty
Aug 26 18:23:58.292656: | creating state object #21 at 0x55f088ae9060
Aug 26 18:23:58.292661: | State DB: adding IKEv1 state #21 in UNDEFINED
Aug 26 18:23:58.292666: | pstats #21 ikev1.isakmp started
Aug 26 18:23:58.292671: | #21 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.292678: | start processing: state #21 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.292686: | parent state #21: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.292690: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.292694: "test" #21: responding to Main Mode
Aug 26 18:23:58.292699: | **emit ISAKMP Message:
Aug 26 18:23:58.292703: |    initiator cookie:
Aug 26 18:23:58.292706: |   aa 1e c1 9f  53 d9 f6 e6
Aug 26 18:23:58.292708: |    responder cookie:
Aug 26 18:23:58.292711: |   b6 4a 42 be  21 8f 95 53
Aug 26 18:23:58.292714: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.292717: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.292720: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.292722: |    flags: none (0x0)
Aug 26 18:23:58.292725: |    Message ID: 0 (0x0)
Aug 26 18:23:58.292728: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.292731: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.292735: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.292738: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.292741: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.292744: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.292748: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.292751: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.292755: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.292758: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.292761: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.292764: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.292767: |    length: 28 (0x1c)
Aug 26 18:23:58.292769: |    proposal number: 1 (0x1)
Aug 26 18:23:58.292772: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.292775: |    SPI size: 0 (0x0)
Aug 26 18:23:58.292777: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.292781: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.292784: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.292786: |    length: 20 (0x14)
Aug 26 18:23:58.292789: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.292792: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.292795: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.292798: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.292801: |    length/value: 18 (0x12)
Aug 26 18:23:58.292804: |    [18 is OAKLEY_AES_GCM_A]
Aug 26 18:23:58.292809: "test" #21: OAKLEY_AES_GCM_A is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.292812: "test" #21: no acceptable Oakley Transform
Aug 26 18:23:58.292815: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.292820: | [RE]START processing: state #21 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.292823: | #21 is idle
Aug 26 18:23:58.292921: "test" #21: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.292926: | **emit ISAKMP Message:
Aug 26 18:23:58.292929: |    initiator cookie:
Aug 26 18:23:58.292932: |   aa 1e c1 9f  53 d9 f6 e6
Aug 26 18:23:58.292934: |    responder cookie:
Aug 26 18:23:58.292936: |   b6 4a 42 be  21 8f 95 53
Aug 26 18:23:58.292939: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.292942: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.292945: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.292947: |    flags: none (0x0)
Aug 26 18:23:58.292950: |    Message ID: 0 (0x0)
Aug 26 18:23:58.292953: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.292956: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.292959: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.292964: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.292966: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.292969: |    SPI size: 0 (0x0)
Aug 26 18:23:58.292971: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.292974: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.292977: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.292980: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.292983: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.292989: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #21)
Aug 26 18:23:58.292991: |   aa 1e c1 9f  53 d9 f6 e6  b6 4a 42 be  21 8f 95 53
Aug 26 18:23:58.292994: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.292996: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.293028: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.293035: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.293040: | stop processing: state #21 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.293044: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.293050: | spent 0.521 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.344241: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.344278: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.344282: |   e9 61 d8 96  0c 4a 41 7f  00 00 00 00  00 00 00 00
Aug 26 18:23:58.344285: |   01 10 02 00  00 00 00 00  00 00 00 48  00 00 00 2c
Aug 26 18:23:58.344292: |   00 00 00 01  00 00 00 01  00 00 00 20  01 01 00 01
Aug 26 18:23:58.344296: |   00 00 00 18  01 01 00 00  80 01 00 02  80 02 00 0c
Aug 26 18:23:58.344299: |   80 03 00 1e  80 04 00 20
Aug 26 18:23:58.344304: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.344309: | **parse ISAKMP Message:
Aug 26 18:23:58.344312: |    initiator cookie:
Aug 26 18:23:58.344314: |   e9 61 d8 96  0c 4a 41 7f
Aug 26 18:23:58.344317: |    responder cookie:
Aug 26 18:23:58.344319: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.344322: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.344324: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.344327: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.344330: |    flags: none (0x0)
Aug 26 18:23:58.344332: |    Message ID: 0 (0x0)
Aug 26 18:23:58.344335: |    length: 72 (0x48)
Aug 26 18:23:58.344337: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.344341: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.344344: | #null state always idle
Aug 26 18:23:58.344348: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.344351: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.344353: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.344356: |    length: 44 (0x2c)
Aug 26 18:23:58.344358: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.344360: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.344363: | in statetime_start() with no state
Aug 26 18:23:58.344368: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.344373: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.344376: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.344380: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.344383: | find_next_host_connection returns test
Aug 26 18:23:58.344386: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.344392: | find_next_host_connection returns empty
Aug 26 18:23:58.344422: | creating state object #22 at 0x55f088ae9b20
Aug 26 18:23:58.344425: | State DB: adding IKEv1 state #22 in UNDEFINED
Aug 26 18:23:58.344430: | pstats #22 ikev1.isakmp started
Aug 26 18:23:58.344435: | #22 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.344441: | start processing: state #22 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.344444: | parent state #22: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.344448: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.344451: "test" #22: responding to Main Mode
Aug 26 18:23:58.344455: | **emit ISAKMP Message:
Aug 26 18:23:58.344458: |    initiator cookie:
Aug 26 18:23:58.344460: |   e9 61 d8 96  0c 4a 41 7f
Aug 26 18:23:58.344462: |    responder cookie:
Aug 26 18:23:58.344465: |   e9 24 f4 c5  bc 03 82 0a
Aug 26 18:23:58.344467: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.344469: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.344472: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.344474: |    flags: none (0x0)
Aug 26 18:23:58.344477: |    Message ID: 0 (0x0)
Aug 26 18:23:58.344479: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.344482: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.344485: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.344487: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.344490: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.344493: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.344496: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.344498: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.344502: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.344505: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.344508: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.344510: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.344512: |    length: 32 (0x20)
Aug 26 18:23:58.344515: |    proposal number: 1 (0x1)
Aug 26 18:23:58.344517: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.344519: |    SPI size: 0 (0x0)
Aug 26 18:23:58.344522: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.344525: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.344527: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.344529: |    length: 24 (0x18)
Aug 26 18:23:58.344532: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.344534: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.344537: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.344539: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.344542: |    length/value: 2 (0x2)
Aug 26 18:23:58.344545: |    [2 is OAKLEY_IDEA_CBC(UNUSED)]
Aug 26 18:23:58.344549: "test" #22: OAKLEY_IDEA_CBC(UNUSED) is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.344551: "test" #22: no acceptable Oakley Transform
Aug 26 18:23:58.344555: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.344559: | [RE]START processing: state #22 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.344561: | #22 is idle
Aug 26 18:23:58.344629: "test" #22: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.344634: | **emit ISAKMP Message:
Aug 26 18:23:58.344636: |    initiator cookie:
Aug 26 18:23:58.344639: |   e9 61 d8 96  0c 4a 41 7f
Aug 26 18:23:58.344641: |    responder cookie:
Aug 26 18:23:58.344643: |   e9 24 f4 c5  bc 03 82 0a
Aug 26 18:23:58.344646: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.344650: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.344653: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.344656: |    flags: none (0x0)
Aug 26 18:23:58.344658: |    Message ID: 0 (0x0)
Aug 26 18:23:58.344661: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.344664: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.344666: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.344669: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.344671: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.344673: |    SPI size: 0 (0x0)
Aug 26 18:23:58.344676: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.344678: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.344681: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.344684: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.344686: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.344692: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #22)
Aug 26 18:23:58.344694: |   e9 61 d8 96  0c 4a 41 7f  e9 24 f4 c5  bc 03 82 0a
Aug 26 18:23:58.344697: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.344699: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.344726: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.344732: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.344736: | stop processing: state #22 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.344739: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.344745: | spent 0.462 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.398783: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.398814: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.398819: |   e3 2b 4c 18  56 49 d7 a5  00 00 00 00  00 00 00 00
Aug 26 18:23:58.398822: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.398824: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.398827: |   00 00 00 14  01 01 00 00  80 02 00 0c  80 03 00 1e
Aug 26 18:23:58.398829: |   80 04 00 20
Aug 26 18:23:58.398834: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.398839: | **parse ISAKMP Message:
Aug 26 18:23:58.398842: |    initiator cookie:
Aug 26 18:23:58.398845: |   e3 2b 4c 18  56 49 d7 a5
Aug 26 18:23:58.398847: |    responder cookie:
Aug 26 18:23:58.398850: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.398853: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.398856: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.398859: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.398862: |    flags: none (0x0)
Aug 26 18:23:58.398865: |    Message ID: 0 (0x0)
Aug 26 18:23:58.398868: |    length: 68 (0x44)
Aug 26 18:23:58.398871: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.398875: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.398879: | #null state always idle
Aug 26 18:23:58.398882: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.398885: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.398888: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.398891: |    length: 40 (0x28)
Aug 26 18:23:58.398894: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.398897: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.398899: | in statetime_start() with no state
Aug 26 18:23:58.398905: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.398915: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.398918: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.398922: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.398925: | find_next_host_connection returns test
Aug 26 18:23:58.398928: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.398931: | find_next_host_connection returns empty
Aug 26 18:23:58.398953: | creating state object #23 at 0x55f088aea5e0
Aug 26 18:23:58.398957: | State DB: adding IKEv1 state #23 in UNDEFINED
Aug 26 18:23:58.398962: | pstats #23 ikev1.isakmp started
Aug 26 18:23:58.398967: | #23 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.398973: | start processing: state #23 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.398978: | parent state #23: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.398981: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.398984: "test" #23: responding to Main Mode
Aug 26 18:23:58.398990: | **emit ISAKMP Message:
Aug 26 18:23:58.398993: |    initiator cookie:
Aug 26 18:23:58.398996: |   e3 2b 4c 18  56 49 d7 a5
Aug 26 18:23:58.398999: |    responder cookie:
Aug 26 18:23:58.399001: |   85 de 44 24  44 bd 68 9d
Aug 26 18:23:58.399004: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.399007: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.399009: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.399012: |    flags: none (0x0)
Aug 26 18:23:58.399015: |    Message ID: 0 (0x0)
Aug 26 18:23:58.399018: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.399021: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.399024: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.399027: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.399029: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.399033: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.399036: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.399039: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.399043: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.399046: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.399049: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.399052: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.399055: |    length: 28 (0x1c)
Aug 26 18:23:58.399057: |    proposal number: 1 (0x1)
Aug 26 18:23:58.399060: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.399063: |    SPI size: 0 (0x0)
Aug 26 18:23:58.399065: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.399068: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.399071: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.399074: |    length: 20 (0x14)
Aug 26 18:23:58.399076: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.399079: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.399082: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.399085: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:23:58.399088: |    length/value: 12 (0xc)
Aug 26 18:23:58.399092: "test" #23: 12?? is not supported.  Attribute OAKLEY_HASH_ALGORITHM
Aug 26 18:23:58.399095: "test" #23: no acceptable Oakley Transform
Aug 26 18:23:58.399099: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.399104: | [RE]START processing: state #23 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.399109: | #23 is idle
Aug 26 18:23:58.399630: "test" #23: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.399642: | **emit ISAKMP Message:
Aug 26 18:23:58.399646: |    initiator cookie:
Aug 26 18:23:58.399648: |   e3 2b 4c 18  56 49 d7 a5
Aug 26 18:23:58.399651: |    responder cookie:
Aug 26 18:23:58.399653: |   85 de 44 24  44 bd 68 9d
Aug 26 18:23:58.399656: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.399659: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.399662: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.399665: |    flags: none (0x0)
Aug 26 18:23:58.399667: |    Message ID: 0 (0x0)
Aug 26 18:23:58.399670: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.399673: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.399676: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.399679: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.399681: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.399684: |    SPI size: 0 (0x0)
Aug 26 18:23:58.399687: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.399690: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.399693: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.399696: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.399699: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.399706: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #23)
Aug 26 18:23:58.399709: |   e3 2b 4c 18  56 49 d7 a5  85 de 44 24  44 bd 68 9d
Aug 26 18:23:58.399712: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.399714: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.399747: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.399754: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.399759: | stop processing: state #23 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.399762: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.399768: | spent 0.946 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.442187: | spent 0.00409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.442217: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.442222: |   ed 5b a9 af  bd 06 a1 60  00 00 00 00  00 00 00 00
Aug 26 18:23:58.442225: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.442228: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.442230: |   00 00 00 14  01 01 00 00  80 01 00 02  80 03 00 1e
Aug 26 18:23:58.442232: |   80 04 00 20
Aug 26 18:23:58.442238: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.442242: | **parse ISAKMP Message:
Aug 26 18:23:58.442245: |    initiator cookie:
Aug 26 18:23:58.442248: |   ed 5b a9 af  bd 06 a1 60
Aug 26 18:23:58.442250: |    responder cookie:
Aug 26 18:23:58.442252: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.442256: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.442259: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.442262: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.442264: |    flags: none (0x0)
Aug 26 18:23:58.442267: |    Message ID: 0 (0x0)
Aug 26 18:23:58.442270: |    length: 68 (0x44)
Aug 26 18:23:58.442273: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.442277: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.442280: | #null state always idle
Aug 26 18:23:58.442284: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.442287: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.442306: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.442309: |    length: 40 (0x28)
Aug 26 18:23:58.442311: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.442314: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.442316: | in statetime_start() with no state
Aug 26 18:23:58.442323: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.442328: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.442332: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.442336: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.442338: | find_next_host_connection returns test
Aug 26 18:23:58.442341: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.442344: | find_next_host_connection returns empty
Aug 26 18:23:58.442367: | creating state object #24 at 0x55f088aeb0a0
Aug 26 18:23:58.442371: | State DB: adding IKEv1 state #24 in UNDEFINED
Aug 26 18:23:58.442375: | pstats #24 ikev1.isakmp started
Aug 26 18:23:58.442380: | #24 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.442386: | start processing: state #24 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.442390: | parent state #24: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.442394: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.442397: "test" #24: responding to Main Mode
Aug 26 18:23:58.442402: | **emit ISAKMP Message:
Aug 26 18:23:58.442405: |    initiator cookie:
Aug 26 18:23:58.442407: |   ed 5b a9 af  bd 06 a1 60
Aug 26 18:23:58.442410: |    responder cookie:
Aug 26 18:23:58.442412: |   4e 8c a5 96  6a 9e f5 db
Aug 26 18:23:58.442415: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.442418: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.442420: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.442423: |    flags: none (0x0)
Aug 26 18:23:58.442426: |    Message ID: 0 (0x0)
Aug 26 18:23:58.442429: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.442432: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.442435: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.442438: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.442440: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.442444: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.442447: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.442450: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.442454: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.442456: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.442459: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.442462: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.442465: |    length: 28 (0x1c)
Aug 26 18:23:58.442467: |    proposal number: 1 (0x1)
Aug 26 18:23:58.442470: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.442473: |    SPI size: 0 (0x0)
Aug 26 18:23:58.442475: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.442479: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.442481: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.442484: |    length: 20 (0x14)
Aug 26 18:23:58.442486: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.442489: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.442492: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.442495: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.442497: |    length/value: 2 (0x2)
Aug 26 18:23:58.442503: |    [2 is OAKLEY_IDEA_CBC(UNUSED)]
Aug 26 18:23:58.442507: "test" #24: OAKLEY_IDEA_CBC(UNUSED) is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.442510: "test" #24: no acceptable Oakley Transform
Aug 26 18:23:58.442513: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.442519: | [RE]START processing: state #24 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.442521: | #24 is idle
Aug 26 18:23:58.443154: "test" #24: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.443163: | **emit ISAKMP Message:
Aug 26 18:23:58.443167: |    initiator cookie:
Aug 26 18:23:58.443170: |   ed 5b a9 af  bd 06 a1 60
Aug 26 18:23:58.443173: |    responder cookie:
Aug 26 18:23:58.443175: |   4e 8c a5 96  6a 9e f5 db
Aug 26 18:23:58.443178: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.443181: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.443184: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.443187: |    flags: none (0x0)
Aug 26 18:23:58.443189: |    Message ID: 0 (0x0)
Aug 26 18:23:58.443193: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.443196: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.443199: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.443202: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.443205: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.443207: |    SPI size: 0 (0x0)
Aug 26 18:23:58.443210: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.443214: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.443217: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.443220: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.443223: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.443230: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #24)
Aug 26 18:23:58.443233: |   ed 5b a9 af  bd 06 a1 60  4e 8c a5 96  6a 9e f5 db
Aug 26 18:23:58.443235: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.443238: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.443274: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.443282: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.443298: | stop processing: state #24 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.443305: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.443311: | spent 0.515 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.486104: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.486131: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.486136: |   9c c1 ad 04  a2 d6 8b 23  00 00 00 00  00 00 00 00
Aug 26 18:23:58.486139: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.486141: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.486144: |   00 00 00 14  01 01 00 00  80 01 00 02  80 02 00 0c
Aug 26 18:23:58.486146: |   80 04 00 20
Aug 26 18:23:58.486151: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.486156: | **parse ISAKMP Message:
Aug 26 18:23:58.486159: |    initiator cookie:
Aug 26 18:23:58.486161: |   9c c1 ad 04  a2 d6 8b 23
Aug 26 18:23:58.486164: |    responder cookie:
Aug 26 18:23:58.486166: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.486169: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.486172: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.486175: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.486180: |    flags: none (0x0)
Aug 26 18:23:58.486183: |    Message ID: 0 (0x0)
Aug 26 18:23:58.486186: |    length: 68 (0x44)
Aug 26 18:23:58.486189: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.486193: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.486196: | #null state always idle
Aug 26 18:23:58.486199: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.486202: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.486205: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.486207: |    length: 40 (0x28)
Aug 26 18:23:58.486209: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.486212: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.486214: | in statetime_start() with no state
Aug 26 18:23:58.486219: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.486225: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.486228: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.486231: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.486234: | find_next_host_connection returns test
Aug 26 18:23:58.486236: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.486239: | find_next_host_connection returns empty
Aug 26 18:23:58.486262: | creating state object #25 at 0x55f088aebb60
Aug 26 18:23:58.486265: | State DB: adding IKEv1 state #25 in UNDEFINED
Aug 26 18:23:58.486270: | pstats #25 ikev1.isakmp started
Aug 26 18:23:58.486275: | #25 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.486280: | start processing: state #25 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.486283: | parent state #25: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.486287: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.486297: "test" #25: responding to Main Mode
Aug 26 18:23:58.486302: | **emit ISAKMP Message:
Aug 26 18:23:58.486305: |    initiator cookie:
Aug 26 18:23:58.486307: |   9c c1 ad 04  a2 d6 8b 23
Aug 26 18:23:58.486310: |    responder cookie:
Aug 26 18:23:58.486312: |   bf a1 92 4e  38 0d 2e de
Aug 26 18:23:58.486314: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.486317: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.486319: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.486322: |    flags: none (0x0)
Aug 26 18:23:58.486324: |    Message ID: 0 (0x0)
Aug 26 18:23:58.486327: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.486330: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.486333: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.486335: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.486338: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.486341: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.486344: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.486346: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.486350: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.486352: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.486355: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.486358: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.486360: |    length: 28 (0x1c)
Aug 26 18:23:58.486362: |    proposal number: 1 (0x1)
Aug 26 18:23:58.486365: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.486367: |    SPI size: 0 (0x0)
Aug 26 18:23:58.486370: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.486376: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.486379: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.486381: |    length: 20 (0x14)
Aug 26 18:23:58.486383: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.486386: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.486389: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.486392: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.486395: |    length/value: 2 (0x2)
Aug 26 18:23:58.486398: |    [2 is OAKLEY_IDEA_CBC(UNUSED)]
Aug 26 18:23:58.486402: "test" #25: OAKLEY_IDEA_CBC(UNUSED) is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.486405: "test" #25: no acceptable Oakley Transform
Aug 26 18:23:58.486408: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.486413: | [RE]START processing: state #25 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.486416: | #25 is idle
Aug 26 18:23:58.486480: "test" #25: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.486485: | **emit ISAKMP Message:
Aug 26 18:23:58.486487: |    initiator cookie:
Aug 26 18:23:58.486490: |   9c c1 ad 04  a2 d6 8b 23
Aug 26 18:23:58.486492: |    responder cookie:
Aug 26 18:23:58.486494: |   bf a1 92 4e  38 0d 2e de
Aug 26 18:23:58.486497: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.486500: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.486502: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.486505: |    flags: none (0x0)
Aug 26 18:23:58.486507: |    Message ID: 0 (0x0)
Aug 26 18:23:58.486510: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.486513: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.486516: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.486518: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.486521: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.486523: |    SPI size: 0 (0x0)
Aug 26 18:23:58.486525: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.486529: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.486531: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.486534: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.486537: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.486543: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #25)
Aug 26 18:23:58.486546: |   9c c1 ad 04  a2 d6 8b 23  bf a1 92 4e  38 0d 2e de
Aug 26 18:23:58.486549: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.486551: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.486574: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.486580: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.486585: | stop processing: state #25 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.486588: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.486594: | spent 0.46 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.520036: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.520065: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.520070: |   fe 5a 58 1b  69 f5 50 7f  00 00 00 00  00 00 00 00
Aug 26 18:23:58.520073: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.520076: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.520078: |   00 00 00 14  01 01 00 00  80 01 00 02  80 02 00 0c
Aug 26 18:23:58.520081: |   80 03 00 1e
Aug 26 18:23:58.520087: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.520096: | **parse ISAKMP Message:
Aug 26 18:23:58.520100: |    initiator cookie:
Aug 26 18:23:58.520102: |   fe 5a 58 1b  69 f5 50 7f
Aug 26 18:23:58.520105: |    responder cookie:
Aug 26 18:23:58.520107: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.520111: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.520114: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.520117: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.520120: |    flags: none (0x0)
Aug 26 18:23:58.520123: |    Message ID: 0 (0x0)
Aug 26 18:23:58.520126: |    length: 68 (0x44)
Aug 26 18:23:58.520129: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.520133: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.520136: | #null state always idle
Aug 26 18:23:58.520140: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.520144: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.520147: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.520149: |    length: 40 (0x28)
Aug 26 18:23:58.520152: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.520155: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.520157: | in statetime_start() with no state
Aug 26 18:23:58.520163: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.520168: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.520172: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.520176: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.520179: | find_next_host_connection returns test
Aug 26 18:23:58.520181: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.520184: | find_next_host_connection returns empty
Aug 26 18:23:58.520210: | creating state object #26 at 0x55f088aec620
Aug 26 18:23:58.520214: | State DB: adding IKEv1 state #26 in UNDEFINED
Aug 26 18:23:58.520219: | pstats #26 ikev1.isakmp started
Aug 26 18:23:58.520224: | #26 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.520231: | start processing: state #26 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.520235: | parent state #26: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.520239: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.520242: "test" #26: responding to Main Mode
Aug 26 18:23:58.520247: | **emit ISAKMP Message:
Aug 26 18:23:58.520250: |    initiator cookie:
Aug 26 18:23:58.520252: |   fe 5a 58 1b  69 f5 50 7f
Aug 26 18:23:58.520255: |    responder cookie:
Aug 26 18:23:58.520257: |   9d 29 2b 52  b4 f8 2b ea
Aug 26 18:23:58.520260: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.520262: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.520265: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.520268: |    flags: none (0x0)
Aug 26 18:23:58.520270: |    Message ID: 0 (0x0)
Aug 26 18:23:58.520274: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.520277: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.520280: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.520283: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.520285: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.520292: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.520298: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.520301: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.520308: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.520312: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.520315: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.520317: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.520320: |    length: 28 (0x1c)
Aug 26 18:23:58.520323: |    proposal number: 1 (0x1)
Aug 26 18:23:58.520326: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.520329: |    SPI size: 0 (0x0)
Aug 26 18:23:58.520332: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.520335: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.520337: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.520340: |    length: 20 (0x14)
Aug 26 18:23:58.520342: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.520345: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.520348: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.520352: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.520354: |    length/value: 2 (0x2)
Aug 26 18:23:58.520357: |    [2 is OAKLEY_IDEA_CBC(UNUSED)]
Aug 26 18:23:58.520362: "test" #26: OAKLEY_IDEA_CBC(UNUSED) is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.520365: "test" #26: no acceptable Oakley Transform
Aug 26 18:23:58.520368: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.520375: | [RE]START processing: state #26 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.520378: | #26 is idle
Aug 26 18:23:58.520461: "test" #26: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.520467: | **emit ISAKMP Message:
Aug 26 18:23:58.520470: |    initiator cookie:
Aug 26 18:23:58.520472: |   fe 5a 58 1b  69 f5 50 7f
Aug 26 18:23:58.520474: |    responder cookie:
Aug 26 18:23:58.520476: |   9d 29 2b 52  b4 f8 2b ea
Aug 26 18:23:58.520479: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.520482: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.520485: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.520488: |    flags: none (0x0)
Aug 26 18:23:58.520490: |    Message ID: 0 (0x0)
Aug 26 18:23:58.520493: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.520497: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.520500: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.520502: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.520505: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.520507: |    SPI size: 0 (0x0)
Aug 26 18:23:58.520510: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.520513: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.520516: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.520519: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.520522: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.520529: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #26)
Aug 26 18:23:58.520532: |   fe 5a 58 1b  69 f5 50 7f  9d 29 2b 52  b4 f8 2b ea
Aug 26 18:23:58.520534: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.520537: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.520567: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.520574: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.520579: | stop processing: state #26 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.520583: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.520590: | spent 0.514 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.558361: | spent 0.00368 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.558390: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.558397: |   b1 43 52 1f  45 9c fc cb  00 00 00 00  00 00 00 00
Aug 26 18:23:58.558400: |   01 10 02 00  00 00 00 00  00 00 00 48  00 00 00 2c
Aug 26 18:23:58.558403: |   00 00 00 01  00 00 00 01  00 00 00 20  01 01 00 01
Aug 26 18:23:58.558405: |   00 00 00 18  01 01 00 00  80 01 00 1a  80 02 00 0e
Aug 26 18:23:58.558407: |   80 03 00 1b  80 04 00 11
Aug 26 18:23:58.558412: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.558417: | **parse ISAKMP Message:
Aug 26 18:23:58.558419: |    initiator cookie:
Aug 26 18:23:58.558422: |   b1 43 52 1f  45 9c fc cb
Aug 26 18:23:58.558424: |    responder cookie:
Aug 26 18:23:58.558427: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.558429: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.558432: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.558435: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.558438: |    flags: none (0x0)
Aug 26 18:23:58.558441: |    Message ID: 0 (0x0)
Aug 26 18:23:58.558443: |    length: 72 (0x48)
Aug 26 18:23:58.558446: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.558450: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.558454: | #null state always idle
Aug 26 18:23:58.558458: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.558461: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.558464: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.558467: |    length: 44 (0x2c)
Aug 26 18:23:58.558470: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.558472: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.558475: | in statetime_start() with no state
Aug 26 18:23:58.558482: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.558488: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.558491: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.558495: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.558498: | find_next_host_connection returns test
Aug 26 18:23:58.558501: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.558503: | find_next_host_connection returns empty
Aug 26 18:23:58.558527: | creating state object #27 at 0x55f088aed0e0
Aug 26 18:23:58.558531: | State DB: adding IKEv1 state #27 in UNDEFINED
Aug 26 18:23:58.558535: | pstats #27 ikev1.isakmp started
Aug 26 18:23:58.558540: | #27 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.558547: | start processing: state #27 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.558552: | parent state #27: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.558555: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.558559: "test" #27: responding to Main Mode
Aug 26 18:23:58.558564: | **emit ISAKMP Message:
Aug 26 18:23:58.558567: |    initiator cookie:
Aug 26 18:23:58.558570: |   b1 43 52 1f  45 9c fc cb
Aug 26 18:23:58.558572: |    responder cookie:
Aug 26 18:23:58.558575: |   37 f6 be 2d  2d 77 c2 d6
Aug 26 18:23:58.558578: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.558581: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.558583: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.558586: |    flags: none (0x0)
Aug 26 18:23:58.558589: |    Message ID: 0 (0x0)
Aug 26 18:23:58.558592: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.558595: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.558598: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.558601: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.558606: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.558610: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.558613: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.558617: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.558620: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.558623: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.558627: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.558629: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.558632: |    length: 32 (0x20)
Aug 26 18:23:58.558635: |    proposal number: 1 (0x1)
Aug 26 18:23:58.558637: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.558640: |    SPI size: 0 (0x0)
Aug 26 18:23:58.558643: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.558646: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.558649: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.558651: |    length: 24 (0x18)
Aug 26 18:23:58.558654: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.558657: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.558660: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.558663: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.558665: |    length/value: 26 (0x1a)
Aug 26 18:23:58.558669: |    [26 is OAKLEY_CAMELLIA_CCM_B]
Aug 26 18:23:58.558673: "test" #27: OAKLEY_CAMELLIA_CCM_B is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.558676: "test" #27: no acceptable Oakley Transform
Aug 26 18:23:58.558680: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.558685: | [RE]START processing: state #27 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.558688: | #27 is idle
Aug 26 18:23:58.558778: "test" #27: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.558783: | **emit ISAKMP Message:
Aug 26 18:23:58.558786: |    initiator cookie:
Aug 26 18:23:58.558789: |   b1 43 52 1f  45 9c fc cb
Aug 26 18:23:58.558791: |    responder cookie:
Aug 26 18:23:58.558794: |   37 f6 be 2d  2d 77 c2 d6
Aug 26 18:23:58.558797: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.558799: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.558802: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.558805: |    flags: none (0x0)
Aug 26 18:23:58.558808: |    Message ID: 0 (0x0)
Aug 26 18:23:58.558810: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.558814: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.558817: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.558820: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.558822: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.558825: |    SPI size: 0 (0x0)
Aug 26 18:23:58.558827: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.558830: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.558833: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.558837: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.558839: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.558846: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #27)
Aug 26 18:23:58.558849: |   b1 43 52 1f  45 9c fc cb  37 f6 be 2d  2d 77 c2 d6
Aug 26 18:23:58.558852: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.558854: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.558886: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.558893: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.558900: | stop processing: state #27 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.558904: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.558909: | spent 0.515 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.610318: | spent 0.00397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.610351: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.610356: |   af 33 6b 61  99 9e 2f f8  00 00 00 00  00 00 00 00
Aug 26 18:23:58.610358: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.610361: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.610364: |   00 00 00 14  01 01 00 00  80 02 00 0e  80 03 00 1b
Aug 26 18:23:58.610366: |   80 04 00 11
Aug 26 18:23:58.610371: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.610376: | **parse ISAKMP Message:
Aug 26 18:23:58.610380: |    initiator cookie:
Aug 26 18:23:58.610382: |   af 33 6b 61  99 9e 2f f8
Aug 26 18:23:58.610385: |    responder cookie:
Aug 26 18:23:58.610387: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.610391: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.610394: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.610397: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.610400: |    flags: none (0x0)
Aug 26 18:23:58.610403: |    Message ID: 0 (0x0)
Aug 26 18:23:58.610405: |    length: 68 (0x44)
Aug 26 18:23:58.610408: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.610413: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.610415: | #null state always idle
Aug 26 18:23:58.610419: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.610422: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.610425: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.610428: |    length: 40 (0x28)
Aug 26 18:23:58.610430: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.610433: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.610436: | in statetime_start() with no state
Aug 26 18:23:58.610442: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.610447: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.610450: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.610454: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.610457: | find_next_host_connection returns test
Aug 26 18:23:58.610460: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.610463: | find_next_host_connection returns empty
Aug 26 18:23:58.610489: | creating state object #28 at 0x55f088aedba0
Aug 26 18:23:58.610493: | State DB: adding IKEv1 state #28 in UNDEFINED
Aug 26 18:23:58.610498: | pstats #28 ikev1.isakmp started
Aug 26 18:23:58.610503: | #28 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.610509: | start processing: state #28 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.610513: | parent state #28: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.610517: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.610521: "test" #28: responding to Main Mode
Aug 26 18:23:58.610526: | **emit ISAKMP Message:
Aug 26 18:23:58.610529: |    initiator cookie:
Aug 26 18:23:58.610531: |   af 33 6b 61  99 9e 2f f8
Aug 26 18:23:58.610534: |    responder cookie:
Aug 26 18:23:58.610536: |   52 17 fe b4  92 38 b3 03
Aug 26 18:23:58.610539: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.610541: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.610544: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.610551: |    flags: none (0x0)
Aug 26 18:23:58.610553: |    Message ID: 0 (0x0)
Aug 26 18:23:58.610556: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.610559: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.610562: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.610565: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.610568: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.610571: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.610575: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.610578: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.610582: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.610585: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.610588: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.610591: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.610594: |    length: 28 (0x1c)
Aug 26 18:23:58.610597: |    proposal number: 1 (0x1)
Aug 26 18:23:58.610599: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.610602: |    SPI size: 0 (0x0)
Aug 26 18:23:58.610605: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.610608: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.610611: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.610614: |    length: 20 (0x14)
Aug 26 18:23:58.610616: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.610619: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.610622: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.610625: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:23:58.610628: |    length/value: 14 (0xe)
Aug 26 18:23:58.610632: "test" #28: 14?? is not supported.  Attribute OAKLEY_HASH_ALGORITHM
Aug 26 18:23:58.610636: "test" #28: no acceptable Oakley Transform
Aug 26 18:23:58.610639: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.610645: | [RE]START processing: state #28 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.610647: | #28 is idle
Aug 26 18:23:58.610731: "test" #28: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.610736: | **emit ISAKMP Message:
Aug 26 18:23:58.610739: |    initiator cookie:
Aug 26 18:23:58.610742: |   af 33 6b 61  99 9e 2f f8
Aug 26 18:23:58.610745: |    responder cookie:
Aug 26 18:23:58.610747: |   52 17 fe b4  92 38 b3 03
Aug 26 18:23:58.610750: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.610752: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.610755: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.610758: |    flags: none (0x0)
Aug 26 18:23:58.610761: |    Message ID: 0 (0x0)
Aug 26 18:23:58.610764: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.610767: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.610770: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.610772: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.610775: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.610778: |    SPI size: 0 (0x0)
Aug 26 18:23:58.610780: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.610784: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.610787: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.610791: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.610793: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.610800: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #28)
Aug 26 18:23:58.610805: |   af 33 6b 61  99 9e 2f f8  52 17 fe b4  92 38 b3 03
Aug 26 18:23:58.610808: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.610811: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.610849: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.610856: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.610861: | stop processing: state #28 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.610865: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.610870: | spent 0.512 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.650282: | spent 0.00357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.650332: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.650336: |   b8 22 54 2a  09 5a 28 97  00 00 00 00  00 00 00 00
Aug 26 18:23:58.650339: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.650341: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.650344: |   00 00 00 14  01 01 00 00  80 01 00 1a  80 03 00 1b
Aug 26 18:23:58.650346: |   80 04 00 11
Aug 26 18:23:58.650352: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.650356: | **parse ISAKMP Message:
Aug 26 18:23:58.650359: |    initiator cookie:
Aug 26 18:23:58.650362: |   b8 22 54 2a  09 5a 28 97
Aug 26 18:23:58.650364: |    responder cookie:
Aug 26 18:23:58.650367: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.650370: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.650373: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.650375: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.650378: |    flags: none (0x0)
Aug 26 18:23:58.650381: |    Message ID: 0 (0x0)
Aug 26 18:23:58.650384: |    length: 68 (0x44)
Aug 26 18:23:58.650387: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.650391: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.650394: | #null state always idle
Aug 26 18:23:58.650398: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.650401: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.650404: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.650406: |    length: 40 (0x28)
Aug 26 18:23:58.650409: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.650412: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.650414: | in statetime_start() with no state
Aug 26 18:23:58.650420: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.650426: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.650429: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.650433: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.650435: | find_next_host_connection returns test
Aug 26 18:23:58.650438: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.650441: | find_next_host_connection returns empty
Aug 26 18:23:58.650467: | creating state object #29 at 0x55f088aee660
Aug 26 18:23:58.650471: | State DB: adding IKEv1 state #29 in UNDEFINED
Aug 26 18:23:58.650475: | pstats #29 ikev1.isakmp started
Aug 26 18:23:58.650479: | #29 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.650486: | start processing: state #29 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.650490: | parent state #29: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.650494: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.650497: "test" #29: responding to Main Mode
Aug 26 18:23:58.650502: | **emit ISAKMP Message:
Aug 26 18:23:58.650509: |    initiator cookie:
Aug 26 18:23:58.650512: |   b8 22 54 2a  09 5a 28 97
Aug 26 18:23:58.650514: |    responder cookie:
Aug 26 18:23:58.650516: |   c6 29 a8 ad  39 4a e1 d8
Aug 26 18:23:58.650519: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.650522: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.650525: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.650527: |    flags: none (0x0)
Aug 26 18:23:58.650530: |    Message ID: 0 (0x0)
Aug 26 18:23:58.650533: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.650536: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.650539: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.650542: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.650544: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.650547: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.650551: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.650554: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.650557: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.650560: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.650563: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.650565: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.650568: |    length: 28 (0x1c)
Aug 26 18:23:58.650571: |    proposal number: 1 (0x1)
Aug 26 18:23:58.650574: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.650576: |    SPI size: 0 (0x0)
Aug 26 18:23:58.650579: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.650582: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.650584: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.650587: |    length: 20 (0x14)
Aug 26 18:23:58.650589: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.650592: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.650595: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.650598: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.650601: |    length/value: 26 (0x1a)
Aug 26 18:23:58.650603: |    [26 is OAKLEY_CAMELLIA_CCM_B]
Aug 26 18:23:58.650607: "test" #29: OAKLEY_CAMELLIA_CCM_B is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.650610: "test" #29: no acceptable Oakley Transform
Aug 26 18:23:58.650613: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.650618: | [RE]START processing: state #29 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.650621: | #29 is idle
Aug 26 18:23:58.650861: "test" #29: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.650871: | **emit ISAKMP Message:
Aug 26 18:23:58.650875: |    initiator cookie:
Aug 26 18:23:58.650877: |   b8 22 54 2a  09 5a 28 97
Aug 26 18:23:58.650881: |    responder cookie:
Aug 26 18:23:58.650883: |   c6 29 a8 ad  39 4a e1 d8
Aug 26 18:23:58.650887: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.650890: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.650893: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.650896: |    flags: none (0x0)
Aug 26 18:23:58.650898: |    Message ID: 0 (0x0)
Aug 26 18:23:58.650902: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.650905: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.650909: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.650911: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.650914: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.650917: |    SPI size: 0 (0x0)
Aug 26 18:23:58.650920: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.650926: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.650930: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.650933: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.650936: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.650944: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #29)
Aug 26 18:23:58.650948: |   b8 22 54 2a  09 5a 28 97  c6 29 a8 ad  39 4a e1 d8
Aug 26 18:23:58.650951: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.650954: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.650986: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.650994: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.651000: | stop processing: state #29 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.651004: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.651010: | spent 0.504 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.689884: | spent 0.004 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.689912: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.689916: |   3f f4 24 08  db 62 42 e3  00 00 00 00  00 00 00 00
Aug 26 18:23:58.689919: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.689921: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.689923: |   00 00 00 14  01 01 00 00  80 01 00 1a  80 02 00 0e
Aug 26 18:23:58.689925: |   80 04 00 11
Aug 26 18:23:58.689930: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.689933: | **parse ISAKMP Message:
Aug 26 18:23:58.689936: |    initiator cookie:
Aug 26 18:23:58.689938: |   3f f4 24 08  db 62 42 e3
Aug 26 18:23:58.689940: |    responder cookie:
Aug 26 18:23:58.689942: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.689945: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.689947: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.689950: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.689952: |    flags: none (0x0)
Aug 26 18:23:58.689954: |    Message ID: 0 (0x0)
Aug 26 18:23:58.689957: |    length: 68 (0x44)
Aug 26 18:23:58.689960: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.689963: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.689966: | #null state always idle
Aug 26 18:23:58.689969: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.689972: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.689974: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.689976: |    length: 40 (0x28)
Aug 26 18:23:58.689979: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.689981: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.689983: | in statetime_start() with no state
Aug 26 18:23:58.689988: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.689993: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.689996: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.689999: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.690001: | find_next_host_connection returns test
Aug 26 18:23:58.690003: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.690006: | find_next_host_connection returns empty
Aug 26 18:23:58.690026: | creating state object #30 at 0x55f088aef120
Aug 26 18:23:58.690029: | State DB: adding IKEv1 state #30 in UNDEFINED
Aug 26 18:23:58.690033: | pstats #30 ikev1.isakmp started
Aug 26 18:23:58.690041: | #30 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.690047: | start processing: state #30 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.690050: | parent state #30: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.690053: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.690056: "test" #30: responding to Main Mode
Aug 26 18:23:58.690061: | **emit ISAKMP Message:
Aug 26 18:23:58.690063: |    initiator cookie:
Aug 26 18:23:58.690065: |   3f f4 24 08  db 62 42 e3
Aug 26 18:23:58.690067: |    responder cookie:
Aug 26 18:23:58.690069: |   c6 aa c8 94  fc f4 9e 9e
Aug 26 18:23:58.690071: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.690073: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.690076: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.690078: |    flags: none (0x0)
Aug 26 18:23:58.690080: |    Message ID: 0 (0x0)
Aug 26 18:23:58.690083: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.690085: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.690088: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.690090: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.690092: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.690095: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.690098: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.690100: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.690103: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.690105: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.690108: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.690110: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.690113: |    length: 28 (0x1c)
Aug 26 18:23:58.690115: |    proposal number: 1 (0x1)
Aug 26 18:23:58.690117: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.690119: |    SPI size: 0 (0x0)
Aug 26 18:23:58.690121: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.690124: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.690126: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.690128: |    length: 20 (0x14)
Aug 26 18:23:58.690130: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.690132: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.690135: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.690137: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.690140: |    length/value: 26 (0x1a)
Aug 26 18:23:58.690142: |    [26 is OAKLEY_CAMELLIA_CCM_B]
Aug 26 18:23:58.690146: "test" #30: OAKLEY_CAMELLIA_CCM_B is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.690148: "test" #30: no acceptable Oakley Transform
Aug 26 18:23:58.690151: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.690155: | [RE]START processing: state #30 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.690157: | #30 is idle
Aug 26 18:23:58.690210: "test" #30: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.690214: | **emit ISAKMP Message:
Aug 26 18:23:58.690217: |    initiator cookie:
Aug 26 18:23:58.690219: |   3f f4 24 08  db 62 42 e3
Aug 26 18:23:58.690221: |    responder cookie:
Aug 26 18:23:58.690223: |   c6 aa c8 94  fc f4 9e 9e
Aug 26 18:23:58.690225: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.690227: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.690230: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.690232: |    flags: none (0x0)
Aug 26 18:23:58.690234: |    Message ID: 0 (0x0)
Aug 26 18:23:58.690238: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.690241: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.690243: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.690245: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.690248: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.690250: |    SPI size: 0 (0x0)
Aug 26 18:23:58.690252: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.690254: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.690257: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.690260: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.690262: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.690268: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #30)
Aug 26 18:23:58.690270: |   3f f4 24 08  db 62 42 e3  c6 aa c8 94  fc f4 9e 9e
Aug 26 18:23:58.690272: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.690274: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.690317: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.690331: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.690338: | stop processing: state #30 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.690342: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.690348: | spent 0.417 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.735390: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.735421: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.735425: |   e2 8a 86 83  34 16 c1 70  00 00 00 00  00 00 00 00
Aug 26 18:23:58.735428: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.735430: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.735433: |   00 00 00 14  01 01 00 00  80 01 00 1a  80 02 00 0e
Aug 26 18:23:58.735435: |   80 03 00 1b
Aug 26 18:23:58.735441: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.735445: | **parse ISAKMP Message:
Aug 26 18:23:58.735448: |    initiator cookie:
Aug 26 18:23:58.735451: |   e2 8a 86 83  34 16 c1 70
Aug 26 18:23:58.735453: |    responder cookie:
Aug 26 18:23:58.735456: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.735459: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.735462: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.735464: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.735467: |    flags: none (0x0)
Aug 26 18:23:58.735470: |    Message ID: 0 (0x0)
Aug 26 18:23:58.735472: |    length: 68 (0x44)
Aug 26 18:23:58.735475: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.735479: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.735482: | #null state always idle
Aug 26 18:23:58.735486: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.735489: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.735492: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.735494: |    length: 40 (0x28)
Aug 26 18:23:58.735497: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.735500: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.735502: | in statetime_start() with no state
Aug 26 18:23:58.735508: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.735514: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.735517: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.735521: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.735529: | find_next_host_connection returns test
Aug 26 18:23:58.735532: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.735534: | find_next_host_connection returns empty
Aug 26 18:23:58.735559: | creating state object #31 at 0x55f088aefbe0
Aug 26 18:23:58.735562: | State DB: adding IKEv1 state #31 in UNDEFINED
Aug 26 18:23:58.735567: | pstats #31 ikev1.isakmp started
Aug 26 18:23:58.735572: | #31 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.735578: | start processing: state #31 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.735581: | parent state #31: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.735585: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.735588: "test" #31: responding to Main Mode
Aug 26 18:23:58.735593: | **emit ISAKMP Message:
Aug 26 18:23:58.735596: |    initiator cookie:
Aug 26 18:23:58.735598: |   e2 8a 86 83  34 16 c1 70
Aug 26 18:23:58.735601: |    responder cookie:
Aug 26 18:23:58.735603: |   26 49 35 f2  de 15 4f c3
Aug 26 18:23:58.735606: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.735609: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.735611: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.735614: |    flags: none (0x0)
Aug 26 18:23:58.735616: |    Message ID: 0 (0x0)
Aug 26 18:23:58.735619: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.735622: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.735625: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.735628: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.735631: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.735634: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.735637: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.735640: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.735643: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.735646: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.735649: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.735652: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.735654: |    length: 28 (0x1c)
Aug 26 18:23:58.735657: |    proposal number: 1 (0x1)
Aug 26 18:23:58.735659: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.735662: |    SPI size: 0 (0x0)
Aug 26 18:23:58.735665: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.735667: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.735670: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.735672: |    length: 20 (0x14)
Aug 26 18:23:58.735675: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.735678: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.735680: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.735683: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.735686: |    length/value: 26 (0x1a)
Aug 26 18:23:58.735689: |    [26 is OAKLEY_CAMELLIA_CCM_B]
Aug 26 18:23:58.735692: "test" #31: OAKLEY_CAMELLIA_CCM_B is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.735695: "test" #31: no acceptable Oakley Transform
Aug 26 18:23:58.735698: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.735703: | [RE]START processing: state #31 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.735706: | #31 is idle
Aug 26 18:23:58.735785: "test" #31: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.735790: | **emit ISAKMP Message:
Aug 26 18:23:58.735795: |    initiator cookie:
Aug 26 18:23:58.735797: |   e2 8a 86 83  34 16 c1 70
Aug 26 18:23:58.735800: |    responder cookie:
Aug 26 18:23:58.735802: |   26 49 35 f2  de 15 4f c3
Aug 26 18:23:58.735805: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.735808: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.735810: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.735813: |    flags: none (0x0)
Aug 26 18:23:58.735815: |    Message ID: 0 (0x0)
Aug 26 18:23:58.735818: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.735821: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.735823: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.735826: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.735828: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.735831: |    SPI size: 0 (0x0)
Aug 26 18:23:58.735833: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.735836: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.735839: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.735842: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.735844: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.735850: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #31)
Aug 26 18:23:58.735853: |   e2 8a 86 83  34 16 c1 70  26 49 35 f2  de 15 4f c3
Aug 26 18:23:58.735855: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.735858: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.735881: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.735887: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.735892: | stop processing: state #31 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.735895: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.735901: | spent 0.481 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.769424: | spent 0.0039 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.769453: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.769458: |   46 6e 3d 0b  37 32 5a 83  00 00 00 00  00 00 00 00
Aug 26 18:23:58.769461: |   01 10 02 00  00 00 00 00  00 00 00 48  00 00 00 2c
Aug 26 18:23:58.769464: |   00 00 00 01  00 00 00 01  00 00 00 20  01 01 00 01
Aug 26 18:23:58.769466: |   00 00 00 18  01 01 00 00  80 01 00 17  80 02 00 1c
Aug 26 18:23:58.769468: |   80 03 00 11  80 04 00 19
Aug 26 18:23:58.769474: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.769478: | **parse ISAKMP Message:
Aug 26 18:23:58.769481: |    initiator cookie:
Aug 26 18:23:58.769484: |   46 6e 3d 0b  37 32 5a 83
Aug 26 18:23:58.769486: |    responder cookie:
Aug 26 18:23:58.769488: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.769491: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.769495: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.769498: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.769501: |    flags: none (0x0)
Aug 26 18:23:58.769503: |    Message ID: 0 (0x0)
Aug 26 18:23:58.769506: |    length: 72 (0x48)
Aug 26 18:23:58.769509: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.769513: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.769516: | #null state always idle
Aug 26 18:23:58.769520: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.769523: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.769526: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.769528: |    length: 44 (0x2c)
Aug 26 18:23:58.769531: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.769535: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.769537: | in statetime_start() with no state
Aug 26 18:23:58.769541: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.769545: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.769547: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.769550: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.769552: | find_next_host_connection returns test
Aug 26 18:23:58.769554: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.769555: | find_next_host_connection returns empty
Aug 26 18:23:58.769577: | creating state object #32 at 0x55f088af06a0
Aug 26 18:23:58.769580: | State DB: adding IKEv1 state #32 in UNDEFINED
Aug 26 18:23:58.769583: | pstats #32 ikev1.isakmp started
Aug 26 18:23:58.769586: | #32 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.769592: | start processing: state #32 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.769596: | parent state #32: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.769600: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.769603: "test" #32: responding to Main Mode
Aug 26 18:23:58.769609: | **emit ISAKMP Message:
Aug 26 18:23:58.769612: |    initiator cookie:
Aug 26 18:23:58.769615: |   46 6e 3d 0b  37 32 5a 83
Aug 26 18:23:58.769618: |    responder cookie:
Aug 26 18:23:58.769620: |   c3 d0 a2 29  6b cb a4 f3
Aug 26 18:23:58.769622: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.769625: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.769628: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.769630: |    flags: none (0x0)
Aug 26 18:23:58.769633: |    Message ID: 0 (0x0)
Aug 26 18:23:58.769636: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.769639: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.769643: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.769645: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.769648: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.769651: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.769654: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.769658: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.769661: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.769664: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.769667: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.769670: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.769672: |    length: 32 (0x20)
Aug 26 18:23:58.769675: |    proposal number: 1 (0x1)
Aug 26 18:23:58.769677: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.769680: |    SPI size: 0 (0x0)
Aug 26 18:23:58.769682: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.769686: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.769688: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.769691: |    length: 24 (0x18)
Aug 26 18:23:58.769693: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.769696: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.769699: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.769702: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.769706: |    length/value: 23 (0x17)
Aug 26 18:23:58.769709: |    [23 is UNUSED_23]
Aug 26 18:23:58.769713: "test" #32: UNUSED_23 is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.769718: "test" #32: no acceptable Oakley Transform
Aug 26 18:23:58.769722: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.769728: | [RE]START processing: state #32 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.769731: | #32 is idle
Aug 26 18:23:58.769800: "test" #32: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.769806: | **emit ISAKMP Message:
Aug 26 18:23:58.769809: |    initiator cookie:
Aug 26 18:23:58.769812: |   46 6e 3d 0b  37 32 5a 83
Aug 26 18:23:58.769814: |    responder cookie:
Aug 26 18:23:58.769817: |   c3 d0 a2 29  6b cb a4 f3
Aug 26 18:23:58.769820: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.769822: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.769825: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.769828: |    flags: none (0x0)
Aug 26 18:23:58.769830: |    Message ID: 0 (0x0)
Aug 26 18:23:58.769833: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.769836: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.769839: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.769842: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.769844: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.769847: |    SPI size: 0 (0x0)
Aug 26 18:23:58.769849: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.769852: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.769855: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.769858: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.769861: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.769868: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #32)
Aug 26 18:23:58.769871: |   46 6e 3d 0b  37 32 5a 83  c3 d0 a2 29  6b cb a4 f3
Aug 26 18:23:58.769874: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.769876: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.769910: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.769916: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.769921: | stop processing: state #32 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.769925: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.769930: | spent 0.471 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.803810: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.803840: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.803845: |   d8 62 d7 f7  43 e8 70 42  00 00 00 00  00 00 00 00
Aug 26 18:23:58.803847: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.803850: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.803852: |   00 00 00 14  01 01 00 00  80 02 00 1c  80 03 00 11
Aug 26 18:23:58.803855: |   80 04 00 19
Aug 26 18:23:58.803860: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.803865: | **parse ISAKMP Message:
Aug 26 18:23:58.803868: |    initiator cookie:
Aug 26 18:23:58.803870: |   d8 62 d7 f7  43 e8 70 42
Aug 26 18:23:58.803873: |    responder cookie:
Aug 26 18:23:58.803875: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.803878: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.803881: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.803884: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.803887: |    flags: none (0x0)
Aug 26 18:23:58.803890: |    Message ID: 0 (0x0)
Aug 26 18:23:58.803893: |    length: 68 (0x44)
Aug 26 18:23:58.803896: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.803903: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.803906: | #null state always idle
Aug 26 18:23:58.803910: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.803913: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.803916: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.803919: |    length: 40 (0x28)
Aug 26 18:23:58.803921: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.803924: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.803927: | in statetime_start() with no state
Aug 26 18:23:58.803933: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.803939: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.803942: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.803946: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.803949: | find_next_host_connection returns test
Aug 26 18:23:58.803952: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.803954: | find_next_host_connection returns empty
Aug 26 18:23:58.803977: | creating state object #33 at 0x55f088af1160
Aug 26 18:23:58.803980: | State DB: adding IKEv1 state #33 in UNDEFINED
Aug 26 18:23:58.803985: | pstats #33 ikev1.isakmp started
Aug 26 18:23:58.803989: | #33 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.803996: | start processing: state #33 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.804000: | parent state #33: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.804003: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.804006: "test" #33: responding to Main Mode
Aug 26 18:23:58.804012: | **emit ISAKMP Message:
Aug 26 18:23:58.804015: |    initiator cookie:
Aug 26 18:23:58.804017: |   d8 62 d7 f7  43 e8 70 42
Aug 26 18:23:58.804020: |    responder cookie:
Aug 26 18:23:58.804022: |   52 2d 9c 2c  a3 19 a4 45
Aug 26 18:23:58.804025: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.804027: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.804030: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.804032: |    flags: none (0x0)
Aug 26 18:23:58.804034: |    Message ID: 0 (0x0)
Aug 26 18:23:58.804037: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.804040: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.804044: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.804046: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.804049: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.804052: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.804055: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.804058: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.804062: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.804064: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.804067: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.804070: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.804073: |    length: 28 (0x1c)
Aug 26 18:23:58.804076: |    proposal number: 1 (0x1)
Aug 26 18:23:58.804078: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.804081: |    SPI size: 0 (0x0)
Aug 26 18:23:58.804083: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.804086: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.804089: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.804091: |    length: 20 (0x14)
Aug 26 18:23:58.804096: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.804099: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.804102: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.804105: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:23:58.804107: |    length/value: 28 (0x1c)
Aug 26 18:23:58.804112: "test" #33: 28?? is not supported.  Attribute OAKLEY_HASH_ALGORITHM
Aug 26 18:23:58.804115: "test" #33: no acceptable Oakley Transform
Aug 26 18:23:58.804119: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.804124: | [RE]START processing: state #33 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.804127: | #33 is idle
Aug 26 18:23:58.804190: "test" #33: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.804194: | **emit ISAKMP Message:
Aug 26 18:23:58.804197: |    initiator cookie:
Aug 26 18:23:58.804200: |   d8 62 d7 f7  43 e8 70 42
Aug 26 18:23:58.804202: |    responder cookie:
Aug 26 18:23:58.804205: |   52 2d 9c 2c  a3 19 a4 45
Aug 26 18:23:58.804208: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.804210: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.804213: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.804216: |    flags: none (0x0)
Aug 26 18:23:58.804218: |    Message ID: 0 (0x0)
Aug 26 18:23:58.804221: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.804224: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.804227: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.804230: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.804232: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.804235: |    SPI size: 0 (0x0)
Aug 26 18:23:58.804238: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.804241: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.804244: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.804247: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.804250: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.804256: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #33)
Aug 26 18:23:58.804259: |   d8 62 d7 f7  43 e8 70 42  52 2d 9c 2c  a3 19 a4 45
Aug 26 18:23:58.804261: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.804264: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.804297: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.804306: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.804311: | stop processing: state #33 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.804315: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.804321: | spent 0.474 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.869283: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.869317: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.869322: |   12 28 a6 50  a2 c5 e5 2c  00 00 00 00  00 00 00 00
Aug 26 18:23:58.869325: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.869327: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.869329: |   00 00 00 14  01 01 00 00  80 01 00 17  80 03 00 11
Aug 26 18:23:58.869332: |   80 04 00 19
Aug 26 18:23:58.869337: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.869341: | **parse ISAKMP Message:
Aug 26 18:23:58.869344: |    initiator cookie:
Aug 26 18:23:58.869347: |   12 28 a6 50  a2 c5 e5 2c
Aug 26 18:23:58.869349: |    responder cookie:
Aug 26 18:23:58.869352: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.869355: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.869363: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.869366: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.869369: |    flags: none (0x0)
Aug 26 18:23:58.869371: |    Message ID: 0 (0x0)
Aug 26 18:23:58.869374: |    length: 68 (0x44)
Aug 26 18:23:58.869377: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.869381: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.869384: | #null state always idle
Aug 26 18:23:58.869387: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.869391: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.869394: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.869396: |    length: 40 (0x28)
Aug 26 18:23:58.869399: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.869402: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.869405: | in statetime_start() with no state
Aug 26 18:23:58.869410: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.869416: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.869419: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.869423: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.869426: | find_next_host_connection returns test
Aug 26 18:23:58.869429: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.869431: | find_next_host_connection returns empty
Aug 26 18:23:58.869454: | creating state object #34 at 0x55f088af1c20
Aug 26 18:23:58.869458: | State DB: adding IKEv1 state #34 in UNDEFINED
Aug 26 18:23:58.869463: | pstats #34 ikev1.isakmp started
Aug 26 18:23:58.869468: | #34 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.869474: | start processing: state #34 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.869478: | parent state #34: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.869482: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.869485: "test" #34: responding to Main Mode
Aug 26 18:23:58.869490: | **emit ISAKMP Message:
Aug 26 18:23:58.869493: |    initiator cookie:
Aug 26 18:23:58.869496: |   12 28 a6 50  a2 c5 e5 2c
Aug 26 18:23:58.869498: |    responder cookie:
Aug 26 18:23:58.869501: |   c7 9a eb 63  f9 63 83 8b
Aug 26 18:23:58.869503: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.869506: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.869509: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.869512: |    flags: none (0x0)
Aug 26 18:23:58.869514: |    Message ID: 0 (0x0)
Aug 26 18:23:58.869517: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.869520: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.869524: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.869526: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.869529: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.869532: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.869536: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.869539: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.869542: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.869545: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.869548: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.869551: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.869553: |    length: 28 (0x1c)
Aug 26 18:23:58.869558: |    proposal number: 1 (0x1)
Aug 26 18:23:58.869561: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.869563: |    SPI size: 0 (0x0)
Aug 26 18:23:58.869566: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.869569: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.869572: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.869574: |    length: 20 (0x14)
Aug 26 18:23:58.869577: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.869580: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.869583: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.869586: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.869589: |    length/value: 23 (0x17)
Aug 26 18:23:58.869592: |    [23 is UNUSED_23]
Aug 26 18:23:58.869596: "test" #34: UNUSED_23 is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.869599: "test" #34: no acceptable Oakley Transform
Aug 26 18:23:58.869602: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.869607: | [RE]START processing: state #34 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.869610: | #34 is idle
Aug 26 18:23:58.869677: "test" #34: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.869682: | **emit ISAKMP Message:
Aug 26 18:23:58.869685: |    initiator cookie:
Aug 26 18:23:58.869688: |   12 28 a6 50  a2 c5 e5 2c
Aug 26 18:23:58.869690: |    responder cookie:
Aug 26 18:23:58.869692: |   c7 9a eb 63  f9 63 83 8b
Aug 26 18:23:58.869695: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.869698: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.869701: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.869703: |    flags: none (0x0)
Aug 26 18:23:58.869706: |    Message ID: 0 (0x0)
Aug 26 18:23:58.869709: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.869712: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.869715: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.869718: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.869720: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.869723: |    SPI size: 0 (0x0)
Aug 26 18:23:58.869726: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.869729: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.869732: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.869735: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.869738: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.869745: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #34)
Aug 26 18:23:58.869748: |   12 28 a6 50  a2 c5 e5 2c  c7 9a eb 63  f9 63 83 8b
Aug 26 18:23:58.869750: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.869753: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.869781: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.869788: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.869793: | stop processing: state #34 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.869796: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.869802: | spent 0.482 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.911860: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.911890: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.911896: |   f2 4a 7b 3f  e9 c2 09 19  00 00 00 00  00 00 00 00
Aug 26 18:23:58.911899: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.911902: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.911908: |   00 00 00 14  01 01 00 00  80 01 00 17  80 02 00 1c
Aug 26 18:23:58.911911: |   80 04 00 19
Aug 26 18:23:58.911916: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.911921: | **parse ISAKMP Message:
Aug 26 18:23:58.911924: |    initiator cookie:
Aug 26 18:23:58.911927: |   f2 4a 7b 3f  e9 c2 09 19
Aug 26 18:23:58.911929: |    responder cookie:
Aug 26 18:23:58.911931: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.911934: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.911937: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.911940: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.911943: |    flags: none (0x0)
Aug 26 18:23:58.911946: |    Message ID: 0 (0x0)
Aug 26 18:23:58.911948: |    length: 68 (0x44)
Aug 26 18:23:58.911952: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.911956: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.911958: | #null state always idle
Aug 26 18:23:58.911962: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.911966: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.911969: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.911971: |    length: 40 (0x28)
Aug 26 18:23:58.911974: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.911977: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.911980: | in statetime_start() with no state
Aug 26 18:23:58.911985: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.911991: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.911995: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.911999: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.912003: | find_next_host_connection returns test
Aug 26 18:23:58.912006: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.912008: | find_next_host_connection returns empty
Aug 26 18:23:58.912036: | creating state object #35 at 0x55f088af26e0
Aug 26 18:23:58.912041: | State DB: adding IKEv1 state #35 in UNDEFINED
Aug 26 18:23:58.912045: | pstats #35 ikev1.isakmp started
Aug 26 18:23:58.912050: | #35 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.912057: | start processing: state #35 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.912061: | parent state #35: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.912065: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.912068: "test" #35: responding to Main Mode
Aug 26 18:23:58.912073: | **emit ISAKMP Message:
Aug 26 18:23:58.912076: |    initiator cookie:
Aug 26 18:23:58.912078: |   f2 4a 7b 3f  e9 c2 09 19
Aug 26 18:23:58.912081: |    responder cookie:
Aug 26 18:23:58.912083: |   85 27 a2 3c  4e ed 32 8d
Aug 26 18:23:58.912086: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.912089: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.912092: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.912094: |    flags: none (0x0)
Aug 26 18:23:58.912097: |    Message ID: 0 (0x0)
Aug 26 18:23:58.912101: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.912104: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.912107: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.912110: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.912113: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.912116: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.912120: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.912125: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.912129: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.912132: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.912135: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.912138: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.912140: |    length: 28 (0x1c)
Aug 26 18:23:58.912143: |    proposal number: 1 (0x1)
Aug 26 18:23:58.912145: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.912148: |    SPI size: 0 (0x0)
Aug 26 18:23:58.912150: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.912153: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.912156: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.912159: |    length: 20 (0x14)
Aug 26 18:23:58.912162: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.912164: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.912167: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.912170: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.912173: |    length/value: 23 (0x17)
Aug 26 18:23:58.912176: |    [23 is UNUSED_23]
Aug 26 18:23:58.912180: "test" #35: UNUSED_23 is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.912183: "test" #35: no acceptable Oakley Transform
Aug 26 18:23:58.912186: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.912191: | [RE]START processing: state #35 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.912194: | #35 is idle
Aug 26 18:23:58.912315: "test" #35: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.912328: | **emit ISAKMP Message:
Aug 26 18:23:58.912332: |    initiator cookie:
Aug 26 18:23:58.912336: |   f2 4a 7b 3f  e9 c2 09 19
Aug 26 18:23:58.912338: |    responder cookie:
Aug 26 18:23:58.912341: |   85 27 a2 3c  4e ed 32 8d
Aug 26 18:23:58.912344: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.912347: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.912350: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.912353: |    flags: none (0x0)
Aug 26 18:23:58.912355: |    Message ID: 0 (0x0)
Aug 26 18:23:58.912359: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.912362: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.912365: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.912368: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.912371: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.912373: |    SPI size: 0 (0x0)
Aug 26 18:23:58.912376: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.912380: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.912383: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.912386: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.912389: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.912396: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #35)
Aug 26 18:23:58.912400: |   f2 4a 7b 3f  e9 c2 09 19  85 27 a2 3c  4e ed 32 8d
Aug 26 18:23:58.912402: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.912405: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.912439: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.912447: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.912453: | stop processing: state #35 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.912457: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.912463: | spent 0.529 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.958299: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.958328: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.958333: |   38 48 92 06  58 41 75 d9  00 00 00 00  00 00 00 00
Aug 26 18:23:58.958336: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:58.958338: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:58.958341: |   00 00 00 14  01 01 00 00  80 01 00 17  80 02 00 1c
Aug 26 18:23:58.958343: |   80 03 00 11
Aug 26 18:23:58.958348: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.958353: | **parse ISAKMP Message:
Aug 26 18:23:58.958357: |    initiator cookie:
Aug 26 18:23:58.958359: |   38 48 92 06  58 41 75 d9
Aug 26 18:23:58.958362: |    responder cookie:
Aug 26 18:23:58.958364: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.958367: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.958370: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.958373: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.958376: |    flags: none (0x0)
Aug 26 18:23:58.958378: |    Message ID: 0 (0x0)
Aug 26 18:23:58.958381: |    length: 68 (0x44)
Aug 26 18:23:58.958384: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.958389: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.958392: | #null state always idle
Aug 26 18:23:58.958395: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.958399: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.958401: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.958404: |    length: 40 (0x28)
Aug 26 18:23:58.958406: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.958409: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.958412: | in statetime_start() with no state
Aug 26 18:23:58.958418: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.958425: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.958429: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.958433: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.958436: | find_next_host_connection returns test
Aug 26 18:23:58.958438: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.958441: | find_next_host_connection returns empty
Aug 26 18:23:58.958463: | creating state object #36 at 0x55f088af31a0
Aug 26 18:23:58.958466: | State DB: adding IKEv1 state #36 in UNDEFINED
Aug 26 18:23:58.958471: | pstats #36 ikev1.isakmp started
Aug 26 18:23:58.958476: | #36 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.958482: | start processing: state #36 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.958485: | parent state #36: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.958489: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.958492: "test" #36: responding to Main Mode
Aug 26 18:23:58.958497: | **emit ISAKMP Message:
Aug 26 18:23:58.958500: |    initiator cookie:
Aug 26 18:23:58.958503: |   38 48 92 06  58 41 75 d9
Aug 26 18:23:58.958505: |    responder cookie:
Aug 26 18:23:58.958508: |   08 3b 7d ce  04 91 9d 7d
Aug 26 18:23:58.958510: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.958513: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.958516: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.958518: |    flags: none (0x0)
Aug 26 18:23:58.958521: |    Message ID: 0 (0x0)
Aug 26 18:23:58.958524: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.958527: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.958534: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.958536: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.958539: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.958542: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.958545: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.958549: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.958552: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.958554: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.958558: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.958561: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.958563: |    length: 28 (0x1c)
Aug 26 18:23:58.958566: |    proposal number: 1 (0x1)
Aug 26 18:23:58.958569: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.958571: |    SPI size: 0 (0x0)
Aug 26 18:23:58.958574: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.958577: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.958580: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.958582: |    length: 20 (0x14)
Aug 26 18:23:58.958585: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.958587: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.958590: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.958593: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.958596: |    length/value: 23 (0x17)
Aug 26 18:23:58.958599: |    [23 is UNUSED_23]
Aug 26 18:23:58.958603: "test" #36: UNUSED_23 is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.958605: "test" #36: no acceptable Oakley Transform
Aug 26 18:23:58.958608: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.958614: | [RE]START processing: state #36 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.958616: | #36 is idle
Aug 26 18:23:58.958692: "test" #36: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.958696: | **emit ISAKMP Message:
Aug 26 18:23:58.958699: |    initiator cookie:
Aug 26 18:23:58.958701: |   38 48 92 06  58 41 75 d9
Aug 26 18:23:58.958704: |    responder cookie:
Aug 26 18:23:58.958706: |   08 3b 7d ce  04 91 9d 7d
Aug 26 18:23:58.958709: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.958712: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.958714: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.958717: |    flags: none (0x0)
Aug 26 18:23:58.958719: |    Message ID: 0 (0x0)
Aug 26 18:23:58.958722: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.958725: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.958728: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.958731: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.958733: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.958736: |    SPI size: 0 (0x0)
Aug 26 18:23:58.958739: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.958742: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.958745: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.958748: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.958751: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.958757: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #36)
Aug 26 18:23:58.958760: |   38 48 92 06  58 41 75 d9  08 3b 7d ce  04 91 9d 7d
Aug 26 18:23:58.958763: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.958765: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.958787: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.958795: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.958800: | stop processing: state #36 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.958804: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.958809: | spent 0.482 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:58.992792: | spent 0.00338 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:58.992819: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:58.992825: |   73 2a e3 2e  8c df 39 1d  00 00 00 00  00 00 00 00
Aug 26 18:23:58.992828: |   01 10 02 00  00 00 00 00  00 00 00 48  00 00 00 2c
Aug 26 18:23:58.992830: |   00 00 00 01  00 00 00 01  00 00 00 20  01 01 00 01
Aug 26 18:23:58.992833: |   00 00 00 18  01 01 00 00  80 01 00 16  80 02 00 1e
Aug 26 18:23:58.992835: |   80 03 00 06  80 04 00 04
Aug 26 18:23:58.992841: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:58.992846: | **parse ISAKMP Message:
Aug 26 18:23:58.992849: |    initiator cookie:
Aug 26 18:23:58.992852: |   73 2a e3 2e  8c df 39 1d
Aug 26 18:23:58.992854: |    responder cookie:
Aug 26 18:23:58.992857: |   00 00 00 00  00 00 00 00
Aug 26 18:23:58.992860: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.992863: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.992867: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.992870: |    flags: none (0x0)
Aug 26 18:23:58.992872: |    Message ID: 0 (0x0)
Aug 26 18:23:58.992875: |    length: 72 (0x48)
Aug 26 18:23:58.992879: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:58.992883: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:58.992886: | #null state always idle
Aug 26 18:23:58.992890: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:58.992893: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:58.992897: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.992899: |    length: 44 (0x2c)
Aug 26 18:23:58.992902: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.992905: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:58.992908: | in statetime_start() with no state
Aug 26 18:23:58.992915: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:58.992921: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:58.992925: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.992929: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:58.992932: | find_next_host_connection returns test
Aug 26 18:23:58.992935: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:58.992938: | find_next_host_connection returns empty
Aug 26 18:23:58.992959: | creating state object #37 at 0x55f088af3c60
Aug 26 18:23:58.992964: | State DB: adding IKEv1 state #37 in UNDEFINED
Aug 26 18:23:58.992969: | pstats #37 ikev1.isakmp started
Aug 26 18:23:58.992975: | #37 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:58.992982: | start processing: state #37 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:58.992987: | parent state #37: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:58.992991: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:58.992994: "test" #37: responding to Main Mode
Aug 26 18:23:58.993000: | **emit ISAKMP Message:
Aug 26 18:23:58.993003: |    initiator cookie:
Aug 26 18:23:58.993006: |   73 2a e3 2e  8c df 39 1d
Aug 26 18:23:58.993009: |    responder cookie:
Aug 26 18:23:58.993011: |   28 26 2e 19  d3 9d 12 bb
Aug 26 18:23:58.993014: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:58.993019: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.993022: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:58.993025: |    flags: none (0x0)
Aug 26 18:23:58.993028: |    Message ID: 0 (0x0)
Aug 26 18:23:58.993031: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.993034: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:58.993038: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:58.993041: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:58.993044: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.993047: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:58.993051: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:58.993054: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:58.993059: | ****parse IPsec DOI SIT:
Aug 26 18:23:58.993062: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:58.993065: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:58.993068: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.993070: |    length: 32 (0x20)
Aug 26 18:23:58.993073: |    proposal number: 1 (0x1)
Aug 26 18:23:58.993076: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:58.993078: |    SPI size: 0 (0x0)
Aug 26 18:23:58.993081: |    number of transforms: 1 (0x1)
Aug 26 18:23:58.993084: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:58.993087: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.993090: |    length: 24 (0x18)
Aug 26 18:23:58.993093: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:58.993095: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:58.993098: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:58.993102: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:58.993105: |    length/value: 22 (0x16)
Aug 26 18:23:58.993108: |    [22 is UNUSED_22]
Aug 26 18:23:58.993113: "test" #37: UNUSED_22 is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:58.993116: "test" #37: no acceptable Oakley Transform
Aug 26 18:23:58.993120: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.993125: | [RE]START processing: state #37 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:58.993128: | #37 is idle
Aug 26 18:23:58.993198: "test" #37: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:58.993203: | **emit ISAKMP Message:
Aug 26 18:23:58.993207: |    initiator cookie:
Aug 26 18:23:58.993209: |   73 2a e3 2e  8c df 39 1d
Aug 26 18:23:58.993212: |    responder cookie:
Aug 26 18:23:58.993215: |   28 26 2e 19  d3 9d 12 bb
Aug 26 18:23:58.993218: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.993221: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:58.993223: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:58.993226: |    flags: none (0x0)
Aug 26 18:23:58.993229: |    Message ID: 0 (0x0)
Aug 26 18:23:58.993232: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:58.993235: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:58.993238: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:58.993241: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:58.993243: |    protocol ID: 1 (0x1)
Aug 26 18:23:58.993246: |    SPI size: 0 (0x0)
Aug 26 18:23:58.993249: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:58.993252: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:58.993255: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:58.993259: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:58.993264: | emitting length of ISAKMP Message: 40
Aug 26 18:23:58.993272: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #37)
Aug 26 18:23:58.993275: |   73 2a e3 2e  8c df 39 1d  28 26 2e 19  d3 9d 12 bb
Aug 26 18:23:58.993278: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:58.993281: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:58.993330: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:58.993341: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:58.993347: | stop processing: state #37 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:58.993351: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:58.993357: | spent 0.517 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:59.039921: | spent 0.00382 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:59.039951: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:59.039957: |   6a f7 e4 11  50 fd c2 64  00 00 00 00  00 00 00 00
Aug 26 18:23:59.039960: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:59.039962: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:59.039965: |   00 00 00 14  01 01 00 00  80 02 00 1e  80 03 00 06
Aug 26 18:23:59.039967: |   80 04 00 04
Aug 26 18:23:59.039973: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:59.039978: | **parse ISAKMP Message:
Aug 26 18:23:59.039981: |    initiator cookie:
Aug 26 18:23:59.039984: |   6a f7 e4 11  50 fd c2 64
Aug 26 18:23:59.039987: |    responder cookie:
Aug 26 18:23:59.039989: |   00 00 00 00  00 00 00 00
Aug 26 18:23:59.039992: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.039996: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.039999: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.040002: |    flags: none (0x0)
Aug 26 18:23:59.040005: |    Message ID: 0 (0x0)
Aug 26 18:23:59.040008: |    length: 68 (0x44)
Aug 26 18:23:59.040011: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:59.040015: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:59.040018: | #null state always idle
Aug 26 18:23:59.040022: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:59.040026: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:59.040029: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.040032: |    length: 40 (0x28)
Aug 26 18:23:59.040035: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.040038: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:59.040041: | in statetime_start() with no state
Aug 26 18:23:59.040047: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:59.040054: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:59.040058: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.040062: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:59.040065: | find_next_host_connection returns test
Aug 26 18:23:59.040068: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.040071: | find_next_host_connection returns empty
Aug 26 18:23:59.040100: | creating state object #38 at 0x55f088af4720
Aug 26 18:23:59.040104: | State DB: adding IKEv1 state #38 in UNDEFINED
Aug 26 18:23:59.040109: | pstats #38 ikev1.isakmp started
Aug 26 18:23:59.040114: | #38 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:59.040121: | start processing: state #38 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:59.040125: | parent state #38: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:59.040132: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:59.040135: "test" #38: responding to Main Mode
Aug 26 18:23:59.040141: | **emit ISAKMP Message:
Aug 26 18:23:59.040144: |    initiator cookie:
Aug 26 18:23:59.040146: |   6a f7 e4 11  50 fd c2 64
Aug 26 18:23:59.040149: |    responder cookie:
Aug 26 18:23:59.040151: |   20 cc f9 25  70 78 65 c5
Aug 26 18:23:59.040154: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.040157: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.040160: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.040162: |    flags: none (0x0)
Aug 26 18:23:59.040165: |    Message ID: 0 (0x0)
Aug 26 18:23:59.040168: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.040171: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:59.040174: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:59.040177: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:59.040179: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.040183: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:59.040186: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:59.040189: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:59.040193: | ****parse IPsec DOI SIT:
Aug 26 18:23:59.040195: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:59.040198: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:59.040201: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.040204: |    length: 28 (0x1c)
Aug 26 18:23:59.040207: |    proposal number: 1 (0x1)
Aug 26 18:23:59.040210: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:59.040212: |    SPI size: 0 (0x0)
Aug 26 18:23:59.040215: |    number of transforms: 1 (0x1)
Aug 26 18:23:59.040219: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:59.040222: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.040224: |    length: 20 (0x14)
Aug 26 18:23:59.040227: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:59.040230: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:59.040233: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:59.040236: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:23:59.040239: |    length/value: 30 (0x1e)
Aug 26 18:23:59.040243: "test" #38: 30?? is not supported.  Attribute OAKLEY_HASH_ALGORITHM
Aug 26 18:23:59.040246: "test" #38: no acceptable Oakley Transform
Aug 26 18:23:59.040250: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.040255: | [RE]START processing: state #38 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:59.040258: | #38 is idle
Aug 26 18:23:59.040347: "test" #38: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:59.040359: | **emit ISAKMP Message:
Aug 26 18:23:59.040363: |    initiator cookie:
Aug 26 18:23:59.040366: |   6a f7 e4 11  50 fd c2 64
Aug 26 18:23:59.040369: |    responder cookie:
Aug 26 18:23:59.040371: |   20 cc f9 25  70 78 65 c5
Aug 26 18:23:59.040374: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.040377: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.040380: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:59.040382: |    flags: none (0x0)
Aug 26 18:23:59.040385: |    Message ID: 0 (0x0)
Aug 26 18:23:59.040388: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.040391: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:59.040394: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.040397: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.040400: |    protocol ID: 1 (0x1)
Aug 26 18:23:59.040402: |    SPI size: 0 (0x0)
Aug 26 18:23:59.040407: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:59.040411: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:59.040414: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:59.040417: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:59.040420: | emitting length of ISAKMP Message: 40
Aug 26 18:23:59.040427: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #38)
Aug 26 18:23:59.040430: |   6a f7 e4 11  50 fd c2 64  20 cc f9 25  70 78 65 c5
Aug 26 18:23:59.040433: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:59.040435: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:59.040463: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.040469: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:59.040474: | stop processing: state #38 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:59.040478: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:59.040484: | spent 0.516 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:59.105589: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:59.105616: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:59.105620: |   36 05 e1 02  3e cd 2e b6  00 00 00 00  00 00 00 00
Aug 26 18:23:59.105623: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:59.105625: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:59.105628: |   00 00 00 14  01 01 00 00  80 01 00 16  80 03 00 06
Aug 26 18:23:59.105630: |   80 04 00 04
Aug 26 18:23:59.105636: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:59.105640: | **parse ISAKMP Message:
Aug 26 18:23:59.105643: |    initiator cookie:
Aug 26 18:23:59.105645: |   36 05 e1 02  3e cd 2e b6
Aug 26 18:23:59.105648: |    responder cookie:
Aug 26 18:23:59.105650: |   00 00 00 00  00 00 00 00
Aug 26 18:23:59.105653: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.105656: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.105659: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.105662: |    flags: none (0x0)
Aug 26 18:23:59.105664: |    Message ID: 0 (0x0)
Aug 26 18:23:59.105667: |    length: 68 (0x44)
Aug 26 18:23:59.105670: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:59.105674: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:59.105677: | #null state always idle
Aug 26 18:23:59.105681: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:59.105684: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:59.105687: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.105689: |    length: 40 (0x28)
Aug 26 18:23:59.105692: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.105695: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:59.105698: | in statetime_start() with no state
Aug 26 18:23:59.105704: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:59.105709: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:59.105712: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.105716: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:59.105719: | find_next_host_connection returns test
Aug 26 18:23:59.105722: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.105724: | find_next_host_connection returns empty
Aug 26 18:23:59.105744: | creating state object #39 at 0x55f088af51e0
Aug 26 18:23:59.105748: | State DB: adding IKEv1 state #39 in UNDEFINED
Aug 26 18:23:59.105755: | pstats #39 ikev1.isakmp started
Aug 26 18:23:59.105760: | #39 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:59.105767: | start processing: state #39 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:59.105771: | parent state #39: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:59.105774: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:59.105777: "test" #39: responding to Main Mode
Aug 26 18:23:59.105783: | **emit ISAKMP Message:
Aug 26 18:23:59.105785: |    initiator cookie:
Aug 26 18:23:59.105788: |   36 05 e1 02  3e cd 2e b6
Aug 26 18:23:59.105791: |    responder cookie:
Aug 26 18:23:59.105793: |   fa 08 91 81  11 88 e5 57
Aug 26 18:23:59.105796: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.105798: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.105801: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.105804: |    flags: none (0x0)
Aug 26 18:23:59.105806: |    Message ID: 0 (0x0)
Aug 26 18:23:59.105809: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.105812: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:59.105815: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:59.105818: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:59.105821: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.105824: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:59.105827: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:59.105830: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:59.105833: | ****parse IPsec DOI SIT:
Aug 26 18:23:59.105836: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:59.105839: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:59.105841: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.105844: |    length: 28 (0x1c)
Aug 26 18:23:59.105847: |    proposal number: 1 (0x1)
Aug 26 18:23:59.105850: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:59.105852: |    SPI size: 0 (0x0)
Aug 26 18:23:59.105855: |    number of transforms: 1 (0x1)
Aug 26 18:23:59.105858: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:59.105860: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.105863: |    length: 20 (0x14)
Aug 26 18:23:59.105865: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:59.105868: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:59.105871: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:59.105874: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:59.105877: |    length/value: 22 (0x16)
Aug 26 18:23:59.105879: |    [22 is UNUSED_22]
Aug 26 18:23:59.105883: "test" #39: UNUSED_22 is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:59.105886: "test" #39: no acceptable Oakley Transform
Aug 26 18:23:59.105889: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.105894: | [RE]START processing: state #39 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:59.105897: | #39 is idle
Aug 26 18:23:59.105961: "test" #39: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:59.105966: | **emit ISAKMP Message:
Aug 26 18:23:59.105969: |    initiator cookie:
Aug 26 18:23:59.105971: |   36 05 e1 02  3e cd 2e b6
Aug 26 18:23:59.105974: |    responder cookie:
Aug 26 18:23:59.105976: |   fa 08 91 81  11 88 e5 57
Aug 26 18:23:59.105979: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.105981: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.105984: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:59.105989: |    flags: none (0x0)
Aug 26 18:23:59.105991: |    Message ID: 0 (0x0)
Aug 26 18:23:59.105994: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.105997: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:59.106000: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.106002: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.106005: |    protocol ID: 1 (0x1)
Aug 26 18:23:59.106007: |    SPI size: 0 (0x0)
Aug 26 18:23:59.106010: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:59.106013: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:59.106024: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:59.106027: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:59.106030: | emitting length of ISAKMP Message: 40
Aug 26 18:23:59.106037: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #39)
Aug 26 18:23:59.106039: |   36 05 e1 02  3e cd 2e b6  fa 08 91 81  11 88 e5 57
Aug 26 18:23:59.106042: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:59.106044: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:59.106163: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.106172: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:59.106179: | stop processing: state #39 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:59.106182: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:59.106188: | spent 0.479 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:59.151639: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:59.151668: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:59.151672: |   f8 1a 26 bc  94 c1 c4 dc  00 00 00 00  00 00 00 00
Aug 26 18:23:59.151675: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:59.151677: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:59.151679: |   00 00 00 14  01 01 00 00  80 01 00 16  80 02 00 1e
Aug 26 18:23:59.151682: |   80 04 00 04
Aug 26 18:23:59.151687: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:59.151691: | **parse ISAKMP Message:
Aug 26 18:23:59.151695: |    initiator cookie:
Aug 26 18:23:59.151697: |   f8 1a 26 bc  94 c1 c4 dc
Aug 26 18:23:59.151699: |    responder cookie:
Aug 26 18:23:59.151702: |   00 00 00 00  00 00 00 00
Aug 26 18:23:59.151705: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.151708: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.151711: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.151714: |    flags: none (0x0)
Aug 26 18:23:59.151716: |    Message ID: 0 (0x0)
Aug 26 18:23:59.151719: |    length: 68 (0x44)
Aug 26 18:23:59.151722: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:59.151727: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:59.151730: | #null state always idle
Aug 26 18:23:59.151733: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:59.151737: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:59.151740: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.151742: |    length: 40 (0x28)
Aug 26 18:23:59.151745: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.151748: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:59.151751: | in statetime_start() with no state
Aug 26 18:23:59.151758: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:59.151763: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:59.151767: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.151773: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:59.151776: | find_next_host_connection returns test
Aug 26 18:23:59.151779: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.151782: | find_next_host_connection returns empty
Aug 26 18:23:59.151803: | creating state object #40 at 0x55f088af5ca0
Aug 26 18:23:59.151807: | State DB: adding IKEv1 state #40 in UNDEFINED
Aug 26 18:23:59.151812: | pstats #40 ikev1.isakmp started
Aug 26 18:23:59.151817: | #40 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:59.151824: | start processing: state #40 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:59.151828: | parent state #40: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:59.151831: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:59.151834: "test" #40: responding to Main Mode
Aug 26 18:23:59.151840: | **emit ISAKMP Message:
Aug 26 18:23:59.151843: |    initiator cookie:
Aug 26 18:23:59.151845: |   f8 1a 26 bc  94 c1 c4 dc
Aug 26 18:23:59.151848: |    responder cookie:
Aug 26 18:23:59.151851: |   87 5d df ac  47 50 ab 5d
Aug 26 18:23:59.151853: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.151856: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.151859: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.151862: |    flags: none (0x0)
Aug 26 18:23:59.151865: |    Message ID: 0 (0x0)
Aug 26 18:23:59.151867: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.151870: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:59.151873: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:59.151876: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:59.151878: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.151881: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:59.151885: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:59.151889: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:59.151892: | ****parse IPsec DOI SIT:
Aug 26 18:23:59.151895: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:59.151898: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:59.151901: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.151903: |    length: 28 (0x1c)
Aug 26 18:23:59.151906: |    proposal number: 1 (0x1)
Aug 26 18:23:59.151908: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:59.151911: |    SPI size: 0 (0x0)
Aug 26 18:23:59.151913: |    number of transforms: 1 (0x1)
Aug 26 18:23:59.151916: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:59.151919: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.151922: |    length: 20 (0x14)
Aug 26 18:23:59.151925: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:59.151927: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:59.151930: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:59.151934: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:59.151936: |    length/value: 22 (0x16)
Aug 26 18:23:59.151939: |    [22 is UNUSED_22]
Aug 26 18:23:59.151943: "test" #40: UNUSED_22 is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:59.151946: "test" #40: no acceptable Oakley Transform
Aug 26 18:23:59.151949: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.151954: | [RE]START processing: state #40 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:59.151957: | #40 is idle
Aug 26 18:23:59.152424: "test" #40: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:59.152436: | **emit ISAKMP Message:
Aug 26 18:23:59.152439: |    initiator cookie:
Aug 26 18:23:59.152442: |   f8 1a 26 bc  94 c1 c4 dc
Aug 26 18:23:59.152444: |    responder cookie:
Aug 26 18:23:59.152447: |   87 5d df ac  47 50 ab 5d
Aug 26 18:23:59.152450: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.152453: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.152455: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:59.152458: |    flags: none (0x0)
Aug 26 18:23:59.152461: |    Message ID: 0 (0x0)
Aug 26 18:23:59.152464: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.152467: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:59.152469: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.152472: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.152475: |    protocol ID: 1 (0x1)
Aug 26 18:23:59.152477: |    SPI size: 0 (0x0)
Aug 26 18:23:59.152480: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:59.152483: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:59.152486: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:59.152489: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:59.152492: | emitting length of ISAKMP Message: 40
Aug 26 18:23:59.152499: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #40)
Aug 26 18:23:59.152502: |   f8 1a 26 bc  94 c1 c4 dc  87 5d df ac  47 50 ab 5d
Aug 26 18:23:59.152505: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:59.152507: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:59.152535: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.152541: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:59.152546: | stop processing: state #40 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:59.152550: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:59.152556: | spent 0.881 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:59.215518: | spent 0.00379 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:59.215548: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:59.215552: |   59 9e b9 c3  45 b4 52 14  00 00 00 00  00 00 00 00
Aug 26 18:23:59.215555: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:59.215557: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:59.215560: |   00 00 00 14  01 01 00 00  80 01 00 16  80 02 00 1e
Aug 26 18:23:59.215562: |   80 03 00 06
Aug 26 18:23:59.215568: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:59.215573: | **parse ISAKMP Message:
Aug 26 18:23:59.215576: |    initiator cookie:
Aug 26 18:23:59.215579: |   59 9e b9 c3  45 b4 52 14
Aug 26 18:23:59.215582: |    responder cookie:
Aug 26 18:23:59.215584: |   00 00 00 00  00 00 00 00
Aug 26 18:23:59.215587: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.215591: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.215593: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.215596: |    flags: none (0x0)
Aug 26 18:23:59.215599: |    Message ID: 0 (0x0)
Aug 26 18:23:59.215602: |    length: 68 (0x44)
Aug 26 18:23:59.215606: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:59.215610: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:59.215613: | #null state always idle
Aug 26 18:23:59.215617: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:59.215621: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:59.215624: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.215626: |    length: 40 (0x28)
Aug 26 18:23:59.215632: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.215635: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:59.215638: | in statetime_start() with no state
Aug 26 18:23:59.215645: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:59.215650: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:59.215653: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.215657: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:59.215660: | find_next_host_connection returns test
Aug 26 18:23:59.215662: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.215665: | find_next_host_connection returns empty
Aug 26 18:23:59.215692: | creating state object #41 at 0x55f088af6760
Aug 26 18:23:59.215696: | State DB: adding IKEv1 state #41 in UNDEFINED
Aug 26 18:23:59.215701: | pstats #41 ikev1.isakmp started
Aug 26 18:23:59.215706: | #41 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:59.215713: | start processing: state #41 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:59.215717: | parent state #41: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:59.215721: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:59.215725: "test" #41: responding to Main Mode
Aug 26 18:23:59.215731: | **emit ISAKMP Message:
Aug 26 18:23:59.215734: |    initiator cookie:
Aug 26 18:23:59.215737: |   59 9e b9 c3  45 b4 52 14
Aug 26 18:23:59.215740: |    responder cookie:
Aug 26 18:23:59.215742: |   e0 32 04 64  95 83 ab 54
Aug 26 18:23:59.215746: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.215749: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.215752: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.215755: |    flags: none (0x0)
Aug 26 18:23:59.215758: |    Message ID: 0 (0x0)
Aug 26 18:23:59.215762: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.215766: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:59.215769: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:59.215771: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:59.215774: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.215777: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:59.215780: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:59.215783: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:59.215786: | ****parse IPsec DOI SIT:
Aug 26 18:23:59.215789: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:59.215792: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:59.215795: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.215798: |    length: 28 (0x1c)
Aug 26 18:23:59.215800: |    proposal number: 1 (0x1)
Aug 26 18:23:59.215803: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:59.215806: |    SPI size: 0 (0x0)
Aug 26 18:23:59.215808: |    number of transforms: 1 (0x1)
Aug 26 18:23:59.215812: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:59.215814: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.215817: |    length: 20 (0x14)
Aug 26 18:23:59.215819: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:59.215822: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:59.215825: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:59.215828: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:59.215830: |    length/value: 22 (0x16)
Aug 26 18:23:59.215833: |    [22 is UNUSED_22]
Aug 26 18:23:59.215837: "test" #41: UNUSED_22 is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:59.215843: "test" #41: no acceptable Oakley Transform
Aug 26 18:23:59.215847: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.215852: | [RE]START processing: state #41 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:59.215855: | #41 is idle
Aug 26 18:23:59.215918: "test" #41: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:59.215923: | **emit ISAKMP Message:
Aug 26 18:23:59.215927: |    initiator cookie:
Aug 26 18:23:59.215929: |   59 9e b9 c3  45 b4 52 14
Aug 26 18:23:59.215932: |    responder cookie:
Aug 26 18:23:59.215934: |   e0 32 04 64  95 83 ab 54
Aug 26 18:23:59.215937: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.215939: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.215942: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:59.215944: |    flags: none (0x0)
Aug 26 18:23:59.215947: |    Message ID: 0 (0x0)
Aug 26 18:23:59.215950: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.215953: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:59.215956: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.215958: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.215961: |    protocol ID: 1 (0x1)
Aug 26 18:23:59.215963: |    SPI size: 0 (0x0)
Aug 26 18:23:59.215966: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:59.215969: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:59.215972: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:59.215975: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:59.215977: | emitting length of ISAKMP Message: 40
Aug 26 18:23:59.215984: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #41)
Aug 26 18:23:59.215987: |   59 9e b9 c3  45 b4 52 14  e0 32 04 64  95 83 ab 54
Aug 26 18:23:59.215989: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:59.215992: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:59.216017: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.216023: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:59.216028: | stop processing: state #41 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:59.216031: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:59.216037: | spent 0.49 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:59.255523: | spent 0.00447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:59.255553: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:59.255559: |   fd a2 5e 57  96 1b c4 50  00 00 00 00  00 00 00 00
Aug 26 18:23:59.255562: |   01 10 02 00  00 00 00 00  00 00 00 48  00 00 00 2c
Aug 26 18:23:59.255564: |   00 00 00 01  00 00 00 01  00 00 00 20  01 01 00 01
Aug 26 18:23:59.255567: |   00 00 00 18  01 01 00 00  80 01 00 18  80 02 00 04
Aug 26 18:23:59.255569: |   80 03 00 18  80 04 00 17
Aug 26 18:23:59.255575: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:59.255580: | **parse ISAKMP Message:
Aug 26 18:23:59.255583: |    initiator cookie:
Aug 26 18:23:59.255585: |   fd a2 5e 57  96 1b c4 50
Aug 26 18:23:59.255588: |    responder cookie:
Aug 26 18:23:59.255590: |   00 00 00 00  00 00 00 00
Aug 26 18:23:59.255594: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.255597: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.255600: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.255603: |    flags: none (0x0)
Aug 26 18:23:59.255605: |    Message ID: 0 (0x0)
Aug 26 18:23:59.255608: |    length: 72 (0x48)
Aug 26 18:23:59.255614: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:59.255618: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:59.255620: | #null state always idle
Aug 26 18:23:59.255624: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:59.255628: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:59.255631: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.255633: |    length: 44 (0x2c)
Aug 26 18:23:59.255636: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.255639: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:59.255642: | in statetime_start() with no state
Aug 26 18:23:59.255647: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:59.255653: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:59.255657: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.255660: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:59.255663: | find_next_host_connection returns test
Aug 26 18:23:59.255666: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.255669: | find_next_host_connection returns empty
Aug 26 18:23:59.255689: | creating state object #42 at 0x55f088af7220
Aug 26 18:23:59.255694: | State DB: adding IKEv1 state #42 in UNDEFINED
Aug 26 18:23:59.255698: | pstats #42 ikev1.isakmp started
Aug 26 18:23:59.255703: | #42 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:59.255710: | start processing: state #42 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:59.255714: | parent state #42: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:59.255718: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:59.255721: "test" #42: responding to Main Mode
Aug 26 18:23:59.255726: | **emit ISAKMP Message:
Aug 26 18:23:59.255729: |    initiator cookie:
Aug 26 18:23:59.255732: |   fd a2 5e 57  96 1b c4 50
Aug 26 18:23:59.255734: |    responder cookie:
Aug 26 18:23:59.255736: |   60 4d 27 b9  d4 1b bf 51
Aug 26 18:23:59.255739: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.255742: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.255745: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.255747: |    flags: none (0x0)
Aug 26 18:23:59.255750: |    Message ID: 0 (0x0)
Aug 26 18:23:59.255753: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.255756: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:59.255760: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:59.255763: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:59.255765: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.255769: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:59.255772: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:59.255775: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:59.255779: | ****parse IPsec DOI SIT:
Aug 26 18:23:59.255782: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:59.255784: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:59.255787: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.255789: |    length: 32 (0x20)
Aug 26 18:23:59.255792: |    proposal number: 1 (0x1)
Aug 26 18:23:59.255794: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:59.255797: |    SPI size: 0 (0x0)
Aug 26 18:23:59.255799: |    number of transforms: 1 (0x1)
Aug 26 18:23:59.255802: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:59.255805: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.255810: |    length: 24 (0x18)
Aug 26 18:23:59.255812: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:59.255814: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:59.255817: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:59.255819: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:59.255821: |    length/value: 24 (0x18)
Aug 26 18:23:59.255824: |    [24 is OAKLEY_CAMELLIA_CTR]
Aug 26 18:23:59.255827: "test" #42: OAKLEY_CAMELLIA_CTR is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:59.255830: "test" #42: no acceptable Oakley Transform
Aug 26 18:23:59.255832: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.255837: | [RE]START processing: state #42 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:59.255839: | #42 is idle
Aug 26 18:23:59.255897: "test" #42: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:59.255901: | **emit ISAKMP Message:
Aug 26 18:23:59.255904: |    initiator cookie:
Aug 26 18:23:59.255906: |   fd a2 5e 57  96 1b c4 50
Aug 26 18:23:59.255908: |    responder cookie:
Aug 26 18:23:59.255911: |   60 4d 27 b9  d4 1b bf 51
Aug 26 18:23:59.255913: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.255916: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.255919: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:59.255921: |    flags: none (0x0)
Aug 26 18:23:59.255923: |    Message ID: 0 (0x0)
Aug 26 18:23:59.255926: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.255929: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:59.255932: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.255934: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.255936: |    protocol ID: 1 (0x1)
Aug 26 18:23:59.255939: |    SPI size: 0 (0x0)
Aug 26 18:23:59.255941: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:59.255944: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:59.255946: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:59.255949: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:59.255951: | emitting length of ISAKMP Message: 40
Aug 26 18:23:59.255957: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #42)
Aug 26 18:23:59.255959: |   fd a2 5e 57  96 1b c4 50  60 4d 27 b9  d4 1b bf 51
Aug 26 18:23:59.255961: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:59.255963: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:59.256001: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.256007: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:59.256012: | stop processing: state #42 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:59.256015: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:59.256020: | spent 0.46 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:59.301925: | spent 0.0039 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:59.301954: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:59.301959: |   75 07 f6 20  8b 61 12 44  00 00 00 00  00 00 00 00
Aug 26 18:23:59.301961: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:59.301964: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:59.301966: |   00 00 00 14  01 01 00 00  80 02 00 04  80 03 00 18
Aug 26 18:23:59.301968: |   80 04 00 17
Aug 26 18:23:59.301974: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:59.301978: | **parse ISAKMP Message:
Aug 26 18:23:59.301981: |    initiator cookie:
Aug 26 18:23:59.301984: |   75 07 f6 20  8b 61 12 44
Aug 26 18:23:59.301989: |    responder cookie:
Aug 26 18:23:59.301992: |   00 00 00 00  00 00 00 00
Aug 26 18:23:59.301995: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.301998: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.302001: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.302003: |    flags: none (0x0)
Aug 26 18:23:59.302006: |    Message ID: 0 (0x0)
Aug 26 18:23:59.302009: |    length: 68 (0x44)
Aug 26 18:23:59.302012: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:59.302017: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:59.302020: | #null state always idle
Aug 26 18:23:59.302024: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:59.302027: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:59.302030: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.302033: |    length: 40 (0x28)
Aug 26 18:23:59.302036: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.302039: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:59.302042: | in statetime_start() with no state
Aug 26 18:23:59.302048: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:59.302054: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:59.302057: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.302061: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:59.302064: | find_next_host_connection returns test
Aug 26 18:23:59.302067: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.302070: | find_next_host_connection returns empty
Aug 26 18:23:59.302092: | creating state object #43 at 0x55f088af7ce0
Aug 26 18:23:59.302096: | State DB: adding IKEv1 state #43 in UNDEFINED
Aug 26 18:23:59.302101: | pstats #43 ikev1.isakmp started
Aug 26 18:23:59.302107: | #43 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:59.302114: | start processing: state #43 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:59.302118: | parent state #43: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:59.302121: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:59.302125: "test" #43: responding to Main Mode
Aug 26 18:23:59.302131: | **emit ISAKMP Message:
Aug 26 18:23:59.302134: |    initiator cookie:
Aug 26 18:23:59.302137: |   75 07 f6 20  8b 61 12 44
Aug 26 18:23:59.302139: |    responder cookie:
Aug 26 18:23:59.302142: |   74 d6 39 c4  98 6f 27 6b
Aug 26 18:23:59.302145: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.302148: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.302151: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.302153: |    flags: none (0x0)
Aug 26 18:23:59.302156: |    Message ID: 0 (0x0)
Aug 26 18:23:59.302159: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.302163: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:59.302167: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:59.302169: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:59.302172: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.302176: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:59.302180: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:59.302183: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:59.302187: | ****parse IPsec DOI SIT:
Aug 26 18:23:59.302190: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:59.302196: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:59.302199: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.302202: |    length: 28 (0x1c)
Aug 26 18:23:59.302205: |    proposal number: 1 (0x1)
Aug 26 18:23:59.302208: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:59.302210: |    SPI size: 0 (0x0)
Aug 26 18:23:59.302213: |    number of transforms: 1 (0x1)
Aug 26 18:23:59.302217: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:59.302219: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.302222: |    length: 20 (0x14)
Aug 26 18:23:59.302225: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:59.302227: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:59.302230: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:59.302234: |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
Aug 26 18:23:59.302237: |    length/value: 4 (0x4)
Aug 26 18:23:59.302240: |    [4 is OAKLEY_SHA2_256]
Aug 26 18:23:59.302244: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:59.302247: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
Aug 26 18:23:59.302249: |    length/value: 24 (0x18)
Aug 26 18:23:59.302254: "test" #43: Pluto does not support 24?? authentication.  Attribute OAKLEY_AUTHENTICATION_METHOD
Aug 26 18:23:59.302257: "test" #43: no acceptable Oakley Transform
Aug 26 18:23:59.302260: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.302266: | [RE]START processing: state #43 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:59.302269: | #43 is idle
Aug 26 18:23:59.302379: "test" #43: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:59.302387: | **emit ISAKMP Message:
Aug 26 18:23:59.302391: |    initiator cookie:
Aug 26 18:23:59.302393: |   75 07 f6 20  8b 61 12 44
Aug 26 18:23:59.302396: |    responder cookie:
Aug 26 18:23:59.302398: |   74 d6 39 c4  98 6f 27 6b
Aug 26 18:23:59.302401: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.302404: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.302407: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:59.302409: |    flags: none (0x0)
Aug 26 18:23:59.302412: |    Message ID: 0 (0x0)
Aug 26 18:23:59.302415: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.302417: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:59.302420: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.302423: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.302426: |    protocol ID: 1 (0x1)
Aug 26 18:23:59.302428: |    SPI size: 0 (0x0)
Aug 26 18:23:59.302431: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:59.302435: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:59.302438: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:59.302441: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:59.302444: | emitting length of ISAKMP Message: 40
Aug 26 18:23:59.302450: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #43)
Aug 26 18:23:59.302453: |   75 07 f6 20  8b 61 12 44  74 d6 39 c4  98 6f 27 6b
Aug 26 18:23:59.302456: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:59.302458: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:59.302473: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.302479: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:59.302484: | stop processing: state #43 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:59.302488: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:59.302494: | spent 0.519 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:59.341749: | spent 0.00346 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:59.341778: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:59.341782: |   b7 df cb c1  26 53 1c 6e  00 00 00 00  00 00 00 00
Aug 26 18:23:59.341785: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:59.341788: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:59.341791: |   00 00 00 14  01 01 00 00  80 01 00 18  80 03 00 18
Aug 26 18:23:59.341793: |   80 04 00 17
Aug 26 18:23:59.341798: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:59.341802: | **parse ISAKMP Message:
Aug 26 18:23:59.341806: |    initiator cookie:
Aug 26 18:23:59.341808: |   b7 df cb c1  26 53 1c 6e
Aug 26 18:23:59.341811: |    responder cookie:
Aug 26 18:23:59.341813: |   00 00 00 00  00 00 00 00
Aug 26 18:23:59.341816: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.341819: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.341822: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.341825: |    flags: none (0x0)
Aug 26 18:23:59.341828: |    Message ID: 0 (0x0)
Aug 26 18:23:59.341830: |    length: 68 (0x44)
Aug 26 18:23:59.341833: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:59.341837: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:59.341840: | #null state always idle
Aug 26 18:23:59.341844: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:59.341847: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:59.341850: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.341853: |    length: 40 (0x28)
Aug 26 18:23:59.341855: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.341858: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:59.341861: | in statetime_start() with no state
Aug 26 18:23:59.341866: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:59.341872: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:59.341875: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.341879: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:59.341882: | find_next_host_connection returns test
Aug 26 18:23:59.341885: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.341887: | find_next_host_connection returns empty
Aug 26 18:23:59.341910: | creating state object #44 at 0x55f088af87a0
Aug 26 18:23:59.341913: | State DB: adding IKEv1 state #44 in UNDEFINED
Aug 26 18:23:59.341917: | pstats #44 ikev1.isakmp started
Aug 26 18:23:59.341922: | #44 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:59.341927: | start processing: state #44 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:59.341931: | parent state #44: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:59.341934: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:59.341937: "test" #44: responding to Main Mode
Aug 26 18:23:59.341942: | **emit ISAKMP Message:
Aug 26 18:23:59.341945: |    initiator cookie:
Aug 26 18:23:59.341947: |   b7 df cb c1  26 53 1c 6e
Aug 26 18:23:59.341950: |    responder cookie:
Aug 26 18:23:59.341952: |   ce 18 40 2a  60 9a 7e 10
Aug 26 18:23:59.341955: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.341958: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.341960: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.341963: |    flags: none (0x0)
Aug 26 18:23:59.341965: |    Message ID: 0 (0x0)
Aug 26 18:23:59.341969: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.341972: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:59.341975: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:59.341978: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:59.341982: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.341985: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:59.341989: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:59.341992: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:59.341995: | ****parse IPsec DOI SIT:
Aug 26 18:23:59.341998: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:59.342000: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:59.342003: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.342006: |    length: 28 (0x1c)
Aug 26 18:23:59.342008: |    proposal number: 1 (0x1)
Aug 26 18:23:59.342011: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:59.342013: |    SPI size: 0 (0x0)
Aug 26 18:23:59.342016: |    number of transforms: 1 (0x1)
Aug 26 18:23:59.342019: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:59.342021: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.342024: |    length: 20 (0x14)
Aug 26 18:23:59.342026: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:59.342029: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:59.342032: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:59.342035: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:59.342037: |    length/value: 24 (0x18)
Aug 26 18:23:59.342040: |    [24 is OAKLEY_CAMELLIA_CTR]
Aug 26 18:23:59.342044: "test" #44: OAKLEY_CAMELLIA_CTR is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:59.342047: "test" #44: no acceptable Oakley Transform
Aug 26 18:23:59.342050: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.342055: | [RE]START processing: state #44 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:59.342057: | #44 is idle
Aug 26 18:23:59.342275: "test" #44: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:59.342283: | **emit ISAKMP Message:
Aug 26 18:23:59.342286: |    initiator cookie:
Aug 26 18:23:59.342299: |   b7 df cb c1  26 53 1c 6e
Aug 26 18:23:59.342303: |    responder cookie:
Aug 26 18:23:59.342305: |   ce 18 40 2a  60 9a 7e 10
Aug 26 18:23:59.342308: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.342311: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.342314: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:59.342318: |    flags: none (0x0)
Aug 26 18:23:59.342320: |    Message ID: 0 (0x0)
Aug 26 18:23:59.342323: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.342326: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:59.342329: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.342332: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.342335: |    protocol ID: 1 (0x1)
Aug 26 18:23:59.342337: |    SPI size: 0 (0x0)
Aug 26 18:23:59.342340: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:59.342344: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:59.342347: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:59.342350: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:59.342353: | emitting length of ISAKMP Message: 40
Aug 26 18:23:59.342359: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #44)
Aug 26 18:23:59.342362: |   b7 df cb c1  26 53 1c 6e  ce 18 40 2a  60 9a 7e 10
Aug 26 18:23:59.342365: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:59.342367: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:59.342412: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.342420: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:59.342425: | stop processing: state #44 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:59.342428: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:59.342435: | spent 0.492 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:59.379847: | spent 0.00368 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:59.379876: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:59.379881: |   da c6 32 ba  f0 64 a6 80  00 00 00 00  00 00 00 00
Aug 26 18:23:59.379884: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:59.379886: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:59.379889: |   00 00 00 14  01 01 00 00  80 01 00 18  80 02 00 04
Aug 26 18:23:59.379891: |   80 04 00 17
Aug 26 18:23:59.379896: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:59.379901: | **parse ISAKMP Message:
Aug 26 18:23:59.379904: |    initiator cookie:
Aug 26 18:23:59.379906: |   da c6 32 ba  f0 64 a6 80
Aug 26 18:23:59.379908: |    responder cookie:
Aug 26 18:23:59.379910: |   00 00 00 00  00 00 00 00
Aug 26 18:23:59.379913: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.379916: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.379918: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.379921: |    flags: none (0x0)
Aug 26 18:23:59.379923: |    Message ID: 0 (0x0)
Aug 26 18:23:59.379925: |    length: 68 (0x44)
Aug 26 18:23:59.379928: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:59.379932: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:59.379935: | #null state always idle
Aug 26 18:23:59.379938: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:59.379941: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:59.379944: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.379947: |    length: 40 (0x28)
Aug 26 18:23:59.379949: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.379952: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:59.379955: | in statetime_start() with no state
Aug 26 18:23:59.379960: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:59.379966: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:59.379969: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.379973: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:59.379976: | find_next_host_connection returns test
Aug 26 18:23:59.379978: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.379981: | find_next_host_connection returns empty
Aug 26 18:23:59.380005: | creating state object #45 at 0x55f088af9260
Aug 26 18:23:59.380009: | State DB: adding IKEv1 state #45 in UNDEFINED
Aug 26 18:23:59.380013: | pstats #45 ikev1.isakmp started
Aug 26 18:23:59.380018: | #45 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:59.380024: | start processing: state #45 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:59.380027: | parent state #45: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:59.380031: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:59.380034: "test" #45: responding to Main Mode
Aug 26 18:23:59.380040: | **emit ISAKMP Message:
Aug 26 18:23:59.380043: |    initiator cookie:
Aug 26 18:23:59.380045: |   da c6 32 ba  f0 64 a6 80
Aug 26 18:23:59.380047: |    responder cookie:
Aug 26 18:23:59.380049: |   30 3a 48 a4  64 72 82 f9
Aug 26 18:23:59.380051: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.380054: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.380060: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.380063: |    flags: none (0x0)
Aug 26 18:23:59.380065: |    Message ID: 0 (0x0)
Aug 26 18:23:59.380068: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.380071: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:59.380075: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:59.380077: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:59.380080: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.380083: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:59.380087: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:59.380090: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:59.380094: | ****parse IPsec DOI SIT:
Aug 26 18:23:59.380097: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:59.380100: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:59.380103: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.380106: |    length: 28 (0x1c)
Aug 26 18:23:59.380109: |    proposal number: 1 (0x1)
Aug 26 18:23:59.380111: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:59.380114: |    SPI size: 0 (0x0)
Aug 26 18:23:59.380117: |    number of transforms: 1 (0x1)
Aug 26 18:23:59.380120: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:59.380123: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.380126: |    length: 20 (0x14)
Aug 26 18:23:59.380128: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:59.380131: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:59.380134: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:59.380136: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:59.380139: |    length/value: 24 (0x18)
Aug 26 18:23:59.380142: |    [24 is OAKLEY_CAMELLIA_CTR]
Aug 26 18:23:59.380146: "test" #45: OAKLEY_CAMELLIA_CTR is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:59.380149: "test" #45: no acceptable Oakley Transform
Aug 26 18:23:59.380152: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.380158: | [RE]START processing: state #45 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:59.380161: | #45 is idle
Aug 26 18:23:59.380229: "test" #45: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:59.380234: | **emit ISAKMP Message:
Aug 26 18:23:59.380236: |    initiator cookie:
Aug 26 18:23:59.380239: |   da c6 32 ba  f0 64 a6 80
Aug 26 18:23:59.380241: |    responder cookie:
Aug 26 18:23:59.380243: |   30 3a 48 a4  64 72 82 f9
Aug 26 18:23:59.380246: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.380249: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.380251: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:59.380254: |    flags: none (0x0)
Aug 26 18:23:59.380257: |    Message ID: 0 (0x0)
Aug 26 18:23:59.380260: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.380263: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:59.380266: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.380269: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.380272: |    protocol ID: 1 (0x1)
Aug 26 18:23:59.380274: |    SPI size: 0 (0x0)
Aug 26 18:23:59.380277: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:59.380281: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:59.380284: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:59.380287: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:59.380298: | emitting length of ISAKMP Message: 40
Aug 26 18:23:59.380308: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #45)
Aug 26 18:23:59.380311: |   da c6 32 ba  f0 64 a6 80  30 3a 48 a4  64 72 82 f9
Aug 26 18:23:59.380314: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:59.380316: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:59.380345: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.380352: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:59.380358: | stop processing: state #45 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:59.380361: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:59.380368: | spent 0.485 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:59.420388: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:23:59.420414: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500)
Aug 26 18:23:59.420418: |   72 42 77 2d  52 25 77 37  00 00 00 00  00 00 00 00
Aug 26 18:23:59.420420: |   01 10 02 00  00 00 00 00  00 00 00 44  00 00 00 28
Aug 26 18:23:59.420422: |   00 00 00 01  00 00 00 01  00 00 00 1c  01 01 00 01
Aug 26 18:23:59.420424: |   00 00 00 14  01 01 00 00  80 01 00 18  80 02 00 04
Aug 26 18:23:59.420426: |   80 03 00 18
Aug 26 18:23:59.420431: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378)
Aug 26 18:23:59.420436: | **parse ISAKMP Message:
Aug 26 18:23:59.420439: |    initiator cookie:
Aug 26 18:23:59.420441: |   72 42 77 2d  52 25 77 37
Aug 26 18:23:59.420443: |    responder cookie:
Aug 26 18:23:59.420445: |   00 00 00 00  00 00 00 00
Aug 26 18:23:59.420448: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.420450: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.420453: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.420456: |    flags: none (0x0)
Aug 26 18:23:59.420458: |    Message ID: 0 (0x0)
Aug 26 18:23:59.420460: |    length: 68 (0x44)
Aug 26 18:23:59.420463: |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Aug 26 18:23:59.420466: | State DB: IKEv1 state not found (find_state_ikev1_init)
Aug 26 18:23:59.420469: | #null state always idle
Aug 26 18:23:59.420472: | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Aug 26 18:23:59.420475: | ***parse ISAKMP Security Association Payload:
Aug 26 18:23:59.420477: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.420479: |    length: 40 (0x28)
Aug 26 18:23:59.420482: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.420484: | message 'main_inI1_outR1' HASH payload not checked early
Aug 26 18:23:59.420486: | in statetime_start() with no state
Aug 26 18:23:59.420491: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports
Aug 26 18:23:59.420496: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports
Aug 26 18:23:59.420499: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.420503: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test)
Aug 26 18:23:59.420506: | find_next_host_connection returns test
Aug 26 18:23:59.420508: | find_next_host_connection policy=IKEV1_ALLOW
Aug 26 18:23:59.420511: | find_next_host_connection returns empty
Aug 26 18:23:59.420540: | creating state object #46 at 0x55f088af9d20
Aug 26 18:23:59.420543: | State DB: adding IKEv1 state #46 in UNDEFINED
Aug 26 18:23:59.420547: | pstats #46 ikev1.isakmp started
Aug 26 18:23:59.420552: | #46 updating local interface from <none> to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669)
Aug 26 18:23:59.420557: | start processing: state #46 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667)
Aug 26 18:23:59.420561: | parent state #46: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA)
Aug 26 18:23:59.420565: | sender checking NAT-T: enabled; VID 0
Aug 26 18:23:59.420573: "test" #46: responding to Main Mode
Aug 26 18:23:59.420578: | **emit ISAKMP Message:
Aug 26 18:23:59.420581: |    initiator cookie:
Aug 26 18:23:59.420583: |   72 42 77 2d  52 25 77 37
Aug 26 18:23:59.420585: |    responder cookie:
Aug 26 18:23:59.420587: |   35 0d 83 77  bf 0b 75 0e
Aug 26 18:23:59.420590: |    next payload type: ISAKMP_NEXT_SA (0x1)
Aug 26 18:23:59.420593: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.420596: |    exchange type: ISAKMP_XCHG_IDPROT (0x2)
Aug 26 18:23:59.420598: |    flags: none (0x0)
Aug 26 18:23:59.420601: |    Message ID: 0 (0x0)
Aug 26 18:23:59.420604: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.420607: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA
Aug 26 18:23:59.420610: | ***emit ISAKMP Security Association Payload:
Aug 26 18:23:59.420612: |    next payload type: ISAKMP_NEXT_VID (0xd)
Aug 26 18:23:59.420615: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.420618: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID
Aug 26 18:23:59.420621: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA)
Aug 26 18:23:59.420624: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:23:59.420628: | ****parse IPsec DOI SIT:
Aug 26 18:23:59.420631: |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
Aug 26 18:23:59.420633: | ****parse ISAKMP Proposal Payload:
Aug 26 18:23:59.420636: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.420639: |    length: 28 (0x1c)
Aug 26 18:23:59.420641: |    proposal number: 1 (0x1)
Aug 26 18:23:59.420644: |    protocol ID: PROTO_ISAKMP (0x1)
Aug 26 18:23:59.420646: |    SPI size: 0 (0x0)
Aug 26 18:23:59.420649: |    number of transforms: 1 (0x1)
Aug 26 18:23:59.420652: | *****parse ISAKMP Transform Payload (ISAKMP):
Aug 26 18:23:59.420654: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.420657: |    length: 20 (0x14)
Aug 26 18:23:59.420660: |    ISAKMP transform number: 1 (0x1)
Aug 26 18:23:59.420662: |    ISAKMP transform ID: KEY_IKE (0x1)
Aug 26 18:23:59.420665: | ******parse ISAKMP Oakley attribute:
Aug 26 18:23:59.420668: |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
Aug 26 18:23:59.420671: |    length/value: 24 (0x18)
Aug 26 18:23:59.420674: |    [24 is OAKLEY_CAMELLIA_CTR]
Aug 26 18:23:59.420678: "test" #46: OAKLEY_CAMELLIA_CTR is not supported.  Attribute OAKLEY_ENCRYPTION_ALGORITHM
Aug 26 18:23:59.420681: "test" #46: no acceptable Oakley Transform
Aug 26 18:23:59.420684: | complete v1 state transition with NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.420690: | [RE]START processing: state #46 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673)
Aug 26 18:23:59.420692: | #46 is idle
Aug 26 18:23:59.420775: "test" #46: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500
Aug 26 18:23:59.420781: | **emit ISAKMP Message:
Aug 26 18:23:59.420784: |    initiator cookie:
Aug 26 18:23:59.420786: |   72 42 77 2d  52 25 77 37
Aug 26 18:23:59.420789: |    responder cookie:
Aug 26 18:23:59.420791: |   35 0d 83 77  bf 0b 75 0e
Aug 26 18:23:59.420794: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.420797: |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
Aug 26 18:23:59.420800: |    exchange type: ISAKMP_XCHG_INFO (0x5)
Aug 26 18:23:59.420803: |    flags: none (0x0)
Aug 26 18:23:59.420806: |    Message ID: 0 (0x0)
Aug 26 18:23:59.420809: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:23:59.420812: | ***emit ISAKMP Notification Payload:
Aug 26 18:23:59.420815: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:23:59.420818: |    DOI: ISAKMP_DOI_IPSEC (0x1)
Aug 26 18:23:59.420820: |    protocol ID: 1 (0x1)
Aug 26 18:23:59.420823: |    SPI size: 0 (0x0)
Aug 26 18:23:59.420828: |    Notify Message Type: NO_PROPOSAL_CHOSEN (0xe)
Aug 26 18:23:59.420832: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N)
Aug 26 18:23:59.420835: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg'
Aug 26 18:23:59.420839: | emitting length of ISAKMP Notification Payload: 12
Aug 26 18:23:59.420842: | emitting length of ISAKMP Message: 40
Aug 26 18:23:59.420849: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #46)
Aug 26 18:23:59.420852: |   72 42 77 2d  52 25 77 37  35 0d 83 77  bf 0b 75 0e
Aug 26 18:23:59.420855: |   0b 10 05 00  00 00 00 00  00 00 00 28  00 00 00 0c
Aug 26 18:23:59.420858: |   00 00 00 01  01 00 00 0e
Aug 26 18:23:59.420886: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN
Aug 26 18:23:59.420893: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380)
Aug 26 18:23:59.420898: | stop processing: state #46 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382)
Aug 26 18:23:59.420902: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:23:59.420908: | spent 0.485 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:23:59.632692: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:23:59.632718: shutting down
Aug 26 18:23:59.632729: | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825)
Aug 26 18:23:59.632734: | certs and keys locked by 'free_preshared_secrets'
Aug 26 18:23:59.632737: forgetting secrets
Aug 26 18:23:59.632741: | certs and keys unlocked by 'free_preshared_secrets'
Aug 26 18:23:59.632746: | start processing: connection "test" (in delete_connection() at connections.c:189)
Aug 26 18:23:59.632750: | Deleting states for connection - including all other IPsec SA's of this IKE SA
Aug 26 18:23:59.632753: | pass 0
Aug 26 18:23:59.632756: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
Aug 26 18:23:59.632759: | state #46
Aug 26 18:23:59.632763: | suspend processing: connection "test" (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.632769: | start processing: state #46 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.632772: | pstats #46 ikev1.isakmp deleted other
Aug 26 18:23:59.632777: | [RE]START processing: state #46 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.632782: "test" #46: deleting state (STATE_MAIN_R0) aged 0.212s and NOT sending notification
Aug 26 18:23:59.632786: | parent state #46: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.633233: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.633243: | stop processing: connection "test" (BACKGROUND) (in update_state_connection() at connections.c:4076)
Aug 26 18:23:59.633246: | start processing: connection NULL (in update_state_connection() at connections.c:4077)
Aug 26 18:23:59.633249: | in connection_discard for connection test
Aug 26 18:23:59.633252: | State DB: deleting IKEv1 state #46 in MAIN_R0
Aug 26 18:23:59.633256: | parent state #46: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.633267: | stop processing: state #46 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.633278: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.633281: | state #45
Aug 26 18:23:59.633286: | start processing: state #45 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.633297: | pstats #45 ikev1.isakmp deleted other
Aug 26 18:23:59.633302: | [RE]START processing: state #45 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.633309: "test" #45: deleting state (STATE_MAIN_R0) aged 0.253s and NOT sending notification
Aug 26 18:23:59.633312: | parent state #45: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.633356: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.633360: | in connection_discard for connection test
Aug 26 18:23:59.633363: | State DB: deleting IKEv1 state #45 in MAIN_R0
Aug 26 18:23:59.633367: | parent state #45: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.633371: | stop processing: state #45 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.633375: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.633377: | state #44
Aug 26 18:23:59.633382: | start processing: state #44 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.633385: | pstats #44 ikev1.isakmp deleted other
Aug 26 18:23:59.633389: | [RE]START processing: state #44 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.633392: "test" #44: deleting state (STATE_MAIN_R0) aged 0.291s and NOT sending notification
Aug 26 18:23:59.633395: | parent state #44: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.633433: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.633437: | in connection_discard for connection test
Aug 26 18:23:59.633440: | State DB: deleting IKEv1 state #44 in MAIN_R0
Aug 26 18:23:59.633443: | parent state #44: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.633447: | stop processing: state #44 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.633454: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.633457: | state #43
Aug 26 18:23:59.633461: | start processing: state #43 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.633464: | pstats #43 ikev1.isakmp deleted other
Aug 26 18:23:59.633469: | [RE]START processing: state #43 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.633472: "test" #43: deleting state (STATE_MAIN_R0) aged 0.331s and NOT sending notification
Aug 26 18:23:59.633475: | parent state #43: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.633513: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.633517: | in connection_discard for connection test
Aug 26 18:23:59.633520: | State DB: deleting IKEv1 state #43 in MAIN_R0
Aug 26 18:23:59.633523: | parent state #43: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.633528: | stop processing: state #43 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.633534: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.633537: | state #42
Aug 26 18:23:59.633541: | start processing: state #42 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.633544: | pstats #42 ikev1.isakmp deleted other
Aug 26 18:23:59.633548: | [RE]START processing: state #42 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.633552: "test" #42: deleting state (STATE_MAIN_R0) aged 0.377s and NOT sending notification
Aug 26 18:23:59.633554: | parent state #42: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.633592: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.633596: | in connection_discard for connection test
Aug 26 18:23:59.633598: | State DB: deleting IKEv1 state #42 in MAIN_R0
Aug 26 18:23:59.633602: | parent state #42: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.633606: | stop processing: state #42 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.633609: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.633612: | state #41
Aug 26 18:23:59.633618: | start processing: state #41 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.633621: | pstats #41 ikev1.isakmp deleted other
Aug 26 18:23:59.633625: | [RE]START processing: state #41 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.633629: "test" #41: deleting state (STATE_MAIN_R0) aged 0.417s and NOT sending notification
Aug 26 18:23:59.633631: | parent state #41: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.646432: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.646449: | in connection_discard for connection test
Aug 26 18:23:59.646454: | State DB: deleting IKEv1 state #41 in MAIN_R0
Aug 26 18:23:59.646459: | parent state #41: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.646466: | stop processing: state #41 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.646480: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.646483: | state #40
Aug 26 18:23:59.646489: | start processing: state #40 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.646492: | pstats #40 ikev1.isakmp deleted other
Aug 26 18:23:59.646497: | [RE]START processing: state #40 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.646502: "test" #40: deleting state (STATE_MAIN_R0) aged 0.494s and NOT sending notification
Aug 26 18:23:59.646505: | parent state #40: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.646581: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.646588: | in connection_discard for connection test
Aug 26 18:23:59.646591: | State DB: deleting IKEv1 state #40 in MAIN_R0
Aug 26 18:23:59.646595: | parent state #40: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.646600: | stop processing: state #40 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.646609: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.646612: | state #39
Aug 26 18:23:59.646617: | start processing: state #39 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.646620: | pstats #39 ikev1.isakmp deleted other
Aug 26 18:23:59.646625: | [RE]START processing: state #39 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.646628: "test" #39: deleting state (STATE_MAIN_R0) aged 0.540s and NOT sending notification
Aug 26 18:23:59.646631: | parent state #39: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.646679: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.646684: | in connection_discard for connection test
Aug 26 18:23:59.646688: | State DB: deleting IKEv1 state #39 in MAIN_R0
Aug 26 18:23:59.646691: | parent state #39: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.646696: | stop processing: state #39 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.646700: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.646703: | state #38
Aug 26 18:23:59.646708: | start processing: state #38 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.646711: | pstats #38 ikev1.isakmp deleted other
Aug 26 18:23:59.646715: | [RE]START processing: state #38 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.646718: "test" #38: deleting state (STATE_MAIN_R0) aged 0.606s and NOT sending notification
Aug 26 18:23:59.646721: | parent state #38: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.646762: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.646766: | in connection_discard for connection test
Aug 26 18:23:59.646768: | State DB: deleting IKEv1 state #38 in MAIN_R0
Aug 26 18:23:59.646775: | parent state #38: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.646780: | stop processing: state #38 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.646788: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.646791: | state #37
Aug 26 18:23:59.646795: | start processing: state #37 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.646798: | pstats #37 ikev1.isakmp deleted other
Aug 26 18:23:59.646802: | [RE]START processing: state #37 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.646805: "test" #37: deleting state (STATE_MAIN_R0) aged 0.653s and NOT sending notification
Aug 26 18:23:59.646808: | parent state #37: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.647790: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.647804: | in connection_discard for connection test
Aug 26 18:23:59.647808: | State DB: deleting IKEv1 state #37 in MAIN_R0
Aug 26 18:23:59.647812: | parent state #37: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.647819: | stop processing: state #37 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.647831: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.647835: | state #36
Aug 26 18:23:59.647840: | start processing: state #36 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.647843: | pstats #36 ikev1.isakmp deleted other
Aug 26 18:23:59.647848: | [RE]START processing: state #36 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.647852: "test" #36: deleting state (STATE_MAIN_R0) aged 0.689s and NOT sending notification
Aug 26 18:23:59.647855: | parent state #36: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.647924: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.647929: | in connection_discard for connection test
Aug 26 18:23:59.647933: | State DB: deleting IKEv1 state #36 in MAIN_R0
Aug 26 18:23:59.647936: | parent state #36: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.647942: | stop processing: state #36 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.647946: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.647948: | state #35
Aug 26 18:23:59.647954: | start processing: state #35 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.647957: | pstats #35 ikev1.isakmp deleted other
Aug 26 18:23:59.647961: | [RE]START processing: state #35 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.647965: "test" #35: deleting state (STATE_MAIN_R0) aged 0.735s and NOT sending notification
Aug 26 18:23:59.647968: | parent state #35: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.648015: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.648020: | in connection_discard for connection test
Aug 26 18:23:59.648023: | State DB: deleting IKEv1 state #35 in MAIN_R0
Aug 26 18:23:59.648027: | parent state #35: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.648032: | stop processing: state #35 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.648040: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.648043: | state #34
Aug 26 18:23:59.648049: | start processing: state #34 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.648052: | pstats #34 ikev1.isakmp deleted other
Aug 26 18:23:59.648057: | [RE]START processing: state #34 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.648060: "test" #34: deleting state (STATE_MAIN_R0) aged 0.778s and NOT sending notification
Aug 26 18:23:59.648066: | parent state #34: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.648111: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.648116: | in connection_discard for connection test
Aug 26 18:23:59.648119: | State DB: deleting IKEv1 state #34 in MAIN_R0
Aug 26 18:23:59.648122: | parent state #34: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.648128: | stop processing: state #34 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.648136: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.648139: | state #33
Aug 26 18:23:59.648144: | start processing: state #33 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.648147: | pstats #33 ikev1.isakmp deleted other
Aug 26 18:23:59.648151: | [RE]START processing: state #33 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.648155: "test" #33: deleting state (STATE_MAIN_R0) aged 0.844s and NOT sending notification
Aug 26 18:23:59.648157: | parent state #33: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.648198: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.648202: | in connection_discard for connection test
Aug 26 18:23:59.648205: | State DB: deleting IKEv1 state #33 in MAIN_R0
Aug 26 18:23:59.648208: | parent state #33: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.648213: | stop processing: state #33 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.648217: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.648220: | state #32
Aug 26 18:23:59.648224: | start processing: state #32 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.648227: | pstats #32 ikev1.isakmp deleted other
Aug 26 18:23:59.648231: | [RE]START processing: state #32 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.648234: "test" #32: deleting state (STATE_MAIN_R0) aged 0.878s and NOT sending notification
Aug 26 18:23:59.648237: | parent state #32: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.648280: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.648285: | in connection_discard for connection test
Aug 26 18:23:59.648287: | State DB: deleting IKEv1 state #32 in MAIN_R0
Aug 26 18:23:59.648298: | parent state #32: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.648302: | stop processing: state #32 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.648310: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.648313: | state #31
Aug 26 18:23:59.648317: | start processing: state #31 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.648320: | pstats #31 ikev1.isakmp deleted other
Aug 26 18:23:59.648325: | [RE]START processing: state #31 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.648328: "test" #31: deleting state (STATE_MAIN_R0) aged 0.912s and NOT sending notification
Aug 26 18:23:59.648331: | parent state #31: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.648372: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.648377: | in connection_discard for connection test
Aug 26 18:23:59.648380: | State DB: deleting IKEv1 state #31 in MAIN_R0
Aug 26 18:23:59.648384: | parent state #31: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.648388: | stop processing: state #31 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.648396: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.648399: | state #30
Aug 26 18:23:59.648404: | start processing: state #30 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.648410: | pstats #30 ikev1.isakmp deleted other
Aug 26 18:23:59.648415: | [RE]START processing: state #30 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.648419: "test" #30: deleting state (STATE_MAIN_R0) aged 0.958s and NOT sending notification
Aug 26 18:23:59.648421: | parent state #30: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.648462: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.648467: | in connection_discard for connection test
Aug 26 18:23:59.648469: | State DB: deleting IKEv1 state #30 in MAIN_R0
Aug 26 18:23:59.648473: | parent state #30: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.648477: | stop processing: state #30 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.648480: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.648483: | state #29
Aug 26 18:23:59.648487: | start processing: state #29 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.648490: | pstats #29 ikev1.isakmp deleted other
Aug 26 18:23:59.648494: | [RE]START processing: state #29 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.648498: "test" #29: deleting state (STATE_MAIN_R0) aged 0.998s and NOT sending notification
Aug 26 18:23:59.648501: | parent state #29: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.648542: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.648547: | in connection_discard for connection test
Aug 26 18:23:59.648550: | State DB: deleting IKEv1 state #29 in MAIN_R0
Aug 26 18:23:59.648553: | parent state #29: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.648557: | stop processing: state #29 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.648565: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.648568: | state #28
Aug 26 18:23:59.648572: | start processing: state #28 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.648575: | pstats #28 ikev1.isakmp deleted other
Aug 26 18:23:59.648580: | [RE]START processing: state #28 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.648585: "test" #28: deleting state (STATE_MAIN_R0) aged 1.038s and NOT sending notification
Aug 26 18:23:59.648588: | parent state #28: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.648629: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.648634: | in connection_discard for connection test
Aug 26 18:23:59.648637: | State DB: deleting IKEv1 state #28 in MAIN_R0
Aug 26 18:23:59.648640: | parent state #28: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.648645: | stop processing: state #28 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.648653: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.648656: | state #27
Aug 26 18:23:59.648661: | start processing: state #27 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.648664: | pstats #27 ikev1.isakmp deleted other
Aug 26 18:23:59.648669: | [RE]START processing: state #27 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.648672: "test" #27: deleting state (STATE_MAIN_R0) aged 1.090s and NOT sending notification
Aug 26 18:23:59.648676: | parent state #27: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.648719: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.648723: | in connection_discard for connection test
Aug 26 18:23:59.648726: | State DB: deleting IKEv1 state #27 in MAIN_R0
Aug 26 18:23:59.648732: | parent state #27: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.648737: | stop processing: state #27 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.648741: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.648744: | state #26
Aug 26 18:23:59.648748: | start processing: state #26 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.648751: | pstats #26 ikev1.isakmp deleted other
Aug 26 18:23:59.648755: | [RE]START processing: state #26 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.648759: "test" #26: deleting state (STATE_MAIN_R0) aged 1.128s and NOT sending notification
Aug 26 18:23:59.648762: | parent state #26: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.648806: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.648811: | in connection_discard for connection test
Aug 26 18:23:59.648814: | State DB: deleting IKEv1 state #26 in MAIN_R0
Aug 26 18:23:59.648818: | parent state #26: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.648822: | stop processing: state #26 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.648830: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.648832: | state #25
Aug 26 18:23:59.648837: | start processing: state #25 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.648840: | pstats #25 ikev1.isakmp deleted other
Aug 26 18:23:59.648844: | [RE]START processing: state #25 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.648848: "test" #25: deleting state (STATE_MAIN_R0) aged 1.162s and NOT sending notification
Aug 26 18:23:59.648850: | parent state #25: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.648889: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.648894: | in connection_discard for connection test
Aug 26 18:23:59.648897: | State DB: deleting IKEv1 state #25 in MAIN_R0
Aug 26 18:23:59.648900: | parent state #25: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.648905: | stop processing: state #25 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.648912: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.648915: | state #24
Aug 26 18:23:59.648920: | start processing: state #24 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.648922: | pstats #24 ikev1.isakmp deleted other
Aug 26 18:23:59.648927: | [RE]START processing: state #24 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.648930: "test" #24: deleting state (STATE_MAIN_R0) aged 1.206s and NOT sending notification
Aug 26 18:23:59.648933: | parent state #24: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.648976: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.648982: | in connection_discard for connection test
Aug 26 18:23:59.648985: | State DB: deleting IKEv1 state #24 in MAIN_R0
Aug 26 18:23:59.648988: | parent state #24: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.648993: | stop processing: state #24 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.648997: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.649000: | state #23
Aug 26 18:23:59.649005: | start processing: state #23 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.649008: | pstats #23 ikev1.isakmp deleted other
Aug 26 18:23:59.649013: | [RE]START processing: state #23 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.649017: "test" #23: deleting state (STATE_MAIN_R0) aged 1.250s and NOT sending notification
Aug 26 18:23:59.649022: | parent state #23: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.649067: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.649072: | in connection_discard for connection test
Aug 26 18:23:59.649076: | State DB: deleting IKEv1 state #23 in MAIN_R0
Aug 26 18:23:59.649079: | parent state #23: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.649084: | stop processing: state #23 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.649092: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.649095: | state #22
Aug 26 18:23:59.649100: | start processing: state #22 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.649103: | pstats #22 ikev1.isakmp deleted other
Aug 26 18:23:59.649108: | [RE]START processing: state #22 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.649112: "test" #22: deleting state (STATE_MAIN_R0) aged 1.304s and NOT sending notification
Aug 26 18:23:59.649115: | parent state #22: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.649158: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.649162: | in connection_discard for connection test
Aug 26 18:23:59.649165: | State DB: deleting IKEv1 state #22 in MAIN_R0
Aug 26 18:23:59.649169: | parent state #22: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.649174: | stop processing: state #22 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.649181: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.649184: | state #21
Aug 26 18:23:59.649189: | start processing: state #21 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.649193: | pstats #21 ikev1.isakmp deleted other
Aug 26 18:23:59.649197: | [RE]START processing: state #21 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.649200: "test" #21: deleting state (STATE_MAIN_R0) aged 1.356s and NOT sending notification
Aug 26 18:23:59.649204: | parent state #21: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.649246: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.649251: | in connection_discard for connection test
Aug 26 18:23:59.649255: | State DB: deleting IKEv1 state #21 in MAIN_R0
Aug 26 18:23:59.649258: | parent state #21: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.649263: | stop processing: state #21 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.649266: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.649269: | state #20
Aug 26 18:23:59.649274: | start processing: state #20 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.649276: | pstats #20 ikev1.isakmp deleted other
Aug 26 18:23:59.649281: | [RE]START processing: state #20 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.649284: "test" #20: deleting state (STATE_MAIN_R0) aged 1.391s and NOT sending notification
Aug 26 18:23:59.649287: | parent state #20: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.649335: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.649340: | in connection_discard for connection test
Aug 26 18:23:59.649343: | State DB: deleting IKEv1 state #20 in MAIN_R0
Aug 26 18:23:59.649346: | parent state #20: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.649351: | stop processing: state #20 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.649358: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.649361: | state #19
Aug 26 18:23:59.649366: | start processing: state #19 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.649371: | pstats #19 ikev1.isakmp deleted other
Aug 26 18:23:59.649375: | [RE]START processing: state #19 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.649379: "test" #19: deleting state (STATE_MAIN_R0) aged 1.439s and NOT sending notification
Aug 26 18:23:59.649382: | parent state #19: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.649422: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.649426: | in connection_discard for connection test
Aug 26 18:23:59.649429: | State DB: deleting IKEv1 state #19 in MAIN_R0
Aug 26 18:23:59.649433: | parent state #19: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.649437: | stop processing: state #19 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.649445: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.649448: | state #18
Aug 26 18:23:59.649452: | start processing: state #18 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.649455: | pstats #18 ikev1.isakmp deleted other
Aug 26 18:23:59.649459: | [RE]START processing: state #18 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.649462: "test" #18: deleting state (STATE_MAIN_R0) aged 1.495s and NOT sending notification
Aug 26 18:23:59.649466: | parent state #18: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.649507: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.649512: | in connection_discard for connection test
Aug 26 18:23:59.649515: | State DB: deleting IKEv1 state #18 in MAIN_R0
Aug 26 18:23:59.649518: | parent state #18: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.649522: | stop processing: state #18 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.649526: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.649528: | state #17
Aug 26 18:23:59.649533: | start processing: state #17 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.649536: | pstats #17 ikev1.isakmp deleted other
Aug 26 18:23:59.649540: | [RE]START processing: state #17 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.649544: "test" #17: deleting state (STATE_MAIN_R0) aged 1.538s and NOT sending notification
Aug 26 18:23:59.649547: | parent state #17: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.649589: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.649593: | in connection_discard for connection test
Aug 26 18:23:59.649596: | State DB: deleting IKEv1 state #17 in MAIN_R0
Aug 26 18:23:59.649599: | parent state #17: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.649604: | stop processing: state #17 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.649612: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.649615: | state #16
Aug 26 18:23:59.649620: | start processing: state #16 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.649623: | pstats #16 ikev1.isakmp deleted other
Aug 26 18:23:59.649628: | [RE]START processing: state #16 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.649632: "test" #16: deleting state (STATE_MAIN_R0) aged 1.579s and NOT sending notification
Aug 26 18:23:59.649635: | parent state #16: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.649677: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.649682: | in connection_discard for connection test
Aug 26 18:23:59.649685: | State DB: deleting IKEv1 state #16 in MAIN_R0
Aug 26 18:23:59.649689: | parent state #16: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.649696: | stop processing: state #16 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.649704: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.649707: | state #15
Aug 26 18:23:59.649712: | start processing: state #15 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.649715: | pstats #15 ikev1.isakmp deleted other
Aug 26 18:23:59.649720: | [RE]START processing: state #15 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.649724: "test" #15: deleting state (STATE_MAIN_R0) aged 1.619s and NOT sending notification
Aug 26 18:23:59.649727: | parent state #15: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.649769: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.649774: | in connection_discard for connection test
Aug 26 18:23:59.649778: | State DB: deleting IKEv1 state #15 in MAIN_R0
Aug 26 18:23:59.649781: | parent state #15: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.649786: | stop processing: state #15 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.649793: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.649795: | state #14
Aug 26 18:23:59.649800: | start processing: state #14 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.649802: | pstats #14 ikev1.isakmp deleted other
Aug 26 18:23:59.649807: | [RE]START processing: state #14 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.649810: "test" #14: deleting state (STATE_MAIN_R0) aged 1.668s and NOT sending notification
Aug 26 18:23:59.649813: | parent state #14: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.649854: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.649859: | in connection_discard for connection test
Aug 26 18:23:59.649863: | State DB: deleting IKEv1 state #14 in MAIN_R0
Aug 26 18:23:59.649866: | parent state #14: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.649870: | stop processing: state #14 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.649874: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.649876: | state #13
Aug 26 18:23:59.649881: | start processing: state #13 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.649884: | pstats #13 ikev1.isakmp deleted other
Aug 26 18:23:59.649888: | [RE]START processing: state #13 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.649891: "test" #13: deleting state (STATE_MAIN_R0) aged 1.701s and NOT sending notification
Aug 26 18:23:59.649894: | parent state #13: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.649935: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.649939: | in connection_discard for connection test
Aug 26 18:23:59.649942: | State DB: deleting IKEv1 state #13 in MAIN_R0
Aug 26 18:23:59.649946: | parent state #13: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.649950: | stop processing: state #13 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.649958: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.649961: | state #12
Aug 26 18:23:59.649967: | start processing: state #12 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.649969: | pstats #12 ikev1.isakmp deleted other
Aug 26 18:23:59.649974: | [RE]START processing: state #12 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.649978: "test" #12: deleting state (STATE_MAIN_R0) aged 1.762s and NOT sending notification
Aug 26 18:23:59.649983: | parent state #12: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.650026: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.650031: | in connection_discard for connection test
Aug 26 18:23:59.650034: | State DB: deleting IKEv1 state #12 in MAIN_R0
Aug 26 18:23:59.650037: | parent state #12: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.650042: | stop processing: state #12 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.650050: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.650053: | state #11
Aug 26 18:23:59.650058: | start processing: state #11 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.650064: | pstats #11 ikev1.isakmp deleted other
Aug 26 18:23:59.650071: | [RE]START processing: state #11 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.650074: "test" #11: deleting state (STATE_MAIN_R0) aged 1.803s and NOT sending notification
Aug 26 18:23:59.650078: | parent state #11: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.650125: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.650130: | in connection_discard for connection test
Aug 26 18:23:59.650135: | State DB: deleting IKEv1 state #11 in MAIN_R0
Aug 26 18:23:59.650142: | parent state #11: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.650148: | stop processing: state #11 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.650152: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.650155: | state #10
Aug 26 18:23:59.650162: | start processing: state #10 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.650166: | pstats #10 ikev1.isakmp deleted other
Aug 26 18:23:59.650172: | [RE]START processing: state #10 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.650176: "test" #10: deleting state (STATE_MAIN_R0) aged 1.863s and NOT sending notification
Aug 26 18:23:59.650181: | parent state #10: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.650226: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.650232: | in connection_discard for connection test
Aug 26 18:23:59.650236: | State DB: deleting IKEv1 state #10 in MAIN_R0
Aug 26 18:23:59.650240: | parent state #10: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.650246: | stop processing: state #10 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.650255: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.650259: | state #9
Aug 26 18:23:59.650265: | start processing: state #9 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.650269: | pstats #9 ikev1.isakmp deleted other
Aug 26 18:23:59.650274: | [RE]START processing: state #9 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.650278: "test" #9: deleting state (STATE_MAIN_R0) aged 1.914s and NOT sending notification
Aug 26 18:23:59.650281: | parent state #9: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.650328: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.650336: | in connection_discard for connection test
Aug 26 18:23:59.650339: | State DB: deleting IKEv1 state #9 in MAIN_R0
Aug 26 18:23:59.650343: | parent state #9: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.650349: | stop processing: state #9 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.650357: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.650360: | state #8
Aug 26 18:23:59.650366: | start processing: state #8 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.650371: | pstats #8 ikev1.isakmp deleted other
Aug 26 18:23:59.650377: | [RE]START processing: state #8 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.650381: "test" #8: deleting state (STATE_MAIN_R0) aged 1.969s and NOT sending notification
Aug 26 18:23:59.650385: | parent state #8: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.650425: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.650430: | in connection_discard for connection test
Aug 26 18:23:59.650433: | State DB: deleting IKEv1 state #8 in MAIN_R0
Aug 26 18:23:59.650437: | parent state #8: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.650443: | stop processing: state #8 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.650447: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.650450: | state #7
Aug 26 18:23:59.650456: | start processing: state #7 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.650460: | pstats #7 ikev1.isakmp deleted other
Aug 26 18:23:59.650465: | [RE]START processing: state #7 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.650469: "test" #7: deleting state (STATE_MAIN_R0) aged 2.010s and NOT sending notification
Aug 26 18:23:59.650473: | parent state #7: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.650515: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.650521: | in connection_discard for connection test
Aug 26 18:23:59.650525: | State DB: deleting IKEv1 state #7 in MAIN_R0
Aug 26 18:23:59.650529: | parent state #7: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.650536: | stop processing: state #7 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.650545: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.650549: | state #6
Aug 26 18:23:59.650558: | start processing: state #6 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.650563: | pstats #6 ikev1.isakmp deleted other
Aug 26 18:23:59.650568: | [RE]START processing: state #6 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.650572: "test" #6: deleting state (STATE_MAIN_R0) aged 2.057s and NOT sending notification
Aug 26 18:23:59.650576: | parent state #6: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.650620: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.650626: | in connection_discard for connection test
Aug 26 18:23:59.650630: | State DB: deleting IKEv1 state #6 in MAIN_R0
Aug 26 18:23:59.650634: | parent state #6: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.650640: | stop processing: state #6 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.650649: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.650653: | state #5
Aug 26 18:23:59.650660: | start processing: state #5 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.650663: | pstats #5 ikev1.isakmp deleted other
Aug 26 18:23:59.650670: | [RE]START processing: state #5 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.650673: "test" #5: deleting state (STATE_MAIN_R0) aged 2.100s and NOT sending notification
Aug 26 18:23:59.650677: | parent state #5: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.650719: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.650724: | in connection_discard for connection test
Aug 26 18:23:59.650727: | State DB: deleting IKEv1 state #5 in MAIN_R0
Aug 26 18:23:59.650731: | parent state #5: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.650739: | stop processing: state #5 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.650744: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.650747: | state #4
Aug 26 18:23:59.650754: | start processing: state #4 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.650757: | pstats #4 ikev1.isakmp deleted other
Aug 26 18:23:59.650764: | [RE]START processing: state #4 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.650767: "test" #4: deleting state (STATE_MAIN_R0) aged 2.148s and NOT sending notification
Aug 26 18:23:59.650772: | parent state #4: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.650815: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.650820: | in connection_discard for connection test
Aug 26 18:23:59.650824: | State DB: deleting IKEv1 state #4 in MAIN_R0
Aug 26 18:23:59.650829: | parent state #4: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.650835: | stop processing: state #4 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.650845: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.650849: | state #3
Aug 26 18:23:59.650856: | start processing: state #3 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.650860: | pstats #3 ikev1.isakmp deleted other
Aug 26 18:23:59.650866: | [RE]START processing: state #3 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.650871: "test" #3: deleting state (STATE_MAIN_R0) aged 2.208s and NOT sending notification
Aug 26 18:23:59.650874: | parent state #3: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.650920: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.650926: | in connection_discard for connection test
Aug 26 18:23:59.650929: | State DB: deleting IKEv1 state #3 in MAIN_R0
Aug 26 18:23:59.650933: | parent state #3: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.650938: | stop processing: state #3 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.650946: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.650949: | state #2
Aug 26 18:23:59.650954: | start processing: state #2 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.650956: | pstats #2 ikev1.isakmp deleted other
Aug 26 18:23:59.650960: | [RE]START processing: state #2 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.650963: "test" #2: deleting state (STATE_MAIN_R0) aged 2.257s and NOT sending notification
Aug 26 18:23:59.650966: | parent state #2: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.651003: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.651007: | in connection_discard for connection test
Aug 26 18:23:59.651010: | State DB: deleting IKEv1 state #2 in MAIN_R0
Aug 26 18:23:59.651013: | parent state #2: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.651017: | stop processing: state #2 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.651021: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.651023: | state #1
Aug 26 18:23:59.651028: | start processing: state #1 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310)
Aug 26 18:23:59.651032: | pstats #1 ikev1.isakmp deleted other
Aug 26 18:23:59.651037: | [RE]START processing: state #1 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879)
Aug 26 18:23:59.651041: "test" #1: deleting state (STATE_MAIN_R0) aged 2.446s and NOT sending notification
Aug 26 18:23:59.651044: | parent state #1: MAIN_R0(half-open IKE SA) => delete
Aug 26 18:23:59.651084: | State DB: IKEv1 state not found (flush_incomplete_children)
Aug 26 18:23:59.651089: | in connection_discard for connection test
Aug 26 18:23:59.651092: | State DB: deleting IKEv1 state #1 in MAIN_R0
Aug 26 18:23:59.651095: | parent state #1: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore)
Aug 26 18:23:59.651100: | stop processing: state #1 from 192.1.2.45:500 (in delete_state() at state.c:1143)
Aug 26 18:23:59.651109: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312)
Aug 26 18:23:59.651111: | pass 1
Aug 26 18:23:59.651114: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
Aug 26 18:23:59.651118: | free hp@0x55f088aa5920
Aug 26 18:23:59.651121: | flush revival: connection 'test' wasn't on the list
Aug 26 18:23:59.651124: | processing: STOP connection NULL (in discard_connection() at connections.c:249)
Aug 26 18:23:59.651129: | crl fetch request list locked by 'free_crl_fetch'
Aug 26 18:23:59.651132: | crl fetch request list unlocked by 'free_crl_fetch'
Aug 26 18:23:59.651140: shutting down interface lo/lo 127.0.0.1:4500
Aug 26 18:23:59.651144: shutting down interface lo/lo 127.0.0.1:500
Aug 26 18:23:59.651148: shutting down interface eth0/eth0 192.0.2.254:4500
Aug 26 18:23:59.651151: shutting down interface eth0/eth0 192.0.2.254:500
Aug 26 18:23:59.651155: shutting down interface eth1/eth1 192.1.2.23:4500
Aug 26 18:23:59.651159: shutting down interface eth1/eth1 192.1.2.23:500
Aug 26 18:23:59.651163: | FOR_EACH_STATE_... in delete_states_dead_interfaces
Aug 26 18:23:59.651171: | libevent_free: release ptr-libevent@0x55f088ad8f00
Aug 26 18:23:59.651174: | free_event_entry: release EVENT_NULL-pe@0x55f088ac21c0
Aug 26 18:23:59.651184: | libevent_free: release ptr-libevent@0x55f088ad8ff0
Aug 26 18:23:59.651187: | free_event_entry: release EVENT_NULL-pe@0x55f088ad8fb0
Aug 26 18:23:59.651195: | libevent_free: release ptr-libevent@0x55f088ad90e0
Aug 26 18:23:59.651198: | free_event_entry: release EVENT_NULL-pe@0x55f088ad90a0
Aug 26 18:23:59.651204: | libevent_free: release ptr-libevent@0x55f088ad91d0
Aug 26 18:23:59.651207: | free_event_entry: release EVENT_NULL-pe@0x55f088ad9190
Aug 26 18:23:59.651214: | libevent_free: release ptr-libevent@0x55f088ad92c0
Aug 26 18:23:59.651217: | free_event_entry: release EVENT_NULL-pe@0x55f088ad9280
Aug 26 18:23:59.651224: | libevent_free: release ptr-libevent@0x55f088ad93b0
Aug 26 18:23:59.651226: | free_event_entry: release EVENT_NULL-pe@0x55f088ad9370
Aug 26 18:23:59.651231: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
Aug 26 18:23:59.655611: | libevent_free: release ptr-libevent@0x55f088ad8860
Aug 26 18:23:59.655624: | free_event_entry: release EVENT_NULL-pe@0x55f088ac1440
Aug 26 18:23:59.655629: | libevent_free: release ptr-libevent@0x55f088ace340
Aug 26 18:23:59.655633: | free_event_entry: release EVENT_NULL-pe@0x55f088ac16f0
Aug 26 18:23:59.655637: | libevent_free: release ptr-libevent@0x55f088ace2b0
Aug 26 18:23:59.655642: | free_event_entry: release EVENT_NULL-pe@0x55f088ac6e50
Aug 26 18:23:59.655646: | global timer EVENT_REINIT_SECRET uninitialized
Aug 26 18:23:59.655650: | global timer EVENT_SHUNT_SCAN uninitialized
Aug 26 18:23:59.655653: | global timer EVENT_PENDING_DDNS uninitialized
Aug 26 18:23:59.655656: | global timer EVENT_PENDING_PHASE2 uninitialized
Aug 26 18:23:59.655659: | global timer EVENT_CHECK_CRLS uninitialized
Aug 26 18:23:59.655663: | global timer EVENT_REVIVE_CONNS uninitialized
Aug 26 18:23:59.655666: | global timer EVENT_FREE_ROOT_CERTS uninitialized
Aug 26 18:23:59.655669: | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized
Aug 26 18:23:59.656118: | global timer EVENT_NAT_T_KEEPALIVE uninitialized
Aug 26 18:23:59.656126: | libevent_free: release ptr-libevent@0x55f088ad8930
Aug 26 18:23:59.656130: | signal event handler PLUTO_SIGCHLD uninstalled
Aug 26 18:23:59.656135: | libevent_free: release ptr-libevent@0x55f088ad8a10
Aug 26 18:23:59.656138: | signal event handler PLUTO_SIGTERM uninstalled
Aug 26 18:23:59.656142: | libevent_free: release ptr-libevent@0x55f088ad8ad0
Aug 26 18:23:59.656150: | signal event handler PLUTO_SIGHUP uninstalled
Aug 26 18:23:59.656154: | libevent_free: release ptr-libevent@0x55f088acd620
Aug 26 18:23:59.656159: | signal event handler PLUTO_SIGSYS uninstalled
Aug 26 18:23:59.656162: | releasing event base
Aug 26 18:23:59.656177: | libevent_free: release ptr-libevent@0x55f088ad8b90
Aug 26 18:23:59.656180: | libevent_free: release ptr-libevent@0x55f088aae130
Aug 26 18:23:59.656185: | libevent_free: release ptr-libevent@0x55f088abc9d0
Aug 26 18:23:59.656188: | libevent_free: release ptr-libevent@0x55f088abcaa0
Aug 26 18:23:59.656192: | libevent_free: release ptr-libevent@0x55f088abc9f0
Aug 26 18:23:59.656195: | libevent_free: release ptr-libevent@0x55f088ad88f0
Aug 26 18:23:59.656199: | libevent_free: release ptr-libevent@0x55f088ad89d0
Aug 26 18:23:59.656202: | libevent_free: release ptr-libevent@0x55f088abca80
Aug 26 18:23:59.656205: | libevent_free: release ptr-libevent@0x55f088abcbe0
Aug 26 18:23:59.656208: | libevent_free: release ptr-libevent@0x55f088ac1640
Aug 26 18:23:59.656212: | libevent_free: release ptr-libevent@0x55f088ad9440
Aug 26 18:23:59.656215: | libevent_free: release ptr-libevent@0x55f088ad9350
Aug 26 18:23:59.656218: | libevent_free: release ptr-libevent@0x55f088ad9260
Aug 26 18:23:59.656221: | libevent_free: release ptr-libevent@0x55f088ad9170
Aug 26 18:23:59.656225: | libevent_free: release ptr-libevent@0x55f088ad9080
Aug 26 18:23:59.656228: | libevent_free: release ptr-libevent@0x55f088ad8f90
Aug 26 18:23:59.656231: | libevent_free: release ptr-libevent@0x55f088a40370
Aug 26 18:23:59.656234: | libevent_free: release ptr-libevent@0x55f088ad8ab0
Aug 26 18:23:59.656238: | libevent_free: release ptr-libevent@0x55f088ad89f0
Aug 26 18:23:59.656241: | libevent_free: release ptr-libevent@0x55f088ad8910
Aug 26 18:23:59.656244: | libevent_free: release ptr-libevent@0x55f088ad8b70
Aug 26 18:23:59.656247: | libevent_free: release ptr-libevent@0x55f088a3e5b0
Aug 26 18:23:59.656251: | libevent_free: release ptr-libevent@0x55f088abca10
Aug 26 18:23:59.656254: | libevent_free: release ptr-libevent@0x55f088abca40
Aug 26 18:23:59.656258: | libevent_free: release ptr-libevent@0x55f088abc730
Aug 26 18:23:59.656261: | releasing global libevent data
Aug 26 18:23:59.656264: | libevent_free: release ptr-libevent@0x55f088abb3e0
Aug 26 18:23:59.656268: | libevent_free: release ptr-libevent@0x55f088abb410
Aug 26 18:23:59.656272: | libevent_free: release ptr-libevent@0x55f088abc700