Aug 26 18:23:55.755845: FIPS Product: YES Aug 26 18:23:55.755898: FIPS Kernel: NO Aug 26 18:23:55.755902: FIPS Mode: NO Aug 26 18:23:55.755906: NSS DB directory: sql:/etc/ipsec.d Aug 26 18:23:55.756076: Initializing NSS Aug 26 18:23:55.756085: Opening NSS database "sql:/etc/ipsec.d" read-only Aug 26 18:23:55.821168: NSS initialized Aug 26 18:23:55.821184: NSS crypto library initialized Aug 26 18:23:55.821187: FIPS HMAC integrity support [enabled] Aug 26 18:23:55.821189: FIPS mode disabled for pluto daemon Aug 26 18:23:55.931813: FIPS HMAC integrity verification self-test FAILED Aug 26 18:23:55.931911: libcap-ng support [enabled] Aug 26 18:23:55.931918: Linux audit support [enabled] Aug 26 18:23:55.931957: Linux audit activated Aug 26 18:23:55.931964: Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:23602 Aug 26 18:23:55.931968: core dump dir: /tmp Aug 26 18:23:55.931971: secrets file: /etc/ipsec.secrets Aug 26 18:23:55.931973: leak-detective disabled Aug 26 18:23:55.931975: NSS crypto [enabled] Aug 26 18:23:55.931977: XAUTH PAM support [enabled] Aug 26 18:23:55.932050: | libevent is using pluto's memory allocator Aug 26 18:23:55.932057: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Aug 26 18:23:55.932071: | libevent_malloc: new ptr-libevent@0x55f088abb3e0 size 40 Aug 26 18:23:55.932074: | libevent_malloc: new ptr-libevent@0x55f088abb410 size 40 Aug 26 18:23:55.932078: | libevent_malloc: new ptr-libevent@0x55f088abc700 size 40 Aug 26 18:23:55.932080: | creating event base Aug 26 18:23:55.932083: | libevent_malloc: new ptr-libevent@0x55f088abc6c0 size 56 Aug 26 18:23:55.932087: | libevent_malloc: new ptr-libevent@0x55f088abc730 size 664 Aug 26 18:23:55.932100: | libevent_malloc: new ptr-libevent@0x55f088abc9d0 size 24 Aug 26 18:23:55.932104: | libevent_malloc: new ptr-libevent@0x55f088aae130 size 384 Aug 26 18:23:55.932113: | libevent_malloc: new ptr-libevent@0x55f088abc9f0 size 16 Aug 26 18:23:55.932116: | libevent_malloc: new ptr-libevent@0x55f088abca10 size 40 Aug 26 18:23:55.932119: | libevent_malloc: new ptr-libevent@0x55f088abca40 size 48 Aug 26 18:23:55.932126: | libevent_realloc: new ptr-libevent@0x55f088a40370 size 256 Aug 26 18:23:55.932129: | libevent_malloc: new ptr-libevent@0x55f088abca80 size 16 Aug 26 18:23:55.932135: | libevent_free: release ptr-libevent@0x55f088abc6c0 Aug 26 18:23:55.932138: | libevent initialized Aug 26 18:23:55.932142: | libevent_realloc: new ptr-libevent@0x55f088abcaa0 size 64 Aug 26 18:23:55.932146: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Aug 26 18:23:55.932161: | init_nat_traversal() initialized with keep_alive=0s Aug 26 18:23:55.932164: NAT-Traversal support [enabled] Aug 26 18:23:55.932167: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Aug 26 18:23:55.932173: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Aug 26 18:23:55.932177: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Aug 26 18:23:55.932208: | global one-shot timer EVENT_REVIVE_CONNS initialized Aug 26 18:23:55.932212: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Aug 26 18:23:55.932216: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Aug 26 18:23:55.932268: Encryption algorithms: Aug 26 18:23:55.932278: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Aug 26 18:23:55.932283: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Aug 26 18:23:55.932287: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Aug 26 18:23:55.932297: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Aug 26 18:23:55.932301: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Aug 26 18:23:55.932310: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Aug 26 18:23:55.932314: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Aug 26 18:23:55.932318: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Aug 26 18:23:55.932322: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Aug 26 18:23:55.932326: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Aug 26 18:23:55.932329: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Aug 26 18:23:55.932333: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Aug 26 18:23:55.932337: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Aug 26 18:23:55.932341: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Aug 26 18:23:55.932345: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Aug 26 18:23:55.932348: NULL IKEv1: ESP IKEv2: ESP [] Aug 26 18:23:55.932351: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Aug 26 18:23:55.932358: Hash algorithms: Aug 26 18:23:55.932361: MD5 IKEv1: IKE IKEv2: Aug 26 18:23:55.932365: SHA1 IKEv1: IKE IKEv2: FIPS sha Aug 26 18:23:55.932368: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Aug 26 18:23:55.932371: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Aug 26 18:23:55.932374: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Aug 26 18:23:55.932388: PRF algorithms: Aug 26 18:23:55.932391: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Aug 26 18:23:55.932394: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Aug 26 18:23:55.932398: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Aug 26 18:23:55.932402: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Aug 26 18:23:55.932405: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Aug 26 18:23:55.932408: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Aug 26 18:23:55.932435: Integrity algorithms: Aug 26 18:23:55.932438: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Aug 26 18:23:55.932442: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Aug 26 18:23:55.932447: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Aug 26 18:23:55.932451: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Aug 26 18:23:55.932455: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Aug 26 18:23:55.932458: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Aug 26 18:23:55.932462: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Aug 26 18:23:55.932465: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Aug 26 18:23:55.932469: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Aug 26 18:23:55.932481: DH algorithms: Aug 26 18:23:55.932484: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Aug 26 18:23:55.932488: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Aug 26 18:23:55.932491: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Aug 26 18:23:55.932496: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Aug 26 18:23:55.932499: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Aug 26 18:23:55.932502: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Aug 26 18:23:55.932505: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Aug 26 18:23:55.932509: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Aug 26 18:23:55.932512: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Aug 26 18:23:55.932516: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Aug 26 18:23:55.932519: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Aug 26 18:23:55.932521: testing CAMELLIA_CBC: Aug 26 18:23:55.932524: Camellia: 16 bytes with 128-bit key Aug 26 18:23:55.932636: Camellia: 16 bytes with 128-bit key Aug 26 18:23:55.932667: Camellia: 16 bytes with 256-bit key Aug 26 18:23:55.932696: Camellia: 16 bytes with 256-bit key Aug 26 18:23:55.932726: testing AES_GCM_16: Aug 26 18:23:55.932730: empty string Aug 26 18:23:55.932757: one block Aug 26 18:23:55.932782: two blocks Aug 26 18:23:55.932808: two blocks with associated data Aug 26 18:23:55.932833: testing AES_CTR: Aug 26 18:23:55.932836: Encrypting 16 octets using AES-CTR with 128-bit key Aug 26 18:23:55.932863: Encrypting 32 octets using AES-CTR with 128-bit key Aug 26 18:23:55.932890: Encrypting 36 octets using AES-CTR with 128-bit key Aug 26 18:23:55.932918: Encrypting 16 octets using AES-CTR with 192-bit key Aug 26 18:23:55.932944: Encrypting 32 octets using AES-CTR with 192-bit key Aug 26 18:23:55.932971: Encrypting 36 octets using AES-CTR with 192-bit key Aug 26 18:23:55.933000: Encrypting 16 octets using AES-CTR with 256-bit key Aug 26 18:23:55.933026: Encrypting 32 octets using AES-CTR with 256-bit key Aug 26 18:23:55.933054: Encrypting 36 octets using AES-CTR with 256-bit key Aug 26 18:23:55.933082: testing AES_CBC: Aug 26 18:23:55.933085: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Aug 26 18:23:55.933111: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Aug 26 18:23:55.933140: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Aug 26 18:23:55.933169: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Aug 26 18:23:55.933202: testing AES_XCBC: Aug 26 18:23:55.933205: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Aug 26 18:23:55.933327: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Aug 26 18:23:55.933461: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Aug 26 18:23:55.933585: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Aug 26 18:23:55.933712: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Aug 26 18:23:55.933840: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Aug 26 18:23:55.933970: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Aug 26 18:23:55.934266: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Aug 26 18:23:55.934392: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Aug 26 18:23:55.934536: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Aug 26 18:23:55.934795: testing HMAC_MD5: Aug 26 18:23:55.934801: RFC 2104: MD5_HMAC test 1 Aug 26 18:23:55.934988: RFC 2104: MD5_HMAC test 2 Aug 26 18:23:55.935151: RFC 2104: MD5_HMAC test 3 Aug 26 18:23:55.935361: 8 CPU cores online Aug 26 18:23:55.935370: starting up 7 crypto helpers Aug 26 18:23:55.935403: started thread for crypto helper 0 Aug 26 18:23:55.935408: | starting up helper thread 0 Aug 26 18:23:55.935430: | status value returned by setting the priority of this thread (crypto helper 0) 22 Aug 26 18:23:55.935433: | crypto helper 0 waiting (nothing to do) Aug 26 18:23:55.935442: started thread for crypto helper 1 Aug 26 18:23:55.935448: | starting up helper thread 1 Aug 26 18:23:55.935464: | status value returned by setting the priority of this thread (crypto helper 1) 22 Aug 26 18:23:55.935467: | crypto helper 1 waiting (nothing to do) Aug 26 18:23:55.939404: started thread for crypto helper 2 Aug 26 18:23:55.939407: | starting up helper thread 2 Aug 26 18:23:55.939435: | status value returned by setting the priority of this thread (crypto helper 2) 22 Aug 26 18:23:55.939439: | crypto helper 2 waiting (nothing to do) Aug 26 18:23:55.939449: started thread for crypto helper 3 Aug 26 18:23:55.939451: | starting up helper thread 3 Aug 26 18:23:55.939457: | status value returned by setting the priority of this thread (crypto helper 3) 22 Aug 26 18:23:55.939460: | crypto helper 3 waiting (nothing to do) Aug 26 18:23:55.939469: started thread for crypto helper 4 Aug 26 18:23:55.939473: | starting up helper thread 4 Aug 26 18:23:55.939489: | status value returned by setting the priority of this thread (crypto helper 4) 22 Aug 26 18:23:55.939492: started thread for crypto helper 5 Aug 26 18:23:55.939495: | starting up helper thread 5 Aug 26 18:23:55.939501: | status value returned by setting the priority of this thread (crypto helper 5) 22 Aug 26 18:23:55.939492: | crypto helper 4 waiting (nothing to do) Aug 26 18:23:55.939512: | crypto helper 5 waiting (nothing to do) Aug 26 18:23:55.939515: started thread for crypto helper 6 Aug 26 18:23:55.939518: | starting up helper thread 6 Aug 26 18:23:55.939523: | checking IKEv1 state table Aug 26 18:23:55.939523: | status value returned by setting the priority of this thread (crypto helper 6) 22 Aug 26 18:23:55.939530: | crypto helper 6 waiting (nothing to do) Aug 26 18:23:55.939534: | MAIN_R0: category: half-open IKE SA flags: 0: Aug 26 18:23:55.939537: | -> MAIN_R1 EVENT_SO_DISCARD Aug 26 18:23:55.939540: | MAIN_I1: category: half-open IKE SA flags: 0: Aug 26 18:23:55.939543: | -> MAIN_I2 EVENT_RETRANSMIT Aug 26 18:23:55.939546: | MAIN_R1: category: open IKE SA flags: 200: Aug 26 18:23:55.939548: | -> MAIN_R2 EVENT_RETRANSMIT Aug 26 18:23:55.939551: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:23:55.939553: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:23:55.939556: | MAIN_I2: category: open IKE SA flags: 0: Aug 26 18:23:55.939559: | -> MAIN_I3 EVENT_RETRANSMIT Aug 26 18:23:55.939561: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:23:55.939563: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:23:55.939566: | MAIN_R2: category: open IKE SA flags: 0: Aug 26 18:23:55.939569: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:23:55.939571: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:23:55.939574: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 18:23:55.939576: | MAIN_I3: category: open IKE SA flags: 0: Aug 26 18:23:55.939579: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:23:55.939581: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:23:55.939584: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 18:23:55.939587: | MAIN_R3: category: established IKE SA flags: 200: Aug 26 18:23:55.939589: | -> UNDEFINED EVENT_NULL Aug 26 18:23:55.939592: | MAIN_I4: category: established IKE SA flags: 0: Aug 26 18:23:55.939594: | -> UNDEFINED EVENT_NULL Aug 26 18:23:55.939597: | AGGR_R0: category: half-open IKE SA flags: 0: Aug 26 18:23:55.939600: | -> AGGR_R1 EVENT_SO_DISCARD Aug 26 18:23:55.939602: | AGGR_I1: category: half-open IKE SA flags: 0: Aug 26 18:23:55.939605: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 18:23:55.939607: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 18:23:55.939610: | AGGR_R1: category: open IKE SA flags: 200: Aug 26 18:23:55.939613: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 18:23:55.939615: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 18:23:55.939618: | AGGR_I2: category: established IKE SA flags: 200: Aug 26 18:23:55.939620: | -> UNDEFINED EVENT_NULL Aug 26 18:23:55.939623: | AGGR_R2: category: established IKE SA flags: 0: Aug 26 18:23:55.939625: | -> UNDEFINED EVENT_NULL Aug 26 18:23:55.939628: | QUICK_R0: category: established CHILD SA flags: 0: Aug 26 18:23:55.939631: | -> QUICK_R1 EVENT_RETRANSMIT Aug 26 18:23:55.939638: | QUICK_I1: category: established CHILD SA flags: 0: Aug 26 18:23:55.939641: | -> QUICK_I2 EVENT_SA_REPLACE Aug 26 18:23:55.939644: | QUICK_R1: category: established CHILD SA flags: 0: Aug 26 18:23:55.939647: | -> QUICK_R2 EVENT_SA_REPLACE Aug 26 18:23:55.939650: | QUICK_I2: category: established CHILD SA flags: 200: Aug 26 18:23:55.939652: | -> UNDEFINED EVENT_NULL Aug 26 18:23:55.939655: | QUICK_R2: category: established CHILD SA flags: 0: Aug 26 18:23:55.939657: | -> UNDEFINED EVENT_NULL Aug 26 18:23:55.939660: | INFO: category: informational flags: 0: Aug 26 18:23:55.939663: | -> UNDEFINED EVENT_NULL Aug 26 18:23:55.939666: | INFO_PROTECTED: category: informational flags: 0: Aug 26 18:23:55.939668: | -> UNDEFINED EVENT_NULL Aug 26 18:23:55.939671: | XAUTH_R0: category: established IKE SA flags: 0: Aug 26 18:23:55.939673: | -> XAUTH_R1 EVENT_NULL Aug 26 18:23:55.939676: | XAUTH_R1: category: established IKE SA flags: 0: Aug 26 18:23:55.939678: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:23:55.939681: | MODE_CFG_R0: category: informational flags: 0: Aug 26 18:23:55.939684: | -> MODE_CFG_R1 EVENT_SA_REPLACE Aug 26 18:23:55.939687: | MODE_CFG_R1: category: established IKE SA flags: 0: Aug 26 18:23:55.939689: | -> MODE_CFG_R2 EVENT_SA_REPLACE Aug 26 18:23:55.939692: | MODE_CFG_R2: category: established IKE SA flags: 0: Aug 26 18:23:55.939695: | -> UNDEFINED EVENT_NULL Aug 26 18:23:55.939697: | MODE_CFG_I1: category: established IKE SA flags: 0: Aug 26 18:23:55.939700: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:23:55.939703: | XAUTH_I0: category: established IKE SA flags: 0: Aug 26 18:23:55.939705: | -> XAUTH_I1 EVENT_RETRANSMIT Aug 26 18:23:55.939708: | XAUTH_I1: category: established IKE SA flags: 0: Aug 26 18:23:55.939711: | -> MAIN_I4 EVENT_RETRANSMIT Aug 26 18:23:55.939717: | checking IKEv2 state table Aug 26 18:23:55.939724: | PARENT_I0: category: ignore flags: 0: Aug 26 18:23:55.939727: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Aug 26 18:23:55.939730: | PARENT_I1: category: half-open IKE SA flags: 0: Aug 26 18:23:55.939733: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Aug 26 18:23:55.939736: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Aug 26 18:23:55.939739: | PARENT_I2: category: open IKE SA flags: 0: Aug 26 18:23:55.939742: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Aug 26 18:23:55.939745: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Aug 26 18:23:55.939748: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Aug 26 18:23:55.939750: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Aug 26 18:23:55.939753: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Aug 26 18:23:55.939756: | PARENT_I3: category: established IKE SA flags: 0: Aug 26 18:23:55.939759: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Aug 26 18:23:55.939762: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Aug 26 18:23:55.939764: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Aug 26 18:23:55.939767: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Aug 26 18:23:55.939770: | PARENT_R0: category: half-open IKE SA flags: 0: Aug 26 18:23:55.939773: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Aug 26 18:23:55.939776: | PARENT_R1: category: half-open IKE SA flags: 0: Aug 26 18:23:55.939779: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Aug 26 18:23:55.939782: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Aug 26 18:23:55.939785: | PARENT_R2: category: established IKE SA flags: 0: Aug 26 18:23:55.939788: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Aug 26 18:23:55.939792: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Aug 26 18:23:55.939795: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Aug 26 18:23:55.939798: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Aug 26 18:23:55.939801: | V2_CREATE_I0: category: established IKE SA flags: 0: Aug 26 18:23:55.939803: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Aug 26 18:23:55.939806: | V2_CREATE_I: category: established IKE SA flags: 0: Aug 26 18:23:55.939809: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Aug 26 18:23:55.939812: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Aug 26 18:23:55.939815: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Aug 26 18:23:55.939818: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Aug 26 18:23:55.939821: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Aug 26 18:23:55.939824: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Aug 26 18:23:55.939827: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Aug 26 18:23:55.939830: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Aug 26 18:23:55.939833: | V2_CREATE_R: category: established IKE SA flags: 0: Aug 26 18:23:55.939836: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Aug 26 18:23:55.939839: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Aug 26 18:23:55.939842: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Aug 26 18:23:55.939845: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Aug 26 18:23:55.939848: | V2_IPSEC_I: category: established CHILD SA flags: 0: Aug 26 18:23:55.939851: | V2_IPSEC_R: category: established CHILD SA flags: 0: Aug 26 18:23:55.939854: | IKESA_DEL: category: established IKE SA flags: 0: Aug 26 18:23:55.939857: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Aug 26 18:23:55.939860: | CHILDSA_DEL: category: informational flags: 0: Aug 26 18:23:55.939877: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 Aug 26 18:23:55.940329: | Hard-wiring algorithms Aug 26 18:23:55.940338: | adding AES_CCM_16 to kernel algorithm db Aug 26 18:23:55.940343: | adding AES_CCM_12 to kernel algorithm db Aug 26 18:23:55.940346: | adding AES_CCM_8 to kernel algorithm db Aug 26 18:23:55.940349: | adding 3DES_CBC to kernel algorithm db Aug 26 18:23:55.940351: | adding CAMELLIA_CBC to kernel algorithm db Aug 26 18:23:55.940354: | adding AES_GCM_16 to kernel algorithm db Aug 26 18:23:55.940357: | adding AES_GCM_12 to kernel algorithm db Aug 26 18:23:55.940359: | adding AES_GCM_8 to kernel algorithm db Aug 26 18:23:55.940362: | adding AES_CTR to kernel algorithm db Aug 26 18:23:55.940365: | adding AES_CBC to kernel algorithm db Aug 26 18:23:55.940367: | adding SERPENT_CBC to kernel algorithm db Aug 26 18:23:55.940370: | adding TWOFISH_CBC to kernel algorithm db Aug 26 18:23:55.940373: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Aug 26 18:23:55.940375: | adding NULL to kernel algorithm db Aug 26 18:23:55.940378: | adding CHACHA20_POLY1305 to kernel algorithm db Aug 26 18:23:55.940381: | adding HMAC_MD5_96 to kernel algorithm db Aug 26 18:23:55.940383: | adding HMAC_SHA1_96 to kernel algorithm db Aug 26 18:23:55.940386: | adding HMAC_SHA2_512_256 to kernel algorithm db Aug 26 18:23:55.940389: | adding HMAC_SHA2_384_192 to kernel algorithm db Aug 26 18:23:55.940391: | adding HMAC_SHA2_256_128 to kernel algorithm db Aug 26 18:23:55.940394: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Aug 26 18:23:55.940397: | adding AES_XCBC_96 to kernel algorithm db Aug 26 18:23:55.940399: | adding AES_CMAC_96 to kernel algorithm db Aug 26 18:23:55.940402: | adding NONE to kernel algorithm db Aug 26 18:23:55.940435: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Aug 26 18:23:55.940442: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Aug 26 18:23:55.940445: | setup kernel fd callback Aug 26 18:23:55.940449: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x55f088ac6e50 Aug 26 18:23:55.940453: | libevent_malloc: new ptr-libevent@0x55f088ace2b0 size 128 Aug 26 18:23:55.940456: | libevent_malloc: new ptr-libevent@0x55f088abcbe0 size 16 Aug 26 18:23:55.940463: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x55f088ac16f0 Aug 26 18:23:55.940466: | libevent_malloc: new ptr-libevent@0x55f088ace340 size 128 Aug 26 18:23:55.940469: | libevent_malloc: new ptr-libevent@0x55f088ac1640 size 16 Aug 26 18:23:55.940710: | global one-shot timer EVENT_CHECK_CRLS initialized Aug 26 18:23:55.940719: selinux support is enabled. Aug 26 18:23:55.950256: | unbound context created - setting debug level to 5 Aug 26 18:23:55.950326: | /etc/hosts lookups activated Aug 26 18:23:55.950346: | /etc/resolv.conf usage activated Aug 26 18:23:55.950424: | outgoing-port-avoid set 0-65535 Aug 26 18:23:55.950461: | outgoing-port-permit set 32768-60999 Aug 26 18:23:55.950465: | Loading dnssec root key from:/var/lib/unbound/root.key Aug 26 18:23:55.950469: | No additional dnssec trust anchors defined via dnssec-trusted= option Aug 26 18:23:55.950472: | Setting up events, loop start Aug 26 18:23:55.950477: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x55f088ac1440 Aug 26 18:23:55.950482: | libevent_malloc: new ptr-libevent@0x55f088ad8860 size 128 Aug 26 18:23:55.950487: | libevent_malloc: new ptr-libevent@0x55f088ad88f0 size 16 Aug 26 18:23:55.950498: | libevent_realloc: new ptr-libevent@0x55f088a3e5b0 size 256 Aug 26 18:23:55.950501: | libevent_malloc: new ptr-libevent@0x55f088ad8910 size 8 Aug 26 18:23:55.950505: | libevent_realloc: new ptr-libevent@0x55f088acd620 size 144 Aug 26 18:23:55.950508: | libevent_malloc: new ptr-libevent@0x55f088ad8930 size 152 Aug 26 18:23:55.950513: | libevent_malloc: new ptr-libevent@0x55f088ad89d0 size 16 Aug 26 18:23:55.950517: | signal event handler PLUTO_SIGCHLD installed Aug 26 18:23:55.950521: | libevent_malloc: new ptr-libevent@0x55f088ad89f0 size 8 Aug 26 18:23:55.950524: | libevent_malloc: new ptr-libevent@0x55f088ad8a10 size 152 Aug 26 18:23:55.950528: | signal event handler PLUTO_SIGTERM installed Aug 26 18:23:55.950531: | libevent_malloc: new ptr-libevent@0x55f088ad8ab0 size 8 Aug 26 18:23:55.950534: | libevent_malloc: new ptr-libevent@0x55f088ad8ad0 size 152 Aug 26 18:23:55.950538: | signal event handler PLUTO_SIGHUP installed Aug 26 18:23:55.950541: | libevent_malloc: new ptr-libevent@0x55f088ad8b70 size 8 Aug 26 18:23:55.950544: | libevent_realloc: release ptr-libevent@0x55f088acd620 Aug 26 18:23:55.950547: | libevent_realloc: new ptr-libevent@0x55f088ad8b90 size 256 Aug 26 18:23:55.950551: | libevent_malloc: new ptr-libevent@0x55f088acd620 size 152 Aug 26 18:23:55.950554: | signal event handler PLUTO_SIGSYS installed Aug 26 18:23:55.950990: | created addconn helper (pid:24052) using fork+execve Aug 26 18:23:55.951009: | forked child 24052 Aug 26 18:23:55.951058: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:23:55.951077: listening for IKE messages Aug 26 18:23:55.956939: | Inspecting interface lo Aug 26 18:23:55.956956: | found lo with address 127.0.0.1 Aug 26 18:23:55.956961: | Inspecting interface eth0 Aug 26 18:23:55.956966: | found eth0 with address 192.0.2.254 Aug 26 18:23:55.956968: | Inspecting interface eth1 Aug 26 18:23:55.956972: | found eth1 with address 192.1.2.23 Aug 26 18:23:55.957136: Kernel supports NIC esp-hw-offload Aug 26 18:23:55.957156: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.23:500 Aug 26 18:23:55.957245: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 18:23:55.957253: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 18:23:55.957258: adding interface eth1/eth1 192.1.2.23:4500 Aug 26 18:23:55.957302: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.2.254:500 Aug 26 18:23:55.957327: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 18:23:55.957331: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 18:23:55.957335: adding interface eth0/eth0 192.0.2.254:4500 Aug 26 18:23:55.957357: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Aug 26 18:23:55.957376: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 18:23:55.957380: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 18:23:55.957383: adding interface lo/lo 127.0.0.1:4500 Aug 26 18:23:55.957439: | no interfaces to sort Aug 26 18:23:55.957444: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 18:23:55.957452: | add_fd_read_event_handler: new ethX-pe@0x55f088ac21c0 Aug 26 18:23:55.957456: | libevent_malloc: new ptr-libevent@0x55f088ad8f00 size 128 Aug 26 18:23:55.957460: | libevent_malloc: new ptr-libevent@0x55f088ad8f90 size 16 Aug 26 18:23:55.957470: | setup callback for interface lo 127.0.0.1:4500 fd 22 Aug 26 18:23:55.957473: | add_fd_read_event_handler: new ethX-pe@0x55f088ad8fb0 Aug 26 18:23:55.957475: | libevent_malloc: new ptr-libevent@0x55f088ad8ff0 size 128 Aug 26 18:23:55.957478: | libevent_malloc: new ptr-libevent@0x55f088ad9080 size 16 Aug 26 18:23:55.957483: | setup callback for interface lo 127.0.0.1:500 fd 21 Aug 26 18:23:55.957485: | add_fd_read_event_handler: new ethX-pe@0x55f088ad90a0 Aug 26 18:23:55.957488: | libevent_malloc: new ptr-libevent@0x55f088ad90e0 size 128 Aug 26 18:23:55.957491: | libevent_malloc: new ptr-libevent@0x55f088ad9170 size 16 Aug 26 18:23:55.957496: | setup callback for interface eth0 192.0.2.254:4500 fd 20 Aug 26 18:23:55.957499: | add_fd_read_event_handler: new ethX-pe@0x55f088ad9190 Aug 26 18:23:55.957502: | libevent_malloc: new ptr-libevent@0x55f088ad91d0 size 128 Aug 26 18:23:55.957505: | libevent_malloc: new ptr-libevent@0x55f088ad9260 size 16 Aug 26 18:23:55.957510: | setup callback for interface eth0 192.0.2.254:500 fd 19 Aug 26 18:23:55.957514: | add_fd_read_event_handler: new ethX-pe@0x55f088ad9280 Aug 26 18:23:55.957517: | libevent_malloc: new ptr-libevent@0x55f088ad92c0 size 128 Aug 26 18:23:55.957519: | libevent_malloc: new ptr-libevent@0x55f088ad9350 size 16 Aug 26 18:23:55.957524: | setup callback for interface eth1 192.1.2.23:4500 fd 18 Aug 26 18:23:55.957527: | add_fd_read_event_handler: new ethX-pe@0x55f088ad9370 Aug 26 18:23:55.957530: | libevent_malloc: new ptr-libevent@0x55f088ad93b0 size 128 Aug 26 18:23:55.957533: | libevent_malloc: new ptr-libevent@0x55f088ad9440 size 16 Aug 26 18:23:55.957538: | setup callback for interface eth1 192.1.2.23:500 fd 17 Aug 26 18:23:55.957543: | certs and keys locked by 'free_preshared_secrets' Aug 26 18:23:55.957546: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 18:23:55.957569: loading secrets from "/etc/ipsec.secrets" Aug 26 18:23:55.957581: | Processing PSK at line 1: passed Aug 26 18:23:55.957585: | certs and keys locked by 'process_secret' Aug 26 18:23:55.957588: | certs and keys unlocked by 'process_secret' Aug 26 18:23:55.957599: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:23:55.957609: | spent 1.32 milliseconds in whack Aug 26 18:23:56.105558: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:23:56.105586: listening for IKE messages Aug 26 18:23:56.106023: | Inspecting interface lo Aug 26 18:23:56.106032: | found lo with address 127.0.0.1 Aug 26 18:23:56.106036: | Inspecting interface eth0 Aug 26 18:23:56.106040: | found eth0 with address 192.0.2.254 Aug 26 18:23:56.106043: | Inspecting interface eth1 Aug 26 18:23:56.106047: | found eth1 with address 192.1.2.23 Aug 26 18:23:56.106100: | no interfaces to sort Aug 26 18:23:56.106111: | libevent_free: release ptr-libevent@0x55f088ad8f00 Aug 26 18:23:56.106114: | free_event_entry: release EVENT_NULL-pe@0x55f088ac21c0 Aug 26 18:23:56.106123: | add_fd_read_event_handler: new ethX-pe@0x55f088ac21c0 Aug 26 18:23:56.106127: | libevent_malloc: new ptr-libevent@0x55f088ad8f00 size 128 Aug 26 18:23:56.106135: | setup callback for interface lo 127.0.0.1:4500 fd 22 Aug 26 18:23:56.106139: | libevent_free: release ptr-libevent@0x55f088ad8ff0 Aug 26 18:23:56.106142: | free_event_entry: release EVENT_NULL-pe@0x55f088ad8fb0 Aug 26 18:23:56.106145: | add_fd_read_event_handler: new ethX-pe@0x55f088ad8fb0 Aug 26 18:23:56.106148: | libevent_malloc: new ptr-libevent@0x55f088ad8ff0 size 128 Aug 26 18:23:56.106153: | setup callback for interface lo 127.0.0.1:500 fd 21 Aug 26 18:23:56.106156: | libevent_free: release ptr-libevent@0x55f088ad90e0 Aug 26 18:23:56.106159: | free_event_entry: release EVENT_NULL-pe@0x55f088ad90a0 Aug 26 18:23:56.106162: | add_fd_read_event_handler: new ethX-pe@0x55f088ad90a0 Aug 26 18:23:56.106165: | libevent_malloc: new ptr-libevent@0x55f088ad90e0 size 128 Aug 26 18:23:56.106170: | setup callback for interface eth0 192.0.2.254:4500 fd 20 Aug 26 18:23:56.106174: | libevent_free: release ptr-libevent@0x55f088ad91d0 Aug 26 18:23:56.106176: | free_event_entry: release EVENT_NULL-pe@0x55f088ad9190 Aug 26 18:23:56.106179: | add_fd_read_event_handler: new ethX-pe@0x55f088ad9190 Aug 26 18:23:56.106182: | libevent_malloc: new ptr-libevent@0x55f088ad91d0 size 128 Aug 26 18:23:56.106187: | setup callback for interface eth0 192.0.2.254:500 fd 19 Aug 26 18:23:56.106191: | libevent_free: release ptr-libevent@0x55f088ad92c0 Aug 26 18:23:56.106193: | free_event_entry: release EVENT_NULL-pe@0x55f088ad9280 Aug 26 18:23:56.106196: | add_fd_read_event_handler: new ethX-pe@0x55f088ad9280 Aug 26 18:23:56.106199: | libevent_malloc: new ptr-libevent@0x55f088ad92c0 size 128 Aug 26 18:23:56.106204: | setup callback for interface eth1 192.1.2.23:4500 fd 18 Aug 26 18:23:56.106207: | libevent_free: release ptr-libevent@0x55f088ad93b0 Aug 26 18:23:56.106210: | free_event_entry: release EVENT_NULL-pe@0x55f088ad9370 Aug 26 18:23:56.106213: | add_fd_read_event_handler: new ethX-pe@0x55f088ad9370 Aug 26 18:23:56.106215: | libevent_malloc: new ptr-libevent@0x55f088ad93b0 size 128 Aug 26 18:23:56.106220: | setup callback for interface eth1 192.1.2.23:500 fd 17 Aug 26 18:23:56.106224: | certs and keys locked by 'free_preshared_secrets' Aug 26 18:23:56.106226: forgetting secrets Aug 26 18:23:56.106232: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 18:23:56.106245: loading secrets from "/etc/ipsec.secrets" Aug 26 18:23:56.106252: | Processing PSK at line 1: passed Aug 26 18:23:56.106255: | certs and keys locked by 'process_secret' Aug 26 18:23:56.106257: | certs and keys unlocked by 'process_secret' Aug 26 18:23:56.106265: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:23:56.106272: | spent 0.722 milliseconds in whack Aug 26 18:23:56.112069: | processing signal PLUTO_SIGCHLD Aug 26 18:23:56.112096: | waitpid returned pid 24052 (exited with status 0) Aug 26 18:23:56.112101: | reaped addconn helper child (status 0) Aug 26 18:23:56.112107: | waitpid returned ECHILD (no child processes left) Aug 26 18:23:56.112114: | spent 0.0255 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 18:23:56.119831: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:23:56.124317: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:23:56.124341: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 18:23:56.124345: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:23:56.124347: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 18:23:56.124352: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:23:56.124360: | Added new connection test with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 18:23:56.124363: | from whack: got --esp=aes256-sha1,aes-sha1 Aug 26 18:23:56.124389: | ESP/AH string values: AES_CBC_256-HMAC_SHA1_96, AES_CBC-HMAC_SHA1_96 Aug 26 18:23:56.124396: | counting wild cards for 192.1.2.23 is 0 Aug 26 18:23:56.124408: | counting wild cards for 192.1.2.45 is 0 Aug 26 18:23:56.124421: | connect_to_host_pair: 192.1.2.23:500 192.1.2.45:500 -> hp@(nil): none Aug 26 18:23:56.124427: | new hp@0x55f088aa5920 Aug 26 18:23:56.124431: added connection description "test" Aug 26 18:23:56.124440: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 18:23:56.124453: | 192.1.2.23/32===192.1.2.23<192.1.2.23>...192.1.2.45<192.1.2.45>===10.1.1.0/29 Aug 26 18:23:56.124462: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:23:56.124471: | spent 0.2 milliseconds in whack Aug 26 18:23:57.204536: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:57.204575: | *received 92 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:57.204581: | 63 23 89 df d6 98 a7 ca 00 00 00 00 00 00 00 00 Aug 26 18:23:57.204586: | 01 10 02 00 00 00 00 00 00 00 00 5c 00 00 00 40 Aug 26 18:23:57.204589: | 00 00 00 01 00 00 00 01 00 00 00 34 01 01 00 02 Aug 26 18:23:57.204592: | 03 00 00 1c 01 01 00 00 80 01 00 07 80 0e 00 80 Aug 26 18:23:57.204595: | 80 02 00 01 80 03 00 01 80 04 00 04 00 00 00 10 Aug 26 18:23:57.204597: | 02 01 00 00 80 03 00 01 80 04 00 04 Aug 26 18:23:57.204605: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:57.204611: | **parse ISAKMP Message: Aug 26 18:23:57.204614: | initiator cookie: Aug 26 18:23:57.204617: | 63 23 89 df d6 98 a7 ca Aug 26 18:23:57.204620: | responder cookie: Aug 26 18:23:57.204622: | 00 00 00 00 00 00 00 00 Aug 26 18:23:57.204626: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.204629: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.204632: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.204635: | flags: none (0x0) Aug 26 18:23:57.204637: | Message ID: 0 (0x0) Aug 26 18:23:57.204640: | length: 92 (0x5c) Aug 26 18:23:57.204644: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:57.204649: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:57.204653: | #null state always idle Aug 26 18:23:57.204657: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:57.204661: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:57.204665: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.204668: | length: 64 (0x40) Aug 26 18:23:57.204671: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.204674: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:57.204678: | in statetime_start() with no state Aug 26 18:23:57.204684: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:57.204693: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:57.204699: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.204704: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:57.204707: | find_next_host_connection returns test Aug 26 18:23:57.204710: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.204713: | find_next_host_connection returns empty Aug 26 18:23:57.204743: | creating state object #1 at 0x55f088adb960 Aug 26 18:23:57.204748: | State DB: adding IKEv1 state #1 in UNDEFINED Aug 26 18:23:57.204757: | pstats #1 ikev1.isakmp started Aug 26 18:23:57.204762: | #1 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:57.204773: | start processing: state #1 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:57.204779: | parent state #1: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:57.204783: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:57.204787: "test" #1: responding to Main Mode Aug 26 18:23:57.204823: | **emit ISAKMP Message: Aug 26 18:23:57.204827: | initiator cookie: Aug 26 18:23:57.204830: | 63 23 89 df d6 98 a7 ca Aug 26 18:23:57.204833: | responder cookie: Aug 26 18:23:57.204835: | cb 02 21 9c 6c 89 da 94 Aug 26 18:23:57.204838: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.204841: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.204844: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.204846: | flags: none (0x0) Aug 26 18:23:57.204849: | Message ID: 0 (0x0) Aug 26 18:23:57.204852: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.204855: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:57.204859: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:57.204861: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:57.204864: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.204867: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:57.204871: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:57.204874: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:57.204878: | ****parse IPsec DOI SIT: Aug 26 18:23:57.204881: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:57.204884: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:57.204887: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.204890: | length: 52 (0x34) Aug 26 18:23:57.204892: | proposal number: 1 (0x1) Aug 26 18:23:57.204895: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:57.204898: | SPI size: 0 (0x0) Aug 26 18:23:57.204901: | number of transforms: 2 (0x2) Aug 26 18:23:57.204904: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.204906: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:23:57.204909: | length: 28 (0x1c) Aug 26 18:23:57.204912: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:57.204915: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.204918: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.204921: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:57.204924: | length/value: 7 (0x7) Aug 26 18:23:57.204927: | [7 is OAKLEY_AES_CBC] Aug 26 18:23:57.204930: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.204933: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 18:23:57.204936: | length/value: 128 (0x80) Aug 26 18:23:57.204939: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.204942: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:23:57.204944: | length/value: 1 (0x1) Aug 26 18:23:57.204947: | [1 is OAKLEY_MD5] Aug 26 18:23:57.204950: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.204953: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:23:57.204955: | length/value: 1 (0x1) Aug 26 18:23:57.204958: | [1 is OAKLEY_PRESHARED_KEY] Aug 26 18:23:57.204963: | started looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Aug 26 18:23:57.204967: | actually looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Aug 26 18:23:57.204973: | line 1: key type PKK_PSK(192.1.2.23) to type PKK_PSK Aug 26 18:23:57.204977: | 1: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Aug 26 18:23:57.204980: | 2: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Aug 26 18:23:57.204983: | line 1: match=002 Aug 26 18:23:57.204986: | match 002 beats previous best_match 000 match=0x55f088ace490 (line=1) Aug 26 18:23:57.204989: | concluding with best_match=002 best=0x55f088ace490 (lineno=1) Aug 26 18:23:57.204992: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.204995: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:23:57.204998: | length/value: 4 (0x4) Aug 26 18:23:57.205001: | [4 is OAKLEY_GROUP_GP185(UNUSED)] Aug 26 18:23:57.205008: "test" #1: OAKLEY_GROUP 4 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Aug 26 18:23:57.205012: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.205015: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.205017: | length: 16 (0x10) Aug 26 18:23:57.205020: | ISAKMP transform number: 2 (0x2) Aug 26 18:23:57.205023: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.205025: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.205028: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:23:57.205031: | length/value: 1 (0x1) Aug 26 18:23:57.205034: | [1 is OAKLEY_PRESHARED_KEY] Aug 26 18:23:57.205038: | started looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Aug 26 18:23:57.205041: | actually looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Aug 26 18:23:57.205046: | line 1: key type PKK_PSK(192.1.2.23) to type PKK_PSK Aug 26 18:23:57.205050: | 1: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Aug 26 18:23:57.205053: | 2: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Aug 26 18:23:57.205055: | line 1: match=002 Aug 26 18:23:57.205059: | match 002 beats previous best_match 000 match=0x55f088ace490 (line=1) Aug 26 18:23:57.205062: | concluding with best_match=002 best=0x55f088ace490 (lineno=1) Aug 26 18:23:57.205064: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.205067: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:23:57.205070: | length/value: 4 (0x4) Aug 26 18:23:57.205072: | [4 is OAKLEY_GROUP_GP185(UNUSED)] Aug 26 18:23:57.205076: "test" #1: OAKLEY_GROUP 4 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Aug 26 18:23:57.205078: "test" #1: no acceptable Oakley Transform Aug 26 18:23:57.205083: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:57.205088: | [RE]START processing: state #1 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:57.205090: | #1 is idle Aug 26 18:23:57.205417: "test" #1: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:57.205427: | **emit ISAKMP Message: Aug 26 18:23:57.205430: | initiator cookie: Aug 26 18:23:57.205433: | 63 23 89 df d6 98 a7 ca Aug 26 18:23:57.205435: | responder cookie: Aug 26 18:23:57.205438: | cb 02 21 9c 6c 89 da 94 Aug 26 18:23:57.205441: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.205444: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.205446: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:57.205449: | flags: none (0x0) Aug 26 18:23:57.205451: | Message ID: 0 (0x0) Aug 26 18:23:57.205455: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.205458: | ***emit ISAKMP Notification Payload: Aug 26 18:23:57.205461: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.205463: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.205466: | protocol ID: 1 (0x1) Aug 26 18:23:57.205469: | SPI size: 0 (0x0) Aug 26 18:23:57.205471: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:57.205475: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:57.205478: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:57.205481: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:57.205483: | emitting length of ISAKMP Message: 40 Aug 26 18:23:57.205491: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1) Aug 26 18:23:57.205494: | 63 23 89 df d6 98 a7 ca cb 02 21 9c 6c 89 da 94 Aug 26 18:23:57.205497: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:57.205500: | 00 00 00 01 01 00 00 0e Aug 26 18:23:57.205531: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:57.205539: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:57.205548: | stop processing: state #1 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:57.205553: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:57.205560: | spent 0.758 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:57.393371: | spent 0.00345 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:57.393405: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:57.393409: | 2f 15 08 dd a1 29 7a 4a 00 00 00 00 00 00 00 00 Aug 26 18:23:57.393412: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 18:23:57.393414: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 18:23:57.393417: | 00 00 00 18 01 01 00 00 80 01 00 1d 80 02 00 0b Aug 26 18:23:57.393419: | 80 03 00 0c 80 04 00 16 Aug 26 18:23:57.393425: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:57.393428: | **parse ISAKMP Message: Aug 26 18:23:57.393431: | initiator cookie: Aug 26 18:23:57.393434: | 2f 15 08 dd a1 29 7a 4a Aug 26 18:23:57.393436: | responder cookie: Aug 26 18:23:57.393439: | 00 00 00 00 00 00 00 00 Aug 26 18:23:57.393442: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.393445: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.393448: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.393450: | flags: none (0x0) Aug 26 18:23:57.393453: | Message ID: 0 (0x0) Aug 26 18:23:57.393456: | length: 72 (0x48) Aug 26 18:23:57.393459: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:57.393463: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:57.393466: | #null state always idle Aug 26 18:23:57.393469: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:57.393473: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:57.393475: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.393478: | length: 44 (0x2c) Aug 26 18:23:57.393480: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.393483: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:57.393486: | in statetime_start() with no state Aug 26 18:23:57.393492: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:57.393498: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:57.393501: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.393505: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:57.393507: | find_next_host_connection returns test Aug 26 18:23:57.393510: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.393513: | find_next_host_connection returns empty Aug 26 18:23:57.393539: | creating state object #2 at 0x55f088adc420 Aug 26 18:23:57.393543: | State DB: adding IKEv1 state #2 in UNDEFINED Aug 26 18:23:57.393549: | pstats #2 ikev1.isakmp started Aug 26 18:23:57.393554: | #2 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:57.393560: | start processing: state #2 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:57.393563: | parent state #2: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:57.393567: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:57.393570: "test" #2: responding to Main Mode Aug 26 18:23:57.393575: | **emit ISAKMP Message: Aug 26 18:23:57.393578: | initiator cookie: Aug 26 18:23:57.393580: | 2f 15 08 dd a1 29 7a 4a Aug 26 18:23:57.393583: | responder cookie: Aug 26 18:23:57.393585: | 19 b6 fe 0b 33 ce 79 c7 Aug 26 18:23:57.393588: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.393591: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.393593: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.393601: | flags: none (0x0) Aug 26 18:23:57.393604: | Message ID: 0 (0x0) Aug 26 18:23:57.393607: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.393610: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:57.393613: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:57.393616: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:57.393618: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.393621: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:57.393624: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:57.393628: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:57.393631: | ****parse IPsec DOI SIT: Aug 26 18:23:57.393634: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:57.393637: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:57.393640: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.393642: | length: 32 (0x20) Aug 26 18:23:57.393645: | proposal number: 1 (0x1) Aug 26 18:23:57.393648: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:57.393650: | SPI size: 0 (0x0) Aug 26 18:23:57.393653: | number of transforms: 1 (0x1) Aug 26 18:23:57.393656: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.393658: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.393661: | length: 24 (0x18) Aug 26 18:23:57.393663: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:57.393666: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.393669: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.393672: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:57.393675: | length/value: 29 (0x1d) Aug 26 18:23:57.393679: "test" #2: 29?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:57.393682: "test" #2: no acceptable Oakley Transform Aug 26 18:23:57.393685: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:57.393690: | [RE]START processing: state #2 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:57.393693: | #2 is idle Aug 26 18:23:57.395000: "test" #2: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:57.395015: | **emit ISAKMP Message: Aug 26 18:23:57.395019: | initiator cookie: Aug 26 18:23:57.395022: | 2f 15 08 dd a1 29 7a 4a Aug 26 18:23:57.395025: | responder cookie: Aug 26 18:23:57.395027: | 19 b6 fe 0b 33 ce 79 c7 Aug 26 18:23:57.395030: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.395033: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.395035: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:57.395038: | flags: none (0x0) Aug 26 18:23:57.395041: | Message ID: 0 (0x0) Aug 26 18:23:57.395044: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.395048: | ***emit ISAKMP Notification Payload: Aug 26 18:23:57.395051: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.395054: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.395057: | protocol ID: 1 (0x1) Aug 26 18:23:57.395059: | SPI size: 0 (0x0) Aug 26 18:23:57.395062: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:57.395065: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:57.395069: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:57.395072: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:57.395075: | emitting length of ISAKMP Message: 40 Aug 26 18:23:57.395083: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #2) Aug 26 18:23:57.395089: | 2f 15 08 dd a1 29 7a 4a 19 b6 fe 0b 33 ce 79 c7 Aug 26 18:23:57.395092: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:57.395094: | 00 00 00 01 01 00 00 0e Aug 26 18:23:57.395138: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:57.395146: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:57.395153: | stop processing: state #2 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:57.395157: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:57.395165: | spent 0.954 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:57.442268: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:57.442311: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:57.442319: | 36 cb 48 34 2a 0f 8d 22 00 00 00 00 00 00 00 00 Aug 26 18:23:57.442321: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:57.442324: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:57.442326: | 00 00 00 14 01 01 00 00 80 02 00 0b 80 03 00 0c Aug 26 18:23:57.442329: | 80 04 00 16 Aug 26 18:23:57.442334: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:57.442340: | **parse ISAKMP Message: Aug 26 18:23:57.442343: | initiator cookie: Aug 26 18:23:57.442346: | 36 cb 48 34 2a 0f 8d 22 Aug 26 18:23:57.442348: | responder cookie: Aug 26 18:23:57.442351: | 00 00 00 00 00 00 00 00 Aug 26 18:23:57.442354: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.442357: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.442360: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.442363: | flags: none (0x0) Aug 26 18:23:57.442365: | Message ID: 0 (0x0) Aug 26 18:23:57.442368: | length: 68 (0x44) Aug 26 18:23:57.442371: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:57.442375: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:57.442378: | #null state always idle Aug 26 18:23:57.442382: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:57.442385: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:57.442388: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.442390: | length: 40 (0x28) Aug 26 18:23:57.442393: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.442396: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:57.442399: | in statetime_start() with no state Aug 26 18:23:57.442405: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:57.442410: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:57.442414: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.442418: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:57.442421: | find_next_host_connection returns test Aug 26 18:23:57.442424: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.442426: | find_next_host_connection returns empty Aug 26 18:23:57.442457: | creating state object #3 at 0x55f088adcee0 Aug 26 18:23:57.442462: | State DB: adding IKEv1 state #3 in UNDEFINED Aug 26 18:23:57.442469: | pstats #3 ikev1.isakmp started Aug 26 18:23:57.442474: | #3 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:57.442480: | start processing: state #3 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:57.442484: | parent state #3: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:57.442488: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:57.442491: "test" #3: responding to Main Mode Aug 26 18:23:57.442497: | **emit ISAKMP Message: Aug 26 18:23:57.442505: | initiator cookie: Aug 26 18:23:57.442508: | 36 cb 48 34 2a 0f 8d 22 Aug 26 18:23:57.442510: | responder cookie: Aug 26 18:23:57.442512: | ef 5b d0 b4 3a 87 67 de Aug 26 18:23:57.442515: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.442517: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.442520: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.442523: | flags: none (0x0) Aug 26 18:23:57.442526: | Message ID: 0 (0x0) Aug 26 18:23:57.442529: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.442532: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:57.442535: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:57.442538: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:57.442541: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.442544: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:57.442548: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:57.442551: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:57.442555: | ****parse IPsec DOI SIT: Aug 26 18:23:57.442558: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:57.442561: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:57.442563: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.442566: | length: 28 (0x1c) Aug 26 18:23:57.442569: | proposal number: 1 (0x1) Aug 26 18:23:57.442571: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:57.442574: | SPI size: 0 (0x0) Aug 26 18:23:57.442576: | number of transforms: 1 (0x1) Aug 26 18:23:57.442579: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.442582: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.442585: | length: 20 (0x14) Aug 26 18:23:57.442587: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:57.442590: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.442593: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.442596: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:23:57.442599: | length/value: 11 (0xb) Aug 26 18:23:57.442603: "test" #3: 11?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Aug 26 18:23:57.442607: "test" #3: no acceptable Oakley Transform Aug 26 18:23:57.442611: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:57.442616: | [RE]START processing: state #3 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:57.442619: | #3 is idle Aug 26 18:23:57.442706: "test" #3: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:57.442712: | **emit ISAKMP Message: Aug 26 18:23:57.442715: | initiator cookie: Aug 26 18:23:57.442718: | 36 cb 48 34 2a 0f 8d 22 Aug 26 18:23:57.442720: | responder cookie: Aug 26 18:23:57.442723: | ef 5b d0 b4 3a 87 67 de Aug 26 18:23:57.442726: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.442729: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.442731: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:57.442734: | flags: none (0x0) Aug 26 18:23:57.442736: | Message ID: 0 (0x0) Aug 26 18:23:57.442739: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.442743: | ***emit ISAKMP Notification Payload: Aug 26 18:23:57.442745: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.442748: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.442750: | protocol ID: 1 (0x1) Aug 26 18:23:57.442753: | SPI size: 0 (0x0) Aug 26 18:23:57.442756: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:57.442759: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:57.442767: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:57.442771: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:57.442774: | emitting length of ISAKMP Message: 40 Aug 26 18:23:57.442780: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3) Aug 26 18:23:57.442784: | 36 cb 48 34 2a 0f 8d 22 ef 5b d0 b4 3a 87 67 de Aug 26 18:23:57.442787: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:57.442789: | 00 00 00 01 01 00 00 0e Aug 26 18:23:57.442819: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:57.442825: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:57.442831: | stop processing: state #3 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:57.442835: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:57.442842: | spent 0.53 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:57.501714: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:57.501743: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:57.501747: | e6 8f a8 c7 e0 8d e6 22 00 00 00 00 00 00 00 00 Aug 26 18:23:57.501749: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:57.501752: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:57.501755: | 00 00 00 14 01 01 00 00 80 01 00 1d 80 03 00 0c Aug 26 18:23:57.501757: | 80 04 00 16 Aug 26 18:23:57.501762: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:57.501767: | **parse ISAKMP Message: Aug 26 18:23:57.501770: | initiator cookie: Aug 26 18:23:57.501772: | e6 8f a8 c7 e0 8d e6 22 Aug 26 18:23:57.501775: | responder cookie: Aug 26 18:23:57.501777: | 00 00 00 00 00 00 00 00 Aug 26 18:23:57.501780: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.501783: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.501786: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.501789: | flags: none (0x0) Aug 26 18:23:57.501792: | Message ID: 0 (0x0) Aug 26 18:23:57.501794: | length: 68 (0x44) Aug 26 18:23:57.501798: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:57.501802: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:57.501805: | #null state always idle Aug 26 18:23:57.501808: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:57.501812: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:57.501814: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.501817: | length: 40 (0x28) Aug 26 18:23:57.501820: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.501823: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:57.501825: | in statetime_start() with no state Aug 26 18:23:57.501831: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:57.501837: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:57.501840: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.501844: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:57.501847: | find_next_host_connection returns test Aug 26 18:23:57.501850: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.501852: | find_next_host_connection returns empty Aug 26 18:23:57.501879: | creating state object #4 at 0x55f088add9a0 Aug 26 18:23:57.501883: | State DB: adding IKEv1 state #4 in UNDEFINED Aug 26 18:23:57.501887: | pstats #4 ikev1.isakmp started Aug 26 18:23:57.501892: | #4 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:57.501902: | start processing: state #4 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:57.501906: | parent state #4: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:57.501909: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:57.501913: "test" #4: responding to Main Mode Aug 26 18:23:57.501918: | **emit ISAKMP Message: Aug 26 18:23:57.501921: | initiator cookie: Aug 26 18:23:57.501923: | e6 8f a8 c7 e0 8d e6 22 Aug 26 18:23:57.501926: | responder cookie: Aug 26 18:23:57.501928: | 91 01 b9 b6 af 4d d5 69 Aug 26 18:23:57.501931: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.501934: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.501937: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.501939: | flags: none (0x0) Aug 26 18:23:57.501942: | Message ID: 0 (0x0) Aug 26 18:23:57.501945: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.501948: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:57.501951: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:57.501954: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:57.501956: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.501960: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:57.501963: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:57.501966: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:57.501969: | ****parse IPsec DOI SIT: Aug 26 18:23:57.501972: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:57.501975: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:57.501978: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.501981: | length: 28 (0x1c) Aug 26 18:23:57.501983: | proposal number: 1 (0x1) Aug 26 18:23:57.501986: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:57.501989: | SPI size: 0 (0x0) Aug 26 18:23:57.501991: | number of transforms: 1 (0x1) Aug 26 18:23:57.501994: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.501997: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.502000: | length: 20 (0x14) Aug 26 18:23:57.502002: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:57.502005: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.502008: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.502011: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:57.502013: | length/value: 29 (0x1d) Aug 26 18:23:57.502018: "test" #4: 29?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:57.502021: "test" #4: no acceptable Oakley Transform Aug 26 18:23:57.502024: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:57.502029: | [RE]START processing: state #4 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:57.502032: | #4 is idle Aug 26 18:23:57.502116: "test" #4: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:57.502121: | **emit ISAKMP Message: Aug 26 18:23:57.502124: | initiator cookie: Aug 26 18:23:57.502126: | e6 8f a8 c7 e0 8d e6 22 Aug 26 18:23:57.502129: | responder cookie: Aug 26 18:23:57.502131: | 91 01 b9 b6 af 4d d5 69 Aug 26 18:23:57.502134: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.502137: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.502140: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:57.502142: | flags: none (0x0) Aug 26 18:23:57.502145: | Message ID: 0 (0x0) Aug 26 18:23:57.502148: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.502151: | ***emit ISAKMP Notification Payload: Aug 26 18:23:57.502154: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.502160: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.502163: | protocol ID: 1 (0x1) Aug 26 18:23:57.502165: | SPI size: 0 (0x0) Aug 26 18:23:57.502168: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:57.502171: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:57.502175: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:57.502178: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:57.502180: | emitting length of ISAKMP Message: 40 Aug 26 18:23:57.502187: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #4) Aug 26 18:23:57.502190: | e6 8f a8 c7 e0 8d e6 22 91 01 b9 b6 af 4d d5 69 Aug 26 18:23:57.502192: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:57.502195: | 00 00 00 01 01 00 00 0e Aug 26 18:23:57.502219: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:57.502225: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:57.502230: | stop processing: state #4 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:57.502234: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:57.502240: | spent 0.497 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:57.549846: | spent 0.00343 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:57.549881: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:57.549886: | ca ac 01 06 8c a1 c7 f7 00 00 00 00 00 00 00 00 Aug 26 18:23:57.549890: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:57.549892: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:57.549895: | 00 00 00 14 01 01 00 00 80 01 00 1d 80 02 00 0b Aug 26 18:23:57.549897: | 80 04 00 16 Aug 26 18:23:57.549903: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:57.549908: | **parse ISAKMP Message: Aug 26 18:23:57.549912: | initiator cookie: Aug 26 18:23:57.549914: | ca ac 01 06 8c a1 c7 f7 Aug 26 18:23:57.549917: | responder cookie: Aug 26 18:23:57.549920: | 00 00 00 00 00 00 00 00 Aug 26 18:23:57.549923: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.549926: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.549929: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.549932: | flags: none (0x0) Aug 26 18:23:57.549935: | Message ID: 0 (0x0) Aug 26 18:23:57.549938: | length: 68 (0x44) Aug 26 18:23:57.549942: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:57.549946: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:57.549949: | #null state always idle Aug 26 18:23:57.549953: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:57.549956: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:57.549959: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.549962: | length: 40 (0x28) Aug 26 18:23:57.549965: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.549968: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:57.549971: | in statetime_start() with no state Aug 26 18:23:57.549977: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:57.549983: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:57.549987: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.549991: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:57.549995: | find_next_host_connection returns test Aug 26 18:23:57.549998: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.550004: | find_next_host_connection returns empty Aug 26 18:23:57.550029: | creating state object #5 at 0x55f088ade460 Aug 26 18:23:57.550034: | State DB: adding IKEv1 state #5 in UNDEFINED Aug 26 18:23:57.550042: | pstats #5 ikev1.isakmp started Aug 26 18:23:57.550048: | #5 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:57.550055: | start processing: state #5 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:57.550059: | parent state #5: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:57.550063: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:57.550066: "test" #5: responding to Main Mode Aug 26 18:23:57.550072: | **emit ISAKMP Message: Aug 26 18:23:57.550075: | initiator cookie: Aug 26 18:23:57.550078: | ca ac 01 06 8c a1 c7 f7 Aug 26 18:23:57.550080: | responder cookie: Aug 26 18:23:57.550083: | 83 2e 78 05 94 f8 57 09 Aug 26 18:23:57.550086: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.550089: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.550092: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.550094: | flags: none (0x0) Aug 26 18:23:57.550097: | Message ID: 0 (0x0) Aug 26 18:23:57.550101: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.550104: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:57.550108: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:57.550111: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:57.550114: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.550117: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:57.550121: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:57.550124: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:57.550127: | ****parse IPsec DOI SIT: Aug 26 18:23:57.550129: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:57.550132: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:57.550135: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.550138: | length: 28 (0x1c) Aug 26 18:23:57.550140: | proposal number: 1 (0x1) Aug 26 18:23:57.550143: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:57.550146: | SPI size: 0 (0x0) Aug 26 18:23:57.550148: | number of transforms: 1 (0x1) Aug 26 18:23:57.550151: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.550154: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.550156: | length: 20 (0x14) Aug 26 18:23:57.550159: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:57.550162: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.550165: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.550168: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:57.550171: | length/value: 29 (0x1d) Aug 26 18:23:57.550176: "test" #5: 29?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:57.550180: "test" #5: no acceptable Oakley Transform Aug 26 18:23:57.550183: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:57.550189: | [RE]START processing: state #5 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:57.550193: | #5 is idle Aug 26 18:23:57.550282: "test" #5: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:57.550292: | **emit ISAKMP Message: Aug 26 18:23:57.550298: | initiator cookie: Aug 26 18:23:57.550301: | ca ac 01 06 8c a1 c7 f7 Aug 26 18:23:57.550304: | responder cookie: Aug 26 18:23:57.550306: | 83 2e 78 05 94 f8 57 09 Aug 26 18:23:57.550309: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.550312: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.550318: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:57.550321: | flags: none (0x0) Aug 26 18:23:57.550323: | Message ID: 0 (0x0) Aug 26 18:23:57.550326: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.550330: | ***emit ISAKMP Notification Payload: Aug 26 18:23:57.550333: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.550336: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.550338: | protocol ID: 1 (0x1) Aug 26 18:23:57.550341: | SPI size: 0 (0x0) Aug 26 18:23:57.550343: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:57.550347: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:57.550350: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:57.550353: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:57.550355: | emitting length of ISAKMP Message: 40 Aug 26 18:23:57.550363: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #5) Aug 26 18:23:57.550366: | ca ac 01 06 8c a1 c7 f7 83 2e 78 05 94 f8 57 09 Aug 26 18:23:57.550368: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:57.550370: | 00 00 00 01 01 00 00 0e Aug 26 18:23:57.550400: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:57.550406: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:57.550411: | stop processing: state #5 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:57.550415: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:57.550420: | spent 0.534 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:57.592870: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:57.592903: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:57.592908: | f7 07 b8 9c cc 19 b2 35 00 00 00 00 00 00 00 00 Aug 26 18:23:57.592911: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:57.592913: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:57.592916: | 00 00 00 14 01 01 00 00 80 01 00 1d 80 02 00 0b Aug 26 18:23:57.592918: | 80 03 00 0c Aug 26 18:23:57.592924: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:57.592929: | **parse ISAKMP Message: Aug 26 18:23:57.592932: | initiator cookie: Aug 26 18:23:57.592935: | f7 07 b8 9c cc 19 b2 35 Aug 26 18:23:57.592937: | responder cookie: Aug 26 18:23:57.592940: | 00 00 00 00 00 00 00 00 Aug 26 18:23:57.592943: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.592946: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.592948: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.592951: | flags: none (0x0) Aug 26 18:23:57.592954: | Message ID: 0 (0x0) Aug 26 18:23:57.592957: | length: 68 (0x44) Aug 26 18:23:57.592960: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:57.592964: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:57.592967: | #null state always idle Aug 26 18:23:57.592971: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:57.592974: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:57.592977: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.592980: | length: 40 (0x28) Aug 26 18:23:57.592982: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.592985: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:57.592988: | in statetime_start() with no state Aug 26 18:23:57.592994: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:57.592999: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:57.593006: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.593011: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:57.593013: | find_next_host_connection returns test Aug 26 18:23:57.593016: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.593019: | find_next_host_connection returns empty Aug 26 18:23:57.593044: | creating state object #6 at 0x55f088adef20 Aug 26 18:23:57.593049: | State DB: adding IKEv1 state #6 in UNDEFINED Aug 26 18:23:57.593053: | pstats #6 ikev1.isakmp started Aug 26 18:23:57.593058: | #6 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:57.593065: | start processing: state #6 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:57.593069: | parent state #6: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:57.593073: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:57.593076: "test" #6: responding to Main Mode Aug 26 18:23:57.593082: | **emit ISAKMP Message: Aug 26 18:23:57.593085: | initiator cookie: Aug 26 18:23:57.593087: | f7 07 b8 9c cc 19 b2 35 Aug 26 18:23:57.593090: | responder cookie: Aug 26 18:23:57.593093: | 9a ca 6b 7d c0 ac c0 94 Aug 26 18:23:57.593095: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.593098: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.593100: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.593103: | flags: none (0x0) Aug 26 18:23:57.593106: | Message ID: 0 (0x0) Aug 26 18:23:57.593109: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.593112: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:57.593115: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:57.593118: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:57.593121: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.593124: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:57.593128: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:57.593131: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:57.593134: | ****parse IPsec DOI SIT: Aug 26 18:23:57.593137: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:57.593140: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:57.593143: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.593146: | length: 28 (0x1c) Aug 26 18:23:57.593149: | proposal number: 1 (0x1) Aug 26 18:23:57.593151: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:57.593154: | SPI size: 0 (0x0) Aug 26 18:23:57.593157: | number of transforms: 1 (0x1) Aug 26 18:23:57.593160: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.593163: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.593165: | length: 20 (0x14) Aug 26 18:23:57.593168: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:57.593171: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.593174: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.593177: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:57.593180: | length/value: 29 (0x1d) Aug 26 18:23:57.593184: "test" #6: 29?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:57.593187: "test" #6: no acceptable Oakley Transform Aug 26 18:23:57.593191: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:57.593196: | [RE]START processing: state #6 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:57.593199: | #6 is idle Aug 26 18:23:57.593279: "test" #6: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:57.593287: | **emit ISAKMP Message: Aug 26 18:23:57.593297: | initiator cookie: Aug 26 18:23:57.593300: | f7 07 b8 9c cc 19 b2 35 Aug 26 18:23:57.593303: | responder cookie: Aug 26 18:23:57.593305: | 9a ca 6b 7d c0 ac c0 94 Aug 26 18:23:57.593308: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.593311: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.593314: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:57.593316: | flags: none (0x0) Aug 26 18:23:57.593319: | Message ID: 0 (0x0) Aug 26 18:23:57.593322: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.593325: | ***emit ISAKMP Notification Payload: Aug 26 18:23:57.593328: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.593331: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.593333: | protocol ID: 1 (0x1) Aug 26 18:23:57.593336: | SPI size: 0 (0x0) Aug 26 18:23:57.593339: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:57.593342: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:57.593345: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:57.593348: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:57.593351: | emitting length of ISAKMP Message: 40 Aug 26 18:23:57.593358: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #6) Aug 26 18:23:57.593361: | f7 07 b8 9c cc 19 b2 35 9a ca 6b 7d c0 ac c0 94 Aug 26 18:23:57.593363: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:57.593366: | 00 00 00 01 01 00 00 0e Aug 26 18:23:57.593389: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:57.593395: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:57.593401: | stop processing: state #6 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:57.593404: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:57.593410: | spent 0.492 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:57.639949: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:57.639978: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:57.639982: | e4 e1 8b 11 04 6d 0c b0 00 00 00 00 00 00 00 00 Aug 26 18:23:57.639985: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 18:23:57.639987: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 18:23:57.639990: | 00 00 00 18 01 01 00 00 80 01 00 12 80 02 00 06 Aug 26 18:23:57.639992: | 80 03 00 1f 80 04 00 08 Aug 26 18:23:57.639997: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:57.640002: | **parse ISAKMP Message: Aug 26 18:23:57.640005: | initiator cookie: Aug 26 18:23:57.640007: | e4 e1 8b 11 04 6d 0c b0 Aug 26 18:23:57.640010: | responder cookie: Aug 26 18:23:57.640012: | 00 00 00 00 00 00 00 00 Aug 26 18:23:57.640015: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.640018: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.640021: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.640024: | flags: none (0x0) Aug 26 18:23:57.640026: | Message ID: 0 (0x0) Aug 26 18:23:57.640029: | length: 72 (0x48) Aug 26 18:23:57.640032: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:57.640036: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:57.640039: | #null state always idle Aug 26 18:23:57.640043: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:57.640046: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:57.640049: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.640055: | length: 44 (0x2c) Aug 26 18:23:57.640058: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.640061: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:57.640063: | in statetime_start() with no state Aug 26 18:23:57.640070: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:57.640075: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:57.640079: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.640083: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:57.640085: | find_next_host_connection returns test Aug 26 18:23:57.640088: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.640091: | find_next_host_connection returns empty Aug 26 18:23:57.640115: | creating state object #7 at 0x55f088adf9e0 Aug 26 18:23:57.640119: | State DB: adding IKEv1 state #7 in UNDEFINED Aug 26 18:23:57.640123: | pstats #7 ikev1.isakmp started Aug 26 18:23:57.640128: | #7 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:57.640134: | start processing: state #7 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:57.640138: | parent state #7: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:57.640142: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:57.640145: "test" #7: responding to Main Mode Aug 26 18:23:57.640150: | **emit ISAKMP Message: Aug 26 18:23:57.640153: | initiator cookie: Aug 26 18:23:57.640155: | e4 e1 8b 11 04 6d 0c b0 Aug 26 18:23:57.640158: | responder cookie: Aug 26 18:23:57.640160: | 06 27 b2 a1 ff 2b 9a 58 Aug 26 18:23:57.640163: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.640166: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.640168: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.640171: | flags: none (0x0) Aug 26 18:23:57.640174: | Message ID: 0 (0x0) Aug 26 18:23:57.640177: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.640180: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:57.640183: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:57.640186: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:57.640188: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.640191: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:57.640195: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:57.640198: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:57.640201: | ****parse IPsec DOI SIT: Aug 26 18:23:57.640204: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:57.640207: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:57.640210: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.640212: | length: 32 (0x20) Aug 26 18:23:57.640215: | proposal number: 1 (0x1) Aug 26 18:23:57.640218: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:57.640220: | SPI size: 0 (0x0) Aug 26 18:23:57.640223: | number of transforms: 1 (0x1) Aug 26 18:23:57.640226: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.640229: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.640231: | length: 24 (0x18) Aug 26 18:23:57.640234: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:57.640237: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.640240: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.640243: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:57.640245: | length/value: 18 (0x12) Aug 26 18:23:57.640248: | [18 is OAKLEY_AES_GCM_A] Aug 26 18:23:57.640255: "test" #7: OAKLEY_AES_GCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:57.640259: "test" #7: no acceptable Oakley Transform Aug 26 18:23:57.640262: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:57.640267: | [RE]START processing: state #7 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:57.640270: | #7 is idle Aug 26 18:23:57.640357: "test" #7: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:57.640364: | **emit ISAKMP Message: Aug 26 18:23:57.640367: | initiator cookie: Aug 26 18:23:57.640369: | e4 e1 8b 11 04 6d 0c b0 Aug 26 18:23:57.640372: | responder cookie: Aug 26 18:23:57.640374: | 06 27 b2 a1 ff 2b 9a 58 Aug 26 18:23:57.640377: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.640380: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.640382: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:57.640385: | flags: none (0x0) Aug 26 18:23:57.640388: | Message ID: 0 (0x0) Aug 26 18:23:57.640391: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.640394: | ***emit ISAKMP Notification Payload: Aug 26 18:23:57.640396: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.640399: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.640402: | protocol ID: 1 (0x1) Aug 26 18:23:57.640404: | SPI size: 0 (0x0) Aug 26 18:23:57.640407: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:57.640410: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:57.640414: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:57.640417: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:57.640419: | emitting length of ISAKMP Message: 40 Aug 26 18:23:57.640426: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #7) Aug 26 18:23:57.640429: | e4 e1 8b 11 04 6d 0c b0 06 27 b2 a1 ff 2b 9a 58 Aug 26 18:23:57.640431: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:57.640434: | 00 00 00 01 01 00 00 0e Aug 26 18:23:57.640457: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:57.640463: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:57.640468: | stop processing: state #7 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:57.640471: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:57.640476: | spent 0.496 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:57.681089: | spent 0.00356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:57.681121: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:57.681125: | 00 65 84 a9 f5 35 29 a8 00 00 00 00 00 00 00 00 Aug 26 18:23:57.681128: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:57.681130: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:57.681133: | 00 00 00 14 01 01 00 00 80 02 00 06 80 03 00 1f Aug 26 18:23:57.681135: | 80 04 00 08 Aug 26 18:23:57.681141: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:57.681145: | **parse ISAKMP Message: Aug 26 18:23:57.681148: | initiator cookie: Aug 26 18:23:57.681151: | 00 65 84 a9 f5 35 29 a8 Aug 26 18:23:57.681153: | responder cookie: Aug 26 18:23:57.681155: | 00 00 00 00 00 00 00 00 Aug 26 18:23:57.681158: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.681160: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.681163: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.681166: | flags: none (0x0) Aug 26 18:23:57.681169: | Message ID: 0 (0x0) Aug 26 18:23:57.681175: | length: 68 (0x44) Aug 26 18:23:57.681178: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:57.681182: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:57.681184: | #null state always idle Aug 26 18:23:57.681188: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:57.681191: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:57.681194: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.681197: | length: 40 (0x28) Aug 26 18:23:57.681199: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.681202: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:57.681205: | in statetime_start() with no state Aug 26 18:23:57.681211: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:57.681216: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:57.681220: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.681223: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:57.681226: | find_next_host_connection returns test Aug 26 18:23:57.681229: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.681231: | find_next_host_connection returns empty Aug 26 18:23:57.681252: | creating state object #8 at 0x55f088ae04a0 Aug 26 18:23:57.681256: | State DB: adding IKEv1 state #8 in UNDEFINED Aug 26 18:23:57.681260: | pstats #8 ikev1.isakmp started Aug 26 18:23:57.681265: | #8 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:57.681272: | start processing: state #8 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:57.681275: | parent state #8: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:57.681279: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:57.681282: "test" #8: responding to Main Mode Aug 26 18:23:57.681287: | **emit ISAKMP Message: Aug 26 18:23:57.681297: | initiator cookie: Aug 26 18:23:57.681300: | 00 65 84 a9 f5 35 29 a8 Aug 26 18:23:57.681302: | responder cookie: Aug 26 18:23:57.681305: | 9b a8 04 42 1b 54 7d cd Aug 26 18:23:57.681307: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.681310: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.681313: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.681315: | flags: none (0x0) Aug 26 18:23:57.681318: | Message ID: 0 (0x0) Aug 26 18:23:57.681321: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.681324: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:57.681327: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:57.681330: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:57.681333: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.681336: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:57.681339: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:57.681342: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:57.681345: | ****parse IPsec DOI SIT: Aug 26 18:23:57.681348: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:57.681351: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:57.681354: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.681356: | length: 28 (0x1c) Aug 26 18:23:57.681359: | proposal number: 1 (0x1) Aug 26 18:23:57.681362: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:57.681364: | SPI size: 0 (0x0) Aug 26 18:23:57.681367: | number of transforms: 1 (0x1) Aug 26 18:23:57.681370: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.681375: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.681377: | length: 20 (0x14) Aug 26 18:23:57.681380: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:57.681382: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.681386: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.681389: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:23:57.681391: | length/value: 6 (0x6) Aug 26 18:23:57.681394: | [6 is OAKLEY_SHA2_512] Aug 26 18:23:57.681398: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.681400: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:23:57.681403: | length/value: 31 (0x1f) Aug 26 18:23:57.681407: "test" #8: Pluto does not support 31?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Aug 26 18:23:57.681410: "test" #8: no acceptable Oakley Transform Aug 26 18:23:57.681412: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:57.681417: | [RE]START processing: state #8 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:57.681420: | #8 is idle Aug 26 18:23:57.681501: "test" #8: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:57.681506: | **emit ISAKMP Message: Aug 26 18:23:57.681508: | initiator cookie: Aug 26 18:23:57.681511: | 00 65 84 a9 f5 35 29 a8 Aug 26 18:23:57.681513: | responder cookie: Aug 26 18:23:57.681516: | 9b a8 04 42 1b 54 7d cd Aug 26 18:23:57.681518: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.681521: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.681524: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:57.681526: | flags: none (0x0) Aug 26 18:23:57.681529: | Message ID: 0 (0x0) Aug 26 18:23:57.681532: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.681535: | ***emit ISAKMP Notification Payload: Aug 26 18:23:57.681537: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.681540: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.681542: | protocol ID: 1 (0x1) Aug 26 18:23:57.681545: | SPI size: 0 (0x0) Aug 26 18:23:57.681548: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:57.681551: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:57.681554: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:57.681557: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:57.681560: | emitting length of ISAKMP Message: 40 Aug 26 18:23:57.681566: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #8) Aug 26 18:23:57.681569: | 00 65 84 a9 f5 35 29 a8 9b a8 04 42 1b 54 7d cd Aug 26 18:23:57.681572: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:57.681574: | 00 00 00 01 01 00 00 0e Aug 26 18:23:57.681600: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:57.681606: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:57.681611: | stop processing: state #8 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:57.681614: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:57.681619: | spent 0.494 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:57.735646: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:57.735678: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:57.735683: | 35 b3 cb bd 00 67 dc 87 00 00 00 00 00 00 00 00 Aug 26 18:23:57.735686: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:57.735689: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:57.735692: | 00 00 00 14 01 01 00 00 80 01 00 12 80 03 00 1f Aug 26 18:23:57.735695: | 80 04 00 08 Aug 26 18:23:57.735705: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:57.735711: | **parse ISAKMP Message: Aug 26 18:23:57.735715: | initiator cookie: Aug 26 18:23:57.735718: | 35 b3 cb bd 00 67 dc 87 Aug 26 18:23:57.735721: | responder cookie: Aug 26 18:23:57.735724: | 00 00 00 00 00 00 00 00 Aug 26 18:23:57.735728: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.735732: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.735735: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.735739: | flags: none (0x0) Aug 26 18:23:57.735742: | Message ID: 0 (0x0) Aug 26 18:23:57.735745: | length: 68 (0x44) Aug 26 18:23:57.735750: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:57.735754: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:57.735758: | #null state always idle Aug 26 18:23:57.735762: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:57.735766: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:57.735769: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.735772: | length: 40 (0x28) Aug 26 18:23:57.735775: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.735779: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:57.735782: | in statetime_start() with no state Aug 26 18:23:57.735789: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:57.735795: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:57.735799: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.735804: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:57.735807: | find_next_host_connection returns test Aug 26 18:23:57.735810: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.735813: | find_next_host_connection returns empty Aug 26 18:23:57.735839: | creating state object #9 at 0x55f088ae0f60 Aug 26 18:23:57.735843: | State DB: adding IKEv1 state #9 in UNDEFINED Aug 26 18:23:57.735851: | pstats #9 ikev1.isakmp started Aug 26 18:23:57.735857: | #9 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:57.735866: | start processing: state #9 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:57.735870: | parent state #9: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:57.735874: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:57.735878: "test" #9: responding to Main Mode Aug 26 18:23:57.735884: | **emit ISAKMP Message: Aug 26 18:23:57.735888: | initiator cookie: Aug 26 18:23:57.735891: | 35 b3 cb bd 00 67 dc 87 Aug 26 18:23:57.735894: | responder cookie: Aug 26 18:23:57.735897: | 2a 81 3d b8 cf 70 a2 fb Aug 26 18:23:57.735901: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.735904: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.735908: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.735911: | flags: none (0x0) Aug 26 18:23:57.735914: | Message ID: 0 (0x0) Aug 26 18:23:57.735918: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.735922: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:57.735926: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:57.735929: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:57.735932: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.735937: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:57.735942: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:57.735946: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:57.735953: | ****parse IPsec DOI SIT: Aug 26 18:23:57.735957: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:57.735961: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:57.735964: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.735967: | length: 28 (0x1c) Aug 26 18:23:57.735970: | proposal number: 1 (0x1) Aug 26 18:23:57.735973: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:57.735976: | SPI size: 0 (0x0) Aug 26 18:23:57.735979: | number of transforms: 1 (0x1) Aug 26 18:23:57.735983: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.735986: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.735990: | length: 20 (0x14) Aug 26 18:23:57.735993: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:57.735996: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.735999: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.736003: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:57.736006: | length/value: 18 (0x12) Aug 26 18:23:57.736009: | [18 is OAKLEY_AES_GCM_A] Aug 26 18:23:57.736014: "test" #9: OAKLEY_AES_GCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:57.736017: "test" #9: no acceptable Oakley Transform Aug 26 18:23:57.736021: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:57.736027: | [RE]START processing: state #9 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:57.736031: | #9 is idle Aug 26 18:23:57.736657: "test" #9: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:57.736670: | **emit ISAKMP Message: Aug 26 18:23:57.736674: | initiator cookie: Aug 26 18:23:57.736677: | 35 b3 cb bd 00 67 dc 87 Aug 26 18:23:57.736680: | responder cookie: Aug 26 18:23:57.736682: | 2a 81 3d b8 cf 70 a2 fb Aug 26 18:23:57.736685: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.736688: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.736691: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:57.736694: | flags: none (0x0) Aug 26 18:23:57.736696: | Message ID: 0 (0x0) Aug 26 18:23:57.736699: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.736703: | ***emit ISAKMP Notification Payload: Aug 26 18:23:57.736706: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.736708: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.736711: | protocol ID: 1 (0x1) Aug 26 18:23:57.736714: | SPI size: 0 (0x0) Aug 26 18:23:57.736716: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:57.736719: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:57.736722: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:57.736725: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:57.736728: | emitting length of ISAKMP Message: 40 Aug 26 18:23:57.736735: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #9) Aug 26 18:23:57.736738: | 35 b3 cb bd 00 67 dc 87 2a 81 3d b8 cf 70 a2 fb Aug 26 18:23:57.736741: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:57.736743: | 00 00 00 01 01 00 00 0e Aug 26 18:23:57.736779: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:57.736787: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:57.736793: | stop processing: state #9 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:57.736797: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:57.736805: | spent 0.591 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:57.786974: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:57.787006: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:57.787012: | f5 f0 09 ff 44 56 cb 74 00 00 00 00 00 00 00 00 Aug 26 18:23:57.787015: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:57.787017: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:57.787020: | 00 00 00 14 01 01 00 00 80 01 00 12 80 02 00 06 Aug 26 18:23:57.787023: | 80 04 00 08 Aug 26 18:23:57.787029: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:57.787034: | **parse ISAKMP Message: Aug 26 18:23:57.787037: | initiator cookie: Aug 26 18:23:57.787040: | f5 f0 09 ff 44 56 cb 74 Aug 26 18:23:57.787042: | responder cookie: Aug 26 18:23:57.787045: | 00 00 00 00 00 00 00 00 Aug 26 18:23:57.787048: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.787051: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.787055: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.787058: | flags: none (0x0) Aug 26 18:23:57.787061: | Message ID: 0 (0x0) Aug 26 18:23:57.787064: | length: 68 (0x44) Aug 26 18:23:57.787068: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:57.787072: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:57.787075: | #null state always idle Aug 26 18:23:57.787079: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:57.787083: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:57.787086: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.787089: | length: 40 (0x28) Aug 26 18:23:57.787091: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.787095: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:57.787098: | in statetime_start() with no state Aug 26 18:23:57.787104: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:57.787110: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:57.787114: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.787118: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:57.787121: | find_next_host_connection returns test Aug 26 18:23:57.787124: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.787127: | find_next_host_connection returns empty Aug 26 18:23:57.787153: | creating state object #10 at 0x55f088ae1a20 Aug 26 18:23:57.787157: | State DB: adding IKEv1 state #10 in UNDEFINED Aug 26 18:23:57.787163: | pstats #10 ikev1.isakmp started Aug 26 18:23:57.787168: | #10 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:57.787175: | start processing: state #10 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:57.787179: | parent state #10: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:57.787183: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:57.787186: "test" #10: responding to Main Mode Aug 26 18:23:57.787191: | **emit ISAKMP Message: Aug 26 18:23:57.787194: | initiator cookie: Aug 26 18:23:57.787197: | f5 f0 09 ff 44 56 cb 74 Aug 26 18:23:57.787199: | responder cookie: Aug 26 18:23:57.787202: | c9 2a b5 26 a3 5e 6c 72 Aug 26 18:23:57.787204: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.787207: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.787210: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.787213: | flags: none (0x0) Aug 26 18:23:57.787215: | Message ID: 0 (0x0) Aug 26 18:23:57.787219: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.787222: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:57.787225: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:57.787228: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:57.787233: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.787236: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:57.787240: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:57.787243: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:57.787247: | ****parse IPsec DOI SIT: Aug 26 18:23:57.787250: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:57.787253: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:57.787256: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.787258: | length: 28 (0x1c) Aug 26 18:23:57.787261: | proposal number: 1 (0x1) Aug 26 18:23:57.787263: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:57.787266: | SPI size: 0 (0x0) Aug 26 18:23:57.787269: | number of transforms: 1 (0x1) Aug 26 18:23:57.787272: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.787274: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.787277: | length: 20 (0x14) Aug 26 18:23:57.787280: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:57.787282: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.787285: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.787293: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:57.787298: | length/value: 18 (0x12) Aug 26 18:23:57.787301: | [18 is OAKLEY_AES_GCM_A] Aug 26 18:23:57.787305: "test" #10: OAKLEY_AES_GCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:57.787308: "test" #10: no acceptable Oakley Transform Aug 26 18:23:57.787312: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:57.787317: | [RE]START processing: state #10 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:57.787320: | #10 is idle Aug 26 18:23:57.787409: "test" #10: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:57.787415: | **emit ISAKMP Message: Aug 26 18:23:57.787418: | initiator cookie: Aug 26 18:23:57.787421: | f5 f0 09 ff 44 56 cb 74 Aug 26 18:23:57.787423: | responder cookie: Aug 26 18:23:57.787426: | c9 2a b5 26 a3 5e 6c 72 Aug 26 18:23:57.787429: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.787432: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.787435: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:57.787437: | flags: none (0x0) Aug 26 18:23:57.787440: | Message ID: 0 (0x0) Aug 26 18:23:57.787443: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.787447: | ***emit ISAKMP Notification Payload: Aug 26 18:23:57.787450: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.787452: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.787455: | protocol ID: 1 (0x1) Aug 26 18:23:57.787458: | SPI size: 0 (0x0) Aug 26 18:23:57.787460: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:57.787464: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:57.787468: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:57.787471: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:57.787474: | emitting length of ISAKMP Message: 40 Aug 26 18:23:57.787482: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #10) Aug 26 18:23:57.787485: | f5 f0 09 ff 44 56 cb 74 c9 2a b5 26 a3 5e 6c 72 Aug 26 18:23:57.787488: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:57.787491: | 00 00 00 01 01 00 00 0e Aug 26 18:23:57.787515: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:57.787522: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:57.787530: | stop processing: state #10 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:57.787534: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:57.787541: | spent 0.527 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:57.846249: | spent 0.00333 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:57.846285: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:57.846294: | d1 95 1e 5f 76 20 84 4d 00 00 00 00 00 00 00 00 Aug 26 18:23:57.846298: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:57.846300: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:57.846303: | 00 00 00 14 01 01 00 00 80 01 00 12 80 02 00 06 Aug 26 18:23:57.846306: | 80 03 00 1f Aug 26 18:23:57.846312: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:57.846316: | **parse ISAKMP Message: Aug 26 18:23:57.846320: | initiator cookie: Aug 26 18:23:57.846322: | d1 95 1e 5f 76 20 84 4d Aug 26 18:23:57.846325: | responder cookie: Aug 26 18:23:57.846328: | 00 00 00 00 00 00 00 00 Aug 26 18:23:57.846331: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.846334: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.846337: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.846340: | flags: none (0x0) Aug 26 18:23:57.846343: | Message ID: 0 (0x0) Aug 26 18:23:57.846346: | length: 68 (0x44) Aug 26 18:23:57.846350: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:57.846354: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:57.846357: | #null state always idle Aug 26 18:23:57.846361: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:57.846364: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:57.846367: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.846370: | length: 40 (0x28) Aug 26 18:23:57.846373: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.846376: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:57.846379: | in statetime_start() with no state Aug 26 18:23:57.846385: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:57.846392: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:57.846395: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.846399: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:57.846403: | find_next_host_connection returns test Aug 26 18:23:57.846406: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.846409: | find_next_host_connection returns empty Aug 26 18:23:57.846430: | creating state object #11 at 0x55f088ae24e0 Aug 26 18:23:57.846434: | State DB: adding IKEv1 state #11 in UNDEFINED Aug 26 18:23:57.846441: | pstats #11 ikev1.isakmp started Aug 26 18:23:57.846446: | #11 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:57.846453: | start processing: state #11 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:57.846457: | parent state #11: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:57.846461: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:57.846464: "test" #11: responding to Main Mode Aug 26 18:23:57.846470: | **emit ISAKMP Message: Aug 26 18:23:57.846473: | initiator cookie: Aug 26 18:23:57.846476: | d1 95 1e 5f 76 20 84 4d Aug 26 18:23:57.846478: | responder cookie: Aug 26 18:23:57.846481: | 95 38 a9 b1 e3 2c 56 0f Aug 26 18:23:57.846484: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.846487: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.846494: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.846497: | flags: none (0x0) Aug 26 18:23:57.846500: | Message ID: 0 (0x0) Aug 26 18:23:57.846503: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.846507: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:57.846510: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:57.846513: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:57.846516: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.846520: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:57.846523: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:57.846527: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:57.846530: | ****parse IPsec DOI SIT: Aug 26 18:23:57.846533: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:57.846537: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:57.846540: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.846543: | length: 28 (0x1c) Aug 26 18:23:57.846546: | proposal number: 1 (0x1) Aug 26 18:23:57.846549: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:57.846552: | SPI size: 0 (0x0) Aug 26 18:23:57.846555: | number of transforms: 1 (0x1) Aug 26 18:23:57.846558: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.846561: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.846564: | length: 20 (0x14) Aug 26 18:23:57.846566: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:57.846569: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.846572: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.846576: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:57.846579: | length/value: 18 (0x12) Aug 26 18:23:57.846582: | [18 is OAKLEY_AES_GCM_A] Aug 26 18:23:57.846586: "test" #11: OAKLEY_AES_GCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:57.846589: "test" #11: no acceptable Oakley Transform Aug 26 18:23:57.846592: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:57.846598: | [RE]START processing: state #11 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:57.846601: | #11 is idle Aug 26 18:23:57.846698: "test" #11: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:57.846703: | **emit ISAKMP Message: Aug 26 18:23:57.846706: | initiator cookie: Aug 26 18:23:57.846709: | d1 95 1e 5f 76 20 84 4d Aug 26 18:23:57.846711: | responder cookie: Aug 26 18:23:57.846714: | 95 38 a9 b1 e3 2c 56 0f Aug 26 18:23:57.846717: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.846720: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.846723: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:57.846726: | flags: none (0x0) Aug 26 18:23:57.846729: | Message ID: 0 (0x0) Aug 26 18:23:57.846732: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.846735: | ***emit ISAKMP Notification Payload: Aug 26 18:23:57.846738: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.846741: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.846744: | protocol ID: 1 (0x1) Aug 26 18:23:57.846747: | SPI size: 0 (0x0) Aug 26 18:23:57.846750: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:57.846754: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:57.846757: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:57.846760: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:57.846764: | emitting length of ISAKMP Message: 40 Aug 26 18:23:57.846772: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #11) Aug 26 18:23:57.846776: | d1 95 1e 5f 76 20 84 4d 95 38 a9 b1 e3 2c 56 0f Aug 26 18:23:57.846779: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:57.846781: | 00 00 00 01 01 00 00 0e Aug 26 18:23:57.846809: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:57.846816: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:57.846822: | stop processing: state #11 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:57.846825: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:57.846831: | spent 0.535 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:57.887410: | spent 0.00351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:57.887435: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:57.887439: | f0 f0 5d 5d 2f ea 44 ac 00 00 00 00 00 00 00 00 Aug 26 18:23:57.887441: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 18:23:57.887444: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 18:23:57.887446: | 00 00 00 18 01 01 00 00 80 01 00 13 80 02 00 16 Aug 26 18:23:57.887449: | 80 03 00 15 80 04 00 01 Aug 26 18:23:57.887454: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:57.887458: | **parse ISAKMP Message: Aug 26 18:23:57.887461: | initiator cookie: Aug 26 18:23:57.887463: | f0 f0 5d 5d 2f ea 44 ac Aug 26 18:23:57.887466: | responder cookie: Aug 26 18:23:57.887468: | 00 00 00 00 00 00 00 00 Aug 26 18:23:57.887471: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.887474: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.887477: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.887480: | flags: none (0x0) Aug 26 18:23:57.887482: | Message ID: 0 (0x0) Aug 26 18:23:57.887485: | length: 72 (0x48) Aug 26 18:23:57.887488: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:57.887492: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:57.887495: | #null state always idle Aug 26 18:23:57.887498: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:57.887502: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:57.887504: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.887507: | length: 44 (0x2c) Aug 26 18:23:57.887509: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.887512: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:57.887515: | in statetime_start() with no state Aug 26 18:23:57.887520: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:57.887526: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:57.887529: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.887532: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:57.887535: | find_next_host_connection returns test Aug 26 18:23:57.887538: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.887540: | find_next_host_connection returns empty Aug 26 18:23:57.887561: | creating state object #12 at 0x55f088ae2fa0 Aug 26 18:23:57.887565: | State DB: adding IKEv1 state #12 in UNDEFINED Aug 26 18:23:57.887569: | pstats #12 ikev1.isakmp started Aug 26 18:23:57.887573: | #12 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:57.887579: | start processing: state #12 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:57.887583: | parent state #12: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:57.887587: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:57.887592: "test" #12: responding to Main Mode Aug 26 18:23:57.887597: | **emit ISAKMP Message: Aug 26 18:23:57.887600: | initiator cookie: Aug 26 18:23:57.887602: | f0 f0 5d 5d 2f ea 44 ac Aug 26 18:23:57.887605: | responder cookie: Aug 26 18:23:57.887607: | be 05 21 45 4f e5 ad 66 Aug 26 18:23:57.887610: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.887613: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.887615: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.887618: | flags: none (0x0) Aug 26 18:23:57.887620: | Message ID: 0 (0x0) Aug 26 18:23:57.887623: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.887626: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:57.887630: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:57.887632: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:57.887635: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.887638: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:57.887641: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:57.887644: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:57.887648: | ****parse IPsec DOI SIT: Aug 26 18:23:57.887650: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:57.887653: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:57.887656: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.887658: | length: 32 (0x20) Aug 26 18:23:57.887661: | proposal number: 1 (0x1) Aug 26 18:23:57.887664: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:57.887666: | SPI size: 0 (0x0) Aug 26 18:23:57.887669: | number of transforms: 1 (0x1) Aug 26 18:23:57.887671: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.887674: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.887677: | length: 24 (0x18) Aug 26 18:23:57.887679: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:57.887682: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.887685: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.887688: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:57.887690: | length/value: 19 (0x13) Aug 26 18:23:57.887693: | [19 is OAKLEY_AES_GCM_B] Aug 26 18:23:57.887697: "test" #12: OAKLEY_AES_GCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:57.887700: "test" #12: no acceptable Oakley Transform Aug 26 18:23:57.887703: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:57.887708: | [RE]START processing: state #12 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:57.887710: | #12 is idle Aug 26 18:23:57.887788: "test" #12: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:57.887792: | **emit ISAKMP Message: Aug 26 18:23:57.887795: | initiator cookie: Aug 26 18:23:57.887797: | f0 f0 5d 5d 2f ea 44 ac Aug 26 18:23:57.887800: | responder cookie: Aug 26 18:23:57.887802: | be 05 21 45 4f e5 ad 66 Aug 26 18:23:57.887805: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.887807: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.887810: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:57.887813: | flags: none (0x0) Aug 26 18:23:57.887815: | Message ID: 0 (0x0) Aug 26 18:23:57.887818: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.887821: | ***emit ISAKMP Notification Payload: Aug 26 18:23:57.887823: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.887826: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.887828: | protocol ID: 1 (0x1) Aug 26 18:23:57.887831: | SPI size: 0 (0x0) Aug 26 18:23:57.887835: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:57.887839: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:57.887842: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:57.887845: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:57.887847: | emitting length of ISAKMP Message: 40 Aug 26 18:23:57.887853: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #12) Aug 26 18:23:57.887856: | f0 f0 5d 5d 2f ea 44 ac be 05 21 45 4f e5 ad 66 Aug 26 18:23:57.887859: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:57.887861: | 00 00 00 01 01 00 00 0e Aug 26 18:23:57.887888: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:57.887894: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:57.887899: | stop processing: state #12 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:57.887903: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:57.887908: | spent 0.469 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:57.948135: | spent 0.00343 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:57.948171: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:57.948176: | 92 3e 05 7c ce 53 0b 5a 00 00 00 00 00 00 00 00 Aug 26 18:23:57.948178: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:57.948181: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:57.948184: | 00 00 00 14 01 01 00 00 80 02 00 16 80 03 00 15 Aug 26 18:23:57.948186: | 80 04 00 01 Aug 26 18:23:57.948192: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:57.948197: | **parse ISAKMP Message: Aug 26 18:23:57.948200: | initiator cookie: Aug 26 18:23:57.948203: | 92 3e 05 7c ce 53 0b 5a Aug 26 18:23:57.948205: | responder cookie: Aug 26 18:23:57.948208: | 00 00 00 00 00 00 00 00 Aug 26 18:23:57.948211: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.948214: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.948217: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.948220: | flags: none (0x0) Aug 26 18:23:57.948222: | Message ID: 0 (0x0) Aug 26 18:23:57.948225: | length: 68 (0x44) Aug 26 18:23:57.948228: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:57.948232: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:57.948235: | #null state always idle Aug 26 18:23:57.948239: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:57.948242: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:57.948245: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.948248: | length: 40 (0x28) Aug 26 18:23:57.948250: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.948254: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:57.948256: | in statetime_start() with no state Aug 26 18:23:57.948262: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:57.948268: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:57.948271: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.948276: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:57.948279: | find_next_host_connection returns test Aug 26 18:23:57.948282: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.948284: | find_next_host_connection returns empty Aug 26 18:23:57.948320: | creating state object #13 at 0x55f088ae3a60 Aug 26 18:23:57.948328: | State DB: adding IKEv1 state #13 in UNDEFINED Aug 26 18:23:57.948338: | pstats #13 ikev1.isakmp started Aug 26 18:23:57.948344: | #13 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:57.948350: | start processing: state #13 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:57.948354: | parent state #13: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:57.948357: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:57.948360: "test" #13: responding to Main Mode Aug 26 18:23:57.948365: | **emit ISAKMP Message: Aug 26 18:23:57.948368: | initiator cookie: Aug 26 18:23:57.948371: | 92 3e 05 7c ce 53 0b 5a Aug 26 18:23:57.948373: | responder cookie: Aug 26 18:23:57.948375: | fa 9d 9d 4e 11 08 d7 04 Aug 26 18:23:57.948378: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.948380: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.948383: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.948385: | flags: none (0x0) Aug 26 18:23:57.948388: | Message ID: 0 (0x0) Aug 26 18:23:57.948391: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.948394: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:57.948397: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:57.948399: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:57.948402: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.948405: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:57.948408: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:57.948411: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:57.948414: | ****parse IPsec DOI SIT: Aug 26 18:23:57.948417: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:57.948420: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:57.948423: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.948426: | length: 28 (0x1c) Aug 26 18:23:57.948428: | proposal number: 1 (0x1) Aug 26 18:23:57.948431: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:57.948433: | SPI size: 0 (0x0) Aug 26 18:23:57.948435: | number of transforms: 1 (0x1) Aug 26 18:23:57.948439: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.948441: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.948444: | length: 20 (0x14) Aug 26 18:23:57.948447: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:57.948449: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.948452: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.948455: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:23:57.948458: | length/value: 22 (0x16) Aug 26 18:23:57.948463: "test" #13: 22?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Aug 26 18:23:57.948466: "test" #13: no acceptable Oakley Transform Aug 26 18:23:57.948469: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:57.948474: | [RE]START processing: state #13 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:57.948477: | #13 is idle Aug 26 18:23:57.948570: "test" #13: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:57.948575: | **emit ISAKMP Message: Aug 26 18:23:57.948579: | initiator cookie: Aug 26 18:23:57.948581: | 92 3e 05 7c ce 53 0b 5a Aug 26 18:23:57.948584: | responder cookie: Aug 26 18:23:57.948587: | fa 9d 9d 4e 11 08 d7 04 Aug 26 18:23:57.948590: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.948593: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.948595: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:57.948598: | flags: none (0x0) Aug 26 18:23:57.948603: | Message ID: 0 (0x0) Aug 26 18:23:57.948606: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.948609: | ***emit ISAKMP Notification Payload: Aug 26 18:23:57.948612: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.948615: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.948617: | protocol ID: 1 (0x1) Aug 26 18:23:57.948620: | SPI size: 0 (0x0) Aug 26 18:23:57.948622: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:57.948626: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:57.948629: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:57.948632: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:57.948635: | emitting length of ISAKMP Message: 40 Aug 26 18:23:57.948642: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #13) Aug 26 18:23:57.948645: | 92 3e 05 7c ce 53 0b 5a fa 9d 9d 4e 11 08 d7 04 Aug 26 18:23:57.948647: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:57.948649: | 00 00 00 01 01 00 00 0e Aug 26 18:23:57.948680: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:57.948686: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:57.948692: | stop processing: state #13 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:57.948695: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:57.948700: | spent 0.514 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:57.980987: | spent 0.003 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:57.981020: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:57.981024: | 2e 9f f3 be ca ff 1d 00 00 00 00 00 00 00 00 00 Aug 26 18:23:57.981026: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:57.981029: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:57.981032: | 00 00 00 14 01 01 00 00 80 01 00 13 80 03 00 15 Aug 26 18:23:57.981034: | 80 04 00 01 Aug 26 18:23:57.981040: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:57.981045: | **parse ISAKMP Message: Aug 26 18:23:57.981048: | initiator cookie: Aug 26 18:23:57.981050: | 2e 9f f3 be ca ff 1d 00 Aug 26 18:23:57.981053: | responder cookie: Aug 26 18:23:57.981055: | 00 00 00 00 00 00 00 00 Aug 26 18:23:57.981058: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.981061: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.981064: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.981067: | flags: none (0x0) Aug 26 18:23:57.981070: | Message ID: 0 (0x0) Aug 26 18:23:57.981072: | length: 68 (0x44) Aug 26 18:23:57.981076: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:57.981080: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:57.981083: | #null state always idle Aug 26 18:23:57.981086: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:57.981090: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:57.981092: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.981095: | length: 40 (0x28) Aug 26 18:23:57.981098: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.981101: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:57.981104: | in statetime_start() with no state Aug 26 18:23:57.981110: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:57.981115: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:57.981118: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.981126: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:57.981129: | find_next_host_connection returns test Aug 26 18:23:57.981132: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:57.981135: | find_next_host_connection returns empty Aug 26 18:23:57.981157: | creating state object #14 at 0x55f088ae4520 Aug 26 18:23:57.981161: | State DB: adding IKEv1 state #14 in UNDEFINED Aug 26 18:23:57.981166: | pstats #14 ikev1.isakmp started Aug 26 18:23:57.981171: | #14 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:57.981177: | start processing: state #14 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:57.981181: | parent state #14: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:57.981185: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:57.981188: "test" #14: responding to Main Mode Aug 26 18:23:57.981194: | **emit ISAKMP Message: Aug 26 18:23:57.981196: | initiator cookie: Aug 26 18:23:57.981199: | 2e 9f f3 be ca ff 1d 00 Aug 26 18:23:57.981202: | responder cookie: Aug 26 18:23:57.981204: | 18 5c 4d 8b c2 c4 47 c5 Aug 26 18:23:57.981207: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:57.981210: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.981212: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:57.981215: | flags: none (0x0) Aug 26 18:23:57.981218: | Message ID: 0 (0x0) Aug 26 18:23:57.981221: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.981224: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:57.981227: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:57.981230: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:57.981233: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.981236: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:57.981239: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:57.981243: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:57.981246: | ****parse IPsec DOI SIT: Aug 26 18:23:57.981249: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:57.981252: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:57.981255: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.981257: | length: 28 (0x1c) Aug 26 18:23:57.981260: | proposal number: 1 (0x1) Aug 26 18:23:57.981263: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:57.981266: | SPI size: 0 (0x0) Aug 26 18:23:57.981268: | number of transforms: 1 (0x1) Aug 26 18:23:57.981271: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:57.981274: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.981277: | length: 20 (0x14) Aug 26 18:23:57.981279: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:57.981282: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:57.981285: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:57.981292: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:57.981297: | length/value: 19 (0x13) Aug 26 18:23:57.981301: | [19 is OAKLEY_AES_GCM_B] Aug 26 18:23:57.981305: "test" #14: OAKLEY_AES_GCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:57.981307: "test" #14: no acceptable Oakley Transform Aug 26 18:23:57.981310: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:57.981316: | [RE]START processing: state #14 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:57.981318: | #14 is idle Aug 26 18:23:57.981386: "test" #14: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:57.981391: | **emit ISAKMP Message: Aug 26 18:23:57.981396: | initiator cookie: Aug 26 18:23:57.981399: | 2e 9f f3 be ca ff 1d 00 Aug 26 18:23:57.981402: | responder cookie: Aug 26 18:23:57.981404: | 18 5c 4d 8b c2 c4 47 c5 Aug 26 18:23:57.981407: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.981410: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:57.981412: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:57.981415: | flags: none (0x0) Aug 26 18:23:57.981418: | Message ID: 0 (0x0) Aug 26 18:23:57.981421: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:57.981424: | ***emit ISAKMP Notification Payload: Aug 26 18:23:57.981427: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:57.981430: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:57.981432: | protocol ID: 1 (0x1) Aug 26 18:23:57.981435: | SPI size: 0 (0x0) Aug 26 18:23:57.981438: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:57.981441: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:57.981445: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:57.981448: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:57.981451: | emitting length of ISAKMP Message: 40 Aug 26 18:23:57.981457: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #14) Aug 26 18:23:57.981460: | 2e 9f f3 be ca ff 1d 00 18 5c 4d 8b c2 c4 47 c5 Aug 26 18:23:57.981463: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:57.981465: | 00 00 00 01 01 00 00 0e Aug 26 18:23:57.981493: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:57.981500: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:57.981506: | stop processing: state #14 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:57.981509: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:57.981515: | spent 0.49 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.030173: | spent 0.00329 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.030207: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.030211: | 47 f3 8b 00 b2 a7 f2 b9 00 00 00 00 00 00 00 00 Aug 26 18:23:58.030214: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.030217: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.030219: | 00 00 00 14 01 01 00 00 80 01 00 13 80 02 00 16 Aug 26 18:23:58.030222: | 80 04 00 01 Aug 26 18:23:58.030227: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.030232: | **parse ISAKMP Message: Aug 26 18:23:58.030235: | initiator cookie: Aug 26 18:23:58.030237: | 47 f3 8b 00 b2 a7 f2 b9 Aug 26 18:23:58.030240: | responder cookie: Aug 26 18:23:58.030242: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.030246: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.030249: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.030252: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.030254: | flags: none (0x0) Aug 26 18:23:58.030257: | Message ID: 0 (0x0) Aug 26 18:23:58.030260: | length: 68 (0x44) Aug 26 18:23:58.030263: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.030267: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.030270: | #null state always idle Aug 26 18:23:58.030274: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.030277: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.030279: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.030282: | length: 40 (0x28) Aug 26 18:23:58.030285: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.030320: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.030326: | in statetime_start() with no state Aug 26 18:23:58.030332: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.030338: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.030341: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.030345: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.030348: | find_next_host_connection returns test Aug 26 18:23:58.030350: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.030353: | find_next_host_connection returns empty Aug 26 18:23:58.030379: | creating state object #15 at 0x55f088ae4fe0 Aug 26 18:23:58.030383: | State DB: adding IKEv1 state #15 in UNDEFINED Aug 26 18:23:58.030387: | pstats #15 ikev1.isakmp started Aug 26 18:23:58.030391: | #15 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.030396: | start processing: state #15 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.030399: | parent state #15: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.030402: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.030405: "test" #15: responding to Main Mode Aug 26 18:23:58.030410: | **emit ISAKMP Message: Aug 26 18:23:58.030412: | initiator cookie: Aug 26 18:23:58.030414: | 47 f3 8b 00 b2 a7 f2 b9 Aug 26 18:23:58.030417: | responder cookie: Aug 26 18:23:58.030418: | 1b 1d 45 77 94 11 ae 5e Aug 26 18:23:58.030421: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.030423: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.030425: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.030427: | flags: none (0x0) Aug 26 18:23:58.030429: | Message ID: 0 (0x0) Aug 26 18:23:58.030432: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.030434: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.030437: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.030440: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.030442: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.030444: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.030447: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.030450: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.030453: | ****parse IPsec DOI SIT: Aug 26 18:23:58.030455: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.030458: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.030460: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.030462: | length: 28 (0x1c) Aug 26 18:23:58.030464: | proposal number: 1 (0x1) Aug 26 18:23:58.030467: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.030469: | SPI size: 0 (0x0) Aug 26 18:23:58.030471: | number of transforms: 1 (0x1) Aug 26 18:23:58.030474: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.030476: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.030478: | length: 20 (0x14) Aug 26 18:23:58.030480: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.030482: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.030485: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.030487: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.030489: | length/value: 19 (0x13) Aug 26 18:23:58.030492: | [19 is OAKLEY_AES_GCM_B] Aug 26 18:23:58.030495: "test" #15: OAKLEY_AES_GCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.030500: "test" #15: no acceptable Oakley Transform Aug 26 18:23:58.030502: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.030507: | [RE]START processing: state #15 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.030509: | #15 is idle Aug 26 18:23:58.030580: "test" #15: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.030584: | **emit ISAKMP Message: Aug 26 18:23:58.030587: | initiator cookie: Aug 26 18:23:58.030589: | 47 f3 8b 00 b2 a7 f2 b9 Aug 26 18:23:58.030592: | responder cookie: Aug 26 18:23:58.030594: | 1b 1d 45 77 94 11 ae 5e Aug 26 18:23:58.030596: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.030598: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.030601: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.030603: | flags: none (0x0) Aug 26 18:23:58.030605: | Message ID: 0 (0x0) Aug 26 18:23:58.030608: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.030611: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.030613: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.030616: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.030618: | protocol ID: 1 (0x1) Aug 26 18:23:58.030621: | SPI size: 0 (0x0) Aug 26 18:23:58.030623: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.030626: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.030629: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.030632: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.030634: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.030641: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #15) Aug 26 18:23:58.030644: | 47 f3 8b 00 b2 a7 f2 b9 1b 1d 45 77 94 11 ae 5e Aug 26 18:23:58.030646: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.030649: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.030665: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.030671: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.030675: | stop processing: state #15 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.030679: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.030684: | spent 0.461 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.069962: | spent 0.00375 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.069996: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.070000: | c3 e7 5e 3a 93 01 39 85 00 00 00 00 00 00 00 00 Aug 26 18:23:58.070003: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.070006: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.070009: | 00 00 00 14 01 01 00 00 80 01 00 13 80 02 00 16 Aug 26 18:23:58.070011: | 80 03 00 15 Aug 26 18:23:58.070016: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.070021: | **parse ISAKMP Message: Aug 26 18:23:58.070024: | initiator cookie: Aug 26 18:23:58.070027: | c3 e7 5e 3a 93 01 39 85 Aug 26 18:23:58.070029: | responder cookie: Aug 26 18:23:58.070032: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.070035: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.070038: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.070041: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.070044: | flags: none (0x0) Aug 26 18:23:58.070047: | Message ID: 0 (0x0) Aug 26 18:23:58.070050: | length: 68 (0x44) Aug 26 18:23:58.070053: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.070060: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.070064: | #null state always idle Aug 26 18:23:58.070067: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.070071: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.070074: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.070077: | length: 40 (0x28) Aug 26 18:23:58.070079: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.070082: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.070085: | in statetime_start() with no state Aug 26 18:23:58.070091: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.070097: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.070100: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.070104: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.070107: | find_next_host_connection returns test Aug 26 18:23:58.070110: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.070113: | find_next_host_connection returns empty Aug 26 18:23:58.070139: | creating state object #16 at 0x55f088ae5aa0 Aug 26 18:23:58.070143: | State DB: adding IKEv1 state #16 in UNDEFINED Aug 26 18:23:58.070148: | pstats #16 ikev1.isakmp started Aug 26 18:23:58.070153: | #16 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.070160: | start processing: state #16 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.070164: | parent state #16: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.070168: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.070171: "test" #16: responding to Main Mode Aug 26 18:23:58.070176: | **emit ISAKMP Message: Aug 26 18:23:58.070179: | initiator cookie: Aug 26 18:23:58.070182: | c3 e7 5e 3a 93 01 39 85 Aug 26 18:23:58.070184: | responder cookie: Aug 26 18:23:58.070187: | 45 e2 45 77 a6 ad 6a b5 Aug 26 18:23:58.070190: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.070192: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.070195: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.070198: | flags: none (0x0) Aug 26 18:23:58.070201: | Message ID: 0 (0x0) Aug 26 18:23:58.070204: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.070207: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.070211: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.070213: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.070216: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.070219: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.070223: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.070226: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.070229: | ****parse IPsec DOI SIT: Aug 26 18:23:58.070232: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.070235: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.070238: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.070241: | length: 28 (0x1c) Aug 26 18:23:58.070244: | proposal number: 1 (0x1) Aug 26 18:23:58.070247: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.070249: | SPI size: 0 (0x0) Aug 26 18:23:58.070252: | number of transforms: 1 (0x1) Aug 26 18:23:58.070255: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.070258: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.070262: | length: 20 (0x14) Aug 26 18:23:58.070265: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.070268: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.070271: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.070274: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.070277: | length/value: 19 (0x13) Aug 26 18:23:58.070280: | [19 is OAKLEY_AES_GCM_B] Aug 26 18:23:58.070284: "test" #16: OAKLEY_AES_GCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.070287: "test" #16: no acceptable Oakley Transform Aug 26 18:23:58.070297: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.070302: | [RE]START processing: state #16 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.070305: | #16 is idle Aug 26 18:23:58.070775: "test" #16: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.070784: | **emit ISAKMP Message: Aug 26 18:23:58.070787: | initiator cookie: Aug 26 18:23:58.070790: | c3 e7 5e 3a 93 01 39 85 Aug 26 18:23:58.070793: | responder cookie: Aug 26 18:23:58.070795: | 45 e2 45 77 a6 ad 6a b5 Aug 26 18:23:58.070798: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.070801: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.070804: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.070807: | flags: none (0x0) Aug 26 18:23:58.070810: | Message ID: 0 (0x0) Aug 26 18:23:58.070813: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.070816: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.070819: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.070822: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.070825: | protocol ID: 1 (0x1) Aug 26 18:23:58.070828: | SPI size: 0 (0x0) Aug 26 18:23:58.070830: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.070834: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.070837: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.070841: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.070843: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.070850: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #16) Aug 26 18:23:58.070853: | c3 e7 5e 3a 93 01 39 85 45 e2 45 77 a6 ad 6a b5 Aug 26 18:23:58.070856: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.070858: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.070889: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.070897: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.070902: | stop processing: state #16 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.070906: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.070912: | spent 0.909 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.111361: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.111388: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.111392: | 26 56 f6 a9 98 27 88 c9 00 00 00 00 00 00 00 00 Aug 26 18:23:58.111395: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 18:23:58.111398: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 18:23:58.111400: | 00 00 00 18 01 01 00 00 80 01 00 12 80 02 00 11 Aug 26 18:23:58.111403: | 80 03 00 16 80 04 00 15 Aug 26 18:23:58.111408: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.111413: | **parse ISAKMP Message: Aug 26 18:23:58.111416: | initiator cookie: Aug 26 18:23:58.111418: | 26 56 f6 a9 98 27 88 c9 Aug 26 18:23:58.111424: | responder cookie: Aug 26 18:23:58.111426: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.111429: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.111432: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.111435: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.111437: | flags: none (0x0) Aug 26 18:23:58.111440: | Message ID: 0 (0x0) Aug 26 18:23:58.111443: | length: 72 (0x48) Aug 26 18:23:58.111445: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.111450: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.111452: | #null state always idle Aug 26 18:23:58.111456: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.111459: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.111462: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.111464: | length: 44 (0x2c) Aug 26 18:23:58.111466: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.111469: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.111471: | in statetime_start() with no state Aug 26 18:23:58.111477: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.111482: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.111485: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.111489: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.111491: | find_next_host_connection returns test Aug 26 18:23:58.111494: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.111496: | find_next_host_connection returns empty Aug 26 18:23:58.111522: | creating state object #17 at 0x55f088ae6560 Aug 26 18:23:58.111526: | State DB: adding IKEv1 state #17 in UNDEFINED Aug 26 18:23:58.111533: | pstats #17 ikev1.isakmp started Aug 26 18:23:58.111538: | #17 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.111544: | start processing: state #17 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.111548: | parent state #17: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.111551: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.111555: "test" #17: responding to Main Mode Aug 26 18:23:58.111560: | **emit ISAKMP Message: Aug 26 18:23:58.111563: | initiator cookie: Aug 26 18:23:58.111566: | 26 56 f6 a9 98 27 88 c9 Aug 26 18:23:58.111568: | responder cookie: Aug 26 18:23:58.111570: | 2e 09 4e ca 87 ba 8c 01 Aug 26 18:23:58.111573: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.111576: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.111578: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.111581: | flags: none (0x0) Aug 26 18:23:58.111583: | Message ID: 0 (0x0) Aug 26 18:23:58.111586: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.111589: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.111592: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.111595: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.111597: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.111600: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.111603: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.111606: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.111610: | ****parse IPsec DOI SIT: Aug 26 18:23:58.111613: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.111615: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.111620: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.111623: | length: 32 (0x20) Aug 26 18:23:58.111626: | proposal number: 1 (0x1) Aug 26 18:23:58.111628: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.111630: | SPI size: 0 (0x0) Aug 26 18:23:58.111633: | number of transforms: 1 (0x1) Aug 26 18:23:58.111636: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.111638: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.111640: | length: 24 (0x18) Aug 26 18:23:58.111643: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.111645: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.111648: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.111650: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.111653: | length/value: 18 (0x12) Aug 26 18:23:58.111655: | [18 is OAKLEY_AES_GCM_A] Aug 26 18:23:58.111659: "test" #17: OAKLEY_AES_GCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.111662: "test" #17: no acceptable Oakley Transform Aug 26 18:23:58.111665: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.111670: | [RE]START processing: state #17 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.111673: | #17 is idle Aug 26 18:23:58.111744: "test" #17: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.111750: | **emit ISAKMP Message: Aug 26 18:23:58.111753: | initiator cookie: Aug 26 18:23:58.111756: | 26 56 f6 a9 98 27 88 c9 Aug 26 18:23:58.111758: | responder cookie: Aug 26 18:23:58.111761: | 2e 09 4e ca 87 ba 8c 01 Aug 26 18:23:58.111764: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.111767: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.111769: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.111772: | flags: none (0x0) Aug 26 18:23:58.111775: | Message ID: 0 (0x0) Aug 26 18:23:58.111778: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.111781: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.111784: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.111787: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.111790: | protocol ID: 1 (0x1) Aug 26 18:23:58.111792: | SPI size: 0 (0x0) Aug 26 18:23:58.111795: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.111798: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.111802: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.111805: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.111808: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.111815: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #17) Aug 26 18:23:58.111819: | 26 56 f6 a9 98 27 88 c9 2e 09 4e ca 87 ba 8c 01 Aug 26 18:23:58.111821: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.111824: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.111842: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.111848: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.111854: | stop processing: state #17 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.111857: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.111864: | spent 0.484 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.153729: | spent 0.00383 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.153757: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.153762: | a4 85 27 5a e4 56 a8 0b 00 00 00 00 00 00 00 00 Aug 26 18:23:58.153765: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.153771: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.153774: | 00 00 00 14 01 01 00 00 80 02 00 11 80 03 00 16 Aug 26 18:23:58.153777: | 80 04 00 15 Aug 26 18:23:58.153783: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.153788: | **parse ISAKMP Message: Aug 26 18:23:58.153791: | initiator cookie: Aug 26 18:23:58.153794: | a4 85 27 5a e4 56 a8 0b Aug 26 18:23:58.153797: | responder cookie: Aug 26 18:23:58.153799: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.153803: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.153806: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.153809: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.153812: | flags: none (0x0) Aug 26 18:23:58.153815: | Message ID: 0 (0x0) Aug 26 18:23:58.153818: | length: 68 (0x44) Aug 26 18:23:58.153822: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.153826: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.153829: | #null state always idle Aug 26 18:23:58.153833: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.153837: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.153840: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.153843: | length: 40 (0x28) Aug 26 18:23:58.153846: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.153849: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.153852: | in statetime_start() with no state Aug 26 18:23:58.153858: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.153864: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.153868: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.153872: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.153875: | find_next_host_connection returns test Aug 26 18:23:58.153878: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.153881: | find_next_host_connection returns empty Aug 26 18:23:58.153902: | creating state object #18 at 0x55f088ae7020 Aug 26 18:23:58.153906: | State DB: adding IKEv1 state #18 in UNDEFINED Aug 26 18:23:58.153911: | pstats #18 ikev1.isakmp started Aug 26 18:23:58.153916: | #18 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.153923: | start processing: state #18 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.153927: | parent state #18: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.153931: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.153934: "test" #18: responding to Main Mode Aug 26 18:23:58.153940: | **emit ISAKMP Message: Aug 26 18:23:58.153943: | initiator cookie: Aug 26 18:23:58.153946: | a4 85 27 5a e4 56 a8 0b Aug 26 18:23:58.153948: | responder cookie: Aug 26 18:23:58.153951: | 5d 4e 2d ba 80 bb 52 a5 Aug 26 18:23:58.153954: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.153957: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.153960: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.153963: | flags: none (0x0) Aug 26 18:23:58.153966: | Message ID: 0 (0x0) Aug 26 18:23:58.153969: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.153972: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.153976: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.153979: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.153982: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.153985: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.153991: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.153994: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.153998: | ****parse IPsec DOI SIT: Aug 26 18:23:58.154001: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.154004: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.154007: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.154010: | length: 28 (0x1c) Aug 26 18:23:58.154013: | proposal number: 1 (0x1) Aug 26 18:23:58.154016: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.154019: | SPI size: 0 (0x0) Aug 26 18:23:58.154022: | number of transforms: 1 (0x1) Aug 26 18:23:58.154025: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.154028: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.154031: | length: 20 (0x14) Aug 26 18:23:58.154034: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.154037: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.154040: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.154044: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:23:58.154046: | length/value: 17 (0x11) Aug 26 18:23:58.154051: "test" #18: 17?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Aug 26 18:23:58.154055: "test" #18: no acceptable Oakley Transform Aug 26 18:23:58.154058: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.154063: | [RE]START processing: state #18 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.154066: | #18 is idle Aug 26 18:23:58.155257: "test" #18: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.155270: | **emit ISAKMP Message: Aug 26 18:23:58.155274: | initiator cookie: Aug 26 18:23:58.155276: | a4 85 27 5a e4 56 a8 0b Aug 26 18:23:58.155279: | responder cookie: Aug 26 18:23:58.155281: | 5d 4e 2d ba 80 bb 52 a5 Aug 26 18:23:58.155284: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.155291: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.155295: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.155298: | flags: none (0x0) Aug 26 18:23:58.155301: | Message ID: 0 (0x0) Aug 26 18:23:58.155304: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.155307: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.155310: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.155313: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.155316: | protocol ID: 1 (0x1) Aug 26 18:23:58.155318: | SPI size: 0 (0x0) Aug 26 18:23:58.155321: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.155324: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.155327: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.155330: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.155333: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.155340: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #18) Aug 26 18:23:58.155343: | a4 85 27 5a e4 56 a8 0b 5d 4e 2d ba 80 bb 52 a5 Aug 26 18:23:58.155345: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.155348: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.155387: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.155393: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.155399: | stop processing: state #18 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.155403: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.155412: | spent 0.547 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.209762: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.209790: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.209794: | c1 bb bf 58 5e d9 4b b3 00 00 00 00 00 00 00 00 Aug 26 18:23:58.209797: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.209799: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.209802: | 00 00 00 14 01 01 00 00 80 01 00 12 80 03 00 16 Aug 26 18:23:58.209804: | 80 04 00 15 Aug 26 18:23:58.209810: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.209814: | **parse ISAKMP Message: Aug 26 18:23:58.209817: | initiator cookie: Aug 26 18:23:58.209820: | c1 bb bf 58 5e d9 4b b3 Aug 26 18:23:58.209822: | responder cookie: Aug 26 18:23:58.209825: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.209828: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.209831: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.209833: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.209837: | flags: none (0x0) Aug 26 18:23:58.209839: | Message ID: 0 (0x0) Aug 26 18:23:58.209842: | length: 68 (0x44) Aug 26 18:23:58.209845: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.209849: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.209852: | #null state always idle Aug 26 18:23:58.209855: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.209859: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.209861: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.209864: | length: 40 (0x28) Aug 26 18:23:58.209867: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.209870: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.209872: | in statetime_start() with no state Aug 26 18:23:58.209878: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.209883: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.209886: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.209890: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.209893: | find_next_host_connection returns test Aug 26 18:23:58.209896: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.209899: | find_next_host_connection returns empty Aug 26 18:23:58.209923: | creating state object #19 at 0x55f088ae7ae0 Aug 26 18:23:58.209927: | State DB: adding IKEv1 state #19 in UNDEFINED Aug 26 18:23:58.209931: | pstats #19 ikev1.isakmp started Aug 26 18:23:58.209936: | #19 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.209942: | start processing: state #19 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.209946: | parent state #19: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.209949: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.209953: "test" #19: responding to Main Mode Aug 26 18:23:58.209958: | **emit ISAKMP Message: Aug 26 18:23:58.209961: | initiator cookie: Aug 26 18:23:58.209963: | c1 bb bf 58 5e d9 4b b3 Aug 26 18:23:58.209966: | responder cookie: Aug 26 18:23:58.209968: | 75 1c dd 87 ba 97 00 de Aug 26 18:23:58.209971: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.209973: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.209976: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.209979: | flags: none (0x0) Aug 26 18:23:58.209981: | Message ID: 0 (0x0) Aug 26 18:23:58.209984: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.209987: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.209993: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.209996: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.209999: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.210002: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.210005: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.210008: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.210012: | ****parse IPsec DOI SIT: Aug 26 18:23:58.210015: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.210018: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.210020: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.210023: | length: 28 (0x1c) Aug 26 18:23:58.210026: | proposal number: 1 (0x1) Aug 26 18:23:58.210028: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.210031: | SPI size: 0 (0x0) Aug 26 18:23:58.210033: | number of transforms: 1 (0x1) Aug 26 18:23:58.210036: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.210039: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.210041: | length: 20 (0x14) Aug 26 18:23:58.210044: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.210046: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.210049: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.210052: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.210055: | length/value: 18 (0x12) Aug 26 18:23:58.210058: | [18 is OAKLEY_AES_GCM_A] Aug 26 18:23:58.210062: "test" #19: OAKLEY_AES_GCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.210064: "test" #19: no acceptable Oakley Transform Aug 26 18:23:58.210067: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.210072: | [RE]START processing: state #19 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.210075: | #19 is idle Aug 26 18:23:58.210142: "test" #19: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.210146: | **emit ISAKMP Message: Aug 26 18:23:58.210149: | initiator cookie: Aug 26 18:23:58.210152: | c1 bb bf 58 5e d9 4b b3 Aug 26 18:23:58.210154: | responder cookie: Aug 26 18:23:58.210156: | 75 1c dd 87 ba 97 00 de Aug 26 18:23:58.210159: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.210162: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.210164: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.210167: | flags: none (0x0) Aug 26 18:23:58.210169: | Message ID: 0 (0x0) Aug 26 18:23:58.210172: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.210175: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.210178: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.210181: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.210183: | protocol ID: 1 (0x1) Aug 26 18:23:58.210186: | SPI size: 0 (0x0) Aug 26 18:23:58.210188: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.210192: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.210195: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.210198: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.210201: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.210207: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #19) Aug 26 18:23:58.210210: | c1 bb bf 58 5e d9 4b b3 75 1c dd 87 ba 97 00 de Aug 26 18:23:58.210212: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.210217: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.210238: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.210244: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.210249: | stop processing: state #19 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.210252: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.210258: | spent 0.47 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.257760: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.257791: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.257797: | 6c 8a 09 03 14 76 2a 9e 00 00 00 00 00 00 00 00 Aug 26 18:23:58.257800: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.257802: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.257805: | 00 00 00 14 01 01 00 00 80 01 00 12 80 02 00 11 Aug 26 18:23:58.257808: | 80 04 00 15 Aug 26 18:23:58.257813: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.257818: | **parse ISAKMP Message: Aug 26 18:23:58.257821: | initiator cookie: Aug 26 18:23:58.257824: | 6c 8a 09 03 14 76 2a 9e Aug 26 18:23:58.257826: | responder cookie: Aug 26 18:23:58.257828: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.257831: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.257834: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.257837: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.257840: | flags: none (0x0) Aug 26 18:23:58.257843: | Message ID: 0 (0x0) Aug 26 18:23:58.257845: | length: 68 (0x44) Aug 26 18:23:58.257849: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.257853: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.257855: | #null state always idle Aug 26 18:23:58.257859: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.257862: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.257865: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.257868: | length: 40 (0x28) Aug 26 18:23:58.257870: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.257873: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.257876: | in statetime_start() with no state Aug 26 18:23:58.257882: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.257888: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.257891: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.257895: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.257898: | find_next_host_connection returns test Aug 26 18:23:58.257901: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.257904: | find_next_host_connection returns empty Aug 26 18:23:58.257933: | creating state object #20 at 0x55f088ae85a0 Aug 26 18:23:58.257937: | State DB: adding IKEv1 state #20 in UNDEFINED Aug 26 18:23:58.257942: | pstats #20 ikev1.isakmp started Aug 26 18:23:58.257948: | #20 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.257955: | start processing: state #20 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.257960: | parent state #20: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.257964: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.257967: "test" #20: responding to Main Mode Aug 26 18:23:58.257974: | **emit ISAKMP Message: Aug 26 18:23:58.257977: | initiator cookie: Aug 26 18:23:58.257980: | 6c 8a 09 03 14 76 2a 9e Aug 26 18:23:58.257982: | responder cookie: Aug 26 18:23:58.257985: | e7 ff 50 8f 21 a6 86 1d Aug 26 18:23:58.257992: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.257996: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.257999: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.258001: | flags: none (0x0) Aug 26 18:23:58.258004: | Message ID: 0 (0x0) Aug 26 18:23:58.258007: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.258010: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.258014: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.258018: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.258021: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.258024: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.258028: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.258031: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.258034: | ****parse IPsec DOI SIT: Aug 26 18:23:58.258037: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.258040: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.258042: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.258045: | length: 28 (0x1c) Aug 26 18:23:58.258047: | proposal number: 1 (0x1) Aug 26 18:23:58.258050: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.258053: | SPI size: 0 (0x0) Aug 26 18:23:58.258055: | number of transforms: 1 (0x1) Aug 26 18:23:58.258058: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.258061: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.258063: | length: 20 (0x14) Aug 26 18:23:58.258066: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.258068: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.258072: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.258075: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.258077: | length/value: 18 (0x12) Aug 26 18:23:58.258080: | [18 is OAKLEY_AES_GCM_A] Aug 26 18:23:58.258084: "test" #20: OAKLEY_AES_GCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.258087: "test" #20: no acceptable Oakley Transform Aug 26 18:23:58.258090: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.258095: | [RE]START processing: state #20 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.258099: | #20 is idle Aug 26 18:23:58.258183: "test" #20: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.258188: | **emit ISAKMP Message: Aug 26 18:23:58.258191: | initiator cookie: Aug 26 18:23:58.258193: | 6c 8a 09 03 14 76 2a 9e Aug 26 18:23:58.258196: | responder cookie: Aug 26 18:23:58.258198: | e7 ff 50 8f 21 a6 86 1d Aug 26 18:23:58.258201: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.258204: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.258207: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.258209: | flags: none (0x0) Aug 26 18:23:58.258212: | Message ID: 0 (0x0) Aug 26 18:23:58.258215: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.258218: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.258221: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.258223: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.258226: | protocol ID: 1 (0x1) Aug 26 18:23:58.258228: | SPI size: 0 (0x0) Aug 26 18:23:58.258231: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.258234: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.258238: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.258243: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.258246: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.258253: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #20) Aug 26 18:23:58.258256: | 6c 8a 09 03 14 76 2a 9e e7 ff 50 8f 21 a6 86 1d Aug 26 18:23:58.258258: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.258261: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.258294: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.258303: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.258308: | stop processing: state #20 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.258311: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.258317: | spent 0.514 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.292487: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.292519: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.292524: | aa 1e c1 9f 53 d9 f6 e6 00 00 00 00 00 00 00 00 Aug 26 18:23:58.292526: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.292529: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.292531: | 00 00 00 14 01 01 00 00 80 01 00 12 80 02 00 11 Aug 26 18:23:58.292534: | 80 03 00 16 Aug 26 18:23:58.292539: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.292544: | **parse ISAKMP Message: Aug 26 18:23:58.292547: | initiator cookie: Aug 26 18:23:58.292550: | aa 1e c1 9f 53 d9 f6 e6 Aug 26 18:23:58.292553: | responder cookie: Aug 26 18:23:58.292555: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.292558: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.292561: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.292564: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.292566: | flags: none (0x0) Aug 26 18:23:58.292569: | Message ID: 0 (0x0) Aug 26 18:23:58.292571: | length: 68 (0x44) Aug 26 18:23:58.292575: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.292579: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.292582: | #null state always idle Aug 26 18:23:58.292586: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.292589: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.292592: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.292594: | length: 40 (0x28) Aug 26 18:23:58.292597: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.292600: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.292603: | in statetime_start() with no state Aug 26 18:23:58.292609: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.292615: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.292619: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.292623: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.292625: | find_next_host_connection returns test Aug 26 18:23:58.292628: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.292631: | find_next_host_connection returns empty Aug 26 18:23:58.292656: | creating state object #21 at 0x55f088ae9060 Aug 26 18:23:58.292661: | State DB: adding IKEv1 state #21 in UNDEFINED Aug 26 18:23:58.292666: | pstats #21 ikev1.isakmp started Aug 26 18:23:58.292671: | #21 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.292678: | start processing: state #21 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.292686: | parent state #21: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.292690: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.292694: "test" #21: responding to Main Mode Aug 26 18:23:58.292699: | **emit ISAKMP Message: Aug 26 18:23:58.292703: | initiator cookie: Aug 26 18:23:58.292706: | aa 1e c1 9f 53 d9 f6 e6 Aug 26 18:23:58.292708: | responder cookie: Aug 26 18:23:58.292711: | b6 4a 42 be 21 8f 95 53 Aug 26 18:23:58.292714: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.292717: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.292720: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.292722: | flags: none (0x0) Aug 26 18:23:58.292725: | Message ID: 0 (0x0) Aug 26 18:23:58.292728: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.292731: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.292735: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.292738: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.292741: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.292744: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.292748: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.292751: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.292755: | ****parse IPsec DOI SIT: Aug 26 18:23:58.292758: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.292761: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.292764: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.292767: | length: 28 (0x1c) Aug 26 18:23:58.292769: | proposal number: 1 (0x1) Aug 26 18:23:58.292772: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.292775: | SPI size: 0 (0x0) Aug 26 18:23:58.292777: | number of transforms: 1 (0x1) Aug 26 18:23:58.292781: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.292784: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.292786: | length: 20 (0x14) Aug 26 18:23:58.292789: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.292792: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.292795: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.292798: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.292801: | length/value: 18 (0x12) Aug 26 18:23:58.292804: | [18 is OAKLEY_AES_GCM_A] Aug 26 18:23:58.292809: "test" #21: OAKLEY_AES_GCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.292812: "test" #21: no acceptable Oakley Transform Aug 26 18:23:58.292815: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.292820: | [RE]START processing: state #21 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.292823: | #21 is idle Aug 26 18:23:58.292921: "test" #21: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.292926: | **emit ISAKMP Message: Aug 26 18:23:58.292929: | initiator cookie: Aug 26 18:23:58.292932: | aa 1e c1 9f 53 d9 f6 e6 Aug 26 18:23:58.292934: | responder cookie: Aug 26 18:23:58.292936: | b6 4a 42 be 21 8f 95 53 Aug 26 18:23:58.292939: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.292942: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.292945: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.292947: | flags: none (0x0) Aug 26 18:23:58.292950: | Message ID: 0 (0x0) Aug 26 18:23:58.292953: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.292956: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.292959: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.292964: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.292966: | protocol ID: 1 (0x1) Aug 26 18:23:58.292969: | SPI size: 0 (0x0) Aug 26 18:23:58.292971: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.292974: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.292977: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.292980: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.292983: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.292989: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #21) Aug 26 18:23:58.292991: | aa 1e c1 9f 53 d9 f6 e6 b6 4a 42 be 21 8f 95 53 Aug 26 18:23:58.292994: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.292996: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.293028: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.293035: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.293040: | stop processing: state #21 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.293044: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.293050: | spent 0.521 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.344241: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.344278: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.344282: | e9 61 d8 96 0c 4a 41 7f 00 00 00 00 00 00 00 00 Aug 26 18:23:58.344285: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 18:23:58.344292: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 18:23:58.344296: | 00 00 00 18 01 01 00 00 80 01 00 02 80 02 00 0c Aug 26 18:23:58.344299: | 80 03 00 1e 80 04 00 20 Aug 26 18:23:58.344304: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.344309: | **parse ISAKMP Message: Aug 26 18:23:58.344312: | initiator cookie: Aug 26 18:23:58.344314: | e9 61 d8 96 0c 4a 41 7f Aug 26 18:23:58.344317: | responder cookie: Aug 26 18:23:58.344319: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.344322: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.344324: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.344327: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.344330: | flags: none (0x0) Aug 26 18:23:58.344332: | Message ID: 0 (0x0) Aug 26 18:23:58.344335: | length: 72 (0x48) Aug 26 18:23:58.344337: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.344341: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.344344: | #null state always idle Aug 26 18:23:58.344348: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.344351: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.344353: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.344356: | length: 44 (0x2c) Aug 26 18:23:58.344358: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.344360: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.344363: | in statetime_start() with no state Aug 26 18:23:58.344368: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.344373: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.344376: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.344380: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.344383: | find_next_host_connection returns test Aug 26 18:23:58.344386: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.344392: | find_next_host_connection returns empty Aug 26 18:23:58.344422: | creating state object #22 at 0x55f088ae9b20 Aug 26 18:23:58.344425: | State DB: adding IKEv1 state #22 in UNDEFINED Aug 26 18:23:58.344430: | pstats #22 ikev1.isakmp started Aug 26 18:23:58.344435: | #22 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.344441: | start processing: state #22 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.344444: | parent state #22: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.344448: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.344451: "test" #22: responding to Main Mode Aug 26 18:23:58.344455: | **emit ISAKMP Message: Aug 26 18:23:58.344458: | initiator cookie: Aug 26 18:23:58.344460: | e9 61 d8 96 0c 4a 41 7f Aug 26 18:23:58.344462: | responder cookie: Aug 26 18:23:58.344465: | e9 24 f4 c5 bc 03 82 0a Aug 26 18:23:58.344467: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.344469: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.344472: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.344474: | flags: none (0x0) Aug 26 18:23:58.344477: | Message ID: 0 (0x0) Aug 26 18:23:58.344479: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.344482: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.344485: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.344487: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.344490: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.344493: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.344496: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.344498: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.344502: | ****parse IPsec DOI SIT: Aug 26 18:23:58.344505: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.344508: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.344510: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.344512: | length: 32 (0x20) Aug 26 18:23:58.344515: | proposal number: 1 (0x1) Aug 26 18:23:58.344517: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.344519: | SPI size: 0 (0x0) Aug 26 18:23:58.344522: | number of transforms: 1 (0x1) Aug 26 18:23:58.344525: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.344527: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.344529: | length: 24 (0x18) Aug 26 18:23:58.344532: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.344534: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.344537: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.344539: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.344542: | length/value: 2 (0x2) Aug 26 18:23:58.344545: | [2 is OAKLEY_IDEA_CBC(UNUSED)] Aug 26 18:23:58.344549: "test" #22: OAKLEY_IDEA_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.344551: "test" #22: no acceptable Oakley Transform Aug 26 18:23:58.344555: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.344559: | [RE]START processing: state #22 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.344561: | #22 is idle Aug 26 18:23:58.344629: "test" #22: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.344634: | **emit ISAKMP Message: Aug 26 18:23:58.344636: | initiator cookie: Aug 26 18:23:58.344639: | e9 61 d8 96 0c 4a 41 7f Aug 26 18:23:58.344641: | responder cookie: Aug 26 18:23:58.344643: | e9 24 f4 c5 bc 03 82 0a Aug 26 18:23:58.344646: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.344650: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.344653: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.344656: | flags: none (0x0) Aug 26 18:23:58.344658: | Message ID: 0 (0x0) Aug 26 18:23:58.344661: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.344664: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.344666: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.344669: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.344671: | protocol ID: 1 (0x1) Aug 26 18:23:58.344673: | SPI size: 0 (0x0) Aug 26 18:23:58.344676: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.344678: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.344681: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.344684: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.344686: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.344692: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #22) Aug 26 18:23:58.344694: | e9 61 d8 96 0c 4a 41 7f e9 24 f4 c5 bc 03 82 0a Aug 26 18:23:58.344697: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.344699: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.344726: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.344732: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.344736: | stop processing: state #22 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.344739: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.344745: | spent 0.462 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.398783: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.398814: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.398819: | e3 2b 4c 18 56 49 d7 a5 00 00 00 00 00 00 00 00 Aug 26 18:23:58.398822: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.398824: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.398827: | 00 00 00 14 01 01 00 00 80 02 00 0c 80 03 00 1e Aug 26 18:23:58.398829: | 80 04 00 20 Aug 26 18:23:58.398834: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.398839: | **parse ISAKMP Message: Aug 26 18:23:58.398842: | initiator cookie: Aug 26 18:23:58.398845: | e3 2b 4c 18 56 49 d7 a5 Aug 26 18:23:58.398847: | responder cookie: Aug 26 18:23:58.398850: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.398853: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.398856: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.398859: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.398862: | flags: none (0x0) Aug 26 18:23:58.398865: | Message ID: 0 (0x0) Aug 26 18:23:58.398868: | length: 68 (0x44) Aug 26 18:23:58.398871: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.398875: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.398879: | #null state always idle Aug 26 18:23:58.398882: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.398885: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.398888: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.398891: | length: 40 (0x28) Aug 26 18:23:58.398894: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.398897: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.398899: | in statetime_start() with no state Aug 26 18:23:58.398905: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.398915: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.398918: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.398922: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.398925: | find_next_host_connection returns test Aug 26 18:23:58.398928: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.398931: | find_next_host_connection returns empty Aug 26 18:23:58.398953: | creating state object #23 at 0x55f088aea5e0 Aug 26 18:23:58.398957: | State DB: adding IKEv1 state #23 in UNDEFINED Aug 26 18:23:58.398962: | pstats #23 ikev1.isakmp started Aug 26 18:23:58.398967: | #23 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.398973: | start processing: state #23 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.398978: | parent state #23: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.398981: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.398984: "test" #23: responding to Main Mode Aug 26 18:23:58.398990: | **emit ISAKMP Message: Aug 26 18:23:58.398993: | initiator cookie: Aug 26 18:23:58.398996: | e3 2b 4c 18 56 49 d7 a5 Aug 26 18:23:58.398999: | responder cookie: Aug 26 18:23:58.399001: | 85 de 44 24 44 bd 68 9d Aug 26 18:23:58.399004: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.399007: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.399009: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.399012: | flags: none (0x0) Aug 26 18:23:58.399015: | Message ID: 0 (0x0) Aug 26 18:23:58.399018: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.399021: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.399024: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.399027: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.399029: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.399033: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.399036: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.399039: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.399043: | ****parse IPsec DOI SIT: Aug 26 18:23:58.399046: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.399049: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.399052: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.399055: | length: 28 (0x1c) Aug 26 18:23:58.399057: | proposal number: 1 (0x1) Aug 26 18:23:58.399060: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.399063: | SPI size: 0 (0x0) Aug 26 18:23:58.399065: | number of transforms: 1 (0x1) Aug 26 18:23:58.399068: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.399071: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.399074: | length: 20 (0x14) Aug 26 18:23:58.399076: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.399079: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.399082: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.399085: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:23:58.399088: | length/value: 12 (0xc) Aug 26 18:23:58.399092: "test" #23: 12?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Aug 26 18:23:58.399095: "test" #23: no acceptable Oakley Transform Aug 26 18:23:58.399099: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.399104: | [RE]START processing: state #23 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.399109: | #23 is idle Aug 26 18:23:58.399630: "test" #23: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.399642: | **emit ISAKMP Message: Aug 26 18:23:58.399646: | initiator cookie: Aug 26 18:23:58.399648: | e3 2b 4c 18 56 49 d7 a5 Aug 26 18:23:58.399651: | responder cookie: Aug 26 18:23:58.399653: | 85 de 44 24 44 bd 68 9d Aug 26 18:23:58.399656: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.399659: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.399662: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.399665: | flags: none (0x0) Aug 26 18:23:58.399667: | Message ID: 0 (0x0) Aug 26 18:23:58.399670: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.399673: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.399676: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.399679: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.399681: | protocol ID: 1 (0x1) Aug 26 18:23:58.399684: | SPI size: 0 (0x0) Aug 26 18:23:58.399687: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.399690: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.399693: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.399696: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.399699: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.399706: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #23) Aug 26 18:23:58.399709: | e3 2b 4c 18 56 49 d7 a5 85 de 44 24 44 bd 68 9d Aug 26 18:23:58.399712: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.399714: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.399747: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.399754: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.399759: | stop processing: state #23 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.399762: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.399768: | spent 0.946 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.442187: | spent 0.00409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.442217: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.442222: | ed 5b a9 af bd 06 a1 60 00 00 00 00 00 00 00 00 Aug 26 18:23:58.442225: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.442228: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.442230: | 00 00 00 14 01 01 00 00 80 01 00 02 80 03 00 1e Aug 26 18:23:58.442232: | 80 04 00 20 Aug 26 18:23:58.442238: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.442242: | **parse ISAKMP Message: Aug 26 18:23:58.442245: | initiator cookie: Aug 26 18:23:58.442248: | ed 5b a9 af bd 06 a1 60 Aug 26 18:23:58.442250: | responder cookie: Aug 26 18:23:58.442252: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.442256: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.442259: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.442262: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.442264: | flags: none (0x0) Aug 26 18:23:58.442267: | Message ID: 0 (0x0) Aug 26 18:23:58.442270: | length: 68 (0x44) Aug 26 18:23:58.442273: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.442277: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.442280: | #null state always idle Aug 26 18:23:58.442284: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.442287: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.442306: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.442309: | length: 40 (0x28) Aug 26 18:23:58.442311: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.442314: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.442316: | in statetime_start() with no state Aug 26 18:23:58.442323: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.442328: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.442332: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.442336: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.442338: | find_next_host_connection returns test Aug 26 18:23:58.442341: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.442344: | find_next_host_connection returns empty Aug 26 18:23:58.442367: | creating state object #24 at 0x55f088aeb0a0 Aug 26 18:23:58.442371: | State DB: adding IKEv1 state #24 in UNDEFINED Aug 26 18:23:58.442375: | pstats #24 ikev1.isakmp started Aug 26 18:23:58.442380: | #24 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.442386: | start processing: state #24 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.442390: | parent state #24: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.442394: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.442397: "test" #24: responding to Main Mode Aug 26 18:23:58.442402: | **emit ISAKMP Message: Aug 26 18:23:58.442405: | initiator cookie: Aug 26 18:23:58.442407: | ed 5b a9 af bd 06 a1 60 Aug 26 18:23:58.442410: | responder cookie: Aug 26 18:23:58.442412: | 4e 8c a5 96 6a 9e f5 db Aug 26 18:23:58.442415: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.442418: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.442420: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.442423: | flags: none (0x0) Aug 26 18:23:58.442426: | Message ID: 0 (0x0) Aug 26 18:23:58.442429: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.442432: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.442435: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.442438: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.442440: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.442444: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.442447: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.442450: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.442454: | ****parse IPsec DOI SIT: Aug 26 18:23:58.442456: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.442459: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.442462: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.442465: | length: 28 (0x1c) Aug 26 18:23:58.442467: | proposal number: 1 (0x1) Aug 26 18:23:58.442470: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.442473: | SPI size: 0 (0x0) Aug 26 18:23:58.442475: | number of transforms: 1 (0x1) Aug 26 18:23:58.442479: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.442481: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.442484: | length: 20 (0x14) Aug 26 18:23:58.442486: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.442489: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.442492: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.442495: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.442497: | length/value: 2 (0x2) Aug 26 18:23:58.442503: | [2 is OAKLEY_IDEA_CBC(UNUSED)] Aug 26 18:23:58.442507: "test" #24: OAKLEY_IDEA_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.442510: "test" #24: no acceptable Oakley Transform Aug 26 18:23:58.442513: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.442519: | [RE]START processing: state #24 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.442521: | #24 is idle Aug 26 18:23:58.443154: "test" #24: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.443163: | **emit ISAKMP Message: Aug 26 18:23:58.443167: | initiator cookie: Aug 26 18:23:58.443170: | ed 5b a9 af bd 06 a1 60 Aug 26 18:23:58.443173: | responder cookie: Aug 26 18:23:58.443175: | 4e 8c a5 96 6a 9e f5 db Aug 26 18:23:58.443178: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.443181: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.443184: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.443187: | flags: none (0x0) Aug 26 18:23:58.443189: | Message ID: 0 (0x0) Aug 26 18:23:58.443193: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.443196: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.443199: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.443202: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.443205: | protocol ID: 1 (0x1) Aug 26 18:23:58.443207: | SPI size: 0 (0x0) Aug 26 18:23:58.443210: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.443214: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.443217: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.443220: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.443223: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.443230: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #24) Aug 26 18:23:58.443233: | ed 5b a9 af bd 06 a1 60 4e 8c a5 96 6a 9e f5 db Aug 26 18:23:58.443235: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.443238: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.443274: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.443282: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.443298: | stop processing: state #24 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.443305: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.443311: | spent 0.515 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.486104: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.486131: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.486136: | 9c c1 ad 04 a2 d6 8b 23 00 00 00 00 00 00 00 00 Aug 26 18:23:58.486139: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.486141: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.486144: | 00 00 00 14 01 01 00 00 80 01 00 02 80 02 00 0c Aug 26 18:23:58.486146: | 80 04 00 20 Aug 26 18:23:58.486151: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.486156: | **parse ISAKMP Message: Aug 26 18:23:58.486159: | initiator cookie: Aug 26 18:23:58.486161: | 9c c1 ad 04 a2 d6 8b 23 Aug 26 18:23:58.486164: | responder cookie: Aug 26 18:23:58.486166: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.486169: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.486172: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.486175: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.486180: | flags: none (0x0) Aug 26 18:23:58.486183: | Message ID: 0 (0x0) Aug 26 18:23:58.486186: | length: 68 (0x44) Aug 26 18:23:58.486189: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.486193: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.486196: | #null state always idle Aug 26 18:23:58.486199: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.486202: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.486205: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.486207: | length: 40 (0x28) Aug 26 18:23:58.486209: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.486212: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.486214: | in statetime_start() with no state Aug 26 18:23:58.486219: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.486225: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.486228: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.486231: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.486234: | find_next_host_connection returns test Aug 26 18:23:58.486236: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.486239: | find_next_host_connection returns empty Aug 26 18:23:58.486262: | creating state object #25 at 0x55f088aebb60 Aug 26 18:23:58.486265: | State DB: adding IKEv1 state #25 in UNDEFINED Aug 26 18:23:58.486270: | pstats #25 ikev1.isakmp started Aug 26 18:23:58.486275: | #25 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.486280: | start processing: state #25 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.486283: | parent state #25: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.486287: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.486297: "test" #25: responding to Main Mode Aug 26 18:23:58.486302: | **emit ISAKMP Message: Aug 26 18:23:58.486305: | initiator cookie: Aug 26 18:23:58.486307: | 9c c1 ad 04 a2 d6 8b 23 Aug 26 18:23:58.486310: | responder cookie: Aug 26 18:23:58.486312: | bf a1 92 4e 38 0d 2e de Aug 26 18:23:58.486314: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.486317: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.486319: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.486322: | flags: none (0x0) Aug 26 18:23:58.486324: | Message ID: 0 (0x0) Aug 26 18:23:58.486327: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.486330: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.486333: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.486335: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.486338: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.486341: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.486344: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.486346: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.486350: | ****parse IPsec DOI SIT: Aug 26 18:23:58.486352: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.486355: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.486358: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.486360: | length: 28 (0x1c) Aug 26 18:23:58.486362: | proposal number: 1 (0x1) Aug 26 18:23:58.486365: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.486367: | SPI size: 0 (0x0) Aug 26 18:23:58.486370: | number of transforms: 1 (0x1) Aug 26 18:23:58.486376: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.486379: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.486381: | length: 20 (0x14) Aug 26 18:23:58.486383: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.486386: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.486389: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.486392: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.486395: | length/value: 2 (0x2) Aug 26 18:23:58.486398: | [2 is OAKLEY_IDEA_CBC(UNUSED)] Aug 26 18:23:58.486402: "test" #25: OAKLEY_IDEA_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.486405: "test" #25: no acceptable Oakley Transform Aug 26 18:23:58.486408: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.486413: | [RE]START processing: state #25 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.486416: | #25 is idle Aug 26 18:23:58.486480: "test" #25: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.486485: | **emit ISAKMP Message: Aug 26 18:23:58.486487: | initiator cookie: Aug 26 18:23:58.486490: | 9c c1 ad 04 a2 d6 8b 23 Aug 26 18:23:58.486492: | responder cookie: Aug 26 18:23:58.486494: | bf a1 92 4e 38 0d 2e de Aug 26 18:23:58.486497: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.486500: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.486502: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.486505: | flags: none (0x0) Aug 26 18:23:58.486507: | Message ID: 0 (0x0) Aug 26 18:23:58.486510: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.486513: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.486516: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.486518: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.486521: | protocol ID: 1 (0x1) Aug 26 18:23:58.486523: | SPI size: 0 (0x0) Aug 26 18:23:58.486525: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.486529: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.486531: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.486534: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.486537: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.486543: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #25) Aug 26 18:23:58.486546: | 9c c1 ad 04 a2 d6 8b 23 bf a1 92 4e 38 0d 2e de Aug 26 18:23:58.486549: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.486551: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.486574: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.486580: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.486585: | stop processing: state #25 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.486588: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.486594: | spent 0.46 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.520036: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.520065: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.520070: | fe 5a 58 1b 69 f5 50 7f 00 00 00 00 00 00 00 00 Aug 26 18:23:58.520073: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.520076: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.520078: | 00 00 00 14 01 01 00 00 80 01 00 02 80 02 00 0c Aug 26 18:23:58.520081: | 80 03 00 1e Aug 26 18:23:58.520087: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.520096: | **parse ISAKMP Message: Aug 26 18:23:58.520100: | initiator cookie: Aug 26 18:23:58.520102: | fe 5a 58 1b 69 f5 50 7f Aug 26 18:23:58.520105: | responder cookie: Aug 26 18:23:58.520107: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.520111: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.520114: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.520117: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.520120: | flags: none (0x0) Aug 26 18:23:58.520123: | Message ID: 0 (0x0) Aug 26 18:23:58.520126: | length: 68 (0x44) Aug 26 18:23:58.520129: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.520133: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.520136: | #null state always idle Aug 26 18:23:58.520140: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.520144: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.520147: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.520149: | length: 40 (0x28) Aug 26 18:23:58.520152: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.520155: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.520157: | in statetime_start() with no state Aug 26 18:23:58.520163: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.520168: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.520172: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.520176: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.520179: | find_next_host_connection returns test Aug 26 18:23:58.520181: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.520184: | find_next_host_connection returns empty Aug 26 18:23:58.520210: | creating state object #26 at 0x55f088aec620 Aug 26 18:23:58.520214: | State DB: adding IKEv1 state #26 in UNDEFINED Aug 26 18:23:58.520219: | pstats #26 ikev1.isakmp started Aug 26 18:23:58.520224: | #26 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.520231: | start processing: state #26 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.520235: | parent state #26: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.520239: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.520242: "test" #26: responding to Main Mode Aug 26 18:23:58.520247: | **emit ISAKMP Message: Aug 26 18:23:58.520250: | initiator cookie: Aug 26 18:23:58.520252: | fe 5a 58 1b 69 f5 50 7f Aug 26 18:23:58.520255: | responder cookie: Aug 26 18:23:58.520257: | 9d 29 2b 52 b4 f8 2b ea Aug 26 18:23:58.520260: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.520262: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.520265: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.520268: | flags: none (0x0) Aug 26 18:23:58.520270: | Message ID: 0 (0x0) Aug 26 18:23:58.520274: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.520277: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.520280: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.520283: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.520285: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.520292: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.520298: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.520301: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.520308: | ****parse IPsec DOI SIT: Aug 26 18:23:58.520312: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.520315: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.520317: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.520320: | length: 28 (0x1c) Aug 26 18:23:58.520323: | proposal number: 1 (0x1) Aug 26 18:23:58.520326: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.520329: | SPI size: 0 (0x0) Aug 26 18:23:58.520332: | number of transforms: 1 (0x1) Aug 26 18:23:58.520335: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.520337: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.520340: | length: 20 (0x14) Aug 26 18:23:58.520342: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.520345: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.520348: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.520352: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.520354: | length/value: 2 (0x2) Aug 26 18:23:58.520357: | [2 is OAKLEY_IDEA_CBC(UNUSED)] Aug 26 18:23:58.520362: "test" #26: OAKLEY_IDEA_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.520365: "test" #26: no acceptable Oakley Transform Aug 26 18:23:58.520368: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.520375: | [RE]START processing: state #26 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.520378: | #26 is idle Aug 26 18:23:58.520461: "test" #26: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.520467: | **emit ISAKMP Message: Aug 26 18:23:58.520470: | initiator cookie: Aug 26 18:23:58.520472: | fe 5a 58 1b 69 f5 50 7f Aug 26 18:23:58.520474: | responder cookie: Aug 26 18:23:58.520476: | 9d 29 2b 52 b4 f8 2b ea Aug 26 18:23:58.520479: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.520482: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.520485: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.520488: | flags: none (0x0) Aug 26 18:23:58.520490: | Message ID: 0 (0x0) Aug 26 18:23:58.520493: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.520497: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.520500: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.520502: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.520505: | protocol ID: 1 (0x1) Aug 26 18:23:58.520507: | SPI size: 0 (0x0) Aug 26 18:23:58.520510: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.520513: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.520516: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.520519: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.520522: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.520529: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #26) Aug 26 18:23:58.520532: | fe 5a 58 1b 69 f5 50 7f 9d 29 2b 52 b4 f8 2b ea Aug 26 18:23:58.520534: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.520537: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.520567: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.520574: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.520579: | stop processing: state #26 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.520583: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.520590: | spent 0.514 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.558361: | spent 0.00368 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.558390: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.558397: | b1 43 52 1f 45 9c fc cb 00 00 00 00 00 00 00 00 Aug 26 18:23:58.558400: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 18:23:58.558403: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 18:23:58.558405: | 00 00 00 18 01 01 00 00 80 01 00 1a 80 02 00 0e Aug 26 18:23:58.558407: | 80 03 00 1b 80 04 00 11 Aug 26 18:23:58.558412: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.558417: | **parse ISAKMP Message: Aug 26 18:23:58.558419: | initiator cookie: Aug 26 18:23:58.558422: | b1 43 52 1f 45 9c fc cb Aug 26 18:23:58.558424: | responder cookie: Aug 26 18:23:58.558427: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.558429: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.558432: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.558435: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.558438: | flags: none (0x0) Aug 26 18:23:58.558441: | Message ID: 0 (0x0) Aug 26 18:23:58.558443: | length: 72 (0x48) Aug 26 18:23:58.558446: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.558450: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.558454: | #null state always idle Aug 26 18:23:58.558458: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.558461: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.558464: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.558467: | length: 44 (0x2c) Aug 26 18:23:58.558470: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.558472: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.558475: | in statetime_start() with no state Aug 26 18:23:58.558482: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.558488: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.558491: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.558495: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.558498: | find_next_host_connection returns test Aug 26 18:23:58.558501: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.558503: | find_next_host_connection returns empty Aug 26 18:23:58.558527: | creating state object #27 at 0x55f088aed0e0 Aug 26 18:23:58.558531: | State DB: adding IKEv1 state #27 in UNDEFINED Aug 26 18:23:58.558535: | pstats #27 ikev1.isakmp started Aug 26 18:23:58.558540: | #27 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.558547: | start processing: state #27 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.558552: | parent state #27: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.558555: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.558559: "test" #27: responding to Main Mode Aug 26 18:23:58.558564: | **emit ISAKMP Message: Aug 26 18:23:58.558567: | initiator cookie: Aug 26 18:23:58.558570: | b1 43 52 1f 45 9c fc cb Aug 26 18:23:58.558572: | responder cookie: Aug 26 18:23:58.558575: | 37 f6 be 2d 2d 77 c2 d6 Aug 26 18:23:58.558578: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.558581: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.558583: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.558586: | flags: none (0x0) Aug 26 18:23:58.558589: | Message ID: 0 (0x0) Aug 26 18:23:58.558592: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.558595: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.558598: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.558601: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.558606: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.558610: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.558613: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.558617: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.558620: | ****parse IPsec DOI SIT: Aug 26 18:23:58.558623: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.558627: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.558629: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.558632: | length: 32 (0x20) Aug 26 18:23:58.558635: | proposal number: 1 (0x1) Aug 26 18:23:58.558637: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.558640: | SPI size: 0 (0x0) Aug 26 18:23:58.558643: | number of transforms: 1 (0x1) Aug 26 18:23:58.558646: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.558649: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.558651: | length: 24 (0x18) Aug 26 18:23:58.558654: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.558657: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.558660: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.558663: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.558665: | length/value: 26 (0x1a) Aug 26 18:23:58.558669: | [26 is OAKLEY_CAMELLIA_CCM_B] Aug 26 18:23:58.558673: "test" #27: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.558676: "test" #27: no acceptable Oakley Transform Aug 26 18:23:58.558680: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.558685: | [RE]START processing: state #27 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.558688: | #27 is idle Aug 26 18:23:58.558778: "test" #27: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.558783: | **emit ISAKMP Message: Aug 26 18:23:58.558786: | initiator cookie: Aug 26 18:23:58.558789: | b1 43 52 1f 45 9c fc cb Aug 26 18:23:58.558791: | responder cookie: Aug 26 18:23:58.558794: | 37 f6 be 2d 2d 77 c2 d6 Aug 26 18:23:58.558797: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.558799: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.558802: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.558805: | flags: none (0x0) Aug 26 18:23:58.558808: | Message ID: 0 (0x0) Aug 26 18:23:58.558810: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.558814: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.558817: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.558820: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.558822: | protocol ID: 1 (0x1) Aug 26 18:23:58.558825: | SPI size: 0 (0x0) Aug 26 18:23:58.558827: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.558830: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.558833: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.558837: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.558839: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.558846: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #27) Aug 26 18:23:58.558849: | b1 43 52 1f 45 9c fc cb 37 f6 be 2d 2d 77 c2 d6 Aug 26 18:23:58.558852: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.558854: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.558886: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.558893: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.558900: | stop processing: state #27 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.558904: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.558909: | spent 0.515 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.610318: | spent 0.00397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.610351: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.610356: | af 33 6b 61 99 9e 2f f8 00 00 00 00 00 00 00 00 Aug 26 18:23:58.610358: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.610361: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.610364: | 00 00 00 14 01 01 00 00 80 02 00 0e 80 03 00 1b Aug 26 18:23:58.610366: | 80 04 00 11 Aug 26 18:23:58.610371: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.610376: | **parse ISAKMP Message: Aug 26 18:23:58.610380: | initiator cookie: Aug 26 18:23:58.610382: | af 33 6b 61 99 9e 2f f8 Aug 26 18:23:58.610385: | responder cookie: Aug 26 18:23:58.610387: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.610391: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.610394: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.610397: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.610400: | flags: none (0x0) Aug 26 18:23:58.610403: | Message ID: 0 (0x0) Aug 26 18:23:58.610405: | length: 68 (0x44) Aug 26 18:23:58.610408: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.610413: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.610415: | #null state always idle Aug 26 18:23:58.610419: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.610422: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.610425: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.610428: | length: 40 (0x28) Aug 26 18:23:58.610430: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.610433: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.610436: | in statetime_start() with no state Aug 26 18:23:58.610442: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.610447: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.610450: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.610454: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.610457: | find_next_host_connection returns test Aug 26 18:23:58.610460: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.610463: | find_next_host_connection returns empty Aug 26 18:23:58.610489: | creating state object #28 at 0x55f088aedba0 Aug 26 18:23:58.610493: | State DB: adding IKEv1 state #28 in UNDEFINED Aug 26 18:23:58.610498: | pstats #28 ikev1.isakmp started Aug 26 18:23:58.610503: | #28 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.610509: | start processing: state #28 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.610513: | parent state #28: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.610517: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.610521: "test" #28: responding to Main Mode Aug 26 18:23:58.610526: | **emit ISAKMP Message: Aug 26 18:23:58.610529: | initiator cookie: Aug 26 18:23:58.610531: | af 33 6b 61 99 9e 2f f8 Aug 26 18:23:58.610534: | responder cookie: Aug 26 18:23:58.610536: | 52 17 fe b4 92 38 b3 03 Aug 26 18:23:58.610539: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.610541: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.610544: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.610551: | flags: none (0x0) Aug 26 18:23:58.610553: | Message ID: 0 (0x0) Aug 26 18:23:58.610556: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.610559: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.610562: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.610565: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.610568: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.610571: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.610575: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.610578: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.610582: | ****parse IPsec DOI SIT: Aug 26 18:23:58.610585: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.610588: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.610591: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.610594: | length: 28 (0x1c) Aug 26 18:23:58.610597: | proposal number: 1 (0x1) Aug 26 18:23:58.610599: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.610602: | SPI size: 0 (0x0) Aug 26 18:23:58.610605: | number of transforms: 1 (0x1) Aug 26 18:23:58.610608: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.610611: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.610614: | length: 20 (0x14) Aug 26 18:23:58.610616: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.610619: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.610622: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.610625: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:23:58.610628: | length/value: 14 (0xe) Aug 26 18:23:58.610632: "test" #28: 14?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Aug 26 18:23:58.610636: "test" #28: no acceptable Oakley Transform Aug 26 18:23:58.610639: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.610645: | [RE]START processing: state #28 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.610647: | #28 is idle Aug 26 18:23:58.610731: "test" #28: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.610736: | **emit ISAKMP Message: Aug 26 18:23:58.610739: | initiator cookie: Aug 26 18:23:58.610742: | af 33 6b 61 99 9e 2f f8 Aug 26 18:23:58.610745: | responder cookie: Aug 26 18:23:58.610747: | 52 17 fe b4 92 38 b3 03 Aug 26 18:23:58.610750: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.610752: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.610755: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.610758: | flags: none (0x0) Aug 26 18:23:58.610761: | Message ID: 0 (0x0) Aug 26 18:23:58.610764: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.610767: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.610770: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.610772: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.610775: | protocol ID: 1 (0x1) Aug 26 18:23:58.610778: | SPI size: 0 (0x0) Aug 26 18:23:58.610780: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.610784: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.610787: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.610791: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.610793: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.610800: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #28) Aug 26 18:23:58.610805: | af 33 6b 61 99 9e 2f f8 52 17 fe b4 92 38 b3 03 Aug 26 18:23:58.610808: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.610811: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.610849: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.610856: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.610861: | stop processing: state #28 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.610865: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.610870: | spent 0.512 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.650282: | spent 0.00357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.650332: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.650336: | b8 22 54 2a 09 5a 28 97 00 00 00 00 00 00 00 00 Aug 26 18:23:58.650339: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.650341: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.650344: | 00 00 00 14 01 01 00 00 80 01 00 1a 80 03 00 1b Aug 26 18:23:58.650346: | 80 04 00 11 Aug 26 18:23:58.650352: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.650356: | **parse ISAKMP Message: Aug 26 18:23:58.650359: | initiator cookie: Aug 26 18:23:58.650362: | b8 22 54 2a 09 5a 28 97 Aug 26 18:23:58.650364: | responder cookie: Aug 26 18:23:58.650367: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.650370: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.650373: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.650375: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.650378: | flags: none (0x0) Aug 26 18:23:58.650381: | Message ID: 0 (0x0) Aug 26 18:23:58.650384: | length: 68 (0x44) Aug 26 18:23:58.650387: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.650391: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.650394: | #null state always idle Aug 26 18:23:58.650398: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.650401: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.650404: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.650406: | length: 40 (0x28) Aug 26 18:23:58.650409: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.650412: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.650414: | in statetime_start() with no state Aug 26 18:23:58.650420: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.650426: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.650429: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.650433: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.650435: | find_next_host_connection returns test Aug 26 18:23:58.650438: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.650441: | find_next_host_connection returns empty Aug 26 18:23:58.650467: | creating state object #29 at 0x55f088aee660 Aug 26 18:23:58.650471: | State DB: adding IKEv1 state #29 in UNDEFINED Aug 26 18:23:58.650475: | pstats #29 ikev1.isakmp started Aug 26 18:23:58.650479: | #29 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.650486: | start processing: state #29 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.650490: | parent state #29: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.650494: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.650497: "test" #29: responding to Main Mode Aug 26 18:23:58.650502: | **emit ISAKMP Message: Aug 26 18:23:58.650509: | initiator cookie: Aug 26 18:23:58.650512: | b8 22 54 2a 09 5a 28 97 Aug 26 18:23:58.650514: | responder cookie: Aug 26 18:23:58.650516: | c6 29 a8 ad 39 4a e1 d8 Aug 26 18:23:58.650519: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.650522: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.650525: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.650527: | flags: none (0x0) Aug 26 18:23:58.650530: | Message ID: 0 (0x0) Aug 26 18:23:58.650533: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.650536: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.650539: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.650542: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.650544: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.650547: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.650551: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.650554: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.650557: | ****parse IPsec DOI SIT: Aug 26 18:23:58.650560: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.650563: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.650565: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.650568: | length: 28 (0x1c) Aug 26 18:23:58.650571: | proposal number: 1 (0x1) Aug 26 18:23:58.650574: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.650576: | SPI size: 0 (0x0) Aug 26 18:23:58.650579: | number of transforms: 1 (0x1) Aug 26 18:23:58.650582: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.650584: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.650587: | length: 20 (0x14) Aug 26 18:23:58.650589: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.650592: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.650595: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.650598: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.650601: | length/value: 26 (0x1a) Aug 26 18:23:58.650603: | [26 is OAKLEY_CAMELLIA_CCM_B] Aug 26 18:23:58.650607: "test" #29: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.650610: "test" #29: no acceptable Oakley Transform Aug 26 18:23:58.650613: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.650618: | [RE]START processing: state #29 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.650621: | #29 is idle Aug 26 18:23:58.650861: "test" #29: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.650871: | **emit ISAKMP Message: Aug 26 18:23:58.650875: | initiator cookie: Aug 26 18:23:58.650877: | b8 22 54 2a 09 5a 28 97 Aug 26 18:23:58.650881: | responder cookie: Aug 26 18:23:58.650883: | c6 29 a8 ad 39 4a e1 d8 Aug 26 18:23:58.650887: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.650890: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.650893: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.650896: | flags: none (0x0) Aug 26 18:23:58.650898: | Message ID: 0 (0x0) Aug 26 18:23:58.650902: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.650905: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.650909: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.650911: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.650914: | protocol ID: 1 (0x1) Aug 26 18:23:58.650917: | SPI size: 0 (0x0) Aug 26 18:23:58.650920: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.650926: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.650930: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.650933: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.650936: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.650944: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #29) Aug 26 18:23:58.650948: | b8 22 54 2a 09 5a 28 97 c6 29 a8 ad 39 4a e1 d8 Aug 26 18:23:58.650951: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.650954: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.650986: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.650994: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.651000: | stop processing: state #29 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.651004: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.651010: | spent 0.504 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.689884: | spent 0.004 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.689912: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.689916: | 3f f4 24 08 db 62 42 e3 00 00 00 00 00 00 00 00 Aug 26 18:23:58.689919: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.689921: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.689923: | 00 00 00 14 01 01 00 00 80 01 00 1a 80 02 00 0e Aug 26 18:23:58.689925: | 80 04 00 11 Aug 26 18:23:58.689930: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.689933: | **parse ISAKMP Message: Aug 26 18:23:58.689936: | initiator cookie: Aug 26 18:23:58.689938: | 3f f4 24 08 db 62 42 e3 Aug 26 18:23:58.689940: | responder cookie: Aug 26 18:23:58.689942: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.689945: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.689947: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.689950: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.689952: | flags: none (0x0) Aug 26 18:23:58.689954: | Message ID: 0 (0x0) Aug 26 18:23:58.689957: | length: 68 (0x44) Aug 26 18:23:58.689960: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.689963: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.689966: | #null state always idle Aug 26 18:23:58.689969: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.689972: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.689974: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.689976: | length: 40 (0x28) Aug 26 18:23:58.689979: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.689981: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.689983: | in statetime_start() with no state Aug 26 18:23:58.689988: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.689993: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.689996: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.689999: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.690001: | find_next_host_connection returns test Aug 26 18:23:58.690003: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.690006: | find_next_host_connection returns empty Aug 26 18:23:58.690026: | creating state object #30 at 0x55f088aef120 Aug 26 18:23:58.690029: | State DB: adding IKEv1 state #30 in UNDEFINED Aug 26 18:23:58.690033: | pstats #30 ikev1.isakmp started Aug 26 18:23:58.690041: | #30 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.690047: | start processing: state #30 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.690050: | parent state #30: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.690053: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.690056: "test" #30: responding to Main Mode Aug 26 18:23:58.690061: | **emit ISAKMP Message: Aug 26 18:23:58.690063: | initiator cookie: Aug 26 18:23:58.690065: | 3f f4 24 08 db 62 42 e3 Aug 26 18:23:58.690067: | responder cookie: Aug 26 18:23:58.690069: | c6 aa c8 94 fc f4 9e 9e Aug 26 18:23:58.690071: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.690073: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.690076: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.690078: | flags: none (0x0) Aug 26 18:23:58.690080: | Message ID: 0 (0x0) Aug 26 18:23:58.690083: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.690085: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.690088: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.690090: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.690092: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.690095: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.690098: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.690100: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.690103: | ****parse IPsec DOI SIT: Aug 26 18:23:58.690105: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.690108: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.690110: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.690113: | length: 28 (0x1c) Aug 26 18:23:58.690115: | proposal number: 1 (0x1) Aug 26 18:23:58.690117: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.690119: | SPI size: 0 (0x0) Aug 26 18:23:58.690121: | number of transforms: 1 (0x1) Aug 26 18:23:58.690124: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.690126: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.690128: | length: 20 (0x14) Aug 26 18:23:58.690130: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.690132: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.690135: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.690137: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.690140: | length/value: 26 (0x1a) Aug 26 18:23:58.690142: | [26 is OAKLEY_CAMELLIA_CCM_B] Aug 26 18:23:58.690146: "test" #30: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.690148: "test" #30: no acceptable Oakley Transform Aug 26 18:23:58.690151: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.690155: | [RE]START processing: state #30 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.690157: | #30 is idle Aug 26 18:23:58.690210: "test" #30: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.690214: | **emit ISAKMP Message: Aug 26 18:23:58.690217: | initiator cookie: Aug 26 18:23:58.690219: | 3f f4 24 08 db 62 42 e3 Aug 26 18:23:58.690221: | responder cookie: Aug 26 18:23:58.690223: | c6 aa c8 94 fc f4 9e 9e Aug 26 18:23:58.690225: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.690227: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.690230: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.690232: | flags: none (0x0) Aug 26 18:23:58.690234: | Message ID: 0 (0x0) Aug 26 18:23:58.690238: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.690241: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.690243: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.690245: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.690248: | protocol ID: 1 (0x1) Aug 26 18:23:58.690250: | SPI size: 0 (0x0) Aug 26 18:23:58.690252: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.690254: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.690257: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.690260: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.690262: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.690268: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #30) Aug 26 18:23:58.690270: | 3f f4 24 08 db 62 42 e3 c6 aa c8 94 fc f4 9e 9e Aug 26 18:23:58.690272: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.690274: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.690317: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.690331: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.690338: | stop processing: state #30 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.690342: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.690348: | spent 0.417 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.735390: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.735421: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.735425: | e2 8a 86 83 34 16 c1 70 00 00 00 00 00 00 00 00 Aug 26 18:23:58.735428: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.735430: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.735433: | 00 00 00 14 01 01 00 00 80 01 00 1a 80 02 00 0e Aug 26 18:23:58.735435: | 80 03 00 1b Aug 26 18:23:58.735441: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.735445: | **parse ISAKMP Message: Aug 26 18:23:58.735448: | initiator cookie: Aug 26 18:23:58.735451: | e2 8a 86 83 34 16 c1 70 Aug 26 18:23:58.735453: | responder cookie: Aug 26 18:23:58.735456: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.735459: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.735462: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.735464: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.735467: | flags: none (0x0) Aug 26 18:23:58.735470: | Message ID: 0 (0x0) Aug 26 18:23:58.735472: | length: 68 (0x44) Aug 26 18:23:58.735475: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.735479: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.735482: | #null state always idle Aug 26 18:23:58.735486: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.735489: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.735492: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.735494: | length: 40 (0x28) Aug 26 18:23:58.735497: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.735500: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.735502: | in statetime_start() with no state Aug 26 18:23:58.735508: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.735514: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.735517: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.735521: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.735529: | find_next_host_connection returns test Aug 26 18:23:58.735532: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.735534: | find_next_host_connection returns empty Aug 26 18:23:58.735559: | creating state object #31 at 0x55f088aefbe0 Aug 26 18:23:58.735562: | State DB: adding IKEv1 state #31 in UNDEFINED Aug 26 18:23:58.735567: | pstats #31 ikev1.isakmp started Aug 26 18:23:58.735572: | #31 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.735578: | start processing: state #31 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.735581: | parent state #31: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.735585: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.735588: "test" #31: responding to Main Mode Aug 26 18:23:58.735593: | **emit ISAKMP Message: Aug 26 18:23:58.735596: | initiator cookie: Aug 26 18:23:58.735598: | e2 8a 86 83 34 16 c1 70 Aug 26 18:23:58.735601: | responder cookie: Aug 26 18:23:58.735603: | 26 49 35 f2 de 15 4f c3 Aug 26 18:23:58.735606: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.735609: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.735611: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.735614: | flags: none (0x0) Aug 26 18:23:58.735616: | Message ID: 0 (0x0) Aug 26 18:23:58.735619: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.735622: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.735625: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.735628: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.735631: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.735634: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.735637: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.735640: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.735643: | ****parse IPsec DOI SIT: Aug 26 18:23:58.735646: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.735649: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.735652: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.735654: | length: 28 (0x1c) Aug 26 18:23:58.735657: | proposal number: 1 (0x1) Aug 26 18:23:58.735659: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.735662: | SPI size: 0 (0x0) Aug 26 18:23:58.735665: | number of transforms: 1 (0x1) Aug 26 18:23:58.735667: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.735670: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.735672: | length: 20 (0x14) Aug 26 18:23:58.735675: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.735678: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.735680: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.735683: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.735686: | length/value: 26 (0x1a) Aug 26 18:23:58.735689: | [26 is OAKLEY_CAMELLIA_CCM_B] Aug 26 18:23:58.735692: "test" #31: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.735695: "test" #31: no acceptable Oakley Transform Aug 26 18:23:58.735698: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.735703: | [RE]START processing: state #31 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.735706: | #31 is idle Aug 26 18:23:58.735785: "test" #31: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.735790: | **emit ISAKMP Message: Aug 26 18:23:58.735795: | initiator cookie: Aug 26 18:23:58.735797: | e2 8a 86 83 34 16 c1 70 Aug 26 18:23:58.735800: | responder cookie: Aug 26 18:23:58.735802: | 26 49 35 f2 de 15 4f c3 Aug 26 18:23:58.735805: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.735808: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.735810: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.735813: | flags: none (0x0) Aug 26 18:23:58.735815: | Message ID: 0 (0x0) Aug 26 18:23:58.735818: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.735821: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.735823: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.735826: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.735828: | protocol ID: 1 (0x1) Aug 26 18:23:58.735831: | SPI size: 0 (0x0) Aug 26 18:23:58.735833: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.735836: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.735839: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.735842: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.735844: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.735850: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #31) Aug 26 18:23:58.735853: | e2 8a 86 83 34 16 c1 70 26 49 35 f2 de 15 4f c3 Aug 26 18:23:58.735855: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.735858: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.735881: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.735887: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.735892: | stop processing: state #31 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.735895: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.735901: | spent 0.481 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.769424: | spent 0.0039 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.769453: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.769458: | 46 6e 3d 0b 37 32 5a 83 00 00 00 00 00 00 00 00 Aug 26 18:23:58.769461: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 18:23:58.769464: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 18:23:58.769466: | 00 00 00 18 01 01 00 00 80 01 00 17 80 02 00 1c Aug 26 18:23:58.769468: | 80 03 00 11 80 04 00 19 Aug 26 18:23:58.769474: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.769478: | **parse ISAKMP Message: Aug 26 18:23:58.769481: | initiator cookie: Aug 26 18:23:58.769484: | 46 6e 3d 0b 37 32 5a 83 Aug 26 18:23:58.769486: | responder cookie: Aug 26 18:23:58.769488: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.769491: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.769495: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.769498: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.769501: | flags: none (0x0) Aug 26 18:23:58.769503: | Message ID: 0 (0x0) Aug 26 18:23:58.769506: | length: 72 (0x48) Aug 26 18:23:58.769509: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.769513: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.769516: | #null state always idle Aug 26 18:23:58.769520: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.769523: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.769526: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.769528: | length: 44 (0x2c) Aug 26 18:23:58.769531: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.769535: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.769537: | in statetime_start() with no state Aug 26 18:23:58.769541: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.769545: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.769547: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.769550: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.769552: | find_next_host_connection returns test Aug 26 18:23:58.769554: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.769555: | find_next_host_connection returns empty Aug 26 18:23:58.769577: | creating state object #32 at 0x55f088af06a0 Aug 26 18:23:58.769580: | State DB: adding IKEv1 state #32 in UNDEFINED Aug 26 18:23:58.769583: | pstats #32 ikev1.isakmp started Aug 26 18:23:58.769586: | #32 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.769592: | start processing: state #32 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.769596: | parent state #32: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.769600: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.769603: "test" #32: responding to Main Mode Aug 26 18:23:58.769609: | **emit ISAKMP Message: Aug 26 18:23:58.769612: | initiator cookie: Aug 26 18:23:58.769615: | 46 6e 3d 0b 37 32 5a 83 Aug 26 18:23:58.769618: | responder cookie: Aug 26 18:23:58.769620: | c3 d0 a2 29 6b cb a4 f3 Aug 26 18:23:58.769622: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.769625: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.769628: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.769630: | flags: none (0x0) Aug 26 18:23:58.769633: | Message ID: 0 (0x0) Aug 26 18:23:58.769636: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.769639: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.769643: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.769645: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.769648: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.769651: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.769654: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.769658: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.769661: | ****parse IPsec DOI SIT: Aug 26 18:23:58.769664: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.769667: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.769670: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.769672: | length: 32 (0x20) Aug 26 18:23:58.769675: | proposal number: 1 (0x1) Aug 26 18:23:58.769677: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.769680: | SPI size: 0 (0x0) Aug 26 18:23:58.769682: | number of transforms: 1 (0x1) Aug 26 18:23:58.769686: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.769688: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.769691: | length: 24 (0x18) Aug 26 18:23:58.769693: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.769696: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.769699: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.769702: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.769706: | length/value: 23 (0x17) Aug 26 18:23:58.769709: | [23 is UNUSED_23] Aug 26 18:23:58.769713: "test" #32: UNUSED_23 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.769718: "test" #32: no acceptable Oakley Transform Aug 26 18:23:58.769722: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.769728: | [RE]START processing: state #32 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.769731: | #32 is idle Aug 26 18:23:58.769800: "test" #32: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.769806: | **emit ISAKMP Message: Aug 26 18:23:58.769809: | initiator cookie: Aug 26 18:23:58.769812: | 46 6e 3d 0b 37 32 5a 83 Aug 26 18:23:58.769814: | responder cookie: Aug 26 18:23:58.769817: | c3 d0 a2 29 6b cb a4 f3 Aug 26 18:23:58.769820: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.769822: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.769825: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.769828: | flags: none (0x0) Aug 26 18:23:58.769830: | Message ID: 0 (0x0) Aug 26 18:23:58.769833: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.769836: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.769839: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.769842: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.769844: | protocol ID: 1 (0x1) Aug 26 18:23:58.769847: | SPI size: 0 (0x0) Aug 26 18:23:58.769849: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.769852: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.769855: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.769858: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.769861: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.769868: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #32) Aug 26 18:23:58.769871: | 46 6e 3d 0b 37 32 5a 83 c3 d0 a2 29 6b cb a4 f3 Aug 26 18:23:58.769874: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.769876: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.769910: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.769916: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.769921: | stop processing: state #32 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.769925: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.769930: | spent 0.471 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.803810: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.803840: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.803845: | d8 62 d7 f7 43 e8 70 42 00 00 00 00 00 00 00 00 Aug 26 18:23:58.803847: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.803850: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.803852: | 00 00 00 14 01 01 00 00 80 02 00 1c 80 03 00 11 Aug 26 18:23:58.803855: | 80 04 00 19 Aug 26 18:23:58.803860: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.803865: | **parse ISAKMP Message: Aug 26 18:23:58.803868: | initiator cookie: Aug 26 18:23:58.803870: | d8 62 d7 f7 43 e8 70 42 Aug 26 18:23:58.803873: | responder cookie: Aug 26 18:23:58.803875: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.803878: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.803881: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.803884: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.803887: | flags: none (0x0) Aug 26 18:23:58.803890: | Message ID: 0 (0x0) Aug 26 18:23:58.803893: | length: 68 (0x44) Aug 26 18:23:58.803896: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.803903: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.803906: | #null state always idle Aug 26 18:23:58.803910: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.803913: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.803916: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.803919: | length: 40 (0x28) Aug 26 18:23:58.803921: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.803924: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.803927: | in statetime_start() with no state Aug 26 18:23:58.803933: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.803939: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.803942: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.803946: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.803949: | find_next_host_connection returns test Aug 26 18:23:58.803952: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.803954: | find_next_host_connection returns empty Aug 26 18:23:58.803977: | creating state object #33 at 0x55f088af1160 Aug 26 18:23:58.803980: | State DB: adding IKEv1 state #33 in UNDEFINED Aug 26 18:23:58.803985: | pstats #33 ikev1.isakmp started Aug 26 18:23:58.803989: | #33 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.803996: | start processing: state #33 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.804000: | parent state #33: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.804003: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.804006: "test" #33: responding to Main Mode Aug 26 18:23:58.804012: | **emit ISAKMP Message: Aug 26 18:23:58.804015: | initiator cookie: Aug 26 18:23:58.804017: | d8 62 d7 f7 43 e8 70 42 Aug 26 18:23:58.804020: | responder cookie: Aug 26 18:23:58.804022: | 52 2d 9c 2c a3 19 a4 45 Aug 26 18:23:58.804025: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.804027: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.804030: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.804032: | flags: none (0x0) Aug 26 18:23:58.804034: | Message ID: 0 (0x0) Aug 26 18:23:58.804037: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.804040: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.804044: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.804046: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.804049: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.804052: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.804055: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.804058: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.804062: | ****parse IPsec DOI SIT: Aug 26 18:23:58.804064: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.804067: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.804070: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.804073: | length: 28 (0x1c) Aug 26 18:23:58.804076: | proposal number: 1 (0x1) Aug 26 18:23:58.804078: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.804081: | SPI size: 0 (0x0) Aug 26 18:23:58.804083: | number of transforms: 1 (0x1) Aug 26 18:23:58.804086: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.804089: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.804091: | length: 20 (0x14) Aug 26 18:23:58.804096: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.804099: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.804102: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.804105: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:23:58.804107: | length/value: 28 (0x1c) Aug 26 18:23:58.804112: "test" #33: 28?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Aug 26 18:23:58.804115: "test" #33: no acceptable Oakley Transform Aug 26 18:23:58.804119: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.804124: | [RE]START processing: state #33 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.804127: | #33 is idle Aug 26 18:23:58.804190: "test" #33: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.804194: | **emit ISAKMP Message: Aug 26 18:23:58.804197: | initiator cookie: Aug 26 18:23:58.804200: | d8 62 d7 f7 43 e8 70 42 Aug 26 18:23:58.804202: | responder cookie: Aug 26 18:23:58.804205: | 52 2d 9c 2c a3 19 a4 45 Aug 26 18:23:58.804208: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.804210: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.804213: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.804216: | flags: none (0x0) Aug 26 18:23:58.804218: | Message ID: 0 (0x0) Aug 26 18:23:58.804221: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.804224: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.804227: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.804230: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.804232: | protocol ID: 1 (0x1) Aug 26 18:23:58.804235: | SPI size: 0 (0x0) Aug 26 18:23:58.804238: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.804241: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.804244: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.804247: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.804250: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.804256: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #33) Aug 26 18:23:58.804259: | d8 62 d7 f7 43 e8 70 42 52 2d 9c 2c a3 19 a4 45 Aug 26 18:23:58.804261: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.804264: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.804297: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.804306: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.804311: | stop processing: state #33 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.804315: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.804321: | spent 0.474 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.869283: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.869317: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.869322: | 12 28 a6 50 a2 c5 e5 2c 00 00 00 00 00 00 00 00 Aug 26 18:23:58.869325: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.869327: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.869329: | 00 00 00 14 01 01 00 00 80 01 00 17 80 03 00 11 Aug 26 18:23:58.869332: | 80 04 00 19 Aug 26 18:23:58.869337: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.869341: | **parse ISAKMP Message: Aug 26 18:23:58.869344: | initiator cookie: Aug 26 18:23:58.869347: | 12 28 a6 50 a2 c5 e5 2c Aug 26 18:23:58.869349: | responder cookie: Aug 26 18:23:58.869352: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.869355: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.869363: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.869366: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.869369: | flags: none (0x0) Aug 26 18:23:58.869371: | Message ID: 0 (0x0) Aug 26 18:23:58.869374: | length: 68 (0x44) Aug 26 18:23:58.869377: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.869381: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.869384: | #null state always idle Aug 26 18:23:58.869387: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.869391: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.869394: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.869396: | length: 40 (0x28) Aug 26 18:23:58.869399: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.869402: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.869405: | in statetime_start() with no state Aug 26 18:23:58.869410: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.869416: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.869419: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.869423: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.869426: | find_next_host_connection returns test Aug 26 18:23:58.869429: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.869431: | find_next_host_connection returns empty Aug 26 18:23:58.869454: | creating state object #34 at 0x55f088af1c20 Aug 26 18:23:58.869458: | State DB: adding IKEv1 state #34 in UNDEFINED Aug 26 18:23:58.869463: | pstats #34 ikev1.isakmp started Aug 26 18:23:58.869468: | #34 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.869474: | start processing: state #34 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.869478: | parent state #34: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.869482: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.869485: "test" #34: responding to Main Mode Aug 26 18:23:58.869490: | **emit ISAKMP Message: Aug 26 18:23:58.869493: | initiator cookie: Aug 26 18:23:58.869496: | 12 28 a6 50 a2 c5 e5 2c Aug 26 18:23:58.869498: | responder cookie: Aug 26 18:23:58.869501: | c7 9a eb 63 f9 63 83 8b Aug 26 18:23:58.869503: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.869506: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.869509: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.869512: | flags: none (0x0) Aug 26 18:23:58.869514: | Message ID: 0 (0x0) Aug 26 18:23:58.869517: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.869520: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.869524: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.869526: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.869529: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.869532: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.869536: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.869539: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.869542: | ****parse IPsec DOI SIT: Aug 26 18:23:58.869545: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.869548: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.869551: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.869553: | length: 28 (0x1c) Aug 26 18:23:58.869558: | proposal number: 1 (0x1) Aug 26 18:23:58.869561: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.869563: | SPI size: 0 (0x0) Aug 26 18:23:58.869566: | number of transforms: 1 (0x1) Aug 26 18:23:58.869569: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.869572: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.869574: | length: 20 (0x14) Aug 26 18:23:58.869577: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.869580: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.869583: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.869586: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.869589: | length/value: 23 (0x17) Aug 26 18:23:58.869592: | [23 is UNUSED_23] Aug 26 18:23:58.869596: "test" #34: UNUSED_23 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.869599: "test" #34: no acceptable Oakley Transform Aug 26 18:23:58.869602: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.869607: | [RE]START processing: state #34 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.869610: | #34 is idle Aug 26 18:23:58.869677: "test" #34: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.869682: | **emit ISAKMP Message: Aug 26 18:23:58.869685: | initiator cookie: Aug 26 18:23:58.869688: | 12 28 a6 50 a2 c5 e5 2c Aug 26 18:23:58.869690: | responder cookie: Aug 26 18:23:58.869692: | c7 9a eb 63 f9 63 83 8b Aug 26 18:23:58.869695: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.869698: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.869701: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.869703: | flags: none (0x0) Aug 26 18:23:58.869706: | Message ID: 0 (0x0) Aug 26 18:23:58.869709: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.869712: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.869715: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.869718: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.869720: | protocol ID: 1 (0x1) Aug 26 18:23:58.869723: | SPI size: 0 (0x0) Aug 26 18:23:58.869726: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.869729: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.869732: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.869735: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.869738: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.869745: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #34) Aug 26 18:23:58.869748: | 12 28 a6 50 a2 c5 e5 2c c7 9a eb 63 f9 63 83 8b Aug 26 18:23:58.869750: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.869753: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.869781: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.869788: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.869793: | stop processing: state #34 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.869796: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.869802: | spent 0.482 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.911860: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.911890: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.911896: | f2 4a 7b 3f e9 c2 09 19 00 00 00 00 00 00 00 00 Aug 26 18:23:58.911899: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.911902: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.911908: | 00 00 00 14 01 01 00 00 80 01 00 17 80 02 00 1c Aug 26 18:23:58.911911: | 80 04 00 19 Aug 26 18:23:58.911916: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.911921: | **parse ISAKMP Message: Aug 26 18:23:58.911924: | initiator cookie: Aug 26 18:23:58.911927: | f2 4a 7b 3f e9 c2 09 19 Aug 26 18:23:58.911929: | responder cookie: Aug 26 18:23:58.911931: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.911934: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.911937: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.911940: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.911943: | flags: none (0x0) Aug 26 18:23:58.911946: | Message ID: 0 (0x0) Aug 26 18:23:58.911948: | length: 68 (0x44) Aug 26 18:23:58.911952: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.911956: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.911958: | #null state always idle Aug 26 18:23:58.911962: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.911966: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.911969: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.911971: | length: 40 (0x28) Aug 26 18:23:58.911974: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.911977: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.911980: | in statetime_start() with no state Aug 26 18:23:58.911985: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.911991: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.911995: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.911999: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.912003: | find_next_host_connection returns test Aug 26 18:23:58.912006: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.912008: | find_next_host_connection returns empty Aug 26 18:23:58.912036: | creating state object #35 at 0x55f088af26e0 Aug 26 18:23:58.912041: | State DB: adding IKEv1 state #35 in UNDEFINED Aug 26 18:23:58.912045: | pstats #35 ikev1.isakmp started Aug 26 18:23:58.912050: | #35 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.912057: | start processing: state #35 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.912061: | parent state #35: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.912065: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.912068: "test" #35: responding to Main Mode Aug 26 18:23:58.912073: | **emit ISAKMP Message: Aug 26 18:23:58.912076: | initiator cookie: Aug 26 18:23:58.912078: | f2 4a 7b 3f e9 c2 09 19 Aug 26 18:23:58.912081: | responder cookie: Aug 26 18:23:58.912083: | 85 27 a2 3c 4e ed 32 8d Aug 26 18:23:58.912086: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.912089: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.912092: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.912094: | flags: none (0x0) Aug 26 18:23:58.912097: | Message ID: 0 (0x0) Aug 26 18:23:58.912101: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.912104: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.912107: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.912110: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.912113: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.912116: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.912120: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.912125: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.912129: | ****parse IPsec DOI SIT: Aug 26 18:23:58.912132: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.912135: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.912138: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.912140: | length: 28 (0x1c) Aug 26 18:23:58.912143: | proposal number: 1 (0x1) Aug 26 18:23:58.912145: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.912148: | SPI size: 0 (0x0) Aug 26 18:23:58.912150: | number of transforms: 1 (0x1) Aug 26 18:23:58.912153: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.912156: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.912159: | length: 20 (0x14) Aug 26 18:23:58.912162: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.912164: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.912167: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.912170: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.912173: | length/value: 23 (0x17) Aug 26 18:23:58.912176: | [23 is UNUSED_23] Aug 26 18:23:58.912180: "test" #35: UNUSED_23 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.912183: "test" #35: no acceptable Oakley Transform Aug 26 18:23:58.912186: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.912191: | [RE]START processing: state #35 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.912194: | #35 is idle Aug 26 18:23:58.912315: "test" #35: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.912328: | **emit ISAKMP Message: Aug 26 18:23:58.912332: | initiator cookie: Aug 26 18:23:58.912336: | f2 4a 7b 3f e9 c2 09 19 Aug 26 18:23:58.912338: | responder cookie: Aug 26 18:23:58.912341: | 85 27 a2 3c 4e ed 32 8d Aug 26 18:23:58.912344: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.912347: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.912350: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.912353: | flags: none (0x0) Aug 26 18:23:58.912355: | Message ID: 0 (0x0) Aug 26 18:23:58.912359: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.912362: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.912365: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.912368: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.912371: | protocol ID: 1 (0x1) Aug 26 18:23:58.912373: | SPI size: 0 (0x0) Aug 26 18:23:58.912376: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.912380: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.912383: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.912386: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.912389: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.912396: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #35) Aug 26 18:23:58.912400: | f2 4a 7b 3f e9 c2 09 19 85 27 a2 3c 4e ed 32 8d Aug 26 18:23:58.912402: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.912405: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.912439: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.912447: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.912453: | stop processing: state #35 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.912457: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.912463: | spent 0.529 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.958299: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.958328: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.958333: | 38 48 92 06 58 41 75 d9 00 00 00 00 00 00 00 00 Aug 26 18:23:58.958336: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:58.958338: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:58.958341: | 00 00 00 14 01 01 00 00 80 01 00 17 80 02 00 1c Aug 26 18:23:58.958343: | 80 03 00 11 Aug 26 18:23:58.958348: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.958353: | **parse ISAKMP Message: Aug 26 18:23:58.958357: | initiator cookie: Aug 26 18:23:58.958359: | 38 48 92 06 58 41 75 d9 Aug 26 18:23:58.958362: | responder cookie: Aug 26 18:23:58.958364: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.958367: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.958370: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.958373: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.958376: | flags: none (0x0) Aug 26 18:23:58.958378: | Message ID: 0 (0x0) Aug 26 18:23:58.958381: | length: 68 (0x44) Aug 26 18:23:58.958384: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.958389: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.958392: | #null state always idle Aug 26 18:23:58.958395: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.958399: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.958401: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.958404: | length: 40 (0x28) Aug 26 18:23:58.958406: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.958409: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.958412: | in statetime_start() with no state Aug 26 18:23:58.958418: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.958425: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.958429: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.958433: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.958436: | find_next_host_connection returns test Aug 26 18:23:58.958438: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.958441: | find_next_host_connection returns empty Aug 26 18:23:58.958463: | creating state object #36 at 0x55f088af31a0 Aug 26 18:23:58.958466: | State DB: adding IKEv1 state #36 in UNDEFINED Aug 26 18:23:58.958471: | pstats #36 ikev1.isakmp started Aug 26 18:23:58.958476: | #36 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.958482: | start processing: state #36 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.958485: | parent state #36: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.958489: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.958492: "test" #36: responding to Main Mode Aug 26 18:23:58.958497: | **emit ISAKMP Message: Aug 26 18:23:58.958500: | initiator cookie: Aug 26 18:23:58.958503: | 38 48 92 06 58 41 75 d9 Aug 26 18:23:58.958505: | responder cookie: Aug 26 18:23:58.958508: | 08 3b 7d ce 04 91 9d 7d Aug 26 18:23:58.958510: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.958513: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.958516: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.958518: | flags: none (0x0) Aug 26 18:23:58.958521: | Message ID: 0 (0x0) Aug 26 18:23:58.958524: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.958527: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.958534: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.958536: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.958539: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.958542: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.958545: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.958549: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.958552: | ****parse IPsec DOI SIT: Aug 26 18:23:58.958554: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.958558: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.958561: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.958563: | length: 28 (0x1c) Aug 26 18:23:58.958566: | proposal number: 1 (0x1) Aug 26 18:23:58.958569: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.958571: | SPI size: 0 (0x0) Aug 26 18:23:58.958574: | number of transforms: 1 (0x1) Aug 26 18:23:58.958577: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.958580: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.958582: | length: 20 (0x14) Aug 26 18:23:58.958585: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.958587: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.958590: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.958593: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.958596: | length/value: 23 (0x17) Aug 26 18:23:58.958599: | [23 is UNUSED_23] Aug 26 18:23:58.958603: "test" #36: UNUSED_23 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.958605: "test" #36: no acceptable Oakley Transform Aug 26 18:23:58.958608: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.958614: | [RE]START processing: state #36 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.958616: | #36 is idle Aug 26 18:23:58.958692: "test" #36: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.958696: | **emit ISAKMP Message: Aug 26 18:23:58.958699: | initiator cookie: Aug 26 18:23:58.958701: | 38 48 92 06 58 41 75 d9 Aug 26 18:23:58.958704: | responder cookie: Aug 26 18:23:58.958706: | 08 3b 7d ce 04 91 9d 7d Aug 26 18:23:58.958709: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.958712: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.958714: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.958717: | flags: none (0x0) Aug 26 18:23:58.958719: | Message ID: 0 (0x0) Aug 26 18:23:58.958722: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.958725: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.958728: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.958731: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.958733: | protocol ID: 1 (0x1) Aug 26 18:23:58.958736: | SPI size: 0 (0x0) Aug 26 18:23:58.958739: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.958742: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.958745: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.958748: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.958751: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.958757: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #36) Aug 26 18:23:58.958760: | 38 48 92 06 58 41 75 d9 08 3b 7d ce 04 91 9d 7d Aug 26 18:23:58.958763: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.958765: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.958787: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.958795: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.958800: | stop processing: state #36 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.958804: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.958809: | spent 0.482 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:58.992792: | spent 0.00338 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:58.992819: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:58.992825: | 73 2a e3 2e 8c df 39 1d 00 00 00 00 00 00 00 00 Aug 26 18:23:58.992828: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 18:23:58.992830: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 18:23:58.992833: | 00 00 00 18 01 01 00 00 80 01 00 16 80 02 00 1e Aug 26 18:23:58.992835: | 80 03 00 06 80 04 00 04 Aug 26 18:23:58.992841: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:58.992846: | **parse ISAKMP Message: Aug 26 18:23:58.992849: | initiator cookie: Aug 26 18:23:58.992852: | 73 2a e3 2e 8c df 39 1d Aug 26 18:23:58.992854: | responder cookie: Aug 26 18:23:58.992857: | 00 00 00 00 00 00 00 00 Aug 26 18:23:58.992860: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.992863: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.992867: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.992870: | flags: none (0x0) Aug 26 18:23:58.992872: | Message ID: 0 (0x0) Aug 26 18:23:58.992875: | length: 72 (0x48) Aug 26 18:23:58.992879: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:58.992883: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:58.992886: | #null state always idle Aug 26 18:23:58.992890: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:58.992893: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:58.992897: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.992899: | length: 44 (0x2c) Aug 26 18:23:58.992902: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.992905: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:58.992908: | in statetime_start() with no state Aug 26 18:23:58.992915: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:58.992921: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:58.992925: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.992929: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:58.992932: | find_next_host_connection returns test Aug 26 18:23:58.992935: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:58.992938: | find_next_host_connection returns empty Aug 26 18:23:58.992959: | creating state object #37 at 0x55f088af3c60 Aug 26 18:23:58.992964: | State DB: adding IKEv1 state #37 in UNDEFINED Aug 26 18:23:58.992969: | pstats #37 ikev1.isakmp started Aug 26 18:23:58.992975: | #37 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:58.992982: | start processing: state #37 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:58.992987: | parent state #37: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:58.992991: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:58.992994: "test" #37: responding to Main Mode Aug 26 18:23:58.993000: | **emit ISAKMP Message: Aug 26 18:23:58.993003: | initiator cookie: Aug 26 18:23:58.993006: | 73 2a e3 2e 8c df 39 1d Aug 26 18:23:58.993009: | responder cookie: Aug 26 18:23:58.993011: | 28 26 2e 19 d3 9d 12 bb Aug 26 18:23:58.993014: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:58.993019: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.993022: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:58.993025: | flags: none (0x0) Aug 26 18:23:58.993028: | Message ID: 0 (0x0) Aug 26 18:23:58.993031: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.993034: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:58.993038: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:58.993041: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:58.993044: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.993047: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:58.993051: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:58.993054: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:58.993059: | ****parse IPsec DOI SIT: Aug 26 18:23:58.993062: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:58.993065: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:58.993068: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.993070: | length: 32 (0x20) Aug 26 18:23:58.993073: | proposal number: 1 (0x1) Aug 26 18:23:58.993076: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:58.993078: | SPI size: 0 (0x0) Aug 26 18:23:58.993081: | number of transforms: 1 (0x1) Aug 26 18:23:58.993084: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:58.993087: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.993090: | length: 24 (0x18) Aug 26 18:23:58.993093: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:58.993095: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:58.993098: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:58.993102: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:58.993105: | length/value: 22 (0x16) Aug 26 18:23:58.993108: | [22 is UNUSED_22] Aug 26 18:23:58.993113: "test" #37: UNUSED_22 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:58.993116: "test" #37: no acceptable Oakley Transform Aug 26 18:23:58.993120: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:58.993125: | [RE]START processing: state #37 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:58.993128: | #37 is idle Aug 26 18:23:58.993198: "test" #37: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:58.993203: | **emit ISAKMP Message: Aug 26 18:23:58.993207: | initiator cookie: Aug 26 18:23:58.993209: | 73 2a e3 2e 8c df 39 1d Aug 26 18:23:58.993212: | responder cookie: Aug 26 18:23:58.993215: | 28 26 2e 19 d3 9d 12 bb Aug 26 18:23:58.993218: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.993221: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:58.993223: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:58.993226: | flags: none (0x0) Aug 26 18:23:58.993229: | Message ID: 0 (0x0) Aug 26 18:23:58.993232: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:58.993235: | ***emit ISAKMP Notification Payload: Aug 26 18:23:58.993238: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:58.993241: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:58.993243: | protocol ID: 1 (0x1) Aug 26 18:23:58.993246: | SPI size: 0 (0x0) Aug 26 18:23:58.993249: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:58.993252: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:58.993255: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:58.993259: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:58.993264: | emitting length of ISAKMP Message: 40 Aug 26 18:23:58.993272: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #37) Aug 26 18:23:58.993275: | 73 2a e3 2e 8c df 39 1d 28 26 2e 19 d3 9d 12 bb Aug 26 18:23:58.993278: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:58.993281: | 00 00 00 01 01 00 00 0e Aug 26 18:23:58.993330: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:58.993341: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:58.993347: | stop processing: state #37 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:58.993351: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:58.993357: | spent 0.517 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:59.039921: | spent 0.00382 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:59.039951: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:59.039957: | 6a f7 e4 11 50 fd c2 64 00 00 00 00 00 00 00 00 Aug 26 18:23:59.039960: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:59.039962: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:59.039965: | 00 00 00 14 01 01 00 00 80 02 00 1e 80 03 00 06 Aug 26 18:23:59.039967: | 80 04 00 04 Aug 26 18:23:59.039973: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:59.039978: | **parse ISAKMP Message: Aug 26 18:23:59.039981: | initiator cookie: Aug 26 18:23:59.039984: | 6a f7 e4 11 50 fd c2 64 Aug 26 18:23:59.039987: | responder cookie: Aug 26 18:23:59.039989: | 00 00 00 00 00 00 00 00 Aug 26 18:23:59.039992: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.039996: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.039999: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.040002: | flags: none (0x0) Aug 26 18:23:59.040005: | Message ID: 0 (0x0) Aug 26 18:23:59.040008: | length: 68 (0x44) Aug 26 18:23:59.040011: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:59.040015: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:59.040018: | #null state always idle Aug 26 18:23:59.040022: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:59.040026: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:59.040029: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.040032: | length: 40 (0x28) Aug 26 18:23:59.040035: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.040038: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:59.040041: | in statetime_start() with no state Aug 26 18:23:59.040047: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:59.040054: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:59.040058: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.040062: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:59.040065: | find_next_host_connection returns test Aug 26 18:23:59.040068: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.040071: | find_next_host_connection returns empty Aug 26 18:23:59.040100: | creating state object #38 at 0x55f088af4720 Aug 26 18:23:59.040104: | State DB: adding IKEv1 state #38 in UNDEFINED Aug 26 18:23:59.040109: | pstats #38 ikev1.isakmp started Aug 26 18:23:59.040114: | #38 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:59.040121: | start processing: state #38 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:59.040125: | parent state #38: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:59.040132: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:59.040135: "test" #38: responding to Main Mode Aug 26 18:23:59.040141: | **emit ISAKMP Message: Aug 26 18:23:59.040144: | initiator cookie: Aug 26 18:23:59.040146: | 6a f7 e4 11 50 fd c2 64 Aug 26 18:23:59.040149: | responder cookie: Aug 26 18:23:59.040151: | 20 cc f9 25 70 78 65 c5 Aug 26 18:23:59.040154: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.040157: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.040160: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.040162: | flags: none (0x0) Aug 26 18:23:59.040165: | Message ID: 0 (0x0) Aug 26 18:23:59.040168: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.040171: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:59.040174: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:59.040177: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:59.040179: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.040183: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:59.040186: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:59.040189: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:59.040193: | ****parse IPsec DOI SIT: Aug 26 18:23:59.040195: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:59.040198: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:59.040201: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.040204: | length: 28 (0x1c) Aug 26 18:23:59.040207: | proposal number: 1 (0x1) Aug 26 18:23:59.040210: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:59.040212: | SPI size: 0 (0x0) Aug 26 18:23:59.040215: | number of transforms: 1 (0x1) Aug 26 18:23:59.040219: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:59.040222: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.040224: | length: 20 (0x14) Aug 26 18:23:59.040227: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:59.040230: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:59.040233: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:59.040236: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:23:59.040239: | length/value: 30 (0x1e) Aug 26 18:23:59.040243: "test" #38: 30?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Aug 26 18:23:59.040246: "test" #38: no acceptable Oakley Transform Aug 26 18:23:59.040250: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:59.040255: | [RE]START processing: state #38 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:59.040258: | #38 is idle Aug 26 18:23:59.040347: "test" #38: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:59.040359: | **emit ISAKMP Message: Aug 26 18:23:59.040363: | initiator cookie: Aug 26 18:23:59.040366: | 6a f7 e4 11 50 fd c2 64 Aug 26 18:23:59.040369: | responder cookie: Aug 26 18:23:59.040371: | 20 cc f9 25 70 78 65 c5 Aug 26 18:23:59.040374: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.040377: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.040380: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:59.040382: | flags: none (0x0) Aug 26 18:23:59.040385: | Message ID: 0 (0x0) Aug 26 18:23:59.040388: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.040391: | ***emit ISAKMP Notification Payload: Aug 26 18:23:59.040394: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.040397: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.040400: | protocol ID: 1 (0x1) Aug 26 18:23:59.040402: | SPI size: 0 (0x0) Aug 26 18:23:59.040407: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:59.040411: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:59.040414: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:59.040417: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:59.040420: | emitting length of ISAKMP Message: 40 Aug 26 18:23:59.040427: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #38) Aug 26 18:23:59.040430: | 6a f7 e4 11 50 fd c2 64 20 cc f9 25 70 78 65 c5 Aug 26 18:23:59.040433: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:59.040435: | 00 00 00 01 01 00 00 0e Aug 26 18:23:59.040463: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:59.040469: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:59.040474: | stop processing: state #38 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:59.040478: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:59.040484: | spent 0.516 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:59.105589: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:59.105616: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:59.105620: | 36 05 e1 02 3e cd 2e b6 00 00 00 00 00 00 00 00 Aug 26 18:23:59.105623: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:59.105625: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:59.105628: | 00 00 00 14 01 01 00 00 80 01 00 16 80 03 00 06 Aug 26 18:23:59.105630: | 80 04 00 04 Aug 26 18:23:59.105636: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:59.105640: | **parse ISAKMP Message: Aug 26 18:23:59.105643: | initiator cookie: Aug 26 18:23:59.105645: | 36 05 e1 02 3e cd 2e b6 Aug 26 18:23:59.105648: | responder cookie: Aug 26 18:23:59.105650: | 00 00 00 00 00 00 00 00 Aug 26 18:23:59.105653: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.105656: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.105659: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.105662: | flags: none (0x0) Aug 26 18:23:59.105664: | Message ID: 0 (0x0) Aug 26 18:23:59.105667: | length: 68 (0x44) Aug 26 18:23:59.105670: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:59.105674: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:59.105677: | #null state always idle Aug 26 18:23:59.105681: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:59.105684: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:59.105687: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.105689: | length: 40 (0x28) Aug 26 18:23:59.105692: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.105695: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:59.105698: | in statetime_start() with no state Aug 26 18:23:59.105704: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:59.105709: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:59.105712: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.105716: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:59.105719: | find_next_host_connection returns test Aug 26 18:23:59.105722: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.105724: | find_next_host_connection returns empty Aug 26 18:23:59.105744: | creating state object #39 at 0x55f088af51e0 Aug 26 18:23:59.105748: | State DB: adding IKEv1 state #39 in UNDEFINED Aug 26 18:23:59.105755: | pstats #39 ikev1.isakmp started Aug 26 18:23:59.105760: | #39 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:59.105767: | start processing: state #39 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:59.105771: | parent state #39: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:59.105774: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:59.105777: "test" #39: responding to Main Mode Aug 26 18:23:59.105783: | **emit ISAKMP Message: Aug 26 18:23:59.105785: | initiator cookie: Aug 26 18:23:59.105788: | 36 05 e1 02 3e cd 2e b6 Aug 26 18:23:59.105791: | responder cookie: Aug 26 18:23:59.105793: | fa 08 91 81 11 88 e5 57 Aug 26 18:23:59.105796: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.105798: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.105801: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.105804: | flags: none (0x0) Aug 26 18:23:59.105806: | Message ID: 0 (0x0) Aug 26 18:23:59.105809: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.105812: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:59.105815: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:59.105818: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:59.105821: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.105824: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:59.105827: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:59.105830: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:59.105833: | ****parse IPsec DOI SIT: Aug 26 18:23:59.105836: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:59.105839: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:59.105841: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.105844: | length: 28 (0x1c) Aug 26 18:23:59.105847: | proposal number: 1 (0x1) Aug 26 18:23:59.105850: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:59.105852: | SPI size: 0 (0x0) Aug 26 18:23:59.105855: | number of transforms: 1 (0x1) Aug 26 18:23:59.105858: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:59.105860: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.105863: | length: 20 (0x14) Aug 26 18:23:59.105865: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:59.105868: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:59.105871: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:59.105874: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:59.105877: | length/value: 22 (0x16) Aug 26 18:23:59.105879: | [22 is UNUSED_22] Aug 26 18:23:59.105883: "test" #39: UNUSED_22 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:59.105886: "test" #39: no acceptable Oakley Transform Aug 26 18:23:59.105889: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:59.105894: | [RE]START processing: state #39 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:59.105897: | #39 is idle Aug 26 18:23:59.105961: "test" #39: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:59.105966: | **emit ISAKMP Message: Aug 26 18:23:59.105969: | initiator cookie: Aug 26 18:23:59.105971: | 36 05 e1 02 3e cd 2e b6 Aug 26 18:23:59.105974: | responder cookie: Aug 26 18:23:59.105976: | fa 08 91 81 11 88 e5 57 Aug 26 18:23:59.105979: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.105981: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.105984: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:59.105989: | flags: none (0x0) Aug 26 18:23:59.105991: | Message ID: 0 (0x0) Aug 26 18:23:59.105994: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.105997: | ***emit ISAKMP Notification Payload: Aug 26 18:23:59.106000: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.106002: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.106005: | protocol ID: 1 (0x1) Aug 26 18:23:59.106007: | SPI size: 0 (0x0) Aug 26 18:23:59.106010: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:59.106013: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:59.106024: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:59.106027: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:59.106030: | emitting length of ISAKMP Message: 40 Aug 26 18:23:59.106037: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #39) Aug 26 18:23:59.106039: | 36 05 e1 02 3e cd 2e b6 fa 08 91 81 11 88 e5 57 Aug 26 18:23:59.106042: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:59.106044: | 00 00 00 01 01 00 00 0e Aug 26 18:23:59.106163: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:59.106172: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:59.106179: | stop processing: state #39 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:59.106182: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:59.106188: | spent 0.479 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:59.151639: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:59.151668: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:59.151672: | f8 1a 26 bc 94 c1 c4 dc 00 00 00 00 00 00 00 00 Aug 26 18:23:59.151675: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:59.151677: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:59.151679: | 00 00 00 14 01 01 00 00 80 01 00 16 80 02 00 1e Aug 26 18:23:59.151682: | 80 04 00 04 Aug 26 18:23:59.151687: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:59.151691: | **parse ISAKMP Message: Aug 26 18:23:59.151695: | initiator cookie: Aug 26 18:23:59.151697: | f8 1a 26 bc 94 c1 c4 dc Aug 26 18:23:59.151699: | responder cookie: Aug 26 18:23:59.151702: | 00 00 00 00 00 00 00 00 Aug 26 18:23:59.151705: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.151708: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.151711: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.151714: | flags: none (0x0) Aug 26 18:23:59.151716: | Message ID: 0 (0x0) Aug 26 18:23:59.151719: | length: 68 (0x44) Aug 26 18:23:59.151722: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:59.151727: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:59.151730: | #null state always idle Aug 26 18:23:59.151733: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:59.151737: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:59.151740: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.151742: | length: 40 (0x28) Aug 26 18:23:59.151745: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.151748: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:59.151751: | in statetime_start() with no state Aug 26 18:23:59.151758: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:59.151763: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:59.151767: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.151773: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:59.151776: | find_next_host_connection returns test Aug 26 18:23:59.151779: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.151782: | find_next_host_connection returns empty Aug 26 18:23:59.151803: | creating state object #40 at 0x55f088af5ca0 Aug 26 18:23:59.151807: | State DB: adding IKEv1 state #40 in UNDEFINED Aug 26 18:23:59.151812: | pstats #40 ikev1.isakmp started Aug 26 18:23:59.151817: | #40 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:59.151824: | start processing: state #40 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:59.151828: | parent state #40: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:59.151831: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:59.151834: "test" #40: responding to Main Mode Aug 26 18:23:59.151840: | **emit ISAKMP Message: Aug 26 18:23:59.151843: | initiator cookie: Aug 26 18:23:59.151845: | f8 1a 26 bc 94 c1 c4 dc Aug 26 18:23:59.151848: | responder cookie: Aug 26 18:23:59.151851: | 87 5d df ac 47 50 ab 5d Aug 26 18:23:59.151853: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.151856: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.151859: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.151862: | flags: none (0x0) Aug 26 18:23:59.151865: | Message ID: 0 (0x0) Aug 26 18:23:59.151867: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.151870: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:59.151873: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:59.151876: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:59.151878: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.151881: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:59.151885: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:59.151889: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:59.151892: | ****parse IPsec DOI SIT: Aug 26 18:23:59.151895: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:59.151898: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:59.151901: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.151903: | length: 28 (0x1c) Aug 26 18:23:59.151906: | proposal number: 1 (0x1) Aug 26 18:23:59.151908: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:59.151911: | SPI size: 0 (0x0) Aug 26 18:23:59.151913: | number of transforms: 1 (0x1) Aug 26 18:23:59.151916: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:59.151919: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.151922: | length: 20 (0x14) Aug 26 18:23:59.151925: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:59.151927: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:59.151930: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:59.151934: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:59.151936: | length/value: 22 (0x16) Aug 26 18:23:59.151939: | [22 is UNUSED_22] Aug 26 18:23:59.151943: "test" #40: UNUSED_22 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:59.151946: "test" #40: no acceptable Oakley Transform Aug 26 18:23:59.151949: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:59.151954: | [RE]START processing: state #40 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:59.151957: | #40 is idle Aug 26 18:23:59.152424: "test" #40: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:59.152436: | **emit ISAKMP Message: Aug 26 18:23:59.152439: | initiator cookie: Aug 26 18:23:59.152442: | f8 1a 26 bc 94 c1 c4 dc Aug 26 18:23:59.152444: | responder cookie: Aug 26 18:23:59.152447: | 87 5d df ac 47 50 ab 5d Aug 26 18:23:59.152450: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.152453: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.152455: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:59.152458: | flags: none (0x0) Aug 26 18:23:59.152461: | Message ID: 0 (0x0) Aug 26 18:23:59.152464: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.152467: | ***emit ISAKMP Notification Payload: Aug 26 18:23:59.152469: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.152472: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.152475: | protocol ID: 1 (0x1) Aug 26 18:23:59.152477: | SPI size: 0 (0x0) Aug 26 18:23:59.152480: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:59.152483: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:59.152486: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:59.152489: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:59.152492: | emitting length of ISAKMP Message: 40 Aug 26 18:23:59.152499: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #40) Aug 26 18:23:59.152502: | f8 1a 26 bc 94 c1 c4 dc 87 5d df ac 47 50 ab 5d Aug 26 18:23:59.152505: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:59.152507: | 00 00 00 01 01 00 00 0e Aug 26 18:23:59.152535: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:59.152541: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:59.152546: | stop processing: state #40 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:59.152550: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:59.152556: | spent 0.881 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:59.215518: | spent 0.00379 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:59.215548: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:59.215552: | 59 9e b9 c3 45 b4 52 14 00 00 00 00 00 00 00 00 Aug 26 18:23:59.215555: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:59.215557: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:59.215560: | 00 00 00 14 01 01 00 00 80 01 00 16 80 02 00 1e Aug 26 18:23:59.215562: | 80 03 00 06 Aug 26 18:23:59.215568: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:59.215573: | **parse ISAKMP Message: Aug 26 18:23:59.215576: | initiator cookie: Aug 26 18:23:59.215579: | 59 9e b9 c3 45 b4 52 14 Aug 26 18:23:59.215582: | responder cookie: Aug 26 18:23:59.215584: | 00 00 00 00 00 00 00 00 Aug 26 18:23:59.215587: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.215591: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.215593: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.215596: | flags: none (0x0) Aug 26 18:23:59.215599: | Message ID: 0 (0x0) Aug 26 18:23:59.215602: | length: 68 (0x44) Aug 26 18:23:59.215606: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:59.215610: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:59.215613: | #null state always idle Aug 26 18:23:59.215617: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:59.215621: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:59.215624: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.215626: | length: 40 (0x28) Aug 26 18:23:59.215632: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.215635: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:59.215638: | in statetime_start() with no state Aug 26 18:23:59.215645: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:59.215650: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:59.215653: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.215657: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:59.215660: | find_next_host_connection returns test Aug 26 18:23:59.215662: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.215665: | find_next_host_connection returns empty Aug 26 18:23:59.215692: | creating state object #41 at 0x55f088af6760 Aug 26 18:23:59.215696: | State DB: adding IKEv1 state #41 in UNDEFINED Aug 26 18:23:59.215701: | pstats #41 ikev1.isakmp started Aug 26 18:23:59.215706: | #41 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:59.215713: | start processing: state #41 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:59.215717: | parent state #41: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:59.215721: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:59.215725: "test" #41: responding to Main Mode Aug 26 18:23:59.215731: | **emit ISAKMP Message: Aug 26 18:23:59.215734: | initiator cookie: Aug 26 18:23:59.215737: | 59 9e b9 c3 45 b4 52 14 Aug 26 18:23:59.215740: | responder cookie: Aug 26 18:23:59.215742: | e0 32 04 64 95 83 ab 54 Aug 26 18:23:59.215746: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.215749: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.215752: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.215755: | flags: none (0x0) Aug 26 18:23:59.215758: | Message ID: 0 (0x0) Aug 26 18:23:59.215762: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.215766: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:59.215769: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:59.215771: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:59.215774: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.215777: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:59.215780: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:59.215783: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:59.215786: | ****parse IPsec DOI SIT: Aug 26 18:23:59.215789: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:59.215792: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:59.215795: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.215798: | length: 28 (0x1c) Aug 26 18:23:59.215800: | proposal number: 1 (0x1) Aug 26 18:23:59.215803: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:59.215806: | SPI size: 0 (0x0) Aug 26 18:23:59.215808: | number of transforms: 1 (0x1) Aug 26 18:23:59.215812: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:59.215814: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.215817: | length: 20 (0x14) Aug 26 18:23:59.215819: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:59.215822: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:59.215825: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:59.215828: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:59.215830: | length/value: 22 (0x16) Aug 26 18:23:59.215833: | [22 is UNUSED_22] Aug 26 18:23:59.215837: "test" #41: UNUSED_22 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:59.215843: "test" #41: no acceptable Oakley Transform Aug 26 18:23:59.215847: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:59.215852: | [RE]START processing: state #41 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:59.215855: | #41 is idle Aug 26 18:23:59.215918: "test" #41: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:59.215923: | **emit ISAKMP Message: Aug 26 18:23:59.215927: | initiator cookie: Aug 26 18:23:59.215929: | 59 9e b9 c3 45 b4 52 14 Aug 26 18:23:59.215932: | responder cookie: Aug 26 18:23:59.215934: | e0 32 04 64 95 83 ab 54 Aug 26 18:23:59.215937: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.215939: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.215942: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:59.215944: | flags: none (0x0) Aug 26 18:23:59.215947: | Message ID: 0 (0x0) Aug 26 18:23:59.215950: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.215953: | ***emit ISAKMP Notification Payload: Aug 26 18:23:59.215956: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.215958: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.215961: | protocol ID: 1 (0x1) Aug 26 18:23:59.215963: | SPI size: 0 (0x0) Aug 26 18:23:59.215966: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:59.215969: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:59.215972: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:59.215975: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:59.215977: | emitting length of ISAKMP Message: 40 Aug 26 18:23:59.215984: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #41) Aug 26 18:23:59.215987: | 59 9e b9 c3 45 b4 52 14 e0 32 04 64 95 83 ab 54 Aug 26 18:23:59.215989: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:59.215992: | 00 00 00 01 01 00 00 0e Aug 26 18:23:59.216017: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:59.216023: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:59.216028: | stop processing: state #41 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:59.216031: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:59.216037: | spent 0.49 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:59.255523: | spent 0.00447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:59.255553: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:59.255559: | fd a2 5e 57 96 1b c4 50 00 00 00 00 00 00 00 00 Aug 26 18:23:59.255562: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 18:23:59.255564: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 18:23:59.255567: | 00 00 00 18 01 01 00 00 80 01 00 18 80 02 00 04 Aug 26 18:23:59.255569: | 80 03 00 18 80 04 00 17 Aug 26 18:23:59.255575: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:59.255580: | **parse ISAKMP Message: Aug 26 18:23:59.255583: | initiator cookie: Aug 26 18:23:59.255585: | fd a2 5e 57 96 1b c4 50 Aug 26 18:23:59.255588: | responder cookie: Aug 26 18:23:59.255590: | 00 00 00 00 00 00 00 00 Aug 26 18:23:59.255594: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.255597: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.255600: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.255603: | flags: none (0x0) Aug 26 18:23:59.255605: | Message ID: 0 (0x0) Aug 26 18:23:59.255608: | length: 72 (0x48) Aug 26 18:23:59.255614: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:59.255618: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:59.255620: | #null state always idle Aug 26 18:23:59.255624: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:59.255628: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:59.255631: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.255633: | length: 44 (0x2c) Aug 26 18:23:59.255636: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.255639: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:59.255642: | in statetime_start() with no state Aug 26 18:23:59.255647: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:59.255653: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:59.255657: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.255660: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:59.255663: | find_next_host_connection returns test Aug 26 18:23:59.255666: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.255669: | find_next_host_connection returns empty Aug 26 18:23:59.255689: | creating state object #42 at 0x55f088af7220 Aug 26 18:23:59.255694: | State DB: adding IKEv1 state #42 in UNDEFINED Aug 26 18:23:59.255698: | pstats #42 ikev1.isakmp started Aug 26 18:23:59.255703: | #42 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:59.255710: | start processing: state #42 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:59.255714: | parent state #42: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:59.255718: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:59.255721: "test" #42: responding to Main Mode Aug 26 18:23:59.255726: | **emit ISAKMP Message: Aug 26 18:23:59.255729: | initiator cookie: Aug 26 18:23:59.255732: | fd a2 5e 57 96 1b c4 50 Aug 26 18:23:59.255734: | responder cookie: Aug 26 18:23:59.255736: | 60 4d 27 b9 d4 1b bf 51 Aug 26 18:23:59.255739: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.255742: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.255745: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.255747: | flags: none (0x0) Aug 26 18:23:59.255750: | Message ID: 0 (0x0) Aug 26 18:23:59.255753: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.255756: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:59.255760: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:59.255763: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:59.255765: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.255769: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:59.255772: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:59.255775: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:59.255779: | ****parse IPsec DOI SIT: Aug 26 18:23:59.255782: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:59.255784: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:59.255787: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.255789: | length: 32 (0x20) Aug 26 18:23:59.255792: | proposal number: 1 (0x1) Aug 26 18:23:59.255794: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:59.255797: | SPI size: 0 (0x0) Aug 26 18:23:59.255799: | number of transforms: 1 (0x1) Aug 26 18:23:59.255802: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:59.255805: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.255810: | length: 24 (0x18) Aug 26 18:23:59.255812: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:59.255814: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:59.255817: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:59.255819: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:59.255821: | length/value: 24 (0x18) Aug 26 18:23:59.255824: | [24 is OAKLEY_CAMELLIA_CTR] Aug 26 18:23:59.255827: "test" #42: OAKLEY_CAMELLIA_CTR is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:59.255830: "test" #42: no acceptable Oakley Transform Aug 26 18:23:59.255832: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:59.255837: | [RE]START processing: state #42 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:59.255839: | #42 is idle Aug 26 18:23:59.255897: "test" #42: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:59.255901: | **emit ISAKMP Message: Aug 26 18:23:59.255904: | initiator cookie: Aug 26 18:23:59.255906: | fd a2 5e 57 96 1b c4 50 Aug 26 18:23:59.255908: | responder cookie: Aug 26 18:23:59.255911: | 60 4d 27 b9 d4 1b bf 51 Aug 26 18:23:59.255913: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.255916: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.255919: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:59.255921: | flags: none (0x0) Aug 26 18:23:59.255923: | Message ID: 0 (0x0) Aug 26 18:23:59.255926: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.255929: | ***emit ISAKMP Notification Payload: Aug 26 18:23:59.255932: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.255934: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.255936: | protocol ID: 1 (0x1) Aug 26 18:23:59.255939: | SPI size: 0 (0x0) Aug 26 18:23:59.255941: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:59.255944: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:59.255946: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:59.255949: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:59.255951: | emitting length of ISAKMP Message: 40 Aug 26 18:23:59.255957: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #42) Aug 26 18:23:59.255959: | fd a2 5e 57 96 1b c4 50 60 4d 27 b9 d4 1b bf 51 Aug 26 18:23:59.255961: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:59.255963: | 00 00 00 01 01 00 00 0e Aug 26 18:23:59.256001: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:59.256007: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:59.256012: | stop processing: state #42 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:59.256015: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:59.256020: | spent 0.46 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:59.301925: | spent 0.0039 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:59.301954: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:59.301959: | 75 07 f6 20 8b 61 12 44 00 00 00 00 00 00 00 00 Aug 26 18:23:59.301961: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:59.301964: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:59.301966: | 00 00 00 14 01 01 00 00 80 02 00 04 80 03 00 18 Aug 26 18:23:59.301968: | 80 04 00 17 Aug 26 18:23:59.301974: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:59.301978: | **parse ISAKMP Message: Aug 26 18:23:59.301981: | initiator cookie: Aug 26 18:23:59.301984: | 75 07 f6 20 8b 61 12 44 Aug 26 18:23:59.301989: | responder cookie: Aug 26 18:23:59.301992: | 00 00 00 00 00 00 00 00 Aug 26 18:23:59.301995: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.301998: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.302001: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.302003: | flags: none (0x0) Aug 26 18:23:59.302006: | Message ID: 0 (0x0) Aug 26 18:23:59.302009: | length: 68 (0x44) Aug 26 18:23:59.302012: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:59.302017: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:59.302020: | #null state always idle Aug 26 18:23:59.302024: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:59.302027: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:59.302030: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.302033: | length: 40 (0x28) Aug 26 18:23:59.302036: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.302039: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:59.302042: | in statetime_start() with no state Aug 26 18:23:59.302048: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:59.302054: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:59.302057: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.302061: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:59.302064: | find_next_host_connection returns test Aug 26 18:23:59.302067: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.302070: | find_next_host_connection returns empty Aug 26 18:23:59.302092: | creating state object #43 at 0x55f088af7ce0 Aug 26 18:23:59.302096: | State DB: adding IKEv1 state #43 in UNDEFINED Aug 26 18:23:59.302101: | pstats #43 ikev1.isakmp started Aug 26 18:23:59.302107: | #43 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:59.302114: | start processing: state #43 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:59.302118: | parent state #43: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:59.302121: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:59.302125: "test" #43: responding to Main Mode Aug 26 18:23:59.302131: | **emit ISAKMP Message: Aug 26 18:23:59.302134: | initiator cookie: Aug 26 18:23:59.302137: | 75 07 f6 20 8b 61 12 44 Aug 26 18:23:59.302139: | responder cookie: Aug 26 18:23:59.302142: | 74 d6 39 c4 98 6f 27 6b Aug 26 18:23:59.302145: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.302148: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.302151: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.302153: | flags: none (0x0) Aug 26 18:23:59.302156: | Message ID: 0 (0x0) Aug 26 18:23:59.302159: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.302163: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:59.302167: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:59.302169: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:59.302172: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.302176: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:59.302180: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:59.302183: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:59.302187: | ****parse IPsec DOI SIT: Aug 26 18:23:59.302190: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:59.302196: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:59.302199: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.302202: | length: 28 (0x1c) Aug 26 18:23:59.302205: | proposal number: 1 (0x1) Aug 26 18:23:59.302208: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:59.302210: | SPI size: 0 (0x0) Aug 26 18:23:59.302213: | number of transforms: 1 (0x1) Aug 26 18:23:59.302217: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:59.302219: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.302222: | length: 20 (0x14) Aug 26 18:23:59.302225: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:59.302227: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:59.302230: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:59.302234: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:23:59.302237: | length/value: 4 (0x4) Aug 26 18:23:59.302240: | [4 is OAKLEY_SHA2_256] Aug 26 18:23:59.302244: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:59.302247: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:23:59.302249: | length/value: 24 (0x18) Aug 26 18:23:59.302254: "test" #43: Pluto does not support 24?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Aug 26 18:23:59.302257: "test" #43: no acceptable Oakley Transform Aug 26 18:23:59.302260: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:59.302266: | [RE]START processing: state #43 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:59.302269: | #43 is idle Aug 26 18:23:59.302379: "test" #43: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:59.302387: | **emit ISAKMP Message: Aug 26 18:23:59.302391: | initiator cookie: Aug 26 18:23:59.302393: | 75 07 f6 20 8b 61 12 44 Aug 26 18:23:59.302396: | responder cookie: Aug 26 18:23:59.302398: | 74 d6 39 c4 98 6f 27 6b Aug 26 18:23:59.302401: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.302404: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.302407: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:59.302409: | flags: none (0x0) Aug 26 18:23:59.302412: | Message ID: 0 (0x0) Aug 26 18:23:59.302415: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.302417: | ***emit ISAKMP Notification Payload: Aug 26 18:23:59.302420: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.302423: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.302426: | protocol ID: 1 (0x1) Aug 26 18:23:59.302428: | SPI size: 0 (0x0) Aug 26 18:23:59.302431: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:59.302435: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:59.302438: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:59.302441: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:59.302444: | emitting length of ISAKMP Message: 40 Aug 26 18:23:59.302450: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #43) Aug 26 18:23:59.302453: | 75 07 f6 20 8b 61 12 44 74 d6 39 c4 98 6f 27 6b Aug 26 18:23:59.302456: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:59.302458: | 00 00 00 01 01 00 00 0e Aug 26 18:23:59.302473: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:59.302479: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:59.302484: | stop processing: state #43 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:59.302488: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:59.302494: | spent 0.519 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:59.341749: | spent 0.00346 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:59.341778: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:59.341782: | b7 df cb c1 26 53 1c 6e 00 00 00 00 00 00 00 00 Aug 26 18:23:59.341785: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:59.341788: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:59.341791: | 00 00 00 14 01 01 00 00 80 01 00 18 80 03 00 18 Aug 26 18:23:59.341793: | 80 04 00 17 Aug 26 18:23:59.341798: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:59.341802: | **parse ISAKMP Message: Aug 26 18:23:59.341806: | initiator cookie: Aug 26 18:23:59.341808: | b7 df cb c1 26 53 1c 6e Aug 26 18:23:59.341811: | responder cookie: Aug 26 18:23:59.341813: | 00 00 00 00 00 00 00 00 Aug 26 18:23:59.341816: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.341819: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.341822: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.341825: | flags: none (0x0) Aug 26 18:23:59.341828: | Message ID: 0 (0x0) Aug 26 18:23:59.341830: | length: 68 (0x44) Aug 26 18:23:59.341833: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:59.341837: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:59.341840: | #null state always idle Aug 26 18:23:59.341844: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:59.341847: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:59.341850: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.341853: | length: 40 (0x28) Aug 26 18:23:59.341855: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.341858: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:59.341861: | in statetime_start() with no state Aug 26 18:23:59.341866: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:59.341872: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:59.341875: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.341879: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:59.341882: | find_next_host_connection returns test Aug 26 18:23:59.341885: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.341887: | find_next_host_connection returns empty Aug 26 18:23:59.341910: | creating state object #44 at 0x55f088af87a0 Aug 26 18:23:59.341913: | State DB: adding IKEv1 state #44 in UNDEFINED Aug 26 18:23:59.341917: | pstats #44 ikev1.isakmp started Aug 26 18:23:59.341922: | #44 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:59.341927: | start processing: state #44 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:59.341931: | parent state #44: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:59.341934: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:59.341937: "test" #44: responding to Main Mode Aug 26 18:23:59.341942: | **emit ISAKMP Message: Aug 26 18:23:59.341945: | initiator cookie: Aug 26 18:23:59.341947: | b7 df cb c1 26 53 1c 6e Aug 26 18:23:59.341950: | responder cookie: Aug 26 18:23:59.341952: | ce 18 40 2a 60 9a 7e 10 Aug 26 18:23:59.341955: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.341958: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.341960: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.341963: | flags: none (0x0) Aug 26 18:23:59.341965: | Message ID: 0 (0x0) Aug 26 18:23:59.341969: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.341972: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:59.341975: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:59.341978: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:59.341982: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.341985: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:59.341989: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:59.341992: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:59.341995: | ****parse IPsec DOI SIT: Aug 26 18:23:59.341998: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:59.342000: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:59.342003: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.342006: | length: 28 (0x1c) Aug 26 18:23:59.342008: | proposal number: 1 (0x1) Aug 26 18:23:59.342011: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:59.342013: | SPI size: 0 (0x0) Aug 26 18:23:59.342016: | number of transforms: 1 (0x1) Aug 26 18:23:59.342019: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:59.342021: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.342024: | length: 20 (0x14) Aug 26 18:23:59.342026: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:59.342029: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:59.342032: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:59.342035: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:59.342037: | length/value: 24 (0x18) Aug 26 18:23:59.342040: | [24 is OAKLEY_CAMELLIA_CTR] Aug 26 18:23:59.342044: "test" #44: OAKLEY_CAMELLIA_CTR is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:59.342047: "test" #44: no acceptable Oakley Transform Aug 26 18:23:59.342050: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:59.342055: | [RE]START processing: state #44 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:59.342057: | #44 is idle Aug 26 18:23:59.342275: "test" #44: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:59.342283: | **emit ISAKMP Message: Aug 26 18:23:59.342286: | initiator cookie: Aug 26 18:23:59.342299: | b7 df cb c1 26 53 1c 6e Aug 26 18:23:59.342303: | responder cookie: Aug 26 18:23:59.342305: | ce 18 40 2a 60 9a 7e 10 Aug 26 18:23:59.342308: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.342311: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.342314: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:59.342318: | flags: none (0x0) Aug 26 18:23:59.342320: | Message ID: 0 (0x0) Aug 26 18:23:59.342323: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.342326: | ***emit ISAKMP Notification Payload: Aug 26 18:23:59.342329: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.342332: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.342335: | protocol ID: 1 (0x1) Aug 26 18:23:59.342337: | SPI size: 0 (0x0) Aug 26 18:23:59.342340: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:59.342344: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:59.342347: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:59.342350: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:59.342353: | emitting length of ISAKMP Message: 40 Aug 26 18:23:59.342359: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #44) Aug 26 18:23:59.342362: | b7 df cb c1 26 53 1c 6e ce 18 40 2a 60 9a 7e 10 Aug 26 18:23:59.342365: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:59.342367: | 00 00 00 01 01 00 00 0e Aug 26 18:23:59.342412: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:59.342420: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:59.342425: | stop processing: state #44 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:59.342428: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:59.342435: | spent 0.492 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:59.379847: | spent 0.00368 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:59.379876: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:59.379881: | da c6 32 ba f0 64 a6 80 00 00 00 00 00 00 00 00 Aug 26 18:23:59.379884: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:59.379886: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:59.379889: | 00 00 00 14 01 01 00 00 80 01 00 18 80 02 00 04 Aug 26 18:23:59.379891: | 80 04 00 17 Aug 26 18:23:59.379896: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:59.379901: | **parse ISAKMP Message: Aug 26 18:23:59.379904: | initiator cookie: Aug 26 18:23:59.379906: | da c6 32 ba f0 64 a6 80 Aug 26 18:23:59.379908: | responder cookie: Aug 26 18:23:59.379910: | 00 00 00 00 00 00 00 00 Aug 26 18:23:59.379913: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.379916: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.379918: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.379921: | flags: none (0x0) Aug 26 18:23:59.379923: | Message ID: 0 (0x0) Aug 26 18:23:59.379925: | length: 68 (0x44) Aug 26 18:23:59.379928: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:59.379932: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:59.379935: | #null state always idle Aug 26 18:23:59.379938: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:59.379941: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:59.379944: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.379947: | length: 40 (0x28) Aug 26 18:23:59.379949: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.379952: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:59.379955: | in statetime_start() with no state Aug 26 18:23:59.379960: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:59.379966: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:59.379969: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.379973: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:59.379976: | find_next_host_connection returns test Aug 26 18:23:59.379978: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.379981: | find_next_host_connection returns empty Aug 26 18:23:59.380005: | creating state object #45 at 0x55f088af9260 Aug 26 18:23:59.380009: | State DB: adding IKEv1 state #45 in UNDEFINED Aug 26 18:23:59.380013: | pstats #45 ikev1.isakmp started Aug 26 18:23:59.380018: | #45 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:59.380024: | start processing: state #45 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:59.380027: | parent state #45: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:59.380031: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:59.380034: "test" #45: responding to Main Mode Aug 26 18:23:59.380040: | **emit ISAKMP Message: Aug 26 18:23:59.380043: | initiator cookie: Aug 26 18:23:59.380045: | da c6 32 ba f0 64 a6 80 Aug 26 18:23:59.380047: | responder cookie: Aug 26 18:23:59.380049: | 30 3a 48 a4 64 72 82 f9 Aug 26 18:23:59.380051: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.380054: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.380060: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.380063: | flags: none (0x0) Aug 26 18:23:59.380065: | Message ID: 0 (0x0) Aug 26 18:23:59.380068: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.380071: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:59.380075: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:59.380077: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:59.380080: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.380083: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:59.380087: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:59.380090: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:59.380094: | ****parse IPsec DOI SIT: Aug 26 18:23:59.380097: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:59.380100: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:59.380103: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.380106: | length: 28 (0x1c) Aug 26 18:23:59.380109: | proposal number: 1 (0x1) Aug 26 18:23:59.380111: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:59.380114: | SPI size: 0 (0x0) Aug 26 18:23:59.380117: | number of transforms: 1 (0x1) Aug 26 18:23:59.380120: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:59.380123: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.380126: | length: 20 (0x14) Aug 26 18:23:59.380128: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:59.380131: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:59.380134: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:59.380136: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:59.380139: | length/value: 24 (0x18) Aug 26 18:23:59.380142: | [24 is OAKLEY_CAMELLIA_CTR] Aug 26 18:23:59.380146: "test" #45: OAKLEY_CAMELLIA_CTR is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:59.380149: "test" #45: no acceptable Oakley Transform Aug 26 18:23:59.380152: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:59.380158: | [RE]START processing: state #45 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:59.380161: | #45 is idle Aug 26 18:23:59.380229: "test" #45: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:59.380234: | **emit ISAKMP Message: Aug 26 18:23:59.380236: | initiator cookie: Aug 26 18:23:59.380239: | da c6 32 ba f0 64 a6 80 Aug 26 18:23:59.380241: | responder cookie: Aug 26 18:23:59.380243: | 30 3a 48 a4 64 72 82 f9 Aug 26 18:23:59.380246: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.380249: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.380251: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:59.380254: | flags: none (0x0) Aug 26 18:23:59.380257: | Message ID: 0 (0x0) Aug 26 18:23:59.380260: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.380263: | ***emit ISAKMP Notification Payload: Aug 26 18:23:59.380266: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.380269: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.380272: | protocol ID: 1 (0x1) Aug 26 18:23:59.380274: | SPI size: 0 (0x0) Aug 26 18:23:59.380277: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:59.380281: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:59.380284: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:59.380287: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:59.380298: | emitting length of ISAKMP Message: 40 Aug 26 18:23:59.380308: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #45) Aug 26 18:23:59.380311: | da c6 32 ba f0 64 a6 80 30 3a 48 a4 64 72 82 f9 Aug 26 18:23:59.380314: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:59.380316: | 00 00 00 01 01 00 00 0e Aug 26 18:23:59.380345: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:59.380352: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:59.380358: | stop processing: state #45 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:59.380361: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:59.380368: | spent 0.485 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:59.420388: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:23:59.420414: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 18:23:59.420418: | 72 42 77 2d 52 25 77 37 00 00 00 00 00 00 00 00 Aug 26 18:23:59.420420: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 18:23:59.420422: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 18:23:59.420424: | 00 00 00 14 01 01 00 00 80 01 00 18 80 02 00 04 Aug 26 18:23:59.420426: | 80 03 00 18 Aug 26 18:23:59.420431: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 18:23:59.420436: | **parse ISAKMP Message: Aug 26 18:23:59.420439: | initiator cookie: Aug 26 18:23:59.420441: | 72 42 77 2d 52 25 77 37 Aug 26 18:23:59.420443: | responder cookie: Aug 26 18:23:59.420445: | 00 00 00 00 00 00 00 00 Aug 26 18:23:59.420448: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.420450: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.420453: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.420456: | flags: none (0x0) Aug 26 18:23:59.420458: | Message ID: 0 (0x0) Aug 26 18:23:59.420460: | length: 68 (0x44) Aug 26 18:23:59.420463: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:23:59.420466: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 18:23:59.420469: | #null state always idle Aug 26 18:23:59.420472: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:23:59.420475: | ***parse ISAKMP Security Association Payload: Aug 26 18:23:59.420477: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.420479: | length: 40 (0x28) Aug 26 18:23:59.420482: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.420484: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 18:23:59.420486: | in statetime_start() with no state Aug 26 18:23:59.420491: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 18:23:59.420496: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 18:23:59.420499: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.420503: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 18:23:59.420506: | find_next_host_connection returns test Aug 26 18:23:59.420508: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 18:23:59.420511: | find_next_host_connection returns empty Aug 26 18:23:59.420540: | creating state object #46 at 0x55f088af9d20 Aug 26 18:23:59.420543: | State DB: adding IKEv1 state #46 in UNDEFINED Aug 26 18:23:59.420547: | pstats #46 ikev1.isakmp started Aug 26 18:23:59.420552: | #46 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 18:23:59.420557: | start processing: state #46 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 18:23:59.420561: | parent state #46: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 18:23:59.420565: | sender checking NAT-T: enabled; VID 0 Aug 26 18:23:59.420573: "test" #46: responding to Main Mode Aug 26 18:23:59.420578: | **emit ISAKMP Message: Aug 26 18:23:59.420581: | initiator cookie: Aug 26 18:23:59.420583: | 72 42 77 2d 52 25 77 37 Aug 26 18:23:59.420585: | responder cookie: Aug 26 18:23:59.420587: | 35 0d 83 77 bf 0b 75 0e Aug 26 18:23:59.420590: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:23:59.420593: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.420596: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:23:59.420598: | flags: none (0x0) Aug 26 18:23:59.420601: | Message ID: 0 (0x0) Aug 26 18:23:59.420604: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.420607: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:23:59.420610: | ***emit ISAKMP Security Association Payload: Aug 26 18:23:59.420612: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:23:59.420615: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.420618: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:23:59.420621: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:23:59.420624: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:23:59.420628: | ****parse IPsec DOI SIT: Aug 26 18:23:59.420631: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:23:59.420633: | ****parse ISAKMP Proposal Payload: Aug 26 18:23:59.420636: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.420639: | length: 28 (0x1c) Aug 26 18:23:59.420641: | proposal number: 1 (0x1) Aug 26 18:23:59.420644: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:23:59.420646: | SPI size: 0 (0x0) Aug 26 18:23:59.420649: | number of transforms: 1 (0x1) Aug 26 18:23:59.420652: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:23:59.420654: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.420657: | length: 20 (0x14) Aug 26 18:23:59.420660: | ISAKMP transform number: 1 (0x1) Aug 26 18:23:59.420662: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:23:59.420665: | ******parse ISAKMP Oakley attribute: Aug 26 18:23:59.420668: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:23:59.420671: | length/value: 24 (0x18) Aug 26 18:23:59.420674: | [24 is OAKLEY_CAMELLIA_CTR] Aug 26 18:23:59.420678: "test" #46: OAKLEY_CAMELLIA_CTR is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 18:23:59.420681: "test" #46: no acceptable Oakley Transform Aug 26 18:23:59.420684: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 18:23:59.420690: | [RE]START processing: state #46 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:23:59.420692: | #46 is idle Aug 26 18:23:59.420775: "test" #46: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 18:23:59.420781: | **emit ISAKMP Message: Aug 26 18:23:59.420784: | initiator cookie: Aug 26 18:23:59.420786: | 72 42 77 2d 52 25 77 37 Aug 26 18:23:59.420789: | responder cookie: Aug 26 18:23:59.420791: | 35 0d 83 77 bf 0b 75 0e Aug 26 18:23:59.420794: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.420797: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:23:59.420800: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 18:23:59.420803: | flags: none (0x0) Aug 26 18:23:59.420806: | Message ID: 0 (0x0) Aug 26 18:23:59.420809: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:23:59.420812: | ***emit ISAKMP Notification Payload: Aug 26 18:23:59.420815: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:23:59.420818: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:23:59.420820: | protocol ID: 1 (0x1) Aug 26 18:23:59.420823: | SPI size: 0 (0x0) Aug 26 18:23:59.420828: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 18:23:59.420832: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 18:23:59.420835: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 18:23:59.420839: | emitting length of ISAKMP Notification Payload: 12 Aug 26 18:23:59.420842: | emitting length of ISAKMP Message: 40 Aug 26 18:23:59.420849: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #46) Aug 26 18:23:59.420852: | 72 42 77 2d 52 25 77 37 35 0d 83 77 bf 0b 75 0e Aug 26 18:23:59.420855: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 18:23:59.420858: | 00 00 00 01 01 00 00 0e Aug 26 18:23:59.420886: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 18:23:59.420893: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:23:59.420898: | stop processing: state #46 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 18:23:59.420902: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:23:59.420908: | spent 0.485 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:23:59.632692: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:23:59.632718: shutting down Aug 26 18:23:59.632729: | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825) Aug 26 18:23:59.632734: | certs and keys locked by 'free_preshared_secrets' Aug 26 18:23:59.632737: forgetting secrets Aug 26 18:23:59.632741: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 18:23:59.632746: | start processing: connection "test" (in delete_connection() at connections.c:189) Aug 26 18:23:59.632750: | Deleting states for connection - including all other IPsec SA's of this IKE SA Aug 26 18:23:59.632753: | pass 0 Aug 26 18:23:59.632756: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 18:23:59.632759: | state #46 Aug 26 18:23:59.632763: | suspend processing: connection "test" (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.632769: | start processing: state #46 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.632772: | pstats #46 ikev1.isakmp deleted other Aug 26 18:23:59.632777: | [RE]START processing: state #46 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.632782: "test" #46: deleting state (STATE_MAIN_R0) aged 0.212s and NOT sending notification Aug 26 18:23:59.632786: | parent state #46: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.633233: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.633243: | stop processing: connection "test" (BACKGROUND) (in update_state_connection() at connections.c:4076) Aug 26 18:23:59.633246: | start processing: connection NULL (in update_state_connection() at connections.c:4077) Aug 26 18:23:59.633249: | in connection_discard for connection test Aug 26 18:23:59.633252: | State DB: deleting IKEv1 state #46 in MAIN_R0 Aug 26 18:23:59.633256: | parent state #46: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.633267: | stop processing: state #46 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.633278: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.633281: | state #45 Aug 26 18:23:59.633286: | start processing: state #45 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.633297: | pstats #45 ikev1.isakmp deleted other Aug 26 18:23:59.633302: | [RE]START processing: state #45 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.633309: "test" #45: deleting state (STATE_MAIN_R0) aged 0.253s and NOT sending notification Aug 26 18:23:59.633312: | parent state #45: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.633356: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.633360: | in connection_discard for connection test Aug 26 18:23:59.633363: | State DB: deleting IKEv1 state #45 in MAIN_R0 Aug 26 18:23:59.633367: | parent state #45: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.633371: | stop processing: state #45 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.633375: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.633377: | state #44 Aug 26 18:23:59.633382: | start processing: state #44 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.633385: | pstats #44 ikev1.isakmp deleted other Aug 26 18:23:59.633389: | [RE]START processing: state #44 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.633392: "test" #44: deleting state (STATE_MAIN_R0) aged 0.291s and NOT sending notification Aug 26 18:23:59.633395: | parent state #44: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.633433: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.633437: | in connection_discard for connection test Aug 26 18:23:59.633440: | State DB: deleting IKEv1 state #44 in MAIN_R0 Aug 26 18:23:59.633443: | parent state #44: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.633447: | stop processing: state #44 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.633454: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.633457: | state #43 Aug 26 18:23:59.633461: | start processing: state #43 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.633464: | pstats #43 ikev1.isakmp deleted other Aug 26 18:23:59.633469: | [RE]START processing: state #43 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.633472: "test" #43: deleting state (STATE_MAIN_R0) aged 0.331s and NOT sending notification Aug 26 18:23:59.633475: | parent state #43: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.633513: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.633517: | in connection_discard for connection test Aug 26 18:23:59.633520: | State DB: deleting IKEv1 state #43 in MAIN_R0 Aug 26 18:23:59.633523: | parent state #43: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.633528: | stop processing: state #43 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.633534: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.633537: | state #42 Aug 26 18:23:59.633541: | start processing: state #42 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.633544: | pstats #42 ikev1.isakmp deleted other Aug 26 18:23:59.633548: | [RE]START processing: state #42 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.633552: "test" #42: deleting state (STATE_MAIN_R0) aged 0.377s and NOT sending notification Aug 26 18:23:59.633554: | parent state #42: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.633592: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.633596: | in connection_discard for connection test Aug 26 18:23:59.633598: | State DB: deleting IKEv1 state #42 in MAIN_R0 Aug 26 18:23:59.633602: | parent state #42: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.633606: | stop processing: state #42 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.633609: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.633612: | state #41 Aug 26 18:23:59.633618: | start processing: state #41 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.633621: | pstats #41 ikev1.isakmp deleted other Aug 26 18:23:59.633625: | [RE]START processing: state #41 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.633629: "test" #41: deleting state (STATE_MAIN_R0) aged 0.417s and NOT sending notification Aug 26 18:23:59.633631: | parent state #41: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.646432: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.646449: | in connection_discard for connection test Aug 26 18:23:59.646454: | State DB: deleting IKEv1 state #41 in MAIN_R0 Aug 26 18:23:59.646459: | parent state #41: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.646466: | stop processing: state #41 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.646480: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.646483: | state #40 Aug 26 18:23:59.646489: | start processing: state #40 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.646492: | pstats #40 ikev1.isakmp deleted other Aug 26 18:23:59.646497: | [RE]START processing: state #40 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.646502: "test" #40: deleting state (STATE_MAIN_R0) aged 0.494s and NOT sending notification Aug 26 18:23:59.646505: | parent state #40: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.646581: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.646588: | in connection_discard for connection test Aug 26 18:23:59.646591: | State DB: deleting IKEv1 state #40 in MAIN_R0 Aug 26 18:23:59.646595: | parent state #40: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.646600: | stop processing: state #40 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.646609: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.646612: | state #39 Aug 26 18:23:59.646617: | start processing: state #39 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.646620: | pstats #39 ikev1.isakmp deleted other Aug 26 18:23:59.646625: | [RE]START processing: state #39 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.646628: "test" #39: deleting state (STATE_MAIN_R0) aged 0.540s and NOT sending notification Aug 26 18:23:59.646631: | parent state #39: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.646679: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.646684: | in connection_discard for connection test Aug 26 18:23:59.646688: | State DB: deleting IKEv1 state #39 in MAIN_R0 Aug 26 18:23:59.646691: | parent state #39: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.646696: | stop processing: state #39 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.646700: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.646703: | state #38 Aug 26 18:23:59.646708: | start processing: state #38 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.646711: | pstats #38 ikev1.isakmp deleted other Aug 26 18:23:59.646715: | [RE]START processing: state #38 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.646718: "test" #38: deleting state (STATE_MAIN_R0) aged 0.606s and NOT sending notification Aug 26 18:23:59.646721: | parent state #38: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.646762: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.646766: | in connection_discard for connection test Aug 26 18:23:59.646768: | State DB: deleting IKEv1 state #38 in MAIN_R0 Aug 26 18:23:59.646775: | parent state #38: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.646780: | stop processing: state #38 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.646788: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.646791: | state #37 Aug 26 18:23:59.646795: | start processing: state #37 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.646798: | pstats #37 ikev1.isakmp deleted other Aug 26 18:23:59.646802: | [RE]START processing: state #37 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.646805: "test" #37: deleting state (STATE_MAIN_R0) aged 0.653s and NOT sending notification Aug 26 18:23:59.646808: | parent state #37: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.647790: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.647804: | in connection_discard for connection test Aug 26 18:23:59.647808: | State DB: deleting IKEv1 state #37 in MAIN_R0 Aug 26 18:23:59.647812: | parent state #37: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.647819: | stop processing: state #37 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.647831: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.647835: | state #36 Aug 26 18:23:59.647840: | start processing: state #36 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.647843: | pstats #36 ikev1.isakmp deleted other Aug 26 18:23:59.647848: | [RE]START processing: state #36 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.647852: "test" #36: deleting state (STATE_MAIN_R0) aged 0.689s and NOT sending notification Aug 26 18:23:59.647855: | parent state #36: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.647924: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.647929: | in connection_discard for connection test Aug 26 18:23:59.647933: | State DB: deleting IKEv1 state #36 in MAIN_R0 Aug 26 18:23:59.647936: | parent state #36: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.647942: | stop processing: state #36 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.647946: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.647948: | state #35 Aug 26 18:23:59.647954: | start processing: state #35 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.647957: | pstats #35 ikev1.isakmp deleted other Aug 26 18:23:59.647961: | [RE]START processing: state #35 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.647965: "test" #35: deleting state (STATE_MAIN_R0) aged 0.735s and NOT sending notification Aug 26 18:23:59.647968: | parent state #35: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.648015: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.648020: | in connection_discard for connection test Aug 26 18:23:59.648023: | State DB: deleting IKEv1 state #35 in MAIN_R0 Aug 26 18:23:59.648027: | parent state #35: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.648032: | stop processing: state #35 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.648040: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.648043: | state #34 Aug 26 18:23:59.648049: | start processing: state #34 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.648052: | pstats #34 ikev1.isakmp deleted other Aug 26 18:23:59.648057: | [RE]START processing: state #34 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.648060: "test" #34: deleting state (STATE_MAIN_R0) aged 0.778s and NOT sending notification Aug 26 18:23:59.648066: | parent state #34: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.648111: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.648116: | in connection_discard for connection test Aug 26 18:23:59.648119: | State DB: deleting IKEv1 state #34 in MAIN_R0 Aug 26 18:23:59.648122: | parent state #34: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.648128: | stop processing: state #34 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.648136: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.648139: | state #33 Aug 26 18:23:59.648144: | start processing: state #33 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.648147: | pstats #33 ikev1.isakmp deleted other Aug 26 18:23:59.648151: | [RE]START processing: state #33 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.648155: "test" #33: deleting state (STATE_MAIN_R0) aged 0.844s and NOT sending notification Aug 26 18:23:59.648157: | parent state #33: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.648198: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.648202: | in connection_discard for connection test Aug 26 18:23:59.648205: | State DB: deleting IKEv1 state #33 in MAIN_R0 Aug 26 18:23:59.648208: | parent state #33: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.648213: | stop processing: state #33 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.648217: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.648220: | state #32 Aug 26 18:23:59.648224: | start processing: state #32 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.648227: | pstats #32 ikev1.isakmp deleted other Aug 26 18:23:59.648231: | [RE]START processing: state #32 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.648234: "test" #32: deleting state (STATE_MAIN_R0) aged 0.878s and NOT sending notification Aug 26 18:23:59.648237: | parent state #32: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.648280: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.648285: | in connection_discard for connection test Aug 26 18:23:59.648287: | State DB: deleting IKEv1 state #32 in MAIN_R0 Aug 26 18:23:59.648298: | parent state #32: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.648302: | stop processing: state #32 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.648310: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.648313: | state #31 Aug 26 18:23:59.648317: | start processing: state #31 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.648320: | pstats #31 ikev1.isakmp deleted other Aug 26 18:23:59.648325: | [RE]START processing: state #31 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.648328: "test" #31: deleting state (STATE_MAIN_R0) aged 0.912s and NOT sending notification Aug 26 18:23:59.648331: | parent state #31: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.648372: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.648377: | in connection_discard for connection test Aug 26 18:23:59.648380: | State DB: deleting IKEv1 state #31 in MAIN_R0 Aug 26 18:23:59.648384: | parent state #31: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.648388: | stop processing: state #31 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.648396: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.648399: | state #30 Aug 26 18:23:59.648404: | start processing: state #30 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.648410: | pstats #30 ikev1.isakmp deleted other Aug 26 18:23:59.648415: | [RE]START processing: state #30 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.648419: "test" #30: deleting state (STATE_MAIN_R0) aged 0.958s and NOT sending notification Aug 26 18:23:59.648421: | parent state #30: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.648462: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.648467: | in connection_discard for connection test Aug 26 18:23:59.648469: | State DB: deleting IKEv1 state #30 in MAIN_R0 Aug 26 18:23:59.648473: | parent state #30: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.648477: | stop processing: state #30 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.648480: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.648483: | state #29 Aug 26 18:23:59.648487: | start processing: state #29 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.648490: | pstats #29 ikev1.isakmp deleted other Aug 26 18:23:59.648494: | [RE]START processing: state #29 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.648498: "test" #29: deleting state (STATE_MAIN_R0) aged 0.998s and NOT sending notification Aug 26 18:23:59.648501: | parent state #29: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.648542: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.648547: | in connection_discard for connection test Aug 26 18:23:59.648550: | State DB: deleting IKEv1 state #29 in MAIN_R0 Aug 26 18:23:59.648553: | parent state #29: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.648557: | stop processing: state #29 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.648565: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.648568: | state #28 Aug 26 18:23:59.648572: | start processing: state #28 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.648575: | pstats #28 ikev1.isakmp deleted other Aug 26 18:23:59.648580: | [RE]START processing: state #28 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.648585: "test" #28: deleting state (STATE_MAIN_R0) aged 1.038s and NOT sending notification Aug 26 18:23:59.648588: | parent state #28: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.648629: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.648634: | in connection_discard for connection test Aug 26 18:23:59.648637: | State DB: deleting IKEv1 state #28 in MAIN_R0 Aug 26 18:23:59.648640: | parent state #28: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.648645: | stop processing: state #28 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.648653: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.648656: | state #27 Aug 26 18:23:59.648661: | start processing: state #27 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.648664: | pstats #27 ikev1.isakmp deleted other Aug 26 18:23:59.648669: | [RE]START processing: state #27 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.648672: "test" #27: deleting state (STATE_MAIN_R0) aged 1.090s and NOT sending notification Aug 26 18:23:59.648676: | parent state #27: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.648719: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.648723: | in connection_discard for connection test Aug 26 18:23:59.648726: | State DB: deleting IKEv1 state #27 in MAIN_R0 Aug 26 18:23:59.648732: | parent state #27: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.648737: | stop processing: state #27 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.648741: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.648744: | state #26 Aug 26 18:23:59.648748: | start processing: state #26 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.648751: | pstats #26 ikev1.isakmp deleted other Aug 26 18:23:59.648755: | [RE]START processing: state #26 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.648759: "test" #26: deleting state (STATE_MAIN_R0) aged 1.128s and NOT sending notification Aug 26 18:23:59.648762: | parent state #26: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.648806: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.648811: | in connection_discard for connection test Aug 26 18:23:59.648814: | State DB: deleting IKEv1 state #26 in MAIN_R0 Aug 26 18:23:59.648818: | parent state #26: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.648822: | stop processing: state #26 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.648830: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.648832: | state #25 Aug 26 18:23:59.648837: | start processing: state #25 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.648840: | pstats #25 ikev1.isakmp deleted other Aug 26 18:23:59.648844: | [RE]START processing: state #25 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.648848: "test" #25: deleting state (STATE_MAIN_R0) aged 1.162s and NOT sending notification Aug 26 18:23:59.648850: | parent state #25: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.648889: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.648894: | in connection_discard for connection test Aug 26 18:23:59.648897: | State DB: deleting IKEv1 state #25 in MAIN_R0 Aug 26 18:23:59.648900: | parent state #25: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.648905: | stop processing: state #25 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.648912: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.648915: | state #24 Aug 26 18:23:59.648920: | start processing: state #24 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.648922: | pstats #24 ikev1.isakmp deleted other Aug 26 18:23:59.648927: | [RE]START processing: state #24 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.648930: "test" #24: deleting state (STATE_MAIN_R0) aged 1.206s and NOT sending notification Aug 26 18:23:59.648933: | parent state #24: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.648976: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.648982: | in connection_discard for connection test Aug 26 18:23:59.648985: | State DB: deleting IKEv1 state #24 in MAIN_R0 Aug 26 18:23:59.648988: | parent state #24: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.648993: | stop processing: state #24 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.648997: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.649000: | state #23 Aug 26 18:23:59.649005: | start processing: state #23 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.649008: | pstats #23 ikev1.isakmp deleted other Aug 26 18:23:59.649013: | [RE]START processing: state #23 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.649017: "test" #23: deleting state (STATE_MAIN_R0) aged 1.250s and NOT sending notification Aug 26 18:23:59.649022: | parent state #23: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.649067: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.649072: | in connection_discard for connection test Aug 26 18:23:59.649076: | State DB: deleting IKEv1 state #23 in MAIN_R0 Aug 26 18:23:59.649079: | parent state #23: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.649084: | stop processing: state #23 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.649092: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.649095: | state #22 Aug 26 18:23:59.649100: | start processing: state #22 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.649103: | pstats #22 ikev1.isakmp deleted other Aug 26 18:23:59.649108: | [RE]START processing: state #22 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.649112: "test" #22: deleting state (STATE_MAIN_R0) aged 1.304s and NOT sending notification Aug 26 18:23:59.649115: | parent state #22: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.649158: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.649162: | in connection_discard for connection test Aug 26 18:23:59.649165: | State DB: deleting IKEv1 state #22 in MAIN_R0 Aug 26 18:23:59.649169: | parent state #22: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.649174: | stop processing: state #22 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.649181: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.649184: | state #21 Aug 26 18:23:59.649189: | start processing: state #21 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.649193: | pstats #21 ikev1.isakmp deleted other Aug 26 18:23:59.649197: | [RE]START processing: state #21 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.649200: "test" #21: deleting state (STATE_MAIN_R0) aged 1.356s and NOT sending notification Aug 26 18:23:59.649204: | parent state #21: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.649246: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.649251: | in connection_discard for connection test Aug 26 18:23:59.649255: | State DB: deleting IKEv1 state #21 in MAIN_R0 Aug 26 18:23:59.649258: | parent state #21: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.649263: | stop processing: state #21 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.649266: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.649269: | state #20 Aug 26 18:23:59.649274: | start processing: state #20 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.649276: | pstats #20 ikev1.isakmp deleted other Aug 26 18:23:59.649281: | [RE]START processing: state #20 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.649284: "test" #20: deleting state (STATE_MAIN_R0) aged 1.391s and NOT sending notification Aug 26 18:23:59.649287: | parent state #20: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.649335: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.649340: | in connection_discard for connection test Aug 26 18:23:59.649343: | State DB: deleting IKEv1 state #20 in MAIN_R0 Aug 26 18:23:59.649346: | parent state #20: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.649351: | stop processing: state #20 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.649358: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.649361: | state #19 Aug 26 18:23:59.649366: | start processing: state #19 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.649371: | pstats #19 ikev1.isakmp deleted other Aug 26 18:23:59.649375: | [RE]START processing: state #19 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.649379: "test" #19: deleting state (STATE_MAIN_R0) aged 1.439s and NOT sending notification Aug 26 18:23:59.649382: | parent state #19: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.649422: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.649426: | in connection_discard for connection test Aug 26 18:23:59.649429: | State DB: deleting IKEv1 state #19 in MAIN_R0 Aug 26 18:23:59.649433: | parent state #19: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.649437: | stop processing: state #19 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.649445: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.649448: | state #18 Aug 26 18:23:59.649452: | start processing: state #18 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.649455: | pstats #18 ikev1.isakmp deleted other Aug 26 18:23:59.649459: | [RE]START processing: state #18 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.649462: "test" #18: deleting state (STATE_MAIN_R0) aged 1.495s and NOT sending notification Aug 26 18:23:59.649466: | parent state #18: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.649507: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.649512: | in connection_discard for connection test Aug 26 18:23:59.649515: | State DB: deleting IKEv1 state #18 in MAIN_R0 Aug 26 18:23:59.649518: | parent state #18: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.649522: | stop processing: state #18 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.649526: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.649528: | state #17 Aug 26 18:23:59.649533: | start processing: state #17 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.649536: | pstats #17 ikev1.isakmp deleted other Aug 26 18:23:59.649540: | [RE]START processing: state #17 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.649544: "test" #17: deleting state (STATE_MAIN_R0) aged 1.538s and NOT sending notification Aug 26 18:23:59.649547: | parent state #17: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.649589: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.649593: | in connection_discard for connection test Aug 26 18:23:59.649596: | State DB: deleting IKEv1 state #17 in MAIN_R0 Aug 26 18:23:59.649599: | parent state #17: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.649604: | stop processing: state #17 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.649612: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.649615: | state #16 Aug 26 18:23:59.649620: | start processing: state #16 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.649623: | pstats #16 ikev1.isakmp deleted other Aug 26 18:23:59.649628: | [RE]START processing: state #16 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.649632: "test" #16: deleting state (STATE_MAIN_R0) aged 1.579s and NOT sending notification Aug 26 18:23:59.649635: | parent state #16: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.649677: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.649682: | in connection_discard for connection test Aug 26 18:23:59.649685: | State DB: deleting IKEv1 state #16 in MAIN_R0 Aug 26 18:23:59.649689: | parent state #16: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.649696: | stop processing: state #16 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.649704: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.649707: | state #15 Aug 26 18:23:59.649712: | start processing: state #15 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.649715: | pstats #15 ikev1.isakmp deleted other Aug 26 18:23:59.649720: | [RE]START processing: state #15 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.649724: "test" #15: deleting state (STATE_MAIN_R0) aged 1.619s and NOT sending notification Aug 26 18:23:59.649727: | parent state #15: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.649769: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.649774: | in connection_discard for connection test Aug 26 18:23:59.649778: | State DB: deleting IKEv1 state #15 in MAIN_R0 Aug 26 18:23:59.649781: | parent state #15: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.649786: | stop processing: state #15 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.649793: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.649795: | state #14 Aug 26 18:23:59.649800: | start processing: state #14 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.649802: | pstats #14 ikev1.isakmp deleted other Aug 26 18:23:59.649807: | [RE]START processing: state #14 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.649810: "test" #14: deleting state (STATE_MAIN_R0) aged 1.668s and NOT sending notification Aug 26 18:23:59.649813: | parent state #14: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.649854: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.649859: | in connection_discard for connection test Aug 26 18:23:59.649863: | State DB: deleting IKEv1 state #14 in MAIN_R0 Aug 26 18:23:59.649866: | parent state #14: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.649870: | stop processing: state #14 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.649874: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.649876: | state #13 Aug 26 18:23:59.649881: | start processing: state #13 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.649884: | pstats #13 ikev1.isakmp deleted other Aug 26 18:23:59.649888: | [RE]START processing: state #13 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.649891: "test" #13: deleting state (STATE_MAIN_R0) aged 1.701s and NOT sending notification Aug 26 18:23:59.649894: | parent state #13: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.649935: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.649939: | in connection_discard for connection test Aug 26 18:23:59.649942: | State DB: deleting IKEv1 state #13 in MAIN_R0 Aug 26 18:23:59.649946: | parent state #13: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.649950: | stop processing: state #13 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.649958: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.649961: | state #12 Aug 26 18:23:59.649967: | start processing: state #12 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.649969: | pstats #12 ikev1.isakmp deleted other Aug 26 18:23:59.649974: | [RE]START processing: state #12 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.649978: "test" #12: deleting state (STATE_MAIN_R0) aged 1.762s and NOT sending notification Aug 26 18:23:59.649983: | parent state #12: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.650026: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.650031: | in connection_discard for connection test Aug 26 18:23:59.650034: | State DB: deleting IKEv1 state #12 in MAIN_R0 Aug 26 18:23:59.650037: | parent state #12: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.650042: | stop processing: state #12 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.650050: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.650053: | state #11 Aug 26 18:23:59.650058: | start processing: state #11 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.650064: | pstats #11 ikev1.isakmp deleted other Aug 26 18:23:59.650071: | [RE]START processing: state #11 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.650074: "test" #11: deleting state (STATE_MAIN_R0) aged 1.803s and NOT sending notification Aug 26 18:23:59.650078: | parent state #11: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.650125: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.650130: | in connection_discard for connection test Aug 26 18:23:59.650135: | State DB: deleting IKEv1 state #11 in MAIN_R0 Aug 26 18:23:59.650142: | parent state #11: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.650148: | stop processing: state #11 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.650152: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.650155: | state #10 Aug 26 18:23:59.650162: | start processing: state #10 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.650166: | pstats #10 ikev1.isakmp deleted other Aug 26 18:23:59.650172: | [RE]START processing: state #10 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.650176: "test" #10: deleting state (STATE_MAIN_R0) aged 1.863s and NOT sending notification Aug 26 18:23:59.650181: | parent state #10: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.650226: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.650232: | in connection_discard for connection test Aug 26 18:23:59.650236: | State DB: deleting IKEv1 state #10 in MAIN_R0 Aug 26 18:23:59.650240: | parent state #10: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.650246: | stop processing: state #10 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.650255: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.650259: | state #9 Aug 26 18:23:59.650265: | start processing: state #9 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.650269: | pstats #9 ikev1.isakmp deleted other Aug 26 18:23:59.650274: | [RE]START processing: state #9 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.650278: "test" #9: deleting state (STATE_MAIN_R0) aged 1.914s and NOT sending notification Aug 26 18:23:59.650281: | parent state #9: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.650328: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.650336: | in connection_discard for connection test Aug 26 18:23:59.650339: | State DB: deleting IKEv1 state #9 in MAIN_R0 Aug 26 18:23:59.650343: | parent state #9: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.650349: | stop processing: state #9 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.650357: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.650360: | state #8 Aug 26 18:23:59.650366: | start processing: state #8 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.650371: | pstats #8 ikev1.isakmp deleted other Aug 26 18:23:59.650377: | [RE]START processing: state #8 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.650381: "test" #8: deleting state (STATE_MAIN_R0) aged 1.969s and NOT sending notification Aug 26 18:23:59.650385: | parent state #8: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.650425: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.650430: | in connection_discard for connection test Aug 26 18:23:59.650433: | State DB: deleting IKEv1 state #8 in MAIN_R0 Aug 26 18:23:59.650437: | parent state #8: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.650443: | stop processing: state #8 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.650447: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.650450: | state #7 Aug 26 18:23:59.650456: | start processing: state #7 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.650460: | pstats #7 ikev1.isakmp deleted other Aug 26 18:23:59.650465: | [RE]START processing: state #7 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.650469: "test" #7: deleting state (STATE_MAIN_R0) aged 2.010s and NOT sending notification Aug 26 18:23:59.650473: | parent state #7: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.650515: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.650521: | in connection_discard for connection test Aug 26 18:23:59.650525: | State DB: deleting IKEv1 state #7 in MAIN_R0 Aug 26 18:23:59.650529: | parent state #7: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.650536: | stop processing: state #7 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.650545: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.650549: | state #6 Aug 26 18:23:59.650558: | start processing: state #6 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.650563: | pstats #6 ikev1.isakmp deleted other Aug 26 18:23:59.650568: | [RE]START processing: state #6 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.650572: "test" #6: deleting state (STATE_MAIN_R0) aged 2.057s and NOT sending notification Aug 26 18:23:59.650576: | parent state #6: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.650620: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.650626: | in connection_discard for connection test Aug 26 18:23:59.650630: | State DB: deleting IKEv1 state #6 in MAIN_R0 Aug 26 18:23:59.650634: | parent state #6: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.650640: | stop processing: state #6 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.650649: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.650653: | state #5 Aug 26 18:23:59.650660: | start processing: state #5 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.650663: | pstats #5 ikev1.isakmp deleted other Aug 26 18:23:59.650670: | [RE]START processing: state #5 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.650673: "test" #5: deleting state (STATE_MAIN_R0) aged 2.100s and NOT sending notification Aug 26 18:23:59.650677: | parent state #5: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.650719: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.650724: | in connection_discard for connection test Aug 26 18:23:59.650727: | State DB: deleting IKEv1 state #5 in MAIN_R0 Aug 26 18:23:59.650731: | parent state #5: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.650739: | stop processing: state #5 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.650744: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.650747: | state #4 Aug 26 18:23:59.650754: | start processing: state #4 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.650757: | pstats #4 ikev1.isakmp deleted other Aug 26 18:23:59.650764: | [RE]START processing: state #4 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.650767: "test" #4: deleting state (STATE_MAIN_R0) aged 2.148s and NOT sending notification Aug 26 18:23:59.650772: | parent state #4: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.650815: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.650820: | in connection_discard for connection test Aug 26 18:23:59.650824: | State DB: deleting IKEv1 state #4 in MAIN_R0 Aug 26 18:23:59.650829: | parent state #4: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.650835: | stop processing: state #4 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.650845: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.650849: | state #3 Aug 26 18:23:59.650856: | start processing: state #3 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.650860: | pstats #3 ikev1.isakmp deleted other Aug 26 18:23:59.650866: | [RE]START processing: state #3 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.650871: "test" #3: deleting state (STATE_MAIN_R0) aged 2.208s and NOT sending notification Aug 26 18:23:59.650874: | parent state #3: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.650920: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.650926: | in connection_discard for connection test Aug 26 18:23:59.650929: | State DB: deleting IKEv1 state #3 in MAIN_R0 Aug 26 18:23:59.650933: | parent state #3: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.650938: | stop processing: state #3 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.650946: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.650949: | state #2 Aug 26 18:23:59.650954: | start processing: state #2 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.650956: | pstats #2 ikev1.isakmp deleted other Aug 26 18:23:59.650960: | [RE]START processing: state #2 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.650963: "test" #2: deleting state (STATE_MAIN_R0) aged 2.257s and NOT sending notification Aug 26 18:23:59.650966: | parent state #2: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.651003: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.651007: | in connection_discard for connection test Aug 26 18:23:59.651010: | State DB: deleting IKEv1 state #2 in MAIN_R0 Aug 26 18:23:59.651013: | parent state #2: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.651017: | stop processing: state #2 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.651021: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.651023: | state #1 Aug 26 18:23:59.651028: | start processing: state #1 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 18:23:59.651032: | pstats #1 ikev1.isakmp deleted other Aug 26 18:23:59.651037: | [RE]START processing: state #1 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 18:23:59.651041: "test" #1: deleting state (STATE_MAIN_R0) aged 2.446s and NOT sending notification Aug 26 18:23:59.651044: | parent state #1: MAIN_R0(half-open IKE SA) => delete Aug 26 18:23:59.651084: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 18:23:59.651089: | in connection_discard for connection test Aug 26 18:23:59.651092: | State DB: deleting IKEv1 state #1 in MAIN_R0 Aug 26 18:23:59.651095: | parent state #1: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 18:23:59.651100: | stop processing: state #1 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 18:23:59.651109: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 18:23:59.651111: | pass 1 Aug 26 18:23:59.651114: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 18:23:59.651118: | free hp@0x55f088aa5920 Aug 26 18:23:59.651121: | flush revival: connection 'test' wasn't on the list Aug 26 18:23:59.651124: | processing: STOP connection NULL (in discard_connection() at connections.c:249) Aug 26 18:23:59.651129: | crl fetch request list locked by 'free_crl_fetch' Aug 26 18:23:59.651132: | crl fetch request list unlocked by 'free_crl_fetch' Aug 26 18:23:59.651140: shutting down interface lo/lo 127.0.0.1:4500 Aug 26 18:23:59.651144: shutting down interface lo/lo 127.0.0.1:500 Aug 26 18:23:59.651148: shutting down interface eth0/eth0 192.0.2.254:4500 Aug 26 18:23:59.651151: shutting down interface eth0/eth0 192.0.2.254:500 Aug 26 18:23:59.651155: shutting down interface eth1/eth1 192.1.2.23:4500 Aug 26 18:23:59.651159: shutting down interface eth1/eth1 192.1.2.23:500 Aug 26 18:23:59.651163: | FOR_EACH_STATE_... in delete_states_dead_interfaces Aug 26 18:23:59.651171: | libevent_free: release ptr-libevent@0x55f088ad8f00 Aug 26 18:23:59.651174: | free_event_entry: release EVENT_NULL-pe@0x55f088ac21c0 Aug 26 18:23:59.651184: | libevent_free: release ptr-libevent@0x55f088ad8ff0 Aug 26 18:23:59.651187: | free_event_entry: release EVENT_NULL-pe@0x55f088ad8fb0 Aug 26 18:23:59.651195: | libevent_free: release ptr-libevent@0x55f088ad90e0 Aug 26 18:23:59.651198: | free_event_entry: release EVENT_NULL-pe@0x55f088ad90a0 Aug 26 18:23:59.651204: | libevent_free: release ptr-libevent@0x55f088ad91d0 Aug 26 18:23:59.651207: | free_event_entry: release EVENT_NULL-pe@0x55f088ad9190 Aug 26 18:23:59.651214: | libevent_free: release ptr-libevent@0x55f088ad92c0 Aug 26 18:23:59.651217: | free_event_entry: release EVENT_NULL-pe@0x55f088ad9280 Aug 26 18:23:59.651224: | libevent_free: release ptr-libevent@0x55f088ad93b0 Aug 26 18:23:59.651226: | free_event_entry: release EVENT_NULL-pe@0x55f088ad9370 Aug 26 18:23:59.651231: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 18:23:59.655611: | libevent_free: release ptr-libevent@0x55f088ad8860 Aug 26 18:23:59.655624: | free_event_entry: release EVENT_NULL-pe@0x55f088ac1440 Aug 26 18:23:59.655629: | libevent_free: release ptr-libevent@0x55f088ace340 Aug 26 18:23:59.655633: | free_event_entry: release EVENT_NULL-pe@0x55f088ac16f0 Aug 26 18:23:59.655637: | libevent_free: release ptr-libevent@0x55f088ace2b0 Aug 26 18:23:59.655642: | free_event_entry: release EVENT_NULL-pe@0x55f088ac6e50 Aug 26 18:23:59.655646: | global timer EVENT_REINIT_SECRET uninitialized Aug 26 18:23:59.655650: | global timer EVENT_SHUNT_SCAN uninitialized Aug 26 18:23:59.655653: | global timer EVENT_PENDING_DDNS uninitialized Aug 26 18:23:59.655656: | global timer EVENT_PENDING_PHASE2 uninitialized Aug 26 18:23:59.655659: | global timer EVENT_CHECK_CRLS uninitialized Aug 26 18:23:59.655663: | global timer EVENT_REVIVE_CONNS uninitialized Aug 26 18:23:59.655666: | global timer EVENT_FREE_ROOT_CERTS uninitialized Aug 26 18:23:59.655669: | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized Aug 26 18:23:59.656118: | global timer EVENT_NAT_T_KEEPALIVE uninitialized Aug 26 18:23:59.656126: | libevent_free: release ptr-libevent@0x55f088ad8930 Aug 26 18:23:59.656130: | signal event handler PLUTO_SIGCHLD uninstalled Aug 26 18:23:59.656135: | libevent_free: release ptr-libevent@0x55f088ad8a10 Aug 26 18:23:59.656138: | signal event handler PLUTO_SIGTERM uninstalled Aug 26 18:23:59.656142: | libevent_free: release ptr-libevent@0x55f088ad8ad0 Aug 26 18:23:59.656150: | signal event handler PLUTO_SIGHUP uninstalled Aug 26 18:23:59.656154: | libevent_free: release ptr-libevent@0x55f088acd620 Aug 26 18:23:59.656159: | signal event handler PLUTO_SIGSYS uninstalled Aug 26 18:23:59.656162: | releasing event base Aug 26 18:23:59.656177: | libevent_free: release ptr-libevent@0x55f088ad8b90 Aug 26 18:23:59.656180: | libevent_free: release ptr-libevent@0x55f088aae130 Aug 26 18:23:59.656185: | libevent_free: release ptr-libevent@0x55f088abc9d0 Aug 26 18:23:59.656188: | libevent_free: release ptr-libevent@0x55f088abcaa0 Aug 26 18:23:59.656192: | libevent_free: release ptr-libevent@0x55f088abc9f0 Aug 26 18:23:59.656195: | libevent_free: release ptr-libevent@0x55f088ad88f0 Aug 26 18:23:59.656199: | libevent_free: release ptr-libevent@0x55f088ad89d0 Aug 26 18:23:59.656202: | libevent_free: release ptr-libevent@0x55f088abca80 Aug 26 18:23:59.656205: | libevent_free: release ptr-libevent@0x55f088abcbe0 Aug 26 18:23:59.656208: | libevent_free: release ptr-libevent@0x55f088ac1640 Aug 26 18:23:59.656212: | libevent_free: release ptr-libevent@0x55f088ad9440 Aug 26 18:23:59.656215: | libevent_free: release ptr-libevent@0x55f088ad9350 Aug 26 18:23:59.656218: | libevent_free: release ptr-libevent@0x55f088ad9260 Aug 26 18:23:59.656221: | libevent_free: release ptr-libevent@0x55f088ad9170 Aug 26 18:23:59.656225: | libevent_free: release ptr-libevent@0x55f088ad9080 Aug 26 18:23:59.656228: | libevent_free: release ptr-libevent@0x55f088ad8f90 Aug 26 18:23:59.656231: | libevent_free: release ptr-libevent@0x55f088a40370 Aug 26 18:23:59.656234: | libevent_free: release ptr-libevent@0x55f088ad8ab0 Aug 26 18:23:59.656238: | libevent_free: release ptr-libevent@0x55f088ad89f0 Aug 26 18:23:59.656241: | libevent_free: release ptr-libevent@0x55f088ad8910 Aug 26 18:23:59.656244: | libevent_free: release ptr-libevent@0x55f088ad8b70 Aug 26 18:23:59.656247: | libevent_free: release ptr-libevent@0x55f088a3e5b0 Aug 26 18:23:59.656251: | libevent_free: release ptr-libevent@0x55f088abca10 Aug 26 18:23:59.656254: | libevent_free: release ptr-libevent@0x55f088abca40 Aug 26 18:23:59.656258: | libevent_free: release ptr-libevent@0x55f088abc730 Aug 26 18:23:59.656261: | releasing global libevent data Aug 26 18:23:59.656264: | libevent_free: release ptr-libevent@0x55f088abb3e0 Aug 26 18:23:59.656268: | libevent_free: release ptr-libevent@0x55f088abb410 Aug 26 18:23:59.656272: | libevent_free: release ptr-libevent@0x55f088abc700