FIPS Product: YES FIPS Kernel: NO FIPS Mode: NO NSS DB directory: sql:/etc/ipsec.d Initializing NSS Opening NSS database "sql:/etc/ipsec.d" read-only NSS initialized NSS crypto library initialized FIPS HMAC integrity support [enabled] FIPS mode disabled for pluto daemon FIPS HMAC integrity verification self-test FAILED libcap-ng support [enabled] Linux audit support [enabled] Linux audit activated Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:5591 core dump dir: /tmp secrets file: /etc/ipsec.secrets leak-detective enabled NSS crypto [enabled] XAUTH PAM support [enabled] | libevent is using pluto's memory allocator Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) | libevent_malloc: new ptr-libevent@0x56012a8f05d8 size 40 | libevent_malloc: new ptr-libevent@0x56012a8f0558 size 40 | libevent_malloc: new ptr-libevent@0x56012a8f04d8 size 40 | creating event base | libevent_malloc: new ptr-libevent@0x56012a8e2138 size 56 | libevent_malloc: new ptr-libevent@0x56012a863398 size 664 | libevent_malloc: new ptr-libevent@0x56012a92abb8 size 24 | libevent_malloc: new ptr-libevent@0x56012a92ac08 size 384 | libevent_malloc: new ptr-libevent@0x56012a92ab78 size 16 | libevent_malloc: new ptr-libevent@0x56012a8f0458 size 40 | libevent_malloc: new ptr-libevent@0x56012a8f03d8 size 48 | libevent_realloc: new ptr-libevent@0x56012a863028 size 256 | libevent_malloc: new ptr-libevent@0x56012a92adb8 size 16 | libevent_free: release ptr-libevent@0x56012a8e2138 | libevent initialized | libevent_realloc: new ptr-libevent@0x56012a8e2138 size 64 | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds | init_nat_traversal() initialized with keep_alive=0s NAT-Traversal support [enabled] | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized | global one-shot timer EVENT_FREE_ROOT_CERTS initialized | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds | global one-shot timer EVENT_REVIVE_CONNS initialized | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Encryption algorithms: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac NULL IKEv1: ESP IKEv2: ESP [] CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Hash algorithms: MD5 IKEv1: IKE IKEv2: SHA1 IKEv1: IKE IKEv2: FIPS sha SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 PRF algorithms: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Integrity algorithms: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac NONE IKEv1: ESP IKEv2: IKE ESP FIPS null DH algorithms: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 testing CAMELLIA_CBC: Camellia: 16 bytes with 128-bit key Camellia: 16 bytes with 128-bit key Camellia: 16 bytes with 256-bit key Camellia: 16 bytes with 256-bit key testing AES_GCM_16: empty string one block two blocks two blocks with associated data testing AES_CTR: Encrypting 16 octets using AES-CTR with 128-bit key Encrypting 32 octets using AES-CTR with 128-bit key Encrypting 36 octets using AES-CTR with 128-bit key Encrypting 16 octets using AES-CTR with 192-bit key Encrypting 32 octets using AES-CTR with 192-bit key Encrypting 36 octets using AES-CTR with 192-bit key Encrypting 16 octets using AES-CTR with 256-bit key Encrypting 32 octets using AES-CTR with 256-bit key Encrypting 36 octets using AES-CTR with 256-bit key testing AES_CBC: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key testing AES_XCBC: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) testing HMAC_MD5: RFC 2104: MD5_HMAC test 1 RFC 2104: MD5_HMAC test 2 RFC 2104: MD5_HMAC test 3 8 CPU cores online starting up 7 crypto helpers started thread for crypto helper 0 | starting up helper thread 0 started thread for crypto helper 1 | status value returned by setting the priority of this thread (crypto helper 0) 22 | starting up helper thread 1 started thread for crypto helper 2 | crypto helper 0 waiting (nothing to do) | starting up helper thread 2 | status value returned by setting the priority of this thread (crypto helper 1) 22 started thread for crypto helper 3 | crypto helper 1 waiting (nothing to do) | starting up helper thread 3 | starting up helper thread 4 started thread for crypto helper 4 | status value returned by setting the priority of this thread (crypto helper 2) 22 | crypto helper 2 waiting (nothing to do) started thread for crypto helper 5 | starting up helper thread 5 | status value returned by setting the priority of this thread (crypto helper 5) 22 | crypto helper 5 waiting (nothing to do) started thread for crypto helper 6 | starting up helper thread 6 | status value returned by setting the priority of this thread (crypto helper 3) 22 | checking IKEv1 state table | status value returned by setting the priority of this thread (crypto helper 6) 22 | MAIN_R0: category: half-open IKE SA flags: 0: | -> MAIN_R1 EVENT_SO_DISCARD | MAIN_I1: category: half-open IKE SA flags: 0: | -> MAIN_I2 EVENT_RETRANSMIT | MAIN_R1: category: open IKE SA flags: 200: | -> MAIN_R2 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_I2: category: open IKE SA flags: 0: | -> MAIN_I3 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_R2: category: open IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | -> MAIN_R3 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_I3: category: open IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | -> MAIN_I4 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_R3: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | MAIN_I4: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | AGGR_R0: category: half-open IKE SA flags: 0: | -> AGGR_R1 EVENT_SO_DISCARD | AGGR_I1: category: half-open IKE SA flags: 0: | -> AGGR_I2 EVENT_SA_REPLACE | -> AGGR_I2 EVENT_SA_REPLACE | AGGR_R1: category: open IKE SA flags: 200: | -> AGGR_R2 EVENT_SA_REPLACE | -> AGGR_R2 EVENT_SA_REPLACE | AGGR_I2: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | status value returned by setting the priority of this thread (crypto helper 4) 22 | AGGR_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | QUICK_R0: category: established CHILD SA flags: 0: | -> QUICK_R1 EVENT_RETRANSMIT | QUICK_I1: category: established CHILD SA flags: 0: | -> QUICK_I2 EVENT_SA_REPLACE | QUICK_R1: category: established CHILD SA flags: 0: | -> QUICK_R2 EVENT_SA_REPLACE | QUICK_I2: category: established CHILD SA flags: 200: | -> UNDEFINED EVENT_NULL | crypto helper 3 waiting (nothing to do) | QUICK_R2: category: established CHILD SA flags: 0: | -> UNDEFINED EVENT_NULL | crypto helper 6 waiting (nothing to do) | INFO: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | INFO_PROTECTED: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | XAUTH_R0: category: established IKE SA flags: 0: | -> XAUTH_R1 EVENT_NULL | XAUTH_R1: category: established IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | MODE_CFG_R0: category: informational flags: 0: | -> MODE_CFG_R1 EVENT_SA_REPLACE | MODE_CFG_R1: category: established IKE SA flags: 0: | -> MODE_CFG_R2 EVENT_SA_REPLACE | crypto helper 4 waiting (nothing to do) | MODE_CFG_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | MODE_CFG_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | XAUTH_I0: category: established IKE SA flags: 0: | -> XAUTH_I1 EVENT_RETRANSMIT | XAUTH_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_RETRANSMIT | checking IKEv2 state table | PARENT_I0: category: ignore flags: 0: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) | PARENT_I1: category: half-open IKE SA flags: 0: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) | PARENT_I2: category: open IKE SA flags: 0: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) | PARENT_I3: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) | PARENT_R0: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) | PARENT_R1: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) | PARENT_R2: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) | V2_CREATE_I0: category: established IKE SA flags: 0: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) | V2_CREATE_I: category: established IKE SA flags: 0: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) | V2_REKEY_IKE_I: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: | V2_CREATE_R: category: established IKE SA flags: 0: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) | V2_REKEY_IKE_R: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: | V2_IPSEC_I: category: established CHILD SA flags: 0: | V2_IPSEC_R: category: established CHILD SA flags: 0: | IKESA_DEL: category: established IKE SA flags: 0: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) | CHILDSA_DEL: category: informational flags: 0: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 | Hard-wiring algorithms | adding AES_CCM_16 to kernel algorithm db | adding AES_CCM_12 to kernel algorithm db | adding AES_CCM_8 to kernel algorithm db | adding 3DES_CBC to kernel algorithm db | adding CAMELLIA_CBC to kernel algorithm db | adding AES_GCM_16 to kernel algorithm db | adding AES_GCM_12 to kernel algorithm db | adding AES_GCM_8 to kernel algorithm db | adding AES_CTR to kernel algorithm db | adding AES_CBC to kernel algorithm db | adding SERPENT_CBC to kernel algorithm db | adding TWOFISH_CBC to kernel algorithm db | adding NULL_AUTH_AES_GMAC to kernel algorithm db | adding NULL to kernel algorithm db | adding CHACHA20_POLY1305 to kernel algorithm db | adding HMAC_MD5_96 to kernel algorithm db | adding HMAC_SHA1_96 to kernel algorithm db | adding HMAC_SHA2_512_256 to kernel algorithm db | adding HMAC_SHA2_384_192 to kernel algorithm db | adding HMAC_SHA2_256_128 to kernel algorithm db | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db | adding AES_XCBC_96 to kernel algorithm db | adding AES_CMAC_96 to kernel algorithm db | adding NONE to kernel algorithm db | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds | setup kernel fd callback | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x56012a8ea308 | libevent_malloc: new ptr-libevent@0x56012a929438 size 128 | libevent_malloc: new ptr-libevent@0x56012a9303b8 size 16 | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x56012a930348 | libevent_malloc: new ptr-libevent@0x56012a8e2e28 size 128 | libevent_malloc: new ptr-libevent@0x56012a930018 size 16 | global one-shot timer EVENT_CHECK_CRLS initialized selinux support is enabled. | unbound context created - setting debug level to 5 | /etc/hosts lookups activated | /etc/resolv.conf usage activated | outgoing-port-avoid set 0-65535 | outgoing-port-permit set 32768-60999 | Loading dnssec root key from:/var/lib/unbound/root.key | No additional dnssec trust anchors defined via dnssec-trusted= option | Setting up events, loop start | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x56012a9307e8 | libevent_malloc: new ptr-libevent@0x56012a93c6c8 size 128 | libevent_malloc: new ptr-libevent@0x56012a9479b8 size 16 | libevent_realloc: new ptr-libevent@0x56012a9479f8 size 256 | libevent_malloc: new ptr-libevent@0x56012a947b28 size 8 | libevent_realloc: new ptr-libevent@0x56012a947b68 size 144 | libevent_malloc: new ptr-libevent@0x56012a8ee8c8 size 152 | libevent_malloc: new ptr-libevent@0x56012a947c28 size 16 | signal event handler PLUTO_SIGCHLD installed | libevent_malloc: new ptr-libevent@0x56012a947c68 size 8 | libevent_malloc: new ptr-libevent@0x56012a864a68 size 152 | signal event handler PLUTO_SIGTERM installed | libevent_malloc: new ptr-libevent@0x56012a947ca8 size 8 | libevent_malloc: new ptr-libevent@0x56012a85c598 size 152 | signal event handler PLUTO_SIGHUP installed | libevent_malloc: new ptr-libevent@0x56012a947ce8 size 8 | libevent_realloc: release ptr-libevent@0x56012a947b68 | libevent_realloc: new ptr-libevent@0x56012a947d28 size 256 | libevent_malloc: new ptr-libevent@0x56012a85c668 size 152 | signal event handler PLUTO_SIGSYS installed | created addconn helper (pid:5671) using fork+execve | forked child 5671 | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.1.3.209 | Inspecting interface eth0:1 | found eth0:1 with address 192.0.1.254 | Inspecting interface eth0:11 | found eth0:11 with address 192.0.11.254 Kernel supports NIC esp-hw-offload adding interface eth0:11/eth0:11 (esp-hw-offload not supported by kernel) 192.0.11.254:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0:11/eth0:11 192.0.11.254:4500 adding interface eth0:1/eth0:1 (esp-hw-offload not supported by kernel) 192.0.1.254:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0:1/eth0:1 192.0.1.254:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.209:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.209:4500 adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface lo/lo 127.0.0.1:4500 | found lo with address 0000:0000:0000:0000:0000:0000:0000:0001 | sorting 1 interfaces adding interface lo/lo (esp-hw-offload not supported by kernel) [::1]:500 | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | add_fd_read_event_handler: new ethX-pe@0x56012a948538 | libevent_malloc: new ptr-libevent@0x56012a93c618 size 128 | libevent_malloc: new ptr-libevent@0x56012a9485a8 size 16 | setup callback for interface lo [::1]:500 fd 25 | add_fd_read_event_handler: new ethX-pe@0x56012a9485e8 | libevent_malloc: new ptr-libevent@0x56012a8e2ed8 size 128 | libevent_malloc: new ptr-libevent@0x56012a948658 size 16 | setup callback for interface lo 127.0.0.1:4500 fd 24 | add_fd_read_event_handler: new ethX-pe@0x56012a948698 | libevent_malloc: new ptr-libevent@0x56012a8e2668 size 128 | libevent_malloc: new ptr-libevent@0x56012a948708 size 16 | setup callback for interface lo 127.0.0.1:500 fd 23 | add_fd_read_event_handler: new ethX-pe@0x56012a948748 | libevent_malloc: new ptr-libevent@0x56012a8e9fa8 size 128 | libevent_malloc: new ptr-libevent@0x56012a9487b8 size 16 | setup callback for interface eth0 192.1.3.209:4500 fd 22 | add_fd_read_event_handler: new ethX-pe@0x56012a9487f8 | libevent_malloc: new ptr-libevent@0x56012a8ea0a8 size 128 | libevent_malloc: new ptr-libevent@0x56012a948868 size 16 | setup callback for interface eth0 192.1.3.209:500 fd 21 | add_fd_read_event_handler: new ethX-pe@0x56012a948e18 | libevent_malloc: new ptr-libevent@0x56012a8ea1a8 size 128 | libevent_malloc: new ptr-libevent@0x56012a9488a8 size 16 | setup callback for interface eth0:1 192.0.1.254:4500 fd 20 | add_fd_read_event_handler: new ethX-pe@0x56012a948e88 | libevent_malloc: new ptr-libevent@0x56012a948ef8 size 128 | libevent_malloc: new ptr-libevent@0x56012a948fa8 size 16 | setup callback for interface eth0:1 192.0.1.254:500 fd 19 | add_fd_read_event_handler: new ethX-pe@0x56012a948fe8 | libevent_malloc: new ptr-libevent@0x56012a949058 size 128 | libevent_malloc: new ptr-libevent@0x56012a949108 size 16 | setup callback for interface eth0:11 192.0.11.254:4500 fd 18 | add_fd_read_event_handler: new ethX-pe@0x56012a949148 | libevent_malloc: new ptr-libevent@0x56012a9491b8 size 128 | libevent_malloc: new ptr-libevent@0x56012a949268 size 16 | setup callback for interface eth0:11 192.0.11.254:500 fd 17 | certs and keys locked by 'free_preshared_secrets' | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | saving Modulus | saving PublicExponent | computed rsa CKAID 1a 15 cc e8 92 73 43 9c 2b f4 20 2a c1 06 6e f2 | computed rsa CKAID 59 b0 ef 45 loaded private key for keyid: PKK_RSA:AQPHFfpyJ | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.528 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.1.3.209 | Inspecting interface eth0:1 | found eth0:1 with address 192.0.1.254 | Inspecting interface eth0:11 | found eth0:11 with address 192.0.11.254 | found lo with address 0000:0000:0000:0000:0000:0000:0000:0001 | sorting 1 interfaces | libevent_free: release ptr-libevent@0x56012a93c618 | free_event_entry: release EVENT_NULL-pe@0x56012a948538 | add_fd_read_event_handler: new ethX-pe@0x56012a948538 | libevent_malloc: new ptr-libevent@0x56012a93c618 size 128 | setup callback for interface lo [::1]:500 fd 25 | libevent_free: release ptr-libevent@0x56012a8e2ed8 | free_event_entry: release EVENT_NULL-pe@0x56012a9485e8 | add_fd_read_event_handler: new ethX-pe@0x56012a9485e8 | libevent_malloc: new ptr-libevent@0x56012a8e2ed8 size 128 | setup callback for interface lo 127.0.0.1:4500 fd 24 | libevent_free: release ptr-libevent@0x56012a8e2668 | free_event_entry: release EVENT_NULL-pe@0x56012a948698 | add_fd_read_event_handler: new ethX-pe@0x56012a948698 | libevent_malloc: new ptr-libevent@0x56012a8e2668 size 128 | setup callback for interface lo 127.0.0.1:500 fd 23 | libevent_free: release ptr-libevent@0x56012a8e9fa8 | free_event_entry: release EVENT_NULL-pe@0x56012a948748 | add_fd_read_event_handler: new ethX-pe@0x56012a948748 | libevent_malloc: new ptr-libevent@0x56012a8e9fa8 size 128 | setup callback for interface eth0 192.1.3.209:4500 fd 22 | libevent_free: release ptr-libevent@0x56012a8ea0a8 | free_event_entry: release EVENT_NULL-pe@0x56012a9487f8 | add_fd_read_event_handler: new ethX-pe@0x56012a9487f8 | libevent_malloc: new ptr-libevent@0x56012a8ea0a8 size 128 | setup callback for interface eth0 192.1.3.209:500 fd 21 | libevent_free: release ptr-libevent@0x56012a8ea1a8 | free_event_entry: release EVENT_NULL-pe@0x56012a948e18 | add_fd_read_event_handler: new ethX-pe@0x56012a948e18 | libevent_malloc: new ptr-libevent@0x56012a8ea1a8 size 128 | setup callback for interface eth0:1 192.0.1.254:4500 fd 20 | libevent_free: release ptr-libevent@0x56012a948ef8 | free_event_entry: release EVENT_NULL-pe@0x56012a948e88 | add_fd_read_event_handler: new ethX-pe@0x56012a948e88 | libevent_malloc: new ptr-libevent@0x56012a948ef8 size 128 | setup callback for interface eth0:1 192.0.1.254:500 fd 19 | libevent_free: release ptr-libevent@0x56012a949058 | free_event_entry: release EVENT_NULL-pe@0x56012a948fe8 | add_fd_read_event_handler: new ethX-pe@0x56012a948fe8 | libevent_malloc: new ptr-libevent@0x56012a949058 size 128 | setup callback for interface eth0:11 192.0.11.254:4500 fd 18 | libevent_free: release ptr-libevent@0x56012a9491b8 | free_event_entry: release EVENT_NULL-pe@0x56012a949148 | add_fd_read_event_handler: new ethX-pe@0x56012a949148 | libevent_malloc: new ptr-libevent@0x56012a9491b8 size 128 | setup callback for interface eth0:11 192.0.11.254:500 fd 17 | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | saving Modulus | saving PublicExponent | computed rsa CKAID 1a 15 cc e8 92 73 43 9c 2b f4 20 2a c1 06 6e f2 | computed rsa CKAID 59 b0 ef 45 loaded private key for keyid: PKK_RSA:AQPHFfpyJ | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.304 milliseconds in whack | processing signal PLUTO_SIGCHLD | waitpid returned pid 5671 (exited with status 0) | reaped addconn helper child (status 0) | waitpid returned ECHILD (no child processes left) | spent 0.0148 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-east-ipv4-psk-ikev2/1x0 with policy ENCRYPT+TUNNEL+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | No AUTH policy was set - defaulting to RSASIG | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 conn: road-east-ipv4-psk-ikev2/1x0, rekeymargin (540s) >= salifetime (120s); reducing rekeymargin to 60s seconds | setting ID to ID_DER_ASN1_DN: 'E=user-road@testing.libreswan.org,CN=road.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' | loading left certificate 'road' pubkey | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a94c5c8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a94c578 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a94c438 | unreference key: 0x56012a94c618 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- | certs and keys locked by 'lsw_add_rsa_secret' | certs and keys unlocked by 'lsw_add_rsa_secret' | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org is 0 | setting ID to ID_DER_ASN1_DN: 'E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' | loading right certificate 'east' pubkey | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a950948 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a9508f8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a94fcb8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a94f7e8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a94c188 | unreference key: 0x56012a9555d8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | warning: no secret key loaded for right certificate with nickname east: NSS: cert private key not found | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org is 0 | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x56012a954168 added connection description "road-east-ipv4-psk-ikev2/1x0" | ike_life: 240s; ipsec_life: 120s; rekey_margin: 60s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.0.1.0/24===192.1.3.209<192.1.3.209>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org]...192.1.2.23<192.1.2.23>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org]===192.0.2.0/24 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 2.61 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-east-ipv4-psk-ikev2/2x0 with policy ENCRYPT+TUNNEL+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | No AUTH policy was set - defaulting to RSASIG | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 conn: road-east-ipv4-psk-ikev2/2x0, rekeymargin (540s) >= salifetime (120s); reducing rekeymargin to 60s seconds | setting ID to ID_DER_ASN1_DN: 'E=user-road@testing.libreswan.org,CN=road.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' | loading left certificate 'road' pubkey | unreference key: 0x56012a950c38 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a9588d8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a958888 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a959208 | unreference key: 0x56012a94fae8 @road.testing.libreswan.org cnt 1-- | unreference key: 0x56012a9506e8 user-road@testing.libreswan.org cnt 1-- | unreference key: 0x56012a958928 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- | secrets entry for road already exists | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org is 0 | setting ID to ID_DER_ASN1_DN: 'E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' | loading right certificate 'east' pubkey | unreference key: 0x56012a9569b8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a958888 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a959208 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a958c08 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a958bb8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a958b68 | unreference key: 0x56012a9548c8 192.1.2.23 cnt 1-- | unreference key: 0x56012a956038 east@testing.libreswan.org cnt 1-- | unreference key: 0x56012a956258 @east.testing.libreswan.org cnt 1-- | unreference key: 0x56012a9567a8 user-east@testing.libreswan.org cnt 1-- | unreference key: 0x56012a958d38 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | warning: no secret key loaded for right certificate with nickname east: NSS: cert private key not found | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org is 0 | find_host_pair: comparing 192.1.3.209:500 to 192.1.2.23:500 but ignoring ports | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@0x56012a954168: road-east-ipv4-psk-ikev2/1x0 added connection description "road-east-ipv4-psk-ikev2/2x0" | ike_life: 240s; ipsec_life: 120s; rekey_margin: 60s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.0.11.0/24===192.1.3.209<192.1.3.209>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org]...192.1.2.23<192.1.2.23>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org]===192.0.2.0/24 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 1.23 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-east-ipv6-psk-ikev2 with policy ENCRYPT+TUNNEL+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | No AUTH policy was set - defaulting to RSASIG | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 conn: road-east-ipv6-psk-ikev2, rekeymargin (540s) >= salifetime (120s); reducing rekeymargin to 60s seconds | setting ID to ID_DER_ASN1_DN: 'E=user-road@testing.libreswan.org,CN=road.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' | loading left certificate 'road' pubkey | unreference key: 0x56012a9506e8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a95b3a8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a95b358 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a95bcd8 | unreference key: 0x56012a94c618 @road.testing.libreswan.org cnt 1-- | unreference key: 0x56012a94fae8 user-road@testing.libreswan.org cnt 1-- | unreference key: 0x56012a95b3f8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- | secrets entry for road already exists | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org is 0 | setting ID to ID_DER_ASN1_DN: 'E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' | loading right certificate 'east' pubkey | unreference key: 0x56012a9567a8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a95b358 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a95bcd8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a95b6d8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a95b688 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a95b638 | unreference key: 0x56012a9555d8 192.1.2.23 cnt 1-- | unreference key: 0x56012a9548c8 east@testing.libreswan.org cnt 1-- | unreference key: 0x56012a956038 @east.testing.libreswan.org cnt 1-- | unreference key: 0x56012a956258 user-east@testing.libreswan.org cnt 1-- | unreference key: 0x56012a95b808 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | warning: no secret key loaded for right certificate with nickname east: NSS: cert private key not found | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org is 0 | find_host_pair: comparing 192.1.3.209:500 to 192.1.2.23:500 but ignoring ports | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@0x56012a954168: road-east-ipv4-psk-ikev2/2x0 added connection description "road-east-ipv6-psk-ikev2" | ike_life: 240s; ipsec_life: 120s; rekey_margin: 60s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 2001:db8:1:3::/64===192.1.3.209<192.1.3.209>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org]...192.1.2.23<192.1.2.23>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org]===2001:db8:1:2::/64 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 1.47 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in show_connections_status | FOR_EACH_CONNECTION_... in show_connections_status | FOR_EACH_STATE_... in show_states_status (sort_states) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.476 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | dup_any(fd@16) -> fd@26 (in whack_process() at rcv_whack.c:590) | FOR_EACH_CONNECTION_... in conn_by_name initiating all conns with alias='road-east-ipv4-psk-ikev2' | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | start processing: connection "road-east-ipv4-psk-ikev2/2x0" (in initiate_a_connection() at initiate.c:186) | connection 'road-east-ipv4-psk-ikev2/2x0' +POLICY_UP | dup_any(fd@26) -> fd@27 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #1 at 0x56012a95bda8 | State DB: adding IKEv2 state #1 in UNDEFINED | pstats #1 ikev2.ike started | Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #1: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-east-ipv4-psk-ikev2/2x0" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@27) -> fd@28 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-east-ipv4-psk-ikev2/2x0" IKE SA #1 "road-east-ipv4-psk-ikev2/2x0" "road-east-ipv4-psk-ikev2/2x0" #1: initiating v2 parent SA | constructing local IKE proposals for road-east-ipv4-psk-ikev2/2x0 (IKE SA initiator selecting KE) | converting ike_info AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 "road-east-ipv4-psk-ikev2/2x0": constructed local IKE proposals for road-east-ipv4-psk-ikev2/2x0 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | adding ikev2_outI1 KE work-order 1 for state #1 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56012a953588 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x56012a955528 size 128 | #1 spent 0.123 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 resuming | RESET processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-east-ipv4-psk-ikev2/2x0" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 0 starting work-order 1 for state #1 | start processing: connection "road-east-ipv4-psk-ikev2/1x0" (in initiate_a_connection() at initiate.c:186) | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 1 | connection 'road-east-ipv4-psk-ikev2/1x0' +POLICY_UP | dup_any(fd@26) -> fd@29 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-east-ipv4-psk-ikev2/1x0" IKE SA #1 "road-east-ipv4-psk-ikev2/2x0" | stop processing: connection "road-east-ipv4-psk-ikev2/1x0" (in initiate_a_connection() at initiate.c:349) | close_any(fd@26) (in initiate_connection() at initiate.c:384) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.227 milliseconds in whack | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 1 time elapsed 0.001022 seconds | (#1) spent 0.998 milliseconds in crypto helper computing work-order 1: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 1 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7f6058002888 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 1 | calling continuation function 0x5601297a9b50 | ikev2_parent_outI1_continue for #1 | **emit ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-east-ipv4-psk-ikev2/2x0 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | discarding INTEG=NONE | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 11 (0xb) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding INTEG=NONE | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 100 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding INTEG=NONE | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 2 (0x2) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 11 (0xb) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding INTEG=NONE | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 100 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 3 (0x3) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 13 (0xd) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 116 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 4 (0x4) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 13 (0xd) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 116 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 436 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 53 1f 2a a5 3e 65 bc ed 76 71 a8 32 87 89 95 1e | ikev2 g^x 84 f2 eb 2c e3 0e 6a 25 b8 37 c7 0b 26 bf 04 f5 | ikev2 g^x 8d 4a 3e 4f ae 75 8b 3b 47 04 7d 28 ca a3 73 07 | ikev2 g^x 4f e5 14 8d c3 c7 29 09 83 2a 61 21 b8 a2 d4 8d | ikev2 g^x fa 01 68 96 fd 0d d7 e4 db 25 d1 d7 ee 72 8d d5 | ikev2 g^x 8c 63 0c 1d 73 8e f2 d5 99 c0 89 af f1 ee da 11 | ikev2 g^x e0 8f ef f7 c9 41 80 ca d1 2b 70 9f 99 1b fe 48 | ikev2 g^x 86 0c 66 18 08 c2 ab a7 c0 3e 50 dc 0f d7 2a a9 | ikev2 g^x 2e f9 fd b2 39 93 a6 83 ff 06 79 f2 8f a7 65 25 | ikev2 g^x 7e c7 a6 cf 68 c6 30 cf 19 0e 41 e2 a7 6d d9 b7 | ikev2 g^x 98 36 77 fc 7c 9a e7 35 28 4d 7f ca 0a 2b ec 4d | ikev2 g^x 13 3d 71 44 5f aa d8 30 41 15 37 3b 3e 9a 4e 73 | ikev2 g^x 3a 55 f7 89 74 4d 04 09 97 2a 50 d4 d4 a3 8a 23 | ikev2 g^x 9f fe e1 04 28 75 ed 63 be c8 8a 3b e5 99 14 ee | ikev2 g^x f5 92 94 29 f1 06 f0 33 29 ac a8 35 6c 3d a3 76 | ikev2 g^x 28 7c d9 d9 73 02 14 22 88 b5 51 c6 b8 ff ba 71 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 29 73 a4 bc d0 cc be ff bf 3c cc f3 0f bf 75 d4 | IKEv2 nonce f3 c2 10 a5 a4 7a 40 c3 56 28 77 a6 25 7c 45 30 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x56012987e800(20) | natd_hash: icookie= e4 5f 3d fc 18 e0 ca 4e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d1 | natd_hash: port=500 | natd_hash: hash= 37 32 85 cc 18 55 a9 50 4b 6d a4 3c eb 46 95 ff | natd_hash: hash= 4a 4c e5 4a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 37 32 85 cc 18 55 a9 50 4b 6d a4 3c eb 46 95 ff | Notify data 4a 4c e5 4a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x56012987e800(20) | natd_hash: icookie= e4 5f 3d fc 18 e0 ca 4e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 3e 2d 81 19 0c ad 1d 62 63 99 f2 3f 70 ab 41 b3 | natd_hash: hash= dc fe 2a bb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3e 2d 81 19 0c ad 1d 62 63 99 f2 3f 70 ab 41 b3 | Notify data dc fe 2a bb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 828 | stop processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #1 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #1: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #1 to 4294967295 after switching state | Message ID: IKE #1 skipping update_recv as MD is fake | Message ID: sent #1 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-east-ipv4-psk-ikev2/2x0" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) | sending 828 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) | e4 5f 3d fc 18 e0 ca 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f | 28 00 01 08 00 0e 00 00 53 1f 2a a5 3e 65 bc ed | 76 71 a8 32 87 89 95 1e 84 f2 eb 2c e3 0e 6a 25 | b8 37 c7 0b 26 bf 04 f5 8d 4a 3e 4f ae 75 8b 3b | 47 04 7d 28 ca a3 73 07 4f e5 14 8d c3 c7 29 09 | 83 2a 61 21 b8 a2 d4 8d fa 01 68 96 fd 0d d7 e4 | db 25 d1 d7 ee 72 8d d5 8c 63 0c 1d 73 8e f2 d5 | 99 c0 89 af f1 ee da 11 e0 8f ef f7 c9 41 80 ca | d1 2b 70 9f 99 1b fe 48 86 0c 66 18 08 c2 ab a7 | c0 3e 50 dc 0f d7 2a a9 2e f9 fd b2 39 93 a6 83 | ff 06 79 f2 8f a7 65 25 7e c7 a6 cf 68 c6 30 cf | 19 0e 41 e2 a7 6d d9 b7 98 36 77 fc 7c 9a e7 35 | 28 4d 7f ca 0a 2b ec 4d 13 3d 71 44 5f aa d8 30 | 41 15 37 3b 3e 9a 4e 73 3a 55 f7 89 74 4d 04 09 | 97 2a 50 d4 d4 a3 8a 23 9f fe e1 04 28 75 ed 63 | be c8 8a 3b e5 99 14 ee f5 92 94 29 f1 06 f0 33 | 29 ac a8 35 6c 3d a3 76 28 7c d9 d9 73 02 14 22 | 88 b5 51 c6 b8 ff ba 71 29 00 00 24 29 73 a4 bc | d0 cc be ff bf 3c cc f3 0f bf 75 d4 f3 c2 10 a5 | a4 7a 40 c3 56 28 77 a6 25 7c 45 30 29 00 00 08 | 00 00 40 2e 29 00 00 1c 00 00 40 04 37 32 85 cc | 18 55 a9 50 4b 6d a4 3c eb 46 95 ff 4a 4c e5 4a | 00 00 00 1c 00 00 40 05 3e 2d 81 19 0c ad 1d 62 | 63 99 f2 3f 70 ab 41 b3 dc fe 2a bb | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x56012a955528 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56012a953588 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x56012a953588 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 | libevent_malloc: new ptr-libevent@0x56012a95e4f8 size 128 | #1 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29161.254088 | resume sending helper answer for #1 suppresed complete_v2_state_transition() and stole MD | #1 spent 1.26 milliseconds in resume sending helper answer | stop processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f6058002888 | spent 0.00235 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 457 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 21 20 22 20 00 00 00 00 00 00 01 c9 22 00 00 28 | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 | 80 0e 01 00 03 00 00 08 02 00 00 07 00 00 00 08 | 04 00 00 0e 28 00 01 08 00 0e 00 00 38 62 ed 13 | fd fb 6a 05 f2 f7 ab e0 e0 bb af b8 81 8e 06 75 | c5 46 b3 71 d9 a9 d8 eb 30 4c 0a 3d da 54 f4 b2 | 5a bd e5 07 69 a7 4e dd 55 00 61 06 6e 50 d3 3b | 7f e0 e6 4c c6 b1 b2 71 dc ac dc 5b 8c 8d b1 c2 | f8 e0 8b 88 1d b6 6f 39 f2 a4 f2 47 f2 d3 46 76 | 30 fd 5e 6d 4b 46 62 46 62 7f b2 a9 b0 c4 9e bf | 99 2b a5 73 a3 02 95 10 b3 e8 f3 ae 85 11 11 05 | e9 bc 0d 29 5c 9f 4a 74 07 94 ce b1 a9 3f 48 14 | 07 40 ee f9 cd 64 39 da a6 72 ca bd e0 dc 3d 45 | 79 a3 66 e9 1f b1 b1 b2 b2 66 dc ab 43 fb 69 48 | b2 90 73 97 55 32 e2 8a 2a ae 92 ec 5d 31 bb 0f | df cf 7a cb 70 7d 12 15 ec be 5d 57 7a e0 bb bd | fc 92 34 d7 9d d0 e5 f8 c2 2a a1 24 05 fc 11 1c | e6 8d d1 06 c2 fc 65 3c 7e 74 33 46 61 cf 82 9b | 54 18 d5 b9 5b 00 eb 46 79 26 4f 39 b8 b4 b5 79 | c9 cf e4 21 cd c9 5c c6 88 9f 1a 7c 29 00 00 24 | 71 98 8f dd 9d 57 68 d0 aa 57 76 d1 e6 24 c0 62 | be 77 2c f6 3e 14 0b 30 d8 40 f0 bf 4b 6b f0 6e | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 | 2e 1a 99 14 b2 33 14 4e 56 63 1e cf 64 f7 5a 8c | f6 ce 96 d0 26 00 00 1c 00 00 40 05 7e 9e d7 56 | 90 29 4e 07 bc d0 3d 6b 5d f4 d3 d2 47 88 66 c3 | 00 00 00 19 04 58 13 71 57 9d ee 1a 15 74 03 12 | 80 12 4d c1 85 2b 92 25 e9 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_v2SA (0x21) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 0 (0x0) | length: 457 (0x1c9) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_SA_INIT response | State DB: found IKEv2 state #1 in PARENT_I1 (find_v2_ike_sa_by_initiator_spi) | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | [RE]START processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #1 is idle | #1 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SA) | ***parse IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2KE (0x22) | flags: none (0x0) | length: 40 (0x28) | processing payload: ISAKMP_NEXT_v2SA (len=36) | Now let's proceed with payload (ISAKMP_NEXT_v2KE) | ***parse IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2Ni (0x28) | flags: none (0x0) | length: 264 (0x108) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | processing payload: ISAKMP_NEXT_v2KE (len=256) | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) | ***parse IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 36 (0x24) | processing payload: ISAKMP_NEXT_v2Ni (len=32) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 8 (0x8) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | processing payload: ISAKMP_NEXT_v2N (len=0) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 28 (0x1c) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | processing payload: ISAKMP_NEXT_v2N (len=20) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26) | flags: none (0x0) | length: 28 (0x1c) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | processing payload: ISAKMP_NEXT_v2N (len=20) | Now let's proceed with payload (ISAKMP_NEXT_v2CERTREQ) | ***parse IKEv2 Certificate Request Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 25 (0x19) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | processing payload: ISAKMP_NEXT_v2CERTREQ (len=20) | State DB: re-hashing IKEv2 state #1 IKE SPIi and SPI[ir] | #1 in state PARENT_I1: sent v2I1, expected v2R1 | selected state microcode Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH | Now let's proceed with state specific processing | calling processor Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH | ikev2 parent inR1: calculating g^{xy} in order to send I2 | using existing local IKE proposals for connection road-east-ipv4-psk-ikev2/2x0 (IKE SA initiator accepting remote proposal): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | Comparing remote proposals against IKE initiator (accepting) 4 local proposals | local proposal 1 type ENCR has 1 transforms | local proposal 1 type PRF has 2 transforms | local proposal 1 type INTEG has 1 transforms | local proposal 1 type DH has 8 transforms | local proposal 1 type ESN has 0 transforms | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG | local proposal 2 type ENCR has 1 transforms | local proposal 2 type PRF has 2 transforms | local proposal 2 type INTEG has 1 transforms | local proposal 2 type DH has 8 transforms | local proposal 2 type ESN has 0 transforms | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG | local proposal 3 type ENCR has 1 transforms | local proposal 3 type PRF has 2 transforms | local proposal 3 type INTEG has 2 transforms | local proposal 3 type DH has 8 transforms | local proposal 3 type ESN has 0 transforms | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none | local proposal 4 type ENCR has 1 transforms | local proposal 4 type PRF has 2 transforms | local proposal 4 type INTEG has 2 transforms | local proposal 4 type DH has 8 transforms | local proposal 4 type ESN has 0 transforms | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none | ****parse IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | length: 36 (0x24) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 3 (0x3) | Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 4 local proposals | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 12 (0xc) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | ******parse IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | remote proposal 1 transform 2 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none | comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH | remote proposal 1 matches local proposal 1 | remote accepted the proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048[first-match] | converting proposal to internal trans attrs | natd_hash: hasher=0x56012987e800(20) | natd_hash: icookie= e4 5f 3d fc 18 e0 ca 4e | natd_hash: rcookie= e7 fd 3a 72 b2 cd 7f e5 | natd_hash: ip= c0 01 03 d1 | natd_hash: port=500 | natd_hash: hash= 7e 9e d7 56 90 29 4e 07 bc d0 3d 6b 5d f4 d3 d2 | natd_hash: hash= 47 88 66 c3 | natd_hash: hasher=0x56012987e800(20) | natd_hash: icookie= e4 5f 3d fc 18 e0 ca 4e | natd_hash: rcookie= e7 fd 3a 72 b2 cd 7f e5 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 2e 1a 99 14 b2 33 14 4e 56 63 1e cf 64 f7 5a 8c | natd_hash: hash= f6 ce 96 d0 | NAT_TRAVERSAL encaps using auto-detect | NAT_TRAVERSAL this end is NOT behind NAT | NAT_TRAVERSAL that end is NOT behind NAT | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 | offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_512 integ=NONE cipherkey=AES_GCM_16 | adding ikev2_inR1outI2 KE work-order 2 for state #1 | state #1 requesting EVENT_RETRANSMIT to be deleted | #1 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x56012a95e4f8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x56012a953588 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56012a953588 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f6058002888 size 128 | #1 spent 0.205 milliseconds in processing: Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH in ikev2_process_state_packet() | [RE]START processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | crypto helper 1 resuming | crypto helper 1 starting work-order 2 for state #1 | #1 complete_v2_state_transition() PARENT_I1->PARENT_I2 with status STF_SUSPEND | crypto helper 1 doing compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 | suspending state #1 and saving MD | #1 is busy; has a suspended MD | [RE]START processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in log_stf_suspend() at ikev2.c:3269) | "road-east-ipv4-psk-ikev2/2x0" #1 complete v2 state STATE_PARENT_I1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 | stop processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 0.466 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.479 milliseconds in comm_handle_cb() reading and processing packet | calculating skeyseed using prf=sha2_512 integ=none cipherkey-size=32 salt-size=4 | crypto helper 1 finished compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 time elapsed 0.001029 seconds | (#1) spent 1.03 milliseconds in crypto helper computing work-order 2: ikev2_inR1outI2 KE (pcr) | crypto helper 1 sending results from work-order 2 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7f6050000f48 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 2 | calling continuation function 0x5601297a9b50 | ikev2_parent_inR1outI2_continue for #1: calculating g^{xy}, sending I2 | creating state object #2 at 0x56012a960c68 | State DB: adding IKEv2 state #2 in UNDEFINED | pstats #2 ikev2.child started | duplicating state object #1 "road-east-ipv4-psk-ikev2/2x0" as #2 for IPSEC SA | #2 setting local endpoint to 192.1.3.209:500 from #1.st_localport (in duplicate_state() at state.c:1484) | Message ID: init_child #1.#2; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1 | Message ID: switch-from #1 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=0->-1 wip.responder=-1 | Message ID: switch-to #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->0 wip.responder=-1 | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f6058002888 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56012a953588 | event_schedule: new EVENT_SA_REPLACE-pe@0x56012a953588 | inserting event EVENT_SA_REPLACE, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f6058002888 size 128 | parent state #1: PARENT_I1(half-open IKE SA) => PARENT_I2(open IKE SA) | **emit ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' | emitting 8 zero bytes of IV into IKEv2 Encryption Payload | IKEv2 CERT: send a certificate? | IKEv2 CERT: OK to send a certificate (always) | IDr payload will be sent | ****emit IKEv2 Identification - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | ID type: ID_DER_ASN1_DN (0x9) | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Initiator - Payload (35:ISAKMP_NEXT_v2IDi) | next payload chain: saving location 'IKEv2 Identification - Initiator - Payload'.'next payload type' in 'reply packet' | emitting 183 raw bytes of my identity into IKEv2 Identification - Initiator - Payload | my identity 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 | my identity 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | my identity 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | my identity 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | my identity 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | my identity 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | my identity 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 72 6f 61 | my identity 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | my identity 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 | my identity 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 72 6f 61 | my identity 64 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | my identity 77 61 6e 2e 6f 72 67 | emitting length of IKEv2 Identification - Initiator - Payload: 191 | Sending [CERT] of certificate: E=user-road@testing.libreswan.org,CN=road.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | ****emit IKEv2 Certificate Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | next payload chain: setting previous 'IKEv2 Identification - Initiator - Payload'.'next payload type' to current IKEv2 Certificate Payload (37:ISAKMP_NEXT_v2CERT) | next payload chain: saving location 'IKEv2 Certificate Payload'.'next payload type' in 'reply packet' | emitting 1224 raw bytes of CERT into IKEv2 Certificate Payload | CERT 30 82 04 c4 30 82 04 2d a0 03 02 01 02 02 01 05 | CERT 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 | CERT 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 31 | CERT 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 69 | CERT 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 6f | CERT 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c 69 | CERT 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 0b | CERT 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 6e | CERT 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 72 | CERT 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 6f | CERT 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a 86 | CERT 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e 67 | CERT 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 30 22 | CERT 18 0f 32 30 31 39 30 38 32 34 30 39 30 37 35 33 | CERT 5a 18 0f 32 30 32 32 30 38 32 33 30 39 30 37 35 | CERT 33 5a 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 | CERT 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 | CERT 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 | CERT 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c | CERT 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 | CERT 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 | CERT 6d 65 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 72 | CERT 6f 61 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a | CERT 86 48 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 72 | CERT 6f 61 64 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 30 82 01 a2 30 0d 06 | CERT 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 8f | CERT 00 30 82 01 8a 02 82 01 81 00 de eb 73 26 86 d7 | CERT 2c 84 21 13 0e a4 23 30 11 c6 d4 b1 e8 99 58 5b | CERT 54 fa 8c cb 90 bf aa 54 64 e2 ef 00 f9 df b2 5a | CERT 20 d0 1f fd fb 02 a8 d4 60 ac 44 ab c0 91 e1 eb | CERT 81 59 f7 6d 08 30 04 c9 63 5f 07 58 6a d7 e6 ff | CERT 96 d3 79 c2 a1 6b d3 24 00 31 74 f3 8f b4 e9 17 | CERT af d1 3c 33 ee 8b a9 19 b2 03 f1 98 8a 60 f2 f6 | CERT 14 4b 31 a3 8b cb cb ae 31 d9 70 5a 88 2d cc c8 | CERT 77 e8 27 1f 75 07 9a 9b cc 5a 53 bd 69 be 82 0e | CERT 9c b9 3b c8 4f fa 84 87 bb b6 0d 2d ff 11 a1 2d | CERT 51 d4 3f c2 93 09 22 b4 2e 48 0e 77 81 b6 79 ee | CERT 31 37 3d 55 2f 3d 4f 0e 26 7e 73 34 4f 0d d1 90 | CERT 84 c9 06 53 b6 31 7f 6e 62 51 c6 35 3b a1 03 8a | CERT 8b 62 bb 4d 37 a5 44 42 54 a2 10 80 5f 75 0e 17 | CERT a0 4e d8 46 e8 02 bf a1 f5 e5 2a 2e 5c dc b2 d7 | CERT 93 d9 04 45 51 1d 5e 7d d8 fd 03 96 0c d5 02 5b | CERT 72 03 26 b7 d6 cd a0 18 86 a7 07 d0 74 c6 07 e8 | CERT 5c 1f 7a af be d0 ae b8 e7 7a 3b cf 5c fa ca ea | CERT ae c3 6f 85 22 9b 46 81 be 7c 89 15 4f 06 47 30 | CERT 9f bb ee 24 55 e2 21 cd 8e 93 f5 0e 33 49 5d 50 | CERT 48 39 ac ab 37 59 f8 a2 61 be a0 81 d5 25 97 2f | CERT 8b 2f bd d9 47 a4 5c a5 3b c0 99 19 c5 fb 43 da | CERT 6f 6c 33 54 60 af 00 d5 41 12 60 e5 bb 07 b8 76 | CERT 8a 55 c4 c3 47 8b bd 12 bc e8 5e 94 62 7a 20 91 | CERT 11 fb 23 b7 2d f5 6f 73 b6 a9 02 03 01 00 01 a3 | CERT 81 e3 30 81 e0 30 09 06 03 55 1d 13 04 02 30 00 | CERT 30 25 06 03 55 1d 11 04 1e 30 1c 82 1a 72 6f 61 | CERT 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | CERT 77 61 6e 2e 6f 72 67 30 0b 06 03 55 1d 0f 04 04 | CERT 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 | CERT 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 | CERT 07 03 02 30 41 06 08 2b 06 01 05 05 07 01 01 04 | CERT 35 30 33 30 31 06 08 2b 06 01 05 05 07 30 01 86 | CERT 25 68 74 74 70 3a 2f 2f 6e 69 63 2e 74 65 73 74 | CERT 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 | CERT 67 3a 32 35 36 30 30 3d 06 03 55 1d 1f 04 36 30 | CERT 34 30 32 a0 30 a0 2e 86 2c 68 74 74 70 3a 2f 2f | CERT 6e 69 63 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 2f 72 65 76 6f 6b 65 | CERT 64 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 | CERT 01 0b 05 00 03 81 81 00 79 c0 dc 4f ca 3c 5f 4e | CERT 21 3c 76 b0 44 66 c8 74 40 7b 34 5d 63 96 6e ee | CERT c5 df ef 0f fe c2 e4 25 18 39 25 d8 f8 6a b8 87 | CERT f9 17 94 73 7f 8d fb 7d 9d 24 5e c5 95 19 96 3e | CERT 04 dd 8a d0 ad 11 f4 97 32 43 d2 f3 1a d3 1c b1 | CERT e9 01 90 f2 72 36 cf d4 bd 14 e6 ad 8d d2 84 3b | CERT 92 94 99 40 21 16 68 aa e7 5e ac 95 88 11 40 55 | CERT 28 90 af 7f 98 b1 80 36 c5 18 f7 6e 43 40 bc 93 | CERT 86 b3 f1 aa b3 89 b4 15 | emitting length of IKEv2 Certificate Payload: 1229 | IKEv2 CERTREQ: send a cert request? | IKEv2 CERTREQ: OK to send a certificate request | Sending [CERTREQ] of C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org | connection->kind is CK_PERMANENT so send CERTREQ | ****emit IKEv2 Certificate Request Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | next payload chain: setting previous 'IKEv2 Certificate Payload'.'next payload type' to current IKEv2 Certificate Request Payload (38:ISAKMP_NEXT_v2CERTREQ) | next payload chain: saving location 'IKEv2 Certificate Request Payload'.'next payload type' in 'reply packet' | located CA cert E=testing@libreswan.org,CN=Libreswan test CA for mainca,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA for CERTREQ | emitting 20 raw bytes of CA cert public key hash into IKEv2 Certificate Request Payload | CA cert public key hash | 58 13 71 57 9d ee 1a 15 74 03 12 80 12 4d c1 85 | 2b 92 25 e9 | emitting length of IKEv2 Certificate Request Payload: 25 | ****emit IKEv2 Identification - Responder - Payload: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) | flags: none (0x0) | ID type: ID_DER_ASN1_DN (0x9) | next payload chain: ignoring supplied 'IKEv2 Identification - Responder - Payload'.'next payload type' value 39:ISAKMP_NEXT_v2AUTH | next payload chain: setting previous 'IKEv2 Certificate Request Payload'.'next payload type' to current IKEv2 Identification - Responder - Payload (36:ISAKMP_NEXT_v2IDr) | next payload chain: saving location 'IKEv2 Identification - Responder - Payload'.'next payload type' in 'reply packet' | emitting 183 raw bytes of IDr into IKEv2 Identification - Responder - Payload | IDr 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 | IDr 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | IDr 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | IDr 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | IDr 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | IDr 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | IDr 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 61 73 | IDr 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | IDr 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 | IDr 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 61 73 | IDr 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | IDr 77 61 6e 2e 6f 72 67 | emitting length of IKEv2 Identification - Responder - Payload: 191 | not sending INITIAL_CONTACT | ****emit IKEv2 Authentication Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | auth method: IKEv2_AUTH_RSA (0x1) | next payload chain: setting previous 'IKEv2 Identification - Responder - Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH) | next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet' | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_RSA | searching for certificate PKK_RSA:AwEAAd7rc vs PKK_RSA:AwEAAd7rc | #1 spent 7.52 milliseconds in ikev2_calculate_rsa_hash() calling sign_hash_RSA() | emitting 384 raw bytes of rsa signature into IKEv2 Authentication Payload | rsa signature 99 95 dd d5 ef 77 8f 1c b4 58 0f 3c 82 a3 0e a8 | rsa signature 1e d2 9d 70 72 a5 33 0e 02 8e 0c 0e 0c 6b 6c 33 | rsa signature b5 d6 0b d9 9e 6d c3 3b 2c 6a 5c 6f 95 7c 5f 61 | rsa signature 54 3c e8 ba 97 2f 87 ea 54 56 66 0f 05 40 b9 35 | rsa signature 24 be d6 5a e0 1e d6 dd e2 8b 1d 31 b7 00 2c bd | rsa signature 2e 21 94 29 45 71 7a 1c ff 99 07 b6 72 3c dc 81 | rsa signature fe 33 3c e1 54 50 78 98 fc 6b 85 ce 75 ea b0 bb | rsa signature c7 2e 34 49 8a d3 62 35 1c 25 d6 2e ba 0d bd 9c | rsa signature 8f e3 f1 a3 dd 16 39 6f 2c a7 11 2f b0 6c 6f a9 | rsa signature 78 f0 c6 3b 0d 9c 66 3a 26 8b c5 94 97 27 aa aa | rsa signature 61 90 7e 22 f8 9b 3e b5 e9 8a 52 c7 ff cf 32 ff | rsa signature 91 52 35 bf b7 c1 00 d5 a9 56 a4 05 c0 cc 76 63 | rsa signature 66 b5 93 a1 3d 00 a2 44 a9 b6 a4 30 32 02 4e 90 | rsa signature dc 36 13 f8 b1 1e 28 e4 5c 04 3c 81 bc ef 68 20 | rsa signature ec e8 c4 2c 27 36 48 44 a2 b7 6b c9 bf 47 a8 99 | rsa signature ae f0 eb 8c 22 e9 2e a7 42 e7 be 9d 93 78 85 c6 | rsa signature cd b5 ce af 1a 8f e9 d3 ed 9a d6 1a 45 22 2d f7 | rsa signature db f0 f7 78 b1 f1 b5 b1 a9 7e 64 27 58 92 14 ab | rsa signature ea e1 66 c7 fc 1c 32 e1 64 7c b9 64 02 3e 3c b2 | rsa signature 3c 73 19 a1 3a 6c 1b 9a 67 47 25 a3 16 9f e1 ab | rsa signature 3d c7 41 d4 c9 1c 4f 2e 53 fc 67 78 32 45 43 e9 | rsa signature 67 a1 53 30 c1 e2 52 82 35 ae 49 14 18 d9 41 d5 | rsa signature f7 7a 6d 27 27 4d 87 3c d2 09 b8 2f 44 23 12 16 | rsa signature fa 21 12 33 16 24 7a 8e 54 fc 79 77 e0 83 1f d5 | #1 spent 7.62 milliseconds in ikev2_calculate_rsa_hash() | emitting length of IKEv2 Authentication Payload: 392 | getting first pending from state #1 | Switching Child connection for #2 to "road-east-ipv4-psk-ikev2/1x0" from "road-east-ipv4-psk-ikev2/2x0" | in connection_discard for connection road-east-ipv4-psk-ikev2/2x0 | netlink_get_spi: allocated 0xdd9a7e6 for esp.0@192.1.3.209 | constructing ESP/AH proposals with all DH removed for road-east-ipv4-psk-ikev2/1x0 (IKE SA initiator emitting ESP/AH proposals) | converting proposal AES_GCM_16_256-NONE to ikev2 ... | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED | converting proposal AES_GCM_16_128-NONE to ikev2 ... | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED "road-east-ipv4-psk-ikev2/1x0": constructed local ESP/AH proposals for road-east-ipv4-psk-ikev2/1x0 (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | Emitting ikev2_proposals ... | ****emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | discarding INTEG=NONE | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 0d d9 a7 e6 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 32 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding INTEG=NONE | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 2 (0x2) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 0d d9 a7 e6 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 32 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 3 (0x3) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 4 (0x4) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 0d d9 a7 e6 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 48 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 4 (0x4) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 4 (0x4) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 0d d9 a7 e6 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 48 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 164 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ****emit IKEv2 Traffic Selector - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | number of TS: 1 (0x1) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | start port: 0 (0x0) | end port: 65535 (0xffff) | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector | ipv4 start c0 00 01 00 | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector | ipv4 end c0 00 01 ff | emitting length of IKEv2 Traffic Selector: 16 | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 | ****emit IKEv2 Traffic Selector - Responder - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | number of TS: 1 (0x1) | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | start port: 0 (0x0) | end port: 65535 (0xffff) | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector | ipv4 start c0 00 02 00 | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector | ipv4 end c0 00 02 ff | emitting length of IKEv2 Traffic Selector: 16 | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE | Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload | emitting length of IKEv2 Encryption Payload: 2269 | emitting length of ISAKMP Message: 2297 | **parse ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | length: 2297 (0x8f9) | **parse IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2IDi (0x23) | flags: none (0x0) | length: 2269 (0x8dd) | **emit ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2IDi (0x23) | flags: none (0x0) | fragment number: 1 (0x1) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 35:ISAKMP_NEXT_v2IDi | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 478 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 25 00 00 bf 09 00 00 00 30 81 b4 31 0b 30 09 06 | cleartext fragment 03 55 04 06 13 02 43 41 31 10 30 0e 06 03 55 04 | cleartext fragment 08 0c 07 4f 6e 74 61 72 69 6f 31 10 30 0e 06 03 | cleartext fragment 55 04 07 0c 07 54 6f 72 6f 6e 74 6f 31 12 30 10 | cleartext fragment 06 03 55 04 0a 0c 09 4c 69 62 72 65 73 77 61 6e | cleartext fragment 31 18 30 16 06 03 55 04 0b 0c 0f 54 65 73 74 20 | cleartext fragment 44 65 70 61 72 74 6d 65 6e 74 31 23 30 21 06 03 | cleartext fragment 55 04 03 0c 1a 72 6f 61 64 2e 74 65 73 74 69 6e | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 31 | cleartext fragment 2e 30 2c 06 09 2a 86 48 86 f7 0d 01 09 01 16 1f | cleartext fragment 75 73 65 72 2d 72 6f 61 64 40 74 65 73 74 69 6e | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 26 | cleartext fragment 00 04 cd 04 30 82 04 c4 30 82 04 2d a0 03 02 01 | cleartext fragment 02 02 01 05 30 0d 06 09 2a 86 48 86 f7 0d 01 01 | cleartext fragment 0b 05 00 30 81 ac 31 0b 30 09 06 03 55 04 06 13 | cleartext fragment 02 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e | cleartext fragment 74 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 | cleartext fragment 54 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a | cleartext fragment 0c 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 | cleartext fragment 03 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 | cleartext fragment 74 6d 65 6e 74 31 25 30 23 06 03 55 04 03 0c 1c | cleartext fragment 4c 69 62 72 65 73 77 61 6e 20 74 65 73 74 20 43 | cleartext fragment 41 20 66 6f 72 20 6d 61 69 6e 63 61 31 24 30 22 | cleartext fragment 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 74 65 73 | cleartext fragment 74 69 6e 67 40 6c 69 62 72 65 73 77 61 6e 2e 6f | cleartext fragment 72 67 30 22 18 0f 32 30 31 39 30 38 32 34 30 39 | cleartext fragment 30 37 35 33 5a 18 0f 32 30 32 32 30 38 32 33 30 | cleartext fragment 39 30 37 35 33 5a 30 81 b4 31 0b 30 09 06 03 55 | cleartext fragment 04 06 13 02 43 41 31 10 30 0e 06 03 55 04 08 0c | cleartext fragment 07 4f 6e 74 61 72 69 6f 31 10 30 0e 06 03 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 511 | emitting length of ISAKMP Message: 539 | **emit ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 2 (0x2) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 478 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 55 04 07 0c 07 54 6f 72 6f 6e 74 6f 31 12 30 10 | cleartext fragment 06 03 55 04 0a 0c 09 4c 69 62 72 65 73 77 61 6e | cleartext fragment 31 18 30 16 06 03 55 04 0b 0c 0f 54 65 73 74 20 | cleartext fragment 44 65 70 61 72 74 6d 65 6e 74 31 23 30 21 06 03 | cleartext fragment 55 04 03 0c 1a 72 6f 61 64 2e 74 65 73 74 69 6e | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 31 | cleartext fragment 2e 30 2c 06 09 2a 86 48 86 f7 0d 01 09 01 16 1f | cleartext fragment 75 73 65 72 2d 72 6f 61 64 40 74 65 73 74 69 6e | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 30 | cleartext fragment 82 01 a2 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 | cleartext fragment 05 00 03 82 01 8f 00 30 82 01 8a 02 82 01 81 00 | cleartext fragment de eb 73 26 86 d7 2c 84 21 13 0e a4 23 30 11 c6 | cleartext fragment d4 b1 e8 99 58 5b 54 fa 8c cb 90 bf aa 54 64 e2 | cleartext fragment ef 00 f9 df b2 5a 20 d0 1f fd fb 02 a8 d4 60 ac | cleartext fragment 44 ab c0 91 e1 eb 81 59 f7 6d 08 30 04 c9 63 5f | cleartext fragment 07 58 6a d7 e6 ff 96 d3 79 c2 a1 6b d3 24 00 31 | cleartext fragment 74 f3 8f b4 e9 17 af d1 3c 33 ee 8b a9 19 b2 03 | cleartext fragment f1 98 8a 60 f2 f6 14 4b 31 a3 8b cb cb ae 31 d9 | cleartext fragment 70 5a 88 2d cc c8 77 e8 27 1f 75 07 9a 9b cc 5a | cleartext fragment 53 bd 69 be 82 0e 9c b9 3b c8 4f fa 84 87 bb b6 | cleartext fragment 0d 2d ff 11 a1 2d 51 d4 3f c2 93 09 22 b4 2e 48 | cleartext fragment 0e 77 81 b6 79 ee 31 37 3d 55 2f 3d 4f 0e 26 7e | cleartext fragment 73 34 4f 0d d1 90 84 c9 06 53 b6 31 7f 6e 62 51 | cleartext fragment c6 35 3b a1 03 8a 8b 62 bb 4d 37 a5 44 42 54 a2 | cleartext fragment 10 80 5f 75 0e 17 a0 4e d8 46 e8 02 bf a1 f5 e5 | cleartext fragment 2a 2e 5c dc b2 d7 93 d9 04 45 51 1d 5e 7d d8 fd | cleartext fragment 03 96 0c d5 02 5b 72 03 26 b7 d6 cd a0 18 86 a7 | cleartext fragment 07 d0 74 c6 07 e8 5c 1f 7a af be d0 ae b8 e7 7a | cleartext fragment 3b cf 5c fa ca ea ae c3 6f 85 22 9b 46 81 be 7c | cleartext fragment 89 15 4f 06 47 30 9f bb ee 24 55 e2 21 cd | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 511 | emitting length of ISAKMP Message: 539 | **emit ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 3 (0x3) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 478 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 8e 93 f5 0e 33 49 5d 50 48 39 ac ab 37 59 f8 a2 | cleartext fragment 61 be a0 81 d5 25 97 2f 8b 2f bd d9 47 a4 5c a5 | cleartext fragment 3b c0 99 19 c5 fb 43 da 6f 6c 33 54 60 af 00 d5 | cleartext fragment 41 12 60 e5 bb 07 b8 76 8a 55 c4 c3 47 8b bd 12 | cleartext fragment bc e8 5e 94 62 7a 20 91 11 fb 23 b7 2d f5 6f 73 | cleartext fragment b6 a9 02 03 01 00 01 a3 81 e3 30 81 e0 30 09 06 | cleartext fragment 03 55 1d 13 04 02 30 00 30 25 06 03 55 1d 11 04 | cleartext fragment 1e 30 1c 82 1a 72 6f 61 64 2e 74 65 73 74 69 6e | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 30 | cleartext fragment 0b 06 03 55 1d 0f 04 04 03 02 07 80 30 1d 06 03 | cleartext fragment 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 | cleartext fragment 01 06 08 2b 06 01 05 05 07 03 02 30 41 06 08 2b | cleartext fragment 06 01 05 05 07 01 01 04 35 30 33 30 31 06 08 2b | cleartext fragment 06 01 05 05 07 30 01 86 25 68 74 74 70 3a 2f 2f | cleartext fragment 6e 69 63 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | cleartext fragment 65 73 77 61 6e 2e 6f 72 67 3a 32 35 36 30 30 3d | cleartext fragment 06 03 55 1d 1f 04 36 30 34 30 32 a0 30 a0 2e 86 | cleartext fragment 2c 68 74 74 70 3a 2f 2f 6e 69 63 2e 74 65 73 74 | cleartext fragment 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 | cleartext fragment 67 2f 72 65 76 6f 6b 65 64 2e 63 72 6c 30 0d 06 | cleartext fragment 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 81 81 00 | cleartext fragment 79 c0 dc 4f ca 3c 5f 4e 21 3c 76 b0 44 66 c8 74 | cleartext fragment 40 7b 34 5d 63 96 6e ee c5 df ef 0f fe c2 e4 25 | cleartext fragment 18 39 25 d8 f8 6a b8 87 f9 17 94 73 7f 8d fb 7d | cleartext fragment 9d 24 5e c5 95 19 96 3e 04 dd 8a d0 ad 11 f4 97 | cleartext fragment 32 43 d2 f3 1a d3 1c b1 e9 01 90 f2 72 36 cf d4 | cleartext fragment bd 14 e6 ad 8d d2 84 3b 92 94 99 40 21 16 68 aa | cleartext fragment e7 5e ac 95 88 11 40 55 28 90 af 7f 98 b1 80 36 | cleartext fragment c5 18 f7 6e 43 40 bc 93 86 b3 f1 aa b3 89 b4 15 | cleartext fragment 24 00 00 19 04 58 13 71 57 9d ee 1a 15 74 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 511 | emitting length of ISAKMP Message: 539 | **emit ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 4 (0x4) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 478 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 03 12 80 12 4d c1 85 2b 92 25 e9 27 00 00 bf 09 | cleartext fragment 00 00 00 30 81 b4 31 0b 30 09 06 03 55 04 06 13 | cleartext fragment 02 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e | cleartext fragment 74 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 | cleartext fragment 54 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a | cleartext fragment 0c 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 | cleartext fragment 03 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 | cleartext fragment 74 6d 65 6e 74 31 23 30 21 06 03 55 04 03 0c 1a | cleartext fragment 65 61 73 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 | cleartext fragment 72 65 73 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 | cleartext fragment 2a 86 48 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d | cleartext fragment 65 61 73 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 | cleartext fragment 72 65 73 77 61 6e 2e 6f 72 67 21 00 01 88 01 00 | cleartext fragment 00 00 99 95 dd d5 ef 77 8f 1c b4 58 0f 3c 82 a3 | cleartext fragment 0e a8 1e d2 9d 70 72 a5 33 0e 02 8e 0c 0e 0c 6b | cleartext fragment 6c 33 b5 d6 0b d9 9e 6d c3 3b 2c 6a 5c 6f 95 7c | cleartext fragment 5f 61 54 3c e8 ba 97 2f 87 ea 54 56 66 0f 05 40 | cleartext fragment b9 35 24 be d6 5a e0 1e d6 dd e2 8b 1d 31 b7 00 | cleartext fragment 2c bd 2e 21 94 29 45 71 7a 1c ff 99 07 b6 72 3c | cleartext fragment dc 81 fe 33 3c e1 54 50 78 98 fc 6b 85 ce 75 ea | cleartext fragment b0 bb c7 2e 34 49 8a d3 62 35 1c 25 d6 2e ba 0d | cleartext fragment bd 9c 8f e3 f1 a3 dd 16 39 6f 2c a7 11 2f b0 6c | cleartext fragment 6f a9 78 f0 c6 3b 0d 9c 66 3a 26 8b c5 94 97 27 | cleartext fragment aa aa 61 90 7e 22 f8 9b 3e b5 e9 8a 52 c7 ff cf | cleartext fragment 32 ff 91 52 35 bf b7 c1 00 d5 a9 56 a4 05 c0 cc | cleartext fragment 76 63 66 b5 93 a1 3d 00 a2 44 a9 b6 a4 30 32 02 | cleartext fragment 4e 90 dc 36 13 f8 b1 1e 28 e4 5c 04 3c 81 bc ef | cleartext fragment 68 20 ec e8 c4 2c 27 36 48 44 a2 b7 6b c9 bf 47 | cleartext fragment a8 99 ae f0 eb 8c 22 e9 2e a7 42 e7 be 9d 93 78 | cleartext fragment 85 c6 cd b5 ce af 1a 8f e9 d3 ed 9a d6 1a | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 511 | emitting length of ISAKMP Message: 539 | **emit ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 5 (0x5) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 328 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 45 22 2d f7 db f0 f7 78 b1 f1 b5 b1 a9 7e 64 27 | cleartext fragment 58 92 14 ab ea e1 66 c7 fc 1c 32 e1 64 7c b9 64 | cleartext fragment 02 3e 3c b2 3c 73 19 a1 3a 6c 1b 9a 67 47 25 a3 | cleartext fragment 16 9f e1 ab 3d c7 41 d4 c9 1c 4f 2e 53 fc 67 78 | cleartext fragment 32 45 43 e9 67 a1 53 30 c1 e2 52 82 35 ae 49 14 | cleartext fragment 18 d9 41 d5 f7 7a 6d 27 27 4d 87 3c d2 09 b8 2f | cleartext fragment 44 23 12 16 fa 21 12 33 16 24 7a 8e 54 fc 79 77 | cleartext fragment e0 83 1f d5 2c 00 00 a4 02 00 00 20 01 03 04 02 | cleartext fragment 0d d9 a7 e6 03 00 00 0c 01 00 00 14 80 0e 01 00 | cleartext fragment 00 00 00 08 05 00 00 00 02 00 00 20 02 03 04 02 | cleartext fragment 0d d9 a7 e6 03 00 00 0c 01 00 00 14 80 0e 00 80 | cleartext fragment 00 00 00 08 05 00 00 00 02 00 00 30 03 03 04 04 | cleartext fragment 0d d9 a7 e6 03 00 00 0c 01 00 00 0c 80 0e 01 00 | cleartext fragment 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c | cleartext fragment 00 00 00 08 05 00 00 00 00 00 00 30 04 03 04 04 | cleartext fragment 0d d9 a7 e6 03 00 00 0c 01 00 00 0c 80 0e 00 80 | cleartext fragment 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c | cleartext fragment 00 00 00 08 05 00 00 00 2d 00 00 18 01 00 00 00 | cleartext fragment 07 00 00 10 00 00 ff ff c0 00 01 00 c0 00 01 ff | cleartext fragment 00 00 00 18 01 00 00 00 07 00 00 10 00 00 ff ff | cleartext fragment c0 00 02 00 c0 00 02 ff | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 361 | emitting length of ISAKMP Message: 389 | suspend processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | start processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #2 complete_v2_state_transition() md.from_state=PARENT_I1 md.svm.state[from]=PARENT_I1 UNDEFINED->PARENT_I2 with status STF_OK | IKEv2: transition from state STATE_PARENT_I1 to state STATE_PARENT_I2 | child state #2: UNDEFINED(ignore) => PARENT_I2(open IKE SA) | Message ID: updating counters for #2 to 0 after switching state | Message ID: recv #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1->0 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=-1 | Message ID: sent #1.#2 request 1; ike: initiator.sent=0->1 initiator.recv=0 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->1 wip.responder=-1 "road-east-ipv4-psk-ikev2/1x0" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) | sending fragments ... | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 35 20 23 08 00 00 00 01 00 00 02 1b 23 00 01 ff | 00 01 00 05 42 6c 54 71 93 df 6a d5 63 ce 17 15 | 43 3b 0c 52 b0 56 0a 84 08 a3 4a 7c 59 f1 34 79 | bd 8f 23 7f 6a 46 1a 69 19 54 53 73 33 fb 33 2b | cb 8b ca 1c 23 f7 bc 2c a0 5c ab b5 2a f3 9a fa | dd 24 69 9f 14 d9 b0 6d 7e 82 10 68 72 33 bf 3f | 5b 92 da 15 d6 c8 76 48 c7 13 98 77 2b 07 8b 9e | 98 be 62 c2 fd b5 d3 11 af cf aa 9e d9 6a c8 1b | c8 5a bb 9b 7e 6a ff 2d f5 88 19 32 e0 15 1b 7f | ae c1 e2 ed 12 16 cc 21 2a bc ab 9b 2b 95 29 b9 | 85 3b 77 ed e3 a5 b4 ea 95 ef f5 d2 ad 1d 4c ed | 0f d2 dd 0b bc f0 33 b4 41 48 ab 8b bf 75 b9 68 | 03 74 91 c1 b7 a5 76 f8 16 88 77 1d da 04 d8 a6 | 8e 9e 8c 73 95 d5 3f c8 6a b8 0f a4 c8 f4 40 87 | 83 8c 46 7a 06 e7 34 f0 bb 66 18 94 57 5c f8 50 | ab 01 01 31 90 1d a2 25 d6 3b db 0a 60 60 34 06 | 1d 4e c7 43 60 4f 46 ef c6 ba ec bb 7e 02 29 6f | ad 6e 94 f7 8e 91 23 c1 40 d5 a6 5b 73 a9 48 fc | 68 6c 8c 0d 6a 74 cd 09 f8 32 47 8d fa f7 5b cf | f8 10 12 82 c1 61 fa d3 d7 1f 38 32 1d 3a 3b 8a | 03 8e 6d 83 ee 31 1a 5a 13 a2 e2 f7 48 78 cb c9 | a3 07 83 28 64 fa 11 f3 00 be 0f a9 d5 4b c3 e7 | 1c 08 58 d3 6c ee c2 97 c7 aa a2 37 1a 9b 82 92 | 68 8e 3b 53 81 1a c9 b8 7b 88 33 f2 29 99 d7 44 | 8c f6 ef 4b 56 63 9b 70 87 73 41 38 09 ad a3 9c | 13 4d 9b e8 01 86 37 be fd 52 01 fc c6 90 34 f2 | 6f c5 f1 17 45 01 df f4 81 8e 2c d5 93 9b f6 b7 | 8f 0d 43 1d 44 c6 03 0d e9 04 86 81 9b 25 e4 ec | 64 79 6f 3a a9 1a ce 89 7e 4c fb fa a2 be 86 8f | 53 82 24 70 8e db e0 60 1f 43 69 16 67 6f ff 3d | 46 70 92 32 fd 9e e5 b6 9a 17 4f 45 b2 56 7f ae | c3 87 5d b3 11 63 c9 07 78 f2 08 2c 15 9d 76 61 | 94 1b 97 c6 7d c8 2b 48 82 69 8b | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 35 20 23 08 00 00 00 01 00 00 02 1b 00 00 01 ff | 00 02 00 05 7b f4 4c cd bb 6c 96 65 ac d4 7a 27 | 28 73 b6 3b 81 16 df b6 3b 0f c1 d3 93 01 76 5b | 74 9a c0 1a 92 bd 25 35 cf 45 db dd b4 89 91 08 | 97 cc ef e7 1d 81 a5 6d 06 68 f4 ac 30 1d d6 f8 | d7 03 c0 d9 8c 40 67 f8 29 fd 10 09 84 e0 f8 70 | 80 b9 68 d0 4b ef 64 1b 37 bd 9f b5 56 2c 9d 44 | 67 9c 41 32 42 b6 db cd 82 79 6d 9d 1f 37 7d 30 | 9e 71 a8 fb e3 26 3d 29 57 b7 8c 54 ff cd 00 d6 | dd dc a0 a0 00 59 f2 0e 92 fd 80 37 19 89 f5 08 | 78 73 df 68 63 fb c1 e2 94 f5 90 bf 38 e3 e3 1c | 8d f6 34 f0 88 d9 6d 0b 3e 08 d8 bb 92 f7 bd de | 8e 55 ef 1e ea 8a e5 23 3e 24 c7 9c d4 b0 82 49 | be 9c b1 bd cc 01 55 d8 9a b8 d0 43 6e e4 59 04 | 08 e3 4d 74 b9 2f 97 97 08 2f a1 1b 2e 35 0c f7 | 63 05 55 dc a7 fd e2 98 29 8a c6 d1 e3 a7 73 a2 | 48 66 6a 37 d3 2c 32 17 4f f8 6e 7f c8 f9 2a 29 | 30 c6 03 e1 ed 44 a7 be 88 17 eb 7b e6 35 0d c8 | df 15 3a f0 b5 a2 7e c8 e9 0e be c0 f1 73 3c 5f | a2 7d 40 7b cb c6 9e c1 c8 ef 34 f1 f2 eb 66 91 | 60 cb 5c 27 77 22 2f 3c b3 45 40 33 cf 0b 44 66 | 9b 8a f8 42 29 db 6f e0 f4 28 ae da 83 54 04 ab | 6c 0c 8d 0d 10 c5 cd 6c 8e 8c c3 37 ce 2f 15 9b | b5 de c9 df 34 6c 6d ea 50 1f c9 6f 54 ce 40 2c | 10 66 88 86 95 51 23 f8 e4 37 43 84 dc 6b f3 1d | 83 da 77 d5 f7 96 b2 b5 aa 30 fd 66 f5 1e 65 38 | 6c 6d ad 33 bc 33 86 75 f3 5a 2d d3 c9 a2 31 69 | da 5e 62 1b 65 73 2c c3 fc 0d 18 83 68 10 d2 10 | 68 82 54 95 0f a5 d6 57 c0 31 e6 16 38 26 52 66 | c7 c7 f3 0f 9f 3e f0 af 2b e6 3e 95 bb c5 08 09 | ce 76 41 84 82 8f f7 f2 0e d5 d8 80 c7 a1 59 d4 | 57 51 29 61 ff 6c fb 34 83 7e 31 60 31 f8 99 04 | a5 fa c4 ee aa 62 55 42 77 4c 22 | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 35 20 23 08 00 00 00 01 00 00 02 1b 00 00 01 ff | 00 03 00 05 98 b5 70 a3 c8 75 a4 6a 3b 53 37 bd | b3 1c 3d 0a 12 9f a3 e4 a1 c3 07 70 01 8a 05 91 | 09 d8 81 27 89 4c 4d b4 c6 fc 0f d8 e9 b6 78 7e | df e7 c4 55 c1 51 ce 2c 2e fa 5c 80 80 ec c0 07 | 53 d9 c2 bf 4c 45 10 e8 d2 f1 5d 22 0c 31 9d 8b | a3 d1 3c ae 89 3f 2f 8d 27 50 4b 78 c7 76 4f c2 | 72 57 85 21 04 8f a3 f1 0a 5d 10 a3 f8 1f 86 8a | 81 8d ed 9c 80 c6 57 d8 0c 91 75 35 ae a5 1e d0 | 87 e5 67 b5 aa f0 23 3c e0 ae 3d cc 51 55 51 4d | 7b 72 9f 11 7f 20 2f 3c 4a 53 cb f9 99 ef d4 c5 | 02 b2 de 2e b1 0a 1e e5 f9 ac ad 5a d0 de 98 ee | 9f 7c 25 2e 24 56 0b 59 61 ac 10 30 cc 51 97 a5 | 1e 5f 57 73 1a ae 51 db 1f b6 8a e4 03 3b 92 47 | 2e 83 63 e7 ba c5 10 92 ec 99 77 3d 69 f0 fb ed | c1 8c f3 77 b6 f1 34 ff ef 80 96 5a a9 b1 87 5f | ea 34 d6 45 c7 2e ba 17 86 a0 79 5f e9 1d 0e 22 | 93 e9 18 ae 02 f5 3f 7f 67 29 b8 93 5c 80 ca a7 | ae 74 3e 51 ca c7 a2 52 f8 03 eb ea 41 12 01 00 | e8 52 db 8b d7 6b 88 ef 87 f4 5d e9 17 6c 94 66 | a7 e7 63 a2 77 1e af 4d 3a b4 9a 62 9e 91 32 4c | fe 66 fd 89 24 5e 48 2b 10 89 90 48 da 3b a3 81 | 7f 9a c6 94 6f 44 c4 4c c4 e7 9d 0a 3c 6c f0 85 | 29 28 b7 44 95 32 70 d7 b0 04 b0 fd 93 15 14 93 | 7f 02 bf 17 a3 e7 55 ab 5e 20 c2 f1 24 6d 31 da | a1 21 ff 31 e1 5a 02 5d 4d 64 a4 6c 26 b0 a5 0a | af ce f7 d2 68 9a ad 93 bf 77 e6 19 bb c4 5f 37 | 61 0e 2b 4b 75 4c d3 cf ae f7 e2 c1 f2 c9 78 f1 | 0f 0a 8b 54 e9 cf bb a2 c4 af 1b ae a5 8e 22 28 | a4 b6 5b 83 20 17 b2 67 2f d9 2c 29 4d a0 c7 0c | e9 92 85 69 be 2e 11 db ee e2 83 25 d4 5b 80 5c | 2a 0b 00 1b e4 50 aa a7 90 c6 81 8b 3f c2 d4 d6 | e4 7e 80 11 bb a4 53 eb b6 2b fa | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 35 20 23 08 00 00 00 01 00 00 02 1b 00 00 01 ff | 00 04 00 05 23 83 2a a0 95 ef fe 79 41 d6 c9 52 | 5e 37 f0 6e 13 f7 fd a0 04 76 06 05 f1 d7 17 d3 | 64 21 fc e1 4f 20 c5 73 cf d7 44 0b ce de c4 d0 | f6 a2 02 96 b5 8b 04 3c 35 7f 38 9e 4e f5 ae f2 | da aa 7e 15 4c 80 30 52 c9 35 12 3c 58 1a f6 07 | 27 31 2b 1c d8 91 85 7b 54 76 a4 2b b3 80 8e 3c | 21 c4 54 d8 dd 16 9b c1 c4 60 3b 53 41 2c 71 57 | 76 ba c9 68 64 3a 71 2b 74 c8 01 47 43 ec ad 15 | 77 a4 49 4e e6 d2 14 47 8a 73 97 aa 6d b3 fc 50 | 4f f5 dd ff 0d 30 1b 13 a8 3c 1c c6 cb 4f 11 b5 | 34 1d 8d f6 02 f3 81 8d 2c 71 1c a3 e4 7f c4 ec | 21 24 a4 81 2e f8 51 10 24 58 da 9f 29 df 6c fb | 7b 8c 24 92 46 6e 68 c3 6b e3 19 2f 45 d2 dc 84 | cc a8 59 a1 56 66 a1 5c c4 0c 50 b9 37 e0 43 27 | 6b 1c 59 61 38 d8 c1 b6 5b 5a d6 e9 67 88 1f 10 | 47 f1 4f 9a 93 44 50 32 d3 e2 4b b1 de 1b 48 3f | ee 3c 1f 5b d3 77 70 a0 82 9a 2a 04 30 bf bc 9e | 3b 7f dd 2f d9 39 bc 7a 7b a3 97 a9 ec d0 31 c3 | 89 60 fc e7 3d 7e bd 68 3d fa 56 60 8d 29 7c c5 | 54 06 80 35 f5 9f a0 16 1c aa dc 8a 11 c6 d5 6c | 09 dc 58 77 64 80 30 f9 17 46 b8 84 9c a3 b6 55 | a1 f8 49 d5 83 d8 59 20 79 68 b1 84 d1 c9 32 08 | a9 60 9a 3f e6 ee 6e ae db 79 1c 48 d6 09 d7 17 | bb a5 d3 7d 15 96 34 a7 b3 a9 0e 73 92 02 53 d5 | d2 c7 72 13 fc 5f ba e7 fc ad 4f b9 57 74 5b 8f | 97 e3 2c f5 eb dc c3 1f 7e 65 62 66 1d 3a 2e 10 | a3 ad 70 8b 08 2c ca 13 b2 84 b2 a2 28 74 79 91 | a4 c6 cd 88 17 db 77 07 f1 77 57 94 91 45 e0 a0 | b4 a2 90 d3 2b 98 c3 0c 87 ef fd ff f6 3c f6 5b | 6d f3 43 81 02 0e 2b 09 5b 89 7b 83 19 07 5c af | c6 8d 42 e0 5d f5 95 d3 52 7f f9 6b c5 8c c0 5d | 58 31 e8 3d 25 c6 54 c6 03 17 6a | sending 389 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 35 20 23 08 00 00 00 01 00 00 01 85 00 00 01 69 | 00 05 00 05 b1 c4 0b 84 0a 8e 84 f5 1b 79 d9 c5 | 44 c7 65 7a 13 d7 1f a4 a4 19 d6 9f 00 3f 5d 4f | 9c 45 b1 82 69 40 8d 67 bd 12 a3 be 58 1d 10 b8 | 8b 89 d2 60 a7 14 be fe 90 cd 63 65 75 a6 0b 66 | 92 d8 08 45 f3 1a 79 db d0 c5 98 62 7d 75 07 e7 | 52 b9 04 00 37 99 f2 39 93 5e 71 ad db 2e f6 07 | 35 2f 44 3d fc 72 a2 39 dd b0 28 ed 32 f1 0f 26 | a0 d5 92 72 fc f4 4f f5 91 8f 9b da f3 0a e3 29 | 85 3b 97 7b 3a 12 18 3b 4c fe 8b 8e 8a 48 1b b7 | 73 73 e7 e4 5c e8 3e ea e5 39 f8 c3 83 bb 61 0d | 86 2b 06 5b e0 9f 98 30 a0 e4 ca 6f 3d 75 9a 1f | be f1 c3 15 04 21 19 5b 51 14 46 09 b6 86 d7 90 | bd 9c 66 64 fd c0 c1 fa 2f 9c f7 5a be bc f2 e7 | d3 e3 f4 b3 ef 20 52 4d cc 1e 49 85 db c4 d5 44 | e3 6a c6 41 db 8f 39 ef 8e c7 d9 cf 9a 06 99 55 | f4 cb 08 b1 82 c0 13 f4 2b bd 08 ec 3d c6 54 54 | 77 8e 32 f9 36 a7 a5 76 c3 6a 6f e7 0e 01 af 30 | 70 45 e5 ed ca de 31 60 ee b7 62 ed 61 0a 15 f8 | 73 df 82 7f 13 2c 76 ca d6 3a 57 85 bc 95 43 36 | 84 61 9a bf b9 5a 9c d0 60 d8 ea 6b 86 a2 53 2f | 33 7a bb c4 22 d7 24 77 c6 73 b2 4b fb e7 a5 08 | 24 85 38 f0 6a cb 40 5f 3b 5a 7a fc ca 02 d8 66 | f4 e0 2e 25 b3 | sent 5 fragments | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7f6058002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #2 | libevent_malloc: new ptr-libevent@0x56012a965748 size 128 | #2 STATE_PARENT_I2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29161.268279 | resume sending helper answer for #1 suppresed complete_v2_state_transition() | #1 spent 1.32 milliseconds | #1 spent 9.82 milliseconds in resume sending helper answer | stop processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f6050000f48 | spent 0.00282 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 539 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 35 20 23 20 00 00 00 01 00 00 02 1b 24 00 01 ff | 00 01 00 05 01 b3 38 a2 ac b7 a5 c7 20 f1 1f 18 | 86 be 19 53 6c b5 8d 71 f3 6b 15 c2 dd b4 c2 26 | 7b ea b2 ea 54 0b 21 81 ff 90 f3 0a a1 33 83 67 | 5a 78 36 15 66 77 0a 1a e1 16 fc 11 ab 4d c4 69 | 4b 85 1d 3c 85 59 02 65 ec b8 2e 77 f7 29 71 ee | 32 69 2c 37 bc 94 73 05 66 5b 34 8d 5d ab 54 b8 | 62 18 b9 5f 8d c7 6e 85 b9 09 63 3e b6 5e 06 d9 | 5b fc 43 7b 04 f4 0e 7e 2a 50 5f 6e f7 cd b5 84 | ad 8a 22 fd 33 3f 95 01 50 a8 10 1a 60 c4 01 97 | 9a 97 e2 d7 fd ff d6 13 eb f5 bf 3b a3 02 9b b4 | eb b5 c7 51 05 b4 94 85 2a ef a9 e3 1f e2 35 e0 | e4 92 92 20 d1 19 85 9e f8 93 7b ef fb b5 2f 9e | 76 3a a3 a8 99 67 64 ef 2a ba 94 9e f1 4f 47 fc | cd c7 81 b4 60 ab 94 e0 6f ee 03 e1 1a 53 5f 97 | 15 a4 42 17 10 43 bb 78 75 5f f2 89 13 86 fe bf | cf 70 f9 e4 ad a0 0a aa 2c 63 44 86 e7 0e d8 44 | 6d 04 ee a1 c2 39 9e 91 4c 33 c0 17 2c 93 10 5b | 60 81 a1 48 4e 23 03 71 3a 3b ca b6 6f 41 79 6a | 19 da 6c 3b b0 37 c0 d8 21 e5 dc 9b 7a 35 92 ae | 95 98 9f dd 61 ef 30 53 58 91 13 50 77 98 7d 49 | 46 4c b4 ff 34 01 e4 78 f2 93 a2 3b 3a 25 9a fc | 76 5f 48 b1 d3 66 02 4c 71 42 77 89 31 07 77 d2 | f4 53 5d e3 06 15 2e ec be ca 36 c4 d3 8c 3d 6a | 5b 6f f3 84 b1 82 e9 b1 d5 ee 55 a8 d4 9a 3a 80 | b5 82 9d 4b 98 36 37 5d d5 4a 3f 21 3e 73 47 63 | 56 f2 a9 71 fe db cc b1 ff ec d0 a4 b5 6b cc d5 | 96 81 d8 31 d2 78 6a 4c 5c 84 e7 da 6f 00 0f 87 | dd 54 9c 96 6e 6c 8e 4e 23 38 a9 b4 cb 7d 09 96 | 5b 6f b8 35 fc 4b 03 30 8e 80 66 7a 3d 3a d3 10 | b3 e6 d9 e5 8e 10 a1 13 0d 19 cd 29 0c e0 9d 10 | 73 78 22 00 a4 22 75 41 a9 aa c0 0b 01 b7 4c 96 | 31 7c bc e2 0b a4 26 8b a8 0d bf | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 539 (0x21b) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #2 is idle | #2 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2IDr (0x24) | flags: none (0x0) | length: 511 (0x1ff) | fragment number: 1 (0x1) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=503) | #2 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '1', total number '5', next payload '36' | updated IKE fragment state to respond using fragments without waiting for re-transmits | stop processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 0.164 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.177 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00145 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 539 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 35 20 23 20 00 00 00 01 00 00 02 1b 00 00 01 ff | 00 02 00 05 14 c2 d4 8d 77 58 94 f0 e7 ba 7d d8 | 12 84 f6 43 08 38 96 af ad cd 14 26 28 ca c2 00 | e9 40 10 f3 98 58 05 40 1c 42 4f eb b9 cc c2 54 | fc a2 a9 58 c6 2a 7e ee 4e f1 11 17 08 1c 47 40 | 94 2a 8f bd 5b ab e9 77 21 6b d1 cc 2b 78 56 72 | 78 6e 20 16 ec fc e0 b6 9e 52 d4 9b 0c 6f 57 51 | d8 30 be fa 3e f9 0a a3 a7 b5 a1 b0 4a 79 1a 62 | 4c 02 48 29 99 5c 0a 8b 2e 9b ef 10 5d b1 2b fd | 42 30 99 01 8e 02 a5 81 79 57 72 ea ef e4 70 ca | f4 ec 83 d0 f4 77 d6 be 72 21 c7 8c 10 e0 ee 6a | f8 0f 71 6f 18 f9 90 4e e4 e3 bc 21 0b dc 7a b3 | cb 97 60 95 05 51 ff 24 49 5e cb a4 41 bc 2b 39 | 6f 6d 8f ba 06 7f 6a 71 60 91 8b 33 b0 52 2f 03 | 57 fa 97 64 d9 de 55 12 79 75 af 9c 69 20 33 a8 | b3 40 f5 8a e6 f6 ed 37 6e a7 48 e1 d9 21 a7 9b | 73 bd 97 d2 69 17 59 2b 0b f4 c2 cd 0d 19 49 31 | e7 cd da 82 d1 32 30 22 b4 d3 c1 a4 3b 13 dd 3f | df 88 79 46 fe dd 78 57 ea 68 ab c7 95 8c 37 16 | da 28 eb 48 c6 44 19 e3 25 94 3d 8f 1f 2e e6 2a | a7 80 cc 51 57 a5 69 8e 2c dd 1a ab 44 ba 93 56 | d4 ac 22 a0 b5 03 0b 8e d4 8b 79 f5 37 6b 82 13 | a5 e8 db 4c a5 b2 e7 4b 8b 40 20 87 3a 42 03 d1 | 70 31 83 b0 ba ea ad 82 42 36 00 f7 be 09 ba 6d | bf c1 ad f7 46 bc 52 8e af 8a 39 4a 78 15 3b e7 | 48 5c aa 32 7a 68 0f 04 85 64 6a 3f 5c c9 89 d0 | 08 7e fc f8 ec 14 fd 05 8a 62 06 ac e7 96 57 8c | c4 b0 9f 31 c8 50 0a 37 31 6a 1a 1e 94 00 d8 42 | d7 63 43 d7 9e d2 db c2 5d ee 04 ae 66 9a a9 c4 | 81 e2 33 76 8f 43 77 24 b8 18 72 ba cd 99 7f 99 | d7 0b 9f 42 0b 07 79 6d b9 f5 d6 2d 8c d7 51 7c | 3d 76 b1 da 7c 08 18 7e b4 76 e1 19 4c 28 7f 64 | 72 29 44 05 40 b8 ac 43 ae d9 71 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 539 (0x21b) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #2 is idle | #2 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 511 (0x1ff) | fragment number: 2 (0x2) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=503) | #2 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '2', total number '5', next payload '0' | stop processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 0.141 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.149 milliseconds in comm_handle_cb() reading and processing packet | spent 0.0012 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 539 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 35 20 23 20 00 00 00 01 00 00 02 1b 00 00 01 ff | 00 03 00 05 40 7f f9 ad 45 02 78 bc 0c 89 2c 90 | a2 49 3c 3f bc 97 25 91 fb f1 87 0b 80 1a 02 36 | 2e 2c 5d 0f 9f 90 86 e2 67 65 c5 b7 99 7c ed a8 | 4a e1 76 99 39 3f 96 1b da 07 2a e9 fc 0b 23 4b | 23 a9 57 18 ee 86 e4 77 c1 59 ee cc c2 2a 67 6e | a9 30 2c c1 ac 23 17 82 eb 29 c7 4d 94 06 85 19 | 66 a2 f1 d9 b5 ee 8b ac dd c3 78 dc f2 99 ad ad | 74 56 29 8d 7d 85 b0 1f 2a 48 20 d3 f8 43 51 1b | 4f 9a c8 63 68 96 89 b8 b2 94 4c 8b ae 1f d0 48 | 3a c2 19 0f 45 4e 43 dd 59 b4 09 ea 2a 40 e7 8e | 70 11 84 30 30 d9 33 33 13 96 80 a3 c7 e9 1d e7 | a9 87 5c e3 04 f1 ca a7 da b8 cd 22 1a 96 87 76 | c8 ef 17 27 16 ad fb 3f 99 45 7c 00 50 21 59 ab | 74 b5 43 16 33 3b f4 90 61 45 5e 29 2d 48 51 cc | a9 74 aa 7d 92 40 2e da 26 d9 32 82 5d 38 63 e5 | 75 40 d1 19 57 49 35 8d 6f 38 70 e0 eb 2c 50 dd | a3 73 fc cc dc e9 68 7d 41 b1 e4 50 b4 c0 92 78 | f1 0b 89 3b f9 a5 6d 79 10 f3 81 e2 ac f8 aa ce | b3 2a d9 3c bb 2f 26 a3 c8 fa d3 c5 69 4b c3 cd | 42 f6 e5 a1 44 ae 74 1c de f1 07 72 39 20 65 ae | 91 8c f7 2a 1b 1c 7f fe 75 c8 e6 f1 5d e8 00 6f | 95 f5 a4 cd 9f 61 1c d4 b5 5d eb 8e 58 73 1a b4 | b2 43 ef 22 bc 5e 2d d6 f3 07 63 dd 34 5a 34 35 | a7 0c 43 49 aa d9 fc 4c 7e 1b bd a2 82 81 66 8b | 03 a9 91 3f 16 2f 07 a0 7a 31 68 8e 73 53 fb d4 | 3a 87 0e ab 3b a1 7b 2e dc e9 9b 2d b7 1c 7e 6c | 80 eb 46 83 2e 61 85 80 c6 3b e5 8e 2c 21 97 81 | ef 15 8f c1 7a ee 93 de cc 5c 8c d5 9a 6f 32 b5 | b2 af 10 f9 b0 12 41 65 c5 42 e9 43 9a 06 96 78 | c5 ab c9 98 e7 a4 1a 8e cf f4 01 7b 03 2d c4 84 | f1 dd 7e 2c 32 5f 9f 78 7c 20 bf 83 43 b8 84 fe | ba be 9b 68 6e 77 37 01 40 9d 20 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 539 (0x21b) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #2 is idle | #2 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 511 (0x1ff) | fragment number: 3 (0x3) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=503) | #2 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '3', total number '5', next payload '0' | stop processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 0.104 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.112 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 539 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 35 20 23 20 00 00 00 01 00 00 02 1b 00 00 01 ff | 00 04 00 05 5f ff 23 ad ab cc e9 5f b3 a1 11 b4 | fe 25 e6 c9 a5 8f d5 73 2c b6 20 05 9c 2b bd 61 | d4 22 c0 89 e8 00 66 cb 42 29 15 9d 34 d0 cd 04 | 51 4c fa 1d e3 d0 c7 e0 3a 0a b6 c8 58 db 2f 26 | 18 12 39 93 7b 73 87 33 8e 43 37 fe a5 97 fe 58 | aa 62 6e 24 5c 6d 91 c9 2a 74 79 e9 f4 82 21 79 | 13 a8 5f af 0a 5b 59 0d 7c 25 f7 62 c7 14 13 22 | 0b d4 53 60 42 c6 cc e1 48 01 11 ae a4 b2 42 ff | e0 81 d5 f7 f2 30 7d 98 7b 89 54 b1 0f d7 c7 29 | 62 96 09 eb 94 f0 2c 33 f2 27 61 9a 28 2f 7c a4 | 30 e7 70 75 c3 34 b3 d5 dc 42 ee 72 32 76 56 c5 | 91 3a 15 d5 0a 8d 4b ec d3 51 0b a4 51 64 08 79 | 38 00 63 a7 2f d5 98 5c f9 7a c3 4f 8c 9a 73 04 | 89 77 ca b3 49 8b af 1a 3b 4e 1f 53 fd d0 93 c2 | 98 35 3e d6 6e 78 e8 68 c0 26 50 b2 b6 1f b4 0f | bb 24 f3 b2 10 98 ed 10 43 76 85 9a e5 70 90 43 | 61 c5 92 fe 2e a5 7d 94 6a 37 15 92 0d da 40 cd | c7 7d c0 dc 8a a3 2d 36 f0 8d e8 0b af 9d 11 3c | f0 0e d6 8e 39 ac 87 70 26 14 1c 32 0f 02 e5 87 | 1a d5 5e bb 77 3a 75 6b 73 08 5c 76 5f e2 84 aa | 60 dc c3 f3 8c 46 93 e9 04 64 ca 2b 7e 5e 55 85 | 84 1e 0c 2b b2 e0 ff 82 ce 93 d1 98 bd 16 a3 7d | c8 02 3f 7d 0a 0c 9a 79 9f fa 85 c1 d9 93 2d 75 | a0 37 5d 7b 64 f9 e5 8c e3 41 51 c3 14 33 63 9d | 65 a6 4e 9b 3b f5 8d 16 b5 d7 5c e0 70 d7 9f 74 | 25 dc 7a 3c 9f 3c a7 1d 92 ae 41 75 cc 1a ad 0e | 75 88 1c 98 66 46 24 94 f5 67 89 17 c6 53 0c a0 | b8 36 cd 11 bf ba 3d 74 3f 8c ab 0c 09 e8 24 24 | 53 4d ce 6c 59 db f2 00 ff 6e 3e f9 5d 29 6b d1 | f3 ae 36 41 d4 ed 46 8b c4 5b 32 38 19 db 36 cb | 32 b7 0d 88 2c d5 47 90 26 b1 bc 70 fd c7 43 fb | 70 3e 64 a7 a3 92 81 a7 71 b7 c9 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 539 (0x21b) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #2 is idle | #2 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 511 (0x1ff) | fragment number: 4 (0x4) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=503) | #2 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '4', total number '5', next payload '0' | stop processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 0.0877 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.0945 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00103 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 81 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 35 20 23 20 00 00 00 01 00 00 00 51 00 00 00 35 | 00 05 00 05 f7 01 c5 19 ff 1e c1 26 ee ad 5d fc | e2 47 52 57 23 fe b6 25 cd 36 9e 61 e3 2f a2 aa | 24 6d 54 fa 09 eb 9d 0d 0f 7f 52 3a 3e c6 a2 33 | 8c | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 81 (0x51) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #2 is idle | #2 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 53 (0x35) | fragment number: 5 (0x5) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=45) | #2 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '5', total number '5', next payload '0' | #2 ikev2 ISAKMP_v2_IKE_AUTH decrypt success | Now let's proceed with payload (ISAKMP_NEXT_v2IDr) | **parse IKEv2 Identification - Responder - Payload: | next payload type: ISAKMP_NEXT_v2CERT (0x25) | flags: none (0x0) | length: 191 (0xbf) | ID type: ID_DER_ASN1_DN (0x9) | processing payload: ISAKMP_NEXT_v2IDr (len=183) | Now let's proceed with payload (ISAKMP_NEXT_v2CERT) | **parse IKEv2 Certificate Payload: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) | flags: none (0x0) | length: 1265 (0x4f1) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | processing payload: ISAKMP_NEXT_v2CERT (len=1260) | Now let's proceed with payload (ISAKMP_NEXT_v2AUTH) | **parse IKEv2 Authentication Payload: | next payload type: ISAKMP_NEXT_v2SA (0x21) | flags: none (0x0) | length: 392 (0x188) | auth method: IKEv2_AUTH_RSA (0x1) | processing payload: ISAKMP_NEXT_v2AUTH (len=384) | Now let's proceed with payload (ISAKMP_NEXT_v2SA) | **parse IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) | flags: none (0x0) | length: 36 (0x24) | processing payload: ISAKMP_NEXT_v2SA (len=32) | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) | **parse IKEv2 Traffic Selector - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) | flags: none (0x0) | length: 24 (0x18) | number of TS: 1 (0x1) | processing payload: ISAKMP_NEXT_v2TSi (len=16) | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) | **parse IKEv2 Traffic Selector - Responder - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 24 (0x18) | number of TS: 1 (0x1) | processing payload: ISAKMP_NEXT_v2TSr (len=16) | selected state microcode Initiator: process IKE_AUTH response | Now let's proceed with state specific processing | calling processor Initiator: process IKE_AUTH response | global one-shot timer EVENT_FREE_ROOT_CERTS scheduled in 300 seconds loading root certificate cache | spent 2.3 milliseconds in get_root_certs() calling PK11_ListCertsInSlot() | spent 0.0144 milliseconds in get_root_certs() filtering CAs | #1 spent 2.34 milliseconds in find_and_verify_certs() calling get_root_certs() | checking for known CERT payloads | saving certificate of type 'X509_SIGNATURE' | decoded cert: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | #1 spent 0.0293 milliseconds in find_and_verify_certs() calling decode_cert_payloads() | cert_issuer_has_current_crl: looking for a CRL issued by E=testing@libreswan.org,CN=Libreswan test CA for mainca,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | #1 spent 0.0297 milliseconds in find_and_verify_certs() calling crl_update_check() | missing or expired CRL | crl_strict: 0, ocsp: 0, ocsp_strict: 0, ocsp_post: 0 | verify_end_cert trying profile IPsec | certificate is valid (profile IPsec) | #1 spent 0.0882 milliseconds in find_and_verify_certs() calling verify_end_cert() "road-east-ipv4-psk-ikev2/1x0" #2: certificate verified OK: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a96f588 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a96ebc8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a96ea18 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a96e058 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56012a924a68 | unreference key: 0x56012a97b888 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | #1 spent 0.21 milliseconds in decode_certs() calling add_pubkey_from_nss_cert() | #1 spent 2.72 milliseconds in decode_certs() | DER ASN1 DN: 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 | DER ASN1 DN: 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | DER ASN1 DN: 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | DER ASN1 DN: 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | DER ASN1 DN: 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | DER ASN1 DN: 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | DER ASN1 DN: 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 61 73 | DER ASN1 DN: 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | DER ASN1 DN: 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 | DER ASN1 DN: 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 61 73 | DER ASN1 DN: 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | DER ASN1 DN: 77 61 6e 2e 6f 72 67 | ID_DER_ASN1_DN 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' needs further ID comparison against 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' | ID_DER_ASN1_DN 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' matched our ID | X509: CERT and ID matches current connection | offered CA: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' "road-east-ipv4-psk-ikev2/1x0" #2: IKEv2 mode peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' | verifying AUTH payload | required RSA CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | checking RSA keyid 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' for match with 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | key issuer CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | an RSA Sig check passed with *AwEAAbEef [remote certificates] | #1 spent 0.101 milliseconds in try_all_RSA_keys() trying a pubkey "road-east-ipv4-psk-ikev2/1x0" #2: Authenticated using RSA | #1 spent 0.134 milliseconds in ikev2_verify_rsa_hash() | parent state #1: PARENT_I2(open IKE SA) => PARENT_I3(established IKE SA) | #1 will start re-keying in 130 seconds with margin of 110 seconds (attempting re-key) | state #1 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x7f6058002888 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56012a953588 | event_schedule: new EVENT_SA_REKEY-pe@0x56012a953588 | inserting event EVENT_SA_REKEY, timeout in 130 seconds for #1 | libevent_malloc: new ptr-libevent@0x56012a97e738 size 128 | pstats #1 ikev2.ike established | TSi: parsing 1 traffic selectors | ***parse IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | length: 16 (0x10) | start port: 0 (0x0) | end port: 65535 (0xffff) | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low | TS low c0 00 01 00 | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high | TS high c0 00 01 ff | TSi: parsed 1 traffic selectors | TSr: parsing 1 traffic selectors | ***parse IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | length: 16 (0x10) | start port: 0 (0x0) | end port: 65535 (0xffff) | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low | TS low c0 00 02 00 | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high | TS high c0 00 02 ff | TSr: parsed 1 traffic selectors | evaluating our conn="road-east-ipv4-psk-ikev2/1x0" I=192.0.1.0/24:0/0 R=192.0.2.0/24:0/0 to their: | TSi[0] .net=192.0.1.0-192.0.1.255 .iporotoid=0 .{start,end}port=0..65535 | match address end->client=192.0.1.0/24 == TSi[0]net=192.0.1.0-192.0.1.255: YES fitness 32 | narrow port end=0..65535 == TSi[0]=0..65535: 0 | TSi[0] port match: YES fitness 65536 | narrow protocol end=*0 == TSi[0]=*0: 0 | match end->protocol=*0 == TSi[0].ipprotoid=*0: YES fitness 255 | TSr[0] .net=192.0.2.0-192.0.2.255 .iporotoid=0 .{start,end}port=0..65535 | match address end->client=192.0.2.0/24 == TSr[0]net=192.0.2.0-192.0.2.255: YES fitness 32 | narrow port end=0..65535 == TSr[0]=0..65535: 0 | TSr[0] port match: YES fitness 65536 | narrow protocol end=*0 == TSr[0]=*0: 0 | match end->protocol=*0 == TSr[0].ipprotoid=*0: YES fitness 255 | best fit so far: TSi[0] TSr[0] | found an acceptable TSi/TSr Traffic Selector | printing contents struct traffic_selector | ts_type: IKEv2_TS_IPV6_ADDR_RANGE | ipprotoid: 0 | port range: 0-65535 | ip range: 192.0.1.0-192.0.1.255 | printing contents struct traffic_selector | ts_type: IKEv2_TS_IPV6_ADDR_RANGE | ipprotoid: 0 | port range: 0-65535 | ip range: 192.0.2.0-192.0.2.255 | using existing local ESP/AH proposals for road-east-ipv4-psk-ikev2/1x0 (IKE_AUTH initiator accepting remote ESP/AH proposal): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | Comparing remote proposals against IKE_AUTH initiator accepting remote ESP/AH proposal 4 local proposals | local proposal 1 type ENCR has 1 transforms | local proposal 1 type PRF has 0 transforms | local proposal 1 type INTEG has 1 transforms | local proposal 1 type DH has 1 transforms | local proposal 1 type ESN has 1 transforms | local proposal 1 transforms: required: ENCR+ESN; optional: INTEG+DH | local proposal 2 type ENCR has 1 transforms | local proposal 2 type PRF has 0 transforms | local proposal 2 type INTEG has 1 transforms | local proposal 2 type DH has 1 transforms | local proposal 2 type ESN has 1 transforms | local proposal 2 transforms: required: ENCR+ESN; optional: INTEG+DH | local proposal 3 type ENCR has 1 transforms | local proposal 3 type PRF has 0 transforms | local proposal 3 type INTEG has 2 transforms | local proposal 3 type DH has 1 transforms | local proposal 3 type ESN has 1 transforms | local proposal 3 transforms: required: ENCR+INTEG+ESN; optional: DH | local proposal 4 type ENCR has 1 transforms | local proposal 4 type PRF has 0 transforms | local proposal 4 type INTEG has 2 transforms | local proposal 4 type DH has 1 transforms | local proposal 4 type ESN has 1 transforms | local proposal 4 transforms: required: ENCR+INTEG+ESN; optional: DH | ***parse IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | length: 32 (0x20) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI | remote SPI 97 c4 75 d7 | Comparing remote proposal 1 containing 2 transforms against local proposal [1..1] of 4 local proposals | ****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 12 (0xc) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | *****parse IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 | ****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | remote proposal 1 transform 1 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 | remote proposal 1 proposed transforms: ENCR+ESN; matched: ENCR+ESN; unmatched: none | comparing remote proposal 1 containing ENCR+ESN transforms to local proposal 1; required: ENCR+ESN; optional: INTEG+DH; matched: ENCR+ESN | remote proposal 1 matches local proposal 1 | remote accepted the proposal 1:ESP:ENCR=AES_GCM_C_256;ESN=DISABLED[first-match] | IKE_AUTH initiator accepting remote ESP/AH proposal ikev2_proposal: 1:ESP:SPI=97c475d7;ENCR=AES_GCM_C_256;ESN=DISABLED | converting proposal to internal trans attrs | integ=none: .key_size=0 encrypt=aes_gcm_16: .key_size=32 .salt_size=4 keymat_len=36 | install_ipsec_sa() for #2: inbound and outbound | could_route called for road-east-ipv4-psk-ikev2/1x0 (kind=CK_PERMANENT) | FOR_EACH_CONNECTION_... in route_owner | conn road-east-ipv4-psk-ikev2/1x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv6-psk-ikev2 mark 0/00000000, 0/00000000 | conn road-east-ipv4-psk-ikev2/1x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv4-psk-ikev2/2x0 mark 0/00000000, 0/00000000 | conn road-east-ipv4-psk-ikev2/1x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv4-psk-ikev2/1x0 mark 0/00000000, 0/00000000 | route owner of "road-east-ipv4-psk-ikev2/1x0" unrouted: NULL; eroute owner: NULL | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 | AES_GCM_16 requires 4 salt bytes | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'road-east-ipv4-psk-ikev2/1x0' not available on interface eth0 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.97c475d7@192.1.2.23 included non-error error | set up outgoing SA, ref=0/0 | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 | AES_GCM_16 requires 4 salt bytes | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'road-east-ipv4-psk-ikev2/1x0' not available on interface eth0 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.dd9a7e6@192.1.3.209 included non-error error | priority calculation of connection "road-east-ipv4-psk-ikev2/1x0" is 0xfe7e7 | add inbound eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => tun.10000@192.1.3.209 (raw_eroute) | IPsec Sa SPD priority set to 1042407 | raw_eroute result=success | set up incoming SA, ref=0/0 | sr for #2: unrouted | route_and_eroute() for proto 0, and source port 0 dest port 0 | FOR_EACH_CONNECTION_... in route_owner | conn road-east-ipv4-psk-ikev2/1x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv6-psk-ikev2 mark 0/00000000, 0/00000000 | conn road-east-ipv4-psk-ikev2/1x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv4-psk-ikev2/2x0 mark 0/00000000, 0/00000000 | conn road-east-ipv4-psk-ikev2/1x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv4-psk-ikev2/1x0 mark 0/00000000, 0/00000000 | route owner of "road-east-ipv4-psk-ikev2/1x0" unrouted: NULL; eroute owner: NULL | route_and_eroute with c: road-east-ipv4-psk-ikev2/1x0 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2 | priority calculation of connection "road-east-ipv4-psk-ikev2/1x0" is 0xfe7e7 | eroute_connection add eroute 192.0.1.0/24:0 --0-> 192.0.2.0/24:0 => tun.0@192.1.2.23 (raw_eroute) | IPsec Sa SPD priority set to 1042407 | raw_eroute result=success | running updown command "ipsec _updown" for verb up | command executing up-client | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='road-east-ipv4-psk-ikev2/1x0' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLIC | popen cmd is 1406 chars long | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='road-east-ipv4-psk-: | cmd( 80):ikev2/1x0' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.: | cmd( 160):209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, : | cmd( 240):CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIEN: | cmd( 320):T='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.2: | cmd( 400):55.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TY: | cmd( 480):PE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=L: | cmd( 560):ibreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing: | cmd( 640):.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.: | cmd( 720):0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCO: | cmd( 800):L='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Departmen: | cmd( 880):t, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey: | cmd( 960):' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+UP+IKEV2_ALLOW+SARE: | cmd(1040):F_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAM: | cmd(1120):ILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_P: | cmd(1200):EER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0: | cmd(1280):' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0: | cmd(1360):x97c475d7 SPI_OUT=0xdd9a7e6 ipsec _updown 2>&1: | route_and_eroute: firewall_notified: true | running updown command "ipsec _updown" for verb prepare | command executing prepare-client | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='road-east-ipv4-psk-ikev2/1x0' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_ | popen cmd is 1411 chars long | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='road-east-ipv4: | cmd( 80):-psk-ikev2/1x0' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192: | cmd( 160):.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Departm: | cmd( 240):ent, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_: | cmd( 320):CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.: | cmd( 400):255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_: | cmd( 480):SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto: | cmd( 560):, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@te: | cmd( 640):sting.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192: | cmd( 720):.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PR: | cmd( 800):OTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depa: | cmd( 880):rtment, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='n: | cmd( 960):etkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+UP+IKEV2_ALLOW: | cmd(1040):+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_AD: | cmd(1120):DRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PL: | cmd(1200):UTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIE: | cmd(1280):NT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI: | cmd(1360):_IN=0x97c475d7 SPI_OUT=0xdd9a7e6 ipsec _updown 2>&1: | running updown command "ipsec _updown" for verb route | command executing route-client | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='road-east-ipv4-psk-ikev2/1x0' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN | popen cmd is 1409 chars long | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='road-east-ipv4-p: | cmd( 80):sk-ikev2/1x0' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1: | cmd( 160):.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Departmen: | cmd( 240):t, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CL: | cmd( 320):IENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.25: | cmd( 400):5.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA: | cmd( 480):_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, : | cmd( 560):O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@test: | cmd( 640):ing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0: | cmd( 720):.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROT: | cmd( 800):OCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depart: | cmd( 880):ment, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='net: | cmd( 960):key' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+UP+IKEV2_ALLOW+S: | cmd(1040):AREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDR: | cmd(1120):FAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUT: | cmd(1200):O_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT: | cmd(1280):='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_I: | cmd(1360):N=0x97c475d7 SPI_OUT=0xdd9a7e6 ipsec _updown 2>&1: | route_and_eroute: instance "road-east-ipv4-psk-ikev2/1x0", setting eroute_owner {spd=0x56012a9495f8,sr=0x56012a9495f8} to #2 (was #0) (newest_ipsec_sa=#0) | #1 spent 1.66 milliseconds in install_ipsec_sa() | inR2: instance road-east-ipv4-psk-ikev2/1x0[0], setting IKEv2 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1 | state #2 requesting EVENT_RETRANSMIT to be deleted | #2 STATE_PARENT_I2: retransmits: cleared | libevent_free: release ptr-libevent@0x56012a965748 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f6058002b78 | #2 spent 5.03 milliseconds in processing: Initiator: process IKE_AUTH response in ikev2_process_state_packet() | [RE]START processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #2 complete_v2_state_transition() PARENT_I2->V2_IPSEC_I with status STF_OK | IKEv2: transition from state STATE_PARENT_I2 to state STATE_V2_IPSEC_I | child state #2: PARENT_I2(open IKE SA) => V2_IPSEC_I(established CHILD SA) | Message ID: updating counters for #2 to 1 after switching state | Message ID: recv #1.#2 response 1; ike: initiator.sent=1 initiator.recv=0->1 responder.sent=-1 responder.recv=-1; child: wip.initiator=1->-1 wip.responder=-1 | Message ID: #1.#2 skipping update_send as nothing to send; initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 | pstats #2 ikev2.child established "road-east-ipv4-psk-ikev2/1x0" #2: negotiated connection [192.0.1.0-192.0.1.255:0-65535 0] -> [192.0.2.0-192.0.2.255:0-65535 0] | NAT-T: encaps is 'auto' "road-east-ipv4-psk-ikev2/1x0" #2: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0x97c475d7 <0x0dd9a7e6 xfrm=AES_GCM_16_256-NONE NATOA=none NATD=none DPD=active} | releasing whack for #2 (sock=fd@29) | close_any(fd@29) (in release_whack() at state.c:654) | releasing whack and unpending for parent #1 | unpending state #1 connection "road-east-ipv4-psk-ikev2/1x0" | delete from pending Child SA with 192.1.2.23 "road-east-ipv4-psk-ikev2/1x0" | removing pending policy for no connection {0x56012a93b998} | FOR_EACH_STATE_... in find_pending_phase2 | creating state object #3 at 0x56012a96c328 | State DB: adding IKEv2 state #3 in UNDEFINED | pstats #3 ikev2.child started | duplicating state object #1 "road-east-ipv4-psk-ikev2/2x0" as #3 for IPSEC SA | #3 setting local endpoint to 192.1.3.209:500 from #1.st_localport (in duplicate_state() at state.c:1484) | Message ID: init_child #1.#3; ike: initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in ikev2_initiate_child_sa() at ikev2_parent.c:5637) | start processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_initiate_child_sa() at ikev2_parent.c:5637) | child state #3: UNDEFINED(ignore) => V2_CREATE_I0(established IKE SA) | constructing ESP/AH proposals with no default DH for road-east-ipv4-psk-ikev2/2x0 (ESP/AH initiator emitting proposals) | converting proposal AES_GCM_16_256-NONE to ikev2 ... | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;ESN=DISABLED | converting proposal AES_GCM_16_128-NONE to ikev2 ... | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;ESN=DISABLED | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED "road-east-ipv4-psk-ikev2/2x0": constructed local ESP/AH proposals for road-east-ipv4-psk-ikev2/2x0 (ESP/AH initiator emitting proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED | #3 schedule initiate IPsec SA RSASIG+ENCRYPT+TUNNEL+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO using IKE# 1 pfs=no-pfs | event_schedule: new EVENT_v2_INITIATE_CHILD-pe@0x7f6058002b78 | inserting event EVENT_v2_INITIATE_CHILD, timeout in 0 seconds for #3 | libevent_malloc: new ptr-libevent@0x56012a96d3b8 size 128 | RESET processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_initiate_child_sa() at ikev2_parent.c:5737) | RESET processing: from 192.1.2.23:500 (in ikev2_initiate_child_sa() at ikev2_parent.c:5737) | delete from pending Child SA with 192.1.2.23 "road-east-ipv4-psk-ikev2/2x0" | removing pending policy for no connection {0x56012a935808} | close_any(fd@27) (in release_whack() at state.c:654) | #2 will start re-keying in 37 seconds with margin of 83 seconds (attempting re-key) | event_schedule: new EVENT_SA_REKEY-pe@0x56012a9665a8 | inserting event EVENT_SA_REKEY, timeout in 37 seconds for #2 | libevent_malloc: new ptr-libevent@0x56012a94be68 size 128 | libevent_realloc: release ptr-libevent@0x56012a8e2138 | libevent_realloc: new ptr-libevent@0x56012a94b548 size 128 | dpd enabled, scheduling ikev2 liveness checks | event_schedule: new EVENT_v2_LIVENESS-pe@0x56012a8e2138 | inserting event EVENT_v2_LIVENESS, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x56012a9493f8 size 128 | processing: STOP state #0 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 5.41 milliseconds in ikev2_process_packet() | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 5.43 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x7f6058002b78 | handling event EVENT_v2_INITIATE_CHILD for child state #3 | start processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | adding Child Initiator nonce ni work-order 3 for state #3 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56012a9654a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x56012a949348 size 128 | libevent_free: release ptr-libevent@0x56012a96d3b8 | free_event_entry: release EVENT_v2_INITIATE_CHILD-pe@0x7f6058002b78 | #3 spent 0.0362 milliseconds in timer_event_cb() EVENT_v2_INITIATE_CHILD | crypto helper 2 resuming | crypto helper 2 starting work-order 3 for state #3 | stop processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | crypto helper 2 doing build nonce (Child Initiator nonce ni); request ID 3 | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00472 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00283 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00282 milliseconds in signal handler PLUTO_SIGCHLD | crypto helper 2 finished build nonce (Child Initiator nonce ni); request ID 3 time elapsed 0.000032 seconds | (#3) spent 0.0347 milliseconds in crypto helper computing work-order 3: Child Initiator nonce ni (pcr) | crypto helper 2 sending results from work-order 3 for state #3 to event queue | scheduling resume sending helper answer for #3 | libevent_malloc: new ptr-libevent@0x7f6054000d18 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #3 | start processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 3 | calling continuation function 0x5601297a9b50 | ikev2_child_outI_continue for #3 STATE_V2_CREATE_I0 | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x56012a949348 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56012a9654a8 | event_schedule: new EVENT_SA_REPLACE-pe@0x56012a9654a8 | inserting event EVENT_SA_REPLACE, timeout in 200 seconds for #3 | libevent_malloc: new ptr-libevent@0x56012a949348 size 128 | Message ID: #1 wakeing IKE SA (unack 0); initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 | scheduling callback v2_msgid_schedule_next_initiator (#1) | libevent_malloc: new ptr-libevent@0x56012a96d3b8 size 128 | [RE]START processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #3 complete_v2_state_transition() V2_CREATE_I0->V2_CREATE_I with status STF_SUSPEND | suspending state #3 and saving MD | #3 is busy; has a suspended MD | [RE]START processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in log_stf_suspend() at ikev2.c:3269) | "road-east-ipv4-psk-ikev2/2x0" #3 complete v2 state STATE_V2_CREATE_I0 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 | resume sending helper answer for #3 suppresed complete_v2_state_transition() | #3 spent 0.0549 milliseconds in resume sending helper answer | stop processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f6054000d18 | processing callback v2_msgid_schedule_next_initiator for #1 | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in callback_handler() at server.c:904) | Message ID: #1.#3 resuming SA using IKE SA (unack 0); initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 | suspend processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in initiate_next() at ikev2_msgid.c:553) | start processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in initiate_next() at ikev2_msgid.c:553) | **emit ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 2 (0x2) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' | emitting 8 zero bytes of IV into IKEv2 Encryption Payload | netlink_get_spi: allocated 0x41d55369 for esp.0@192.1.3.209 | Emitting ikev2_proposals ... | ****emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | discarding INTEG=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 41 d5 53 69 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 32 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding INTEG=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 2 (0x2) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 41 d5 53 69 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 32 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 3 (0x3) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 4 (0x4) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 41 d5 53 69 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 48 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 4 (0x4) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 4 (0x4) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 41 d5 53 69 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 48 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 164 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ****emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 45 94 03 a2 3a 21 4b 25 fe 21 af 73 6d e4 8a ec | IKEv2 nonce 2b 73 55 63 1a ca b0 62 0a 93 db 5a d2 d0 f6 a7 | emitting length of IKEv2 Nonce Payload: 36 | ****emit IKEv2 Traffic Selector - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | number of TS: 1 (0x1) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | start port: 0 (0x0) | end port: 65535 (0xffff) | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector | ipv4 start c0 00 0b 00 | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector | ipv4 end c0 00 0b ff | emitting length of IKEv2 Traffic Selector: 16 | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 | ****emit IKEv2 Traffic Selector - Responder - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | number of TS: 1 (0x1) | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | start port: 0 (0x0) | end port: 65535 (0xffff) | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector | ipv4 start c0 00 02 00 | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector | ipv4 end c0 00 02 ff | emitting length of IKEv2 Traffic Selector: 16 | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload | emitting length of IKEv2 Encryption Payload: 277 | emitting length of ISAKMP Message: 305 | [RE]START processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #3 complete_v2_state_transition() V2_CREATE_I0->V2_CREATE_I with status STF_OK | IKEv2: transition from state STATE_V2_CREATE_I0 to state STATE_V2_CREATE_I | child state #3: V2_CREATE_I0(established IKE SA) => V2_CREATE_I(established IKE SA) | Message ID: updating counters for #3 to 4294967295 after switching state | Message ID: IKE #1 skipping update_recv as MD is fake | Message ID: sent #1.#3 request 2; ike: initiator.sent=1->2 initiator.recv=1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->2 wip.responder=-1 "road-east-ipv4-psk-ikev2/2x0" #3: STATE_V2_CREATE_I: sent IPsec Child req wait response | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) | sending 305 bytes for STATE_V2_CREATE_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 2e 20 24 08 00 00 00 02 00 00 01 31 21 00 01 15 | ca 34 d7 62 e0 b4 77 e7 02 36 72 82 6e 26 5d 31 | ea cb 05 15 ac d6 9f 88 e1 c8 75 ff 4b d5 b5 c7 | 7a 3e ce 29 40 bb 0f 1e 2e 68 53 17 34 b6 e0 4e | a1 b7 f0 79 07 c2 1a e9 18 50 d0 f0 61 6b 6a 6f | b8 1e 3e 43 b2 b9 8f ef ff e6 ec 79 8d 5f 82 b5 | f9 da 3b f6 2e 73 81 f1 25 b2 9e 48 12 a1 91 53 | 07 19 31 e9 47 3a d7 bf c0 d6 69 44 1f d4 3f df | d0 a2 47 a1 77 98 54 8a a5 7f a7 e6 e3 a7 71 d1 | 19 90 b1 5c 64 f6 c3 1b b4 ed 1d 31 1a 46 65 73 | 25 97 bc 9f 4a 8b 01 d9 04 a8 ef e2 58 51 e1 2a | 35 bc 4a db b3 12 a2 06 98 4a 6b 79 6a 7f cf d9 | ac b9 7f 8a 96 31 47 d1 5b d3 51 83 06 04 98 a7 | f1 c3 92 25 3c 7e 99 24 36 70 f4 c1 b2 a9 04 12 | f5 d9 ca 14 be 07 44 45 e3 81 ce 5a f4 35 67 4d | 7e 11 e5 9f 1f 72 b6 c4 d7 fb 23 3a 7e a1 01 68 | 85 76 a2 fe 6c 5c 77 88 9d 56 c6 d6 62 f7 dd b0 | 8c 48 0c 10 a2 cc 7e 6a 0a 10 70 2e 87 d4 f9 b5 | 48 | state #3 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x56012a949348 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56012a9654a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x56012a9654a8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3 | libevent_malloc: new ptr-libevent@0x56012a949348 size 128 | #3 STATE_V2_CREATE_I: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29161.3647 | stop processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in initiate_next() at ikev2_msgid.c:557) | resume processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in initiate_next() at ikev2_msgid.c:557) | #1 spent 0.658 milliseconds in callback v2_msgid_schedule_next_initiator | stop processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in callback_handler() at server.c:908) | libevent_free: release ptr-libevent@0x56012a96d3b8 | spent 0.0034 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 177 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 2e 20 24 20 00 00 00 02 00 00 00 b1 21 00 00 95 | 2b fe 40 ad 82 37 7c 58 1e 6b 93 71 e9 c4 04 d3 | db 06 89 3c fe 69 bf 4e 5c 53 6d 50 db 5e 9e dc | d3 a9 db 4e b8 24 ce 30 bd 92 50 d0 a1 f2 f8 71 | 24 d4 8b da 18 5f 2b 12 87 cb 74 0e 5d 1a 2a 4f | e4 c0 98 e8 11 fc 3f 96 44 62 02 9b 96 80 80 00 | 5c ba 9e 39 6a a4 fb ab e0 9d c6 2f 03 34 35 f5 | 3e a6 af 29 6b 12 a6 99 f7 5f 26 03 10 00 89 96 | bd 5f e7 55 4f 53 c2 05 c4 cc 75 05 a3 64 da 6f | 55 e4 37 79 20 57 20 96 d5 0f 4c d3 bd 77 4d 65 | de | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 2 (0x2) | length: 177 (0xb1) | processing version=2.0 packet with exchange type=ISAKMP_v2_CREATE_CHILD_SA (36) | I am the IKE SA Original Initiator receiving an IKEv2 CREATE_CHILD_SA response | State DB: found IKEv2 state #1 in PARENT_I3 (find_v2_ike_sa) | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #3 in V2_CREATE_I (find_v2_sa_by_initiator_wip) | suspend processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #3 is idle | #3 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SK) | ***parse IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2SA (0x21) | flags: none (0x0) | length: 149 (0x95) | processing payload: ISAKMP_NEXT_v2SK (len=145) | #3 in state V2_CREATE_I: sent IPsec Child req wait response | #3 ikev2 ISAKMP_v2_CREATE_CHILD_SA decrypt success | Now let's proceed with payload (ISAKMP_NEXT_v2SA) | **parse IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2Ni (0x28) | flags: none (0x0) | length: 36 (0x24) | processing payload: ISAKMP_NEXT_v2SA (len=32) | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) | **parse IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) | flags: none (0x0) | length: 36 (0x24) | processing payload: ISAKMP_NEXT_v2Ni (len=32) | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) | **parse IKEv2 Traffic Selector - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) | flags: none (0x0) | length: 24 (0x18) | number of TS: 1 (0x1) | processing payload: ISAKMP_NEXT_v2TSi (len=16) | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) | **parse IKEv2 Traffic Selector - Responder - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 24 (0x18) | number of TS: 1 (0x1) | processing payload: ISAKMP_NEXT_v2TSr (len=16) | selected state microcode Process CREATE_CHILD_SA IPsec SA Response | #1 updating local interface from 192.1.3.209:500 to 192.1.3.209:500 using md->iface (in update_ike_endpoints() at state.c:2669) | forcing ST #3 to CHILD #1.#3 in FSM processor | Now let's proceed with state specific processing | calling processor Process CREATE_CHILD_SA IPsec SA Response | create child proposal's DH changed from no-PFS to NONE, flushing | constructing ESP/AH proposals with default DH NONE for road-east-ipv4-psk-ikev2/2x0 (CREATE_CHILD_SA initiator accepting remote ESP/AH proposal) | converting proposal AES_GCM_16_256-NONE to ikev2 ... | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED | converting proposal AES_GCM_16_128-NONE to ikev2 ... | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED "road-east-ipv4-psk-ikev2/2x0": constructed local ESP/AH proposals for road-east-ipv4-psk-ikev2/2x0 (CREATE_CHILD_SA initiator accepting remote ESP/AH proposal): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | Comparing remote proposals against CREATE_CHILD_SA initiator accepting remote ESP/AH proposal 4 local proposals | local proposal 1 type ENCR has 1 transforms | local proposal 1 type PRF has 0 transforms | local proposal 1 type INTEG has 1 transforms | local proposal 1 type DH has 1 transforms | local proposal 1 type ESN has 1 transforms | local proposal 1 transforms: required: ENCR+ESN; optional: INTEG+DH | local proposal 2 type ENCR has 1 transforms | local proposal 2 type PRF has 0 transforms | local proposal 2 type INTEG has 1 transforms | local proposal 2 type DH has 1 transforms | local proposal 2 type ESN has 1 transforms | local proposal 2 transforms: required: ENCR+ESN; optional: INTEG+DH | local proposal 3 type ENCR has 1 transforms | local proposal 3 type PRF has 0 transforms | local proposal 3 type INTEG has 2 transforms | local proposal 3 type DH has 1 transforms | local proposal 3 type ESN has 1 transforms | local proposal 3 transforms: required: ENCR+INTEG+ESN; optional: DH | local proposal 4 type ENCR has 1 transforms | local proposal 4 type PRF has 0 transforms | local proposal 4 type INTEG has 2 transforms | local proposal 4 type DH has 1 transforms | local proposal 4 type ESN has 1 transforms | local proposal 4 transforms: required: ENCR+INTEG+ESN; optional: DH | ***parse IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | length: 32 (0x20) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI | remote SPI 60 1c 26 ea | Comparing remote proposal 1 containing 2 transforms against local proposal [1..1] of 4 local proposals | ****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 12 (0xc) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | *****parse IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 | ****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | remote proposal 1 transform 1 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 | remote proposal 1 proposed transforms: ENCR+ESN; matched: ENCR+ESN; unmatched: none | comparing remote proposal 1 containing ENCR+ESN transforms to local proposal 1; required: ENCR+ESN; optional: INTEG+DH; matched: ENCR+ESN | remote proposal 1 matches local proposal 1 | remote accepted the proposal 1:ESP:ENCR=AES_GCM_C_256;ESN=DISABLED[first-match] | CREATE_CHILD_SA initiator accepting remote ESP/AH proposal ikev2_proposal: 1:ESP:SPI=601c26ea;ENCR=AES_GCM_C_256;ESN=DISABLED | converting proposal to internal trans attrs | TSi: parsing 1 traffic selectors | ***parse IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | length: 16 (0x10) | start port: 0 (0x0) | end port: 65535 (0xffff) | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low | TS low c0 00 0b 00 | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high | TS high c0 00 0b ff | TSi: parsed 1 traffic selectors | TSr: parsing 1 traffic selectors | ***parse IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | length: 16 (0x10) | start port: 0 (0x0) | end port: 65535 (0xffff) | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low | TS low c0 00 02 00 | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high | TS high c0 00 02 ff | TSr: parsed 1 traffic selectors | evaluating our conn="road-east-ipv4-psk-ikev2/2x0" I=192.0.11.0/24:0/0 R=192.0.2.0/24:0/0 to their: | TSi[0] .net=192.0.11.0-192.0.11.255 .iporotoid=0 .{start,end}port=0..65535 | match address end->client=192.0.11.0/24 == TSi[0]net=192.0.11.0-192.0.11.255: YES fitness 32 | narrow port end=0..65535 == TSi[0]=0..65535: 0 | TSi[0] port match: YES fitness 65536 | narrow protocol end=*0 == TSi[0]=*0: 0 | match end->protocol=*0 == TSi[0].ipprotoid=*0: YES fitness 255 | TSr[0] .net=192.0.2.0-192.0.2.255 .iporotoid=0 .{start,end}port=0..65535 | match address end->client=192.0.2.0/24 == TSr[0]net=192.0.2.0-192.0.2.255: YES fitness 32 | narrow port end=0..65535 == TSr[0]=0..65535: 0 | TSr[0] port match: YES fitness 65536 | narrow protocol end=*0 == TSr[0]=*0: 0 | match end->protocol=*0 == TSr[0].ipprotoid=*0: YES fitness 255 | best fit so far: TSi[0] TSr[0] | found an acceptable TSi/TSr Traffic Selector | printing contents struct traffic_selector | ts_type: IKEv2_TS_IPV6_ADDR_RANGE | ipprotoid: 0 | port range: 0-65535 | ip range: 192.0.11.0-192.0.11.255 | printing contents struct traffic_selector | ts_type: IKEv2_TS_IPV6_ADDR_RANGE | ipprotoid: 0 | port range: 0-65535 | ip range: 192.0.2.0-192.0.2.255 | integ=none: .key_size=0 encrypt=aes_gcm_16: .key_size=32 .salt_size=4 keymat_len=36 | install_ipsec_sa() for #3: inbound and outbound | could_route called for road-east-ipv4-psk-ikev2/2x0 (kind=CK_PERMANENT) | FOR_EACH_CONNECTION_... in route_owner | conn road-east-ipv4-psk-ikev2/2x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv6-psk-ikev2 mark 0/00000000, 0/00000000 | conn road-east-ipv4-psk-ikev2/2x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv4-psk-ikev2/2x0 mark 0/00000000, 0/00000000 | conn road-east-ipv4-psk-ikev2/2x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv4-psk-ikev2/1x0 mark 0/00000000, 0/00000000 | route owner of "road-east-ipv4-psk-ikev2/2x0" unrouted: "road-east-ipv4-psk-ikev2/1x0" erouted; eroute owner: NULL | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 | AES_GCM_16 requires 4 salt bytes | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'road-east-ipv4-psk-ikev2/2x0' not available on interface eth0 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.601c26ea@192.1.2.23 included non-error error | set up outgoing SA, ref=0/0 | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 | AES_GCM_16 requires 4 salt bytes | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'road-east-ipv4-psk-ikev2/2x0' not available on interface eth0 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.41d55369@192.1.3.209 included non-error error | priority calculation of connection "road-east-ipv4-psk-ikev2/2x0" is 0xfe7e7 | add inbound eroute 192.0.2.0/24:0 --0-> 192.0.11.0/24:0 => tun.10000@192.1.3.209 (raw_eroute) | IPsec Sa SPD priority set to 1042407 | raw_eroute result=success | set up incoming SA, ref=0/0 | sr for #3: unrouted | route_and_eroute() for proto 0, and source port 0 dest port 0 | FOR_EACH_CONNECTION_... in route_owner | conn road-east-ipv4-psk-ikev2/2x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv6-psk-ikev2 mark 0/00000000, 0/00000000 | conn road-east-ipv4-psk-ikev2/2x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv4-psk-ikev2/2x0 mark 0/00000000, 0/00000000 | conn road-east-ipv4-psk-ikev2/2x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv4-psk-ikev2/1x0 mark 0/00000000, 0/00000000 | route owner of "road-east-ipv4-psk-ikev2/2x0" unrouted: "road-east-ipv4-psk-ikev2/1x0" erouted; eroute owner: NULL | route_and_eroute with c: road-east-ipv4-psk-ikev2/2x0 (next: none) ero:null esr:{(nil)} ro:road-east-ipv4-psk-ikev2/1x0 rosr:{0x56012a9495f8} and state: #3 | priority calculation of connection "road-east-ipv4-psk-ikev2/2x0" is 0xfe7e7 | eroute_connection add eroute 192.0.11.0/24:0 --0-> 192.0.2.0/24:0 => tun.0@192.1.2.23 (raw_eroute) | IPsec Sa SPD priority set to 1042407 | raw_eroute result=success | running updown command "ipsec _updown" for verb up | command executing up-client | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='road-east-ipv4-psk-ikev2/2x0' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POL | popen cmd is 1409 chars long | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='road-east-ipv4-psk-: | cmd( 80):ikev2/2x0' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.: | cmd( 160):209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, : | cmd( 240):CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIEN: | cmd( 320):T='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.0' PLUTO_MY_CLIENT_MASK='255.255: | cmd( 400):.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_: | cmd( 480):TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O: | cmd( 560):=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testi: | cmd( 640):ng.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.: | cmd( 720):2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTO: | cmd( 800):COL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Departm: | cmd( 880):ent, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netk: | cmd( 960):ey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+UP+IKEV2_ALLOW+SA: | cmd(1040):REF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRF: | cmd(1120):AMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO: | cmd(1200):_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT=: | cmd(1280):'0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN: | cmd(1360):=0x601c26ea SPI_OUT=0x41d55369 ipsec _updown 2>&1: | route_and_eroute: firewall_notified: true | route_and_eroute: instance "road-east-ipv4-psk-ikev2/2x0", setting eroute_owner {spd=0x56012a954398,sr=0x56012a954398} to #3 (was #0) (newest_ipsec_sa=#0) | #1 spent 0.952 milliseconds in install_ipsec_sa() | inR2: instance road-east-ipv4-psk-ikev2/2x0[0], setting IKEv2 newest_ipsec_sa to #3 (was #0) (spd.eroute=#3) cloned from #1 | state #3 requesting EVENT_RETRANSMIT to be deleted | #3 STATE_V2_CREATE_I: retransmits: cleared | libevent_free: release ptr-libevent@0x56012a949348 | free_event_entry: release EVENT_RETRANSMIT-pe@0x56012a9654a8 | #3 spent 1.53 milliseconds in processing: Process CREATE_CHILD_SA IPsec SA Response in ikev2_process_state_packet() | [RE]START processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #3 complete_v2_state_transition() V2_CREATE_I->V2_IPSEC_I with status STF_OK | IKEv2: transition from state STATE_V2_CREATE_I to state STATE_V2_IPSEC_I | child state #3: V2_CREATE_I(established IKE SA) => V2_IPSEC_I(established CHILD SA) | Message ID: updating counters for #3 to 2 after switching state | Message ID: recv #1.#3 response 2; ike: initiator.sent=2 initiator.recv=1->2 responder.sent=-1 responder.recv=-1; child: wip.initiator=2->-1 wip.responder=-1 | Message ID: #1.#3 skipping update_send as nothing to send; initiator.sent=2 initiator.recv=2 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 | pstats #3 ikev2.child established "road-east-ipv4-psk-ikev2/2x0" #3: negotiated connection [192.0.11.0-192.0.11.255:0-65535 0] -> [192.0.2.0-192.0.2.255:0-65535 0] | NAT-T: encaps is 'auto' "road-east-ipv4-psk-ikev2/2x0" #3: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0x601c26ea <0x41d55369 xfrm=AES_GCM_16_256-NONE NATOA=none NATD=none DPD=active} | releasing whack for #3 (sock=fd@28) | close_any(fd@28) (in release_whack() at state.c:654) | releasing whack and unpending for parent #1 | unpending state #1 connection "road-east-ipv4-psk-ikev2/2x0" | #3 will start re-keying in 14 seconds with margin of 106 seconds (attempting re-key) | event_schedule: new EVENT_SA_REKEY-pe@0x56012a9654a8 | inserting event EVENT_SA_REKEY, timeout in 14 seconds for #3 | libevent_malloc: new ptr-libevent@0x56012a964738 size 128 | dpd enabled, scheduling ikev2 liveness checks | event_schedule: new EVENT_v2_LIVENESS-pe@0x7f6058002b78 | inserting event EVENT_v2_LIVENESS, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x56012a9647e8 size 128 | stop processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 1.86 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 1.87 milliseconds in comm_handle_cb() reading and processing packet | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00438 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | dup_any(fd@16) -> fd@26 (in whack_process() at rcv_whack.c:590) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-east-ipv6-psk-ikev2" (in initiate_a_connection() at initiate.c:186) | connection 'road-east-ipv6-psk-ikev2' +POLICY_UP | dup_any(fd@26) -> fd@27 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | FOR_EACH_STATE_... in find_pending_phase2 | creating state object #4 at 0x56012a975668 | State DB: adding IKEv2 state #4 in UNDEFINED | pstats #4 ikev2.child started | duplicating state object #1 "road-east-ipv4-psk-ikev2/2x0" as #4 for IPSEC SA | #4 setting local endpoint to 192.1.3.209:500 from #1.st_localport (in duplicate_state() at state.c:1484) | Message ID: init_child #1.#4; ike: initiator.sent=2 initiator.recv=2 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1 | in connection_discard for connection road-east-ipv4-psk-ikev2/2x0 | suspend processing: connection "road-east-ipv6-psk-ikev2" (in ikev2_initiate_child_sa() at ikev2_parent.c:5637) | start processing: state #4 connection "road-east-ipv6-psk-ikev2" from 192.1.2.23:500 (in ikev2_initiate_child_sa() at ikev2_parent.c:5637) | child state #4: UNDEFINED(ignore) => V2_CREATE_I0(established IKE SA) | constructing ESP/AH proposals with no default DH for road-east-ipv6-psk-ikev2 (ESP/AH initiator emitting proposals) | converting proposal AES_GCM_16_256-NONE to ikev2 ... | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;ESN=DISABLED | converting proposal AES_GCM_16_128-NONE to ikev2 ... | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;ESN=DISABLED | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED "road-east-ipv6-psk-ikev2": constructed local ESP/AH proposals for road-east-ipv6-psk-ikev2 (ESP/AH initiator emitting proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED | #4 schedule initiate IPsec SA RSASIG+ENCRYPT+TUNNEL+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO using IKE# 1 pfs=no-pfs | event_schedule: new EVENT_v2_INITIATE_CHILD-pe@0x56012a95e488 | inserting event EVENT_v2_INITIATE_CHILD, timeout in 0 seconds for #4 | libevent_malloc: new ptr-libevent@0x56012a97e098 size 128 | processing: RESET whack log_fd (was fd@16) (in ikev2_initiate_child_sa() at ikev2_parent.c:5737) | RESET processing: state #4 connection "road-east-ipv6-psk-ikev2" from 192.1.2.23:500 (in ikev2_initiate_child_sa() at ikev2_parent.c:5737) | RESET processing: connection "road-east-ipv6-psk-ikev2" (in ikev2_initiate_child_sa() at ikev2_parent.c:5737) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@26) (in initiate_connection() at initiate.c:372) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.197 milliseconds in whack | timer_event_cb: processing event@0x56012a95e488 | handling event EVENT_v2_INITIATE_CHILD for child state #4 | start processing: state #4 connection "road-east-ipv6-psk-ikev2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | adding Child Initiator nonce ni work-order 4 for state #4 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56012a964bd8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #4 | libevent_malloc: new ptr-libevent@0x56012a96d3b8 size 128 | libevent_free: release ptr-libevent@0x56012a97e098 | free_event_entry: release EVENT_v2_INITIATE_CHILD-pe@0x56012a95e488 | #4 spent 0.0299 milliseconds in timer_event_cb() EVENT_v2_INITIATE_CHILD | crypto helper 5 resuming | stop processing: state #4 connection "road-east-ipv6-psk-ikev2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | crypto helper 5 starting work-order 4 for state #4 | crypto helper 5 doing build nonce (Child Initiator nonce ni); request ID 4 | crypto helper 5 finished build nonce (Child Initiator nonce ni); request ID 4 time elapsed 0.000034 seconds | (#4) spent 0.0381 milliseconds in crypto helper computing work-order 4: Child Initiator nonce ni (pcr) | crypto helper 5 sending results from work-order 4 for state #4 to event queue | scheduling resume sending helper answer for #4 | libevent_malloc: new ptr-libevent@0x7f6048000d18 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #4 | start processing: state #4 connection "road-east-ipv6-psk-ikev2" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 4 | calling continuation function 0x5601297a9b50 | ikev2_child_outI_continue for #4 STATE_V2_CREATE_I0 | state #4 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x56012a96d3b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56012a964bd8 | event_schedule: new EVENT_SA_REPLACE-pe@0x56012a964bd8 | inserting event EVENT_SA_REPLACE, timeout in 200 seconds for #4 | libevent_malloc: new ptr-libevent@0x56012a96d3b8 size 128 | Message ID: #1 wakeing IKE SA (unack 0); initiator.sent=2 initiator.recv=2 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 | scheduling callback v2_msgid_schedule_next_initiator (#1) | libevent_malloc: new ptr-libevent@0x56012a97e098 size 128 | [RE]START processing: state #4 connection "road-east-ipv6-psk-ikev2" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3379) | #4 complete_v2_state_transition() V2_CREATE_I0->V2_CREATE_I with status STF_SUSPEND | suspending state #4 and saving MD | #4 is busy; has a suspended MD | [RE]START processing: state #4 connection "road-east-ipv6-psk-ikev2" from 192.1.2.23:500 (in log_stf_suspend() at ikev2.c:3269) | "road-east-ipv6-psk-ikev2" #4 complete v2 state STATE_V2_CREATE_I0 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 | resume sending helper answer for #4 suppresed complete_v2_state_transition() | #4 spent 0.0526 milliseconds in resume sending helper answer | stop processing: state #4 connection "road-east-ipv6-psk-ikev2" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f6048000d18 | processing callback v2_msgid_schedule_next_initiator for #1 | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in callback_handler() at server.c:904) | Message ID: #1.#4 resuming SA using IKE SA (unack 0); initiator.sent=2 initiator.recv=2 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 | suspend processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in initiate_next() at ikev2_msgid.c:553) | start processing: state #4 connection "road-east-ipv6-psk-ikev2" from 192.1.2.23:500 (in initiate_next() at ikev2_msgid.c:553) | **emit ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 3 (0x3) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' | emitting 8 zero bytes of IV into IKEv2 Encryption Payload | netlink_get_spi: allocated 0x7ec2adb2 for esp.0@192.1.3.209 | Emitting ikev2_proposals ... | ****emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | discarding INTEG=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 7e c2 ad b2 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 32 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding INTEG=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 2 (0x2) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 7e c2 ad b2 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 32 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 3 (0x3) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 4 (0x4) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 7e c2 ad b2 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 48 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 4 (0x4) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 4 (0x4) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 7e c2 ad b2 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 48 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 164 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ****emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 92 bd ae 89 40 a3 d1 82 5e 2d e6 a7 48 99 7e 5e | IKEv2 nonce 63 a5 53 3a 55 26 37 88 c8 17 2d f4 38 ef 35 02 | emitting length of IKEv2 Nonce Payload: 36 | ****emit IKEv2 Traffic Selector - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | number of TS: 1 (0x1) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV6_ADDR_RANGE (0x8) | IP Protocol ID: 0 (0x0) | start port: 0 (0x0) | end port: 65535 (0xffff) | emitting 16 raw bytes of ipv6 start into IKEv2 Traffic Selector | ipv6 start 20 01 0d b8 00 01 00 03 00 00 00 00 00 00 00 00 | emitting 16 raw bytes of ipv6 end into IKEv2 Traffic Selector | ipv6 end 20 01 0d b8 00 01 00 03 ff ff ff ff ff ff ff ff | emitting length of IKEv2 Traffic Selector: 40 | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 48 | ****emit IKEv2 Traffic Selector - Responder - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | number of TS: 1 (0x1) | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV6_ADDR_RANGE (0x8) | IP Protocol ID: 0 (0x0) | start port: 0 (0x0) | end port: 65535 (0xffff) | emitting 16 raw bytes of ipv6 start into IKEv2 Traffic Selector | ipv6 start 20 01 0d b8 00 01 00 02 00 00 00 00 00 00 00 00 | emitting 16 raw bytes of ipv6 end into IKEv2 Traffic Selector | ipv6 end 20 01 0d b8 00 01 00 02 ff ff ff ff ff ff ff ff | emitting length of IKEv2 Traffic Selector: 40 | emitting length of IKEv2 Traffic Selector - Responder - Payload: 48 | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload | emitting length of IKEv2 Encryption Payload: 325 | emitting length of ISAKMP Message: 353 | [RE]START processing: state #4 connection "road-east-ipv6-psk-ikev2" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3379) | #4 complete_v2_state_transition() V2_CREATE_I0->V2_CREATE_I with status STF_OK | IKEv2: transition from state STATE_V2_CREATE_I0 to state STATE_V2_CREATE_I | child state #4: V2_CREATE_I0(established IKE SA) => V2_CREATE_I(established IKE SA) | Message ID: updating counters for #4 to 4294967295 after switching state | Message ID: IKE #1 skipping update_recv as MD is fake | Message ID: sent #1.#4 request 3; ike: initiator.sent=2->3 initiator.recv=2 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->3 wip.responder=-1 "road-east-ipv6-psk-ikev2" #4: STATE_V2_CREATE_I: sent IPsec Child req wait response | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) | sending 353 bytes for STATE_V2_CREATE_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 2e 20 24 08 00 00 00 03 00 00 01 61 21 00 01 45 | cd 24 66 dd 77 83 18 2d ab 82 6f 18 9f 4e 6d d7 | 96 fa ce 41 55 75 24 f7 e0 1e 24 28 1b f8 0f da | a1 de 2e f0 75 4b 68 cb c9 c6 b2 0f de 31 d4 21 | 42 0e 68 3c f6 85 c1 01 6f 72 2d fa 01 a6 a6 40 | a8 5b 64 57 5c 6d ea 17 51 35 d3 f6 4a dc ac c7 | 43 5c a1 dd 17 35 99 3f 3d 2b 72 ed 3d 8f 41 40 | 31 ea ad c9 5f 41 80 88 b8 c9 1c a6 2e 9c e8 9a | 1b 85 49 2a 50 a6 5f 47 8e ba 45 fe 2d c0 5f 15 | f5 4e 53 0e 92 40 9d db d5 29 cf 29 d4 75 07 ee | a0 0a a6 a0 04 0d 1d da c3 86 c5 59 b3 80 3b 7d | 39 3e 50 19 3b 3a 89 f6 27 59 7b 68 ef 60 59 7f | da d1 7b 62 c4 f9 2f 16 5d be 51 d9 80 c0 74 7a | 29 43 16 77 d7 c2 ab c8 a0 77 04 f0 af 19 00 a6 | 4c 14 2d 37 f2 8d 70 33 8c 66 f9 c6 a4 78 f6 e2 | aa 24 6e f2 4a 6c 06 2b 2b fe 47 c3 7b 89 69 43 | 13 39 c0 f5 79 76 30 e7 fb f6 8f 92 3a 3d 4a 0d | 38 f2 df 59 aa 60 52 d8 51 71 30 df 91 7d 0d 0d | 5f d1 a3 06 a0 dc 4f 87 12 6c cf 13 18 48 27 2e | a4 3f 7e 0c 8d c8 93 56 5b 3d 9e 6b 16 5d d3 f2 | 13 b9 f0 d6 1c 9c cc 38 0e 36 4b 44 49 7f 63 03 | 70 | state #4 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x56012a96d3b8 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56012a964bd8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x56012a964bd8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #4 | libevent_malloc: new ptr-libevent@0x56012a96d3b8 size 128 | #4 STATE_V2_CREATE_I: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29161.47397 | stop processing: state #4 connection "road-east-ipv6-psk-ikev2" from 192.1.2.23:500 (in initiate_next() at ikev2_msgid.c:557) | resume processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in initiate_next() at ikev2_msgid.c:557) | #1 spent 0.679 milliseconds in callback v2_msgid_schedule_next_initiator | stop processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in callback_handler() at server.c:908) | libevent_free: release ptr-libevent@0x56012a97e098 | spent 0.00199 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 65 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 2e 20 24 20 00 00 00 03 00 00 00 41 29 00 00 25 | b3 2e 65 96 51 05 8d d3 27 b7 c6 c1 9a 17 a8 25 | de 10 0a e7 64 ee d6 67 2f ea 0e e4 e2 33 0b 51 | 24 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 3 (0x3) | length: 65 (0x41) | processing version=2.0 packet with exchange type=ISAKMP_v2_CREATE_CHILD_SA (36) | I am the IKE SA Original Initiator receiving an IKEv2 CREATE_CHILD_SA response | State DB: found IKEv2 state #1 in PARENT_I3 (find_v2_ike_sa) | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #4 in V2_CREATE_I (find_v2_sa_by_initiator_wip) | suspend processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2062) | start processing: state #4 connection "road-east-ipv6-psk-ikev2" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2062) | #4 is idle | #4 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SK) | ***parse IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 37 (0x25) | processing payload: ISAKMP_NEXT_v2SK (len=33) | #4 in state V2_CREATE_I: sent IPsec Child req wait response | #4 ikev2 ISAKMP_v2_CREATE_CHILD_SA decrypt success | Now let's proceed with payload (ISAKMP_NEXT_v2N) | **parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 8 (0x8) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_TS_UNACCEPTABLE (0x26) | processing payload: ISAKMP_NEXT_v2N (len=0) | selected state microcode roof "road-east-ipv6-psk-ikev2" #4: dropping unexpected CREATE_CHILD_SA message containing TS_UNACCEPTABLE notification; message payloads: SK; encrypted payloads: N; missing payloads: SA,Ni,TSi,TSr | [RE]START processing: state #4 connection "road-east-ipv6-psk-ikev2" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3379) | #4 complete_v2_state_transition() V2_CREATE_I->NULL with status STF_FATAL | release_pending_whacks: state #4 fd@27 .st_dev=9 .st_ino=9671218 | close_any(fd@27) (in release_whack() at state.c:654) | pstats #4 ikev2.child deleted other | #4 spent 0.121 milliseconds in total | [RE]START processing: state #4 connection "road-east-ipv6-psk-ikev2" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-east-ipv6-psk-ikev2" #4: deleting state (STATE_V2_CREATE_I) aged 0.002s and NOT sending notification | child state #4: V2_CREATE_I(established IKE SA) => delete | child state #4: V2_CREATE_I(established IKE SA) => CHILDSA_DEL(informational) | state #4 requesting EVENT_RETRANSMIT to be deleted | #4 STATE_CHILDSA_DEL: retransmits: cleared | libevent_free: release ptr-libevent@0x56012a96d3b8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x56012a964bd8 | priority calculation of connection "road-east-ipv6-psk-ikev2" is 0xfbfbf | delete inbound eroute 2001:db8:1:2::/64:0 --0-> 2001:db8:1:3::/64:0 => unk255.10000@192.1.3.209 (raw_eroute) | raw_eroute result=success | in connection_discard for connection road-east-ipv6-psk-ikev2 | State DB: deleting IKEv2 state #4 in CHILDSA_DEL | child state #4: CHILDSA_DEL(informational) => UNDEFINED(ignore) | stop processing: state #4 from 192.1.2.23:500 (in delete_state() at state.c:1143) | processing: STOP state #0 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 0.267 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.278 milliseconds in comm_handle_cb() reading and processing packet | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_STATE_... in show_traffic_status (sort_states) | FOR_EACH_STATE_... in sort_states | get_sa_info esp.dd9a7e6@192.1.3.209 | get_sa_info esp.97c475d7@192.1.2.23 | get_sa_info esp.41d55369@192.1.3.209 | get_sa_info esp.601c26ea@192.1.2.23 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.512 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in show_connections_status | FOR_EACH_CONNECTION_... in show_connections_status | FOR_EACH_STATE_... in show_states_status (sort_states) | FOR_EACH_STATE_... in sort_states | get_sa_info esp.dd9a7e6@192.1.3.209 | get_sa_info esp.97c475d7@192.1.2.23 | get_sa_info esp.41d55369@192.1.3.209 | get_sa_info esp.601c26ea@192.1.2.23 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 1.51 milliseconds in whack | spent 0.004 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 69 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 2e 20 25 00 00 00 00 00 00 00 00 45 2a 00 00 29 | 18 f4 97 45 9b 71 20 01 8c de a6 01 8c 20 af 81 | 0f a6 cc 49 45 7d ca 2b 41 0c 78 ab 90 23 70 35 | c1 e7 a5 27 f0 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: none (0x0) | Message ID: 0 (0x0) | length: 69 (0x45) | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) | I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request | State DB: found IKEv2 state #1 in PARENT_I3 (find_v2_ike_sa) | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2016) | State DB: IKEv2 state not found (find_v2_sa_by_responder_wip) | [RE]START processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2064) | #1 st.st_msgid_lastrecv -1 md.hdr.isa_msgid 00000000 | Message ID: #1 not a duplicate - message is new; initiator.sent=3 initiator.recv=2 responder.sent=-1 responder.recv=-1 | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SK) | ***parse IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2D (0x2a) | flags: none (0x0) | length: 41 (0x29) | processing payload: ISAKMP_NEXT_v2SK (len=37) | Message ID: start-responder #1 request 0; ike: initiator.sent=3 initiator.recv=2 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1->0 | #1 in state PARENT_I3: PARENT SA established | #1 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success | Now let's proceed with payload (ISAKMP_NEXT_v2D) | **parse IKEv2 Delete Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 12 (0xc) | protocol ID: PROTO_v2_ESP (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | processing payload: ISAKMP_NEXT_v2D (len=4) | selected state microcode I3: INFORMATIONAL Request | Now let's proceed with state specific processing | calling processor I3: INFORMATIONAL Request | an informational request should send a response | Received an INFORMATIONAL response, updating st_last_liveness, no pending_liveness | **emit ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: ISAKMP_FLAG_v2_IKE_INIT+ISAKMP_FLAG_v2_MSG_RESPONSE (0x28) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'information exchange reply packet' | emitting 8 zero bytes of IV into IKEv2 Encryption Payload | parsing 4 raw bytes of IKEv2 Delete Payload into SPI | SPI 60 1c 26 ea | delete PROTO_v2_ESP SA(0x601c26ea) | v2 CHILD SA #3 found using their inbound (our outbound) SPI, in STATE_V2_IPSEC_I | State DB: found IKEv2 state #3 in V2_IPSEC_I (find_v2_child_sa_by_outbound_spi) | our side SPI that needs to be deleted: PROTO_v2_ESP SA(0x601c26ea) "road-east-ipv4-psk-ikev2/2x0" #1: received Delete SA payload: replace IPsec State #3 now | state #3 requesting EVENT_SA_REKEY to be deleted | libevent_free: release ptr-libevent@0x56012a964738 | free_event_entry: release EVENT_SA_REKEY-pe@0x56012a9654a8 | event_schedule: new EVENT_SA_REPLACE-pe@0x56012a9654a8 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #3 | libevent_malloc: new ptr-libevent@0x56012a97e098 size 128 | ****emit IKEv2 Delete Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | protocol ID: PROTO_v2_ESP (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Delete Payload (42:ISAKMP_NEXT_v2D) | next payload chain: saving location 'IKEv2 Delete Payload'.'next payload type' in 'information exchange reply packet' | emitting 4 raw bytes of local SPIs into IKEv2 Delete Payload | local SPIs 41 d5 53 69 | emitting length of IKEv2 Delete Payload: 12 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload | emitting length of IKEv2 Encryption Payload: 41 | emitting length of ISAKMP Message: 69 | sending 69 bytes for reply packet for process_encrypted_informational_ikev2 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 2e 20 25 28 00 00 00 00 00 00 00 45 2a 00 00 29 | a1 5a 4d 3e 86 7b 04 39 be ee 6d 2c a8 01 30 9e | 0f 70 ba 6f 6e 0f 79 eb 91 b8 cf 2f 73 e7 91 ce | a7 cb 11 41 04 | Message ID: #1 XXX: in process_encrypted_informational_ikev2() hacking around record'n'send bypassing send queue hacking around delete_my_family(); initiator.sent=3 initiator.recv=2 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=0 | Message ID: sent #1 response 0; ike: initiator.sent=3 initiator.recv=2 responder.sent=-1->0 responder.recv=-1 wip.initiator=-1 wip.responder=0 | #1 spent 0.163 milliseconds in processing: I3: INFORMATIONAL Request in ikev2_process_state_packet() | [RE]START processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3379) | #1 complete_v2_state_transition() PARENT_I3->PARENT_I3 with status STF_OK | Message ID: updating counters for #1 to 0 after switching state | Message ID: recv #1 request 0; ike: initiator.sent=3 initiator.recv=2 responder.sent=0 responder.recv=-1->0 wip.initiator=-1 wip.responder=0->-1 | Message ID: #1 skipping update_send as nothing to send; initiator.sent=3 initiator.recv=2 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=-1 "road-east-ipv4-psk-ikev2/2x0" #1: STATE_PARENT_I3: PARENT SA established | stop processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 0.328 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.34 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x56012a9654a8 | handling event EVENT_SA_REPLACE for child state #3 | start processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #3 for #3 | replacing stale CHILD SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) | FOR_EACH_STATE_... in find_phase1_state | FOR_EACH_STATE_... in find_pending_phase2 | creating state object #5 at 0x56012a975668 | State DB: adding IKEv2 state #5 in UNDEFINED | pstats #5 ikev2.child started | duplicating state object #1 "road-east-ipv4-psk-ikev2/2x0" as #5 for IPSEC SA | #5 setting local endpoint to 192.1.3.209:500 from #1.st_localport (in duplicate_state() at state.c:1484) | Message ID: init_child #1.#5; ike: initiator.sent=3 initiator.recv=2 responder.sent=0 responder.recv=0; child: wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_initiate_child_sa() at ikev2_parent.c:5637) | start processing: state #5 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in ikev2_initiate_child_sa() at ikev2_parent.c:5637) | child state #5: UNDEFINED(ignore) => V2_REKEY_CHILD_I0(established IKE SA) | create child proposal's DH changed from NONE to no-PFS, flushing | constructing ESP/AH proposals with no default DH for road-east-ipv4-psk-ikev2/2x0 (ESP/AH initiator emitting proposals) | converting proposal AES_GCM_16_256-NONE to ikev2 ... | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;ESN=DISABLED | converting proposal AES_GCM_16_128-NONE to ikev2 ... | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;ESN=DISABLED | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED "road-east-ipv4-psk-ikev2/2x0": constructed local ESP/AH proposals for road-east-ipv4-psk-ikev2/2x0 (ESP/AH initiator emitting proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED | #5 schedule rekey initiate IPsec SA RSASIG+ENCRYPT+TUNNEL+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO to replace #3 using IKE# 1 pfs=no-pfs | event_schedule: new EVENT_v2_INITIATE_CHILD-pe@0x56012a964bd8 | inserting event EVENT_v2_INITIATE_CHILD, timeout in 0 seconds for #5 | libevent_malloc: new ptr-libevent@0x56012a96d3b8 size 128 | RESET processing: state #5 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in ikev2_initiate_child_sa() at ikev2_parent.c:5737) | state #3 requesting EVENT_v2_LIVENESS-pe@0x7f6058002b78 be deleted | libevent_free: release ptr-libevent@0x56012a9647e8 | free_event_entry: release EVENT_v2_LIVENESS-pe@0x7f6058002b78 | event_schedule: new EVENT_SA_EXPIRE-pe@0x7f6058002b78 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #3 | libevent_malloc: new ptr-libevent@0x56012a9647e8 size 128 | libevent_free: release ptr-libevent@0x56012a97e098 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56012a9654a8 | #3 spent 0.138 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x56012a964bd8 | handling event EVENT_v2_INITIATE_CHILD for child state #5 | start processing: state #5 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | adding Child Rekey Initiator nonce ni work-order 5 for state #5 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56012a9654a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #5 | libevent_malloc: new ptr-libevent@0x56012a97e098 size 128 | libevent_free: release ptr-libevent@0x56012a96d3b8 | free_event_entry: release EVENT_v2_INITIATE_CHILD-pe@0x56012a964bd8 | #5 spent 0.0303 milliseconds in timer_event_cb() EVENT_v2_INITIATE_CHILD | crypto helper 3 resuming | crypto helper 3 starting work-order 5 for state #5 | crypto helper 3 doing build nonce (Child Rekey Initiator nonce ni); request ID 5 | crypto helper 3 finished build nonce (Child Rekey Initiator nonce ni); request ID 5 time elapsed 0.000024 seconds | (#5) spent 0.0283 milliseconds in crypto helper computing work-order 5: Child Rekey Initiator nonce ni (pcr) | crypto helper 3 sending results from work-order 5 for state #5 to event queue | scheduling resume sending helper answer for #5 | libevent_malloc: new ptr-libevent@0x7f604c000d18 size 128 | crypto helper 3 waiting (nothing to do) | stop processing: state #5 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f6058002b78 | handling event EVENT_SA_EXPIRE for child state #3 | start processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #3 for #3 | un-established partial CHILD SA timeout (SA expired) | pstats #3 ikev2.child re-failed exchange-timeout | pstats #3 ikev2.child deleted completed | #3 spent 1.8 milliseconds in total | [RE]START processing: state #3 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in delete_state() at state.c:879) "road-east-ipv4-psk-ikev2/2x0" #3: deleting state (STATE_V2_IPSEC_I) aged 4.161s and NOT sending notification | child state #3: V2_IPSEC_I(established CHILD SA) => delete | get_sa_info esp.601c26ea@192.1.2.23 | get_sa_info esp.41d55369@192.1.3.209 "road-east-ipv4-psk-ikev2/2x0" #3: ESP traffic information: in=168B out=168B | child state #3: V2_IPSEC_I(established CHILD SA) => CHILDSA_DEL(informational) | running updown command "ipsec _updown" for verb down | command executing down-client | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='road-east-ipv4-psk-ikev2/2x0' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566843875' P | popen cmd is 1420 chars long | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='road-east-ipv4-ps: | cmd( 80):k-ikev2/2x0' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.: | cmd( 160):3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department: | cmd( 240):, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLI: | cmd( 320):ENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.0' PLUTO_MY_CLIENT_MASK='255.2: | cmd( 400):55.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_S: | cmd( 480):A_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto,: | cmd( 560): O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@tes: | cmd( 640):ting.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.: | cmd( 720):0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PRO: | cmd( 800):TOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depar: | cmd( 880):tment, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='ne: | cmd( 960):tkey' PLUTO_ADDTIME='1566843875' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+UP+IKE: | cmd(1040):V2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO: | cmd(1120):_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_IN: | cmd(1200):FO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_: | cmd(1280):CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED=: | cmd(1360):'no' SPI_IN=0x601c26ea SPI_OUT=0x41d55369 ipsec _updown 2>&1: | shunt_eroute() called for connection 'road-east-ipv4-psk-ikev2/2x0' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "road-east-ipv4-psk-ikev2/2x0" is 0xfe7e7 | IPsec Sa SPD priority set to 1042407 | delete esp.601c26ea@192.1.2.23 | netlink response for Del SA esp.601c26ea@192.1.2.23 included non-error error | priority calculation of connection "road-east-ipv4-psk-ikev2/2x0" is 0xfe7e7 | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.11.0/24:0 => unk255.10000@192.1.3.209 (raw_eroute) | raw_eroute result=success | delete esp.41d55369@192.1.3.209 | netlink response for Del SA esp.41d55369@192.1.3.209 included non-error error | in connection_discard for connection road-east-ipv4-psk-ikev2/2x0 | State DB: deleting IKEv2 state #3 in CHILDSA_DEL | child state #3: CHILDSA_DEL(informational) => UNDEFINED(ignore) | stop processing: state #3 from 192.1.2.23 (in delete_state() at state.c:1143) | State DB: found IKEv2 state #5 in V2_REKEY_CHILD_I0 (v2_expire_unused_ike_sa) | can't expire unused IKE SA #1; it has the child #5 | libevent_free: release ptr-libevent@0x56012a9647e8 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x7f6058002b78 | in statetime_stop() and could not find #3 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | spent 0.00259 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 69 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 2e 20 25 00 00 00 00 01 00 00 00 45 2a 00 00 29 | ed 5e 35 93 46 9a 68 1a 15 91 09 90 85 fa b4 09 | 3f 5f 22 b9 b4 05 47 b2 fe e2 2b 5c 85 a2 4f e9 | 40 5c 11 c6 b7 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: none (0x0) | Message ID: 1 (0x1) | length: 69 (0x45) | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) | I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request | State DB: found IKEv2 state #1 in PARENT_I3 (find_v2_ike_sa) | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2016) | State DB: IKEv2 state not found (find_v2_sa_by_responder_wip) | [RE]START processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2064) | #1 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001 | Message ID: #1 not a duplicate - message is new; initiator.sent=3 initiator.recv=2 responder.sent=0 responder.recv=0 | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SK) | ***parse IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2D (0x2a) | flags: none (0x0) | length: 41 (0x29) | processing payload: ISAKMP_NEXT_v2SK (len=37) | Message ID: start-responder #1 request 1; ike: initiator.sent=3 initiator.recv=2 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=-1->1 | #1 in state PARENT_I3: PARENT SA established | #1 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success | Now let's proceed with payload (ISAKMP_NEXT_v2D) | **parse IKEv2 Delete Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 12 (0xc) | protocol ID: PROTO_v2_ESP (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | processing payload: ISAKMP_NEXT_v2D (len=4) | selected state microcode I3: INFORMATIONAL Request | Now let's proceed with state specific processing | calling processor I3: INFORMATIONAL Request | an informational request should send a response | Received an INFORMATIONAL response, updating st_last_liveness, no pending_liveness | **emit ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: ISAKMP_FLAG_v2_IKE_INIT+ISAKMP_FLAG_v2_MSG_RESPONSE (0x28) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'information exchange reply packet' | emitting 8 zero bytes of IV into IKEv2 Encryption Payload | parsing 4 raw bytes of IKEv2 Delete Payload into SPI | SPI 97 c4 75 d7 | delete PROTO_v2_ESP SA(0x97c475d7) | v2 CHILD SA #2 found using their inbound (our outbound) SPI, in STATE_V2_IPSEC_I | State DB: found IKEv2 state #2 in V2_IPSEC_I (find_v2_child_sa_by_outbound_spi) | our side SPI that needs to be deleted: PROTO_v2_ESP SA(0x97c475d7) "road-east-ipv4-psk-ikev2/2x0" #1: received Delete SA payload: replace IPsec State #2 now | state #2 requesting EVENT_SA_REKEY to be deleted | libevent_free: release ptr-libevent@0x56012a94be68 | free_event_entry: release EVENT_SA_REKEY-pe@0x56012a9665a8 | event_schedule: new EVENT_SA_REPLACE-pe@0x56012a9665a8 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #2 | libevent_malloc: new ptr-libevent@0x56012a96d3b8 size 128 | ****emit IKEv2 Delete Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | protocol ID: PROTO_v2_ESP (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Delete Payload (42:ISAKMP_NEXT_v2D) | next payload chain: saving location 'IKEv2 Delete Payload'.'next payload type' in 'information exchange reply packet' | emitting 4 raw bytes of local SPIs into IKEv2 Delete Payload | local SPIs 0d d9 a7 e6 | emitting length of IKEv2 Delete Payload: 12 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload | emitting length of IKEv2 Encryption Payload: 41 | emitting length of ISAKMP Message: 69 | sending 69 bytes for reply packet for process_encrypted_informational_ikev2 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 2e 20 25 28 00 00 00 01 00 00 00 45 2a 00 00 29 | 3f f9 ef 47 93 ae 24 2e dc fa 60 8b 26 db 4c c4 | 30 4c 90 f3 10 21 85 b8 bb 64 a7 24 38 82 bc 5a | 07 b1 6c c3 bb | Message ID: #1 XXX: in process_encrypted_informational_ikev2() hacking around record'n'send bypassing send queue hacking around delete_my_family(); initiator.sent=3 initiator.recv=2 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=1 | Message ID: sent #1 response 1; ike: initiator.sent=3 initiator.recv=2 responder.sent=0->1 responder.recv=0 wip.initiator=-1 wip.responder=1 | #1 spent 0.184 milliseconds in processing: I3: INFORMATIONAL Request in ikev2_process_state_packet() | [RE]START processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3379) | #1 complete_v2_state_transition() PARENT_I3->PARENT_I3 with status STF_OK | Message ID: updating counters for #1 to 1 after switching state | Message ID: recv #1 request 1; ike: initiator.sent=3 initiator.recv=2 responder.sent=1 responder.recv=0->1 wip.initiator=-1 wip.responder=1->-1 | Message ID: #1 skipping update_send as nothing to send; initiator.sent=3 initiator.recv=2 responder.sent=1 responder.recv=1 wip.initiator=-1 wip.responder=-1 "road-east-ipv4-psk-ikev2/2x0" #1: STATE_PARENT_I3: PARENT SA established | stop processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 0.378 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.389 milliseconds in comm_handle_cb() reading and processing packet | processing resume sending helper answer for #5 | start processing: state #5 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 5 | calling continuation function 0x5601297a9b50 | ikev2_child_outI_continue for #5 STATE_V2_REKEY_CHILD_I0 | state #5 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x56012a97e098 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56012a9654a8 | event_schedule: new EVENT_SA_REPLACE-pe@0x56012a9654a8 | inserting event EVENT_SA_REPLACE, timeout in 200 seconds for #5 | libevent_malloc: new ptr-libevent@0x56012a97dbe8 size 128 | [RE]START processing: state #5 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3379) | #5 complete_v2_state_transition() V2_REKEY_CHILD_I0->V2_REKEY_CHILD_I with status STF_SUSPEND | suspending state #5 and saving MD | #5 is busy; has a suspended MD | [RE]START processing: state #5 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in log_stf_suspend() at ikev2.c:3269) | "road-east-ipv4-psk-ikev2/2x0" #5 complete v2 state STATE_V2_REKEY_CHILD_I0 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 | resume sending helper answer for #5 suppresed complete_v2_state_transition() | #5 spent 0.047 milliseconds in resume sending helper answer | stop processing: state #5 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f604c000d18 | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00424 milliseconds in signal handler PLUTO_SIGCHLD | timer_event_cb: processing event@0x56012a9665a8 | handling event EVENT_SA_REPLACE for child state #2 | start processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #2 for #2 | replacing stale CHILD SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) | FOR_EACH_STATE_... in find_phase1_state | FOR_EACH_STATE_... in find_pending_phase2 | creating state object #6 at 0x56012a96c328 | State DB: adding IKEv2 state #6 in UNDEFINED | pstats #6 ikev2.child started | duplicating state object #1 "road-east-ipv4-psk-ikev2/2x0" as #6 for IPSEC SA | #6 setting local endpoint to 192.1.3.209:500 from #1.st_localport (in duplicate_state() at state.c:1484) | Message ID: init_child #1.#6; ike: initiator.sent=3 initiator.recv=2 responder.sent=1 responder.recv=1; child: wip.initiator=0->-1 wip.responder=0->-1 | in connection_discard for connection road-east-ipv4-psk-ikev2/2x0 | suspend processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in ikev2_initiate_child_sa() at ikev2_parent.c:5637) | start processing: state #6 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23:500 (in ikev2_initiate_child_sa() at ikev2_parent.c:5637) | child state #6: UNDEFINED(ignore) => V2_REKEY_CHILD_I0(established IKE SA) | constructing ESP/AH proposals with no default DH for road-east-ipv4-psk-ikev2/1x0 (ESP/AH initiator emitting proposals) | converting proposal AES_GCM_16_256-NONE to ikev2 ... | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;ESN=DISABLED | converting proposal AES_GCM_16_128-NONE to ikev2 ... | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;ESN=DISABLED | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED "road-east-ipv4-psk-ikev2/1x0": constructed local ESP/AH proposals for road-east-ipv4-psk-ikev2/1x0 (ESP/AH initiator emitting proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;ESN=DISABLED | #6 schedule rekey initiate IPsec SA RSASIG+ENCRYPT+TUNNEL+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO to replace #2 using IKE# 1 pfs=no-pfs | event_schedule: new EVENT_v2_INITIATE_CHILD-pe@0x7f6058002b78 | inserting event EVENT_v2_INITIATE_CHILD, timeout in 0 seconds for #6 | libevent_malloc: new ptr-libevent@0x7f604c000d18 size 128 | RESET processing: state #6 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23:500 (in ikev2_initiate_child_sa() at ikev2_parent.c:5737) | state #2 requesting EVENT_v2_LIVENESS-pe@0x56012a8e2138 be deleted | libevent_free: release ptr-libevent@0x56012a9493f8 | free_event_entry: release EVENT_v2_LIVENESS-pe@0x56012a8e2138 | event_schedule: new EVENT_SA_EXPIRE-pe@0x56012a8e2138 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #2 | libevent_malloc: new ptr-libevent@0x56012a9493f8 size 128 | libevent_free: release ptr-libevent@0x56012a96d3b8 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56012a9665a8 | #2 spent 0.144 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f6058002b78 | handling event EVENT_v2_INITIATE_CHILD for child state #6 | start processing: state #6 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | adding Child Rekey Initiator nonce ni work-order 6 for state #6 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56012a9665a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #6 | libevent_malloc: new ptr-libevent@0x56012a96d3b8 size 128 | libevent_free: release ptr-libevent@0x7f604c000d18 | free_event_entry: release EVENT_v2_INITIATE_CHILD-pe@0x7f6058002b78 | #6 spent 0.0319 milliseconds in timer_event_cb() EVENT_v2_INITIATE_CHILD | crypto helper 6 resuming | stop processing: state #6 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | crypto helper 6 starting work-order 6 for state #6 | timer_event_cb: processing event@0x56012a8e2138 | handling event EVENT_SA_EXPIRE for child state #2 | crypto helper 6 doing build nonce (Child Rekey Initiator nonce ni); request ID 6 | start processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #2 for #2 | un-established partial CHILD SA timeout (SA expired) | pstats #2 ikev2.child re-failed exchange-timeout | pstats #2 ikev2.child deleted completed | #2 spent 5.18 milliseconds in total | [RE]START processing: state #2 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23 (in delete_state() at state.c:879) "road-east-ipv4-psk-ikev2/1x0" #2: deleting state (STATE_V2_IPSEC_I) aged 4.278s and NOT sending notification | child state #2: V2_IPSEC_I(established CHILD SA) => delete | get_sa_info esp.97c475d7@192.1.2.23 | crypto helper 6 finished build nonce (Child Rekey Initiator nonce ni); request ID 6 time elapsed 0.000038 seconds | (#6) spent 0.0408 milliseconds in crypto helper computing work-order 6: Child Rekey Initiator nonce ni (pcr) | crypto helper 6 sending results from work-order 6 for state #6 to event queue | scheduling resume sending helper answer for #6 | get_sa_info esp.dd9a7e6@192.1.3.209 | libevent_malloc: new ptr-libevent@0x7f6040000d18 size 128 "road-east-ipv4-psk-ikev2/1x0" #2: ESP traffic information: in=168B out=168B | crypto helper 6 waiting (nothing to do) | child state #2: V2_IPSEC_I(established CHILD SA) => CHILDSA_DEL(informational) | running updown command "ipsec _updown" for verb down | command executing down-client | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='road-east-ipv4-psk-ikev2/1x0' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566843875' PLU | popen cmd is 1417 chars long | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='road-east-ipv4-ps: | cmd( 80):k-ikev2/1x0' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.: | cmd( 160):3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department: | cmd( 240):, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLI: | cmd( 320):ENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255: | cmd( 400):.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_: | cmd( 480):TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O: | cmd( 560):=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testi: | cmd( 640):ng.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.: | cmd( 720):2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTO: | cmd( 800):COL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Departm: | cmd( 880):ent, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netk: | cmd( 960):ey' PLUTO_ADDTIME='1566843875' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+UP+IKEV2: | cmd(1040):_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_C: | cmd(1120):ONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO: | cmd(1200):='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CF: | cmd(1280):G_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='n: | cmd(1360):o' SPI_IN=0x97c475d7 SPI_OUT=0xdd9a7e6 ipsec _updown 2>&1: | shunt_eroute() called for connection 'road-east-ipv4-psk-ikev2/1x0' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "road-east-ipv4-psk-ikev2/1x0" is 0xfe7e7 | IPsec Sa SPD priority set to 1042407 | delete esp.97c475d7@192.1.2.23 | netlink response for Del SA esp.97c475d7@192.1.2.23 included non-error error | priority calculation of connection "road-east-ipv4-psk-ikev2/1x0" is 0xfe7e7 | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => unk255.10000@192.1.3.209 (raw_eroute) | raw_eroute result=success | delete esp.dd9a7e6@192.1.3.209 | netlink response for Del SA esp.dd9a7e6@192.1.3.209 included non-error error | in connection_discard for connection road-east-ipv4-psk-ikev2/1x0 | State DB: deleting IKEv2 state #2 in CHILDSA_DEL | child state #2: CHILDSA_DEL(informational) => UNDEFINED(ignore) | stop processing: state #2 from 192.1.2.23 (in delete_state() at state.c:1143) | State DB: found IKEv2 state #6 in V2_REKEY_CHILD_I0 (v2_expire_unused_ike_sa) | can't expire unused IKE SA #1; it has the child #6 | libevent_free: release ptr-libevent@0x56012a9493f8 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x56012a8e2138 | in statetime_stop() and could not find #2 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #6 | start processing: state #6 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 6 | calling continuation function 0x5601297a9b50 | ikev2_child_outI_continue for #6 STATE_V2_REKEY_CHILD_I0 | state #6 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x56012a96d3b8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56012a9665a8 | event_schedule: new EVENT_SA_REPLACE-pe@0x56012a9665a8 | inserting event EVENT_SA_REPLACE, timeout in 200 seconds for #6 | libevent_malloc: new ptr-libevent@0x7f604c000d18 size 128 | [RE]START processing: state #6 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3379) | #6 complete_v2_state_transition() V2_REKEY_CHILD_I0->V2_REKEY_CHILD_I with status STF_SUSPEND | suspending state #6 and saving MD | #6 is busy; has a suspended MD | [RE]START processing: state #6 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23:500 (in log_stf_suspend() at ikev2.c:3269) | "road-east-ipv4-psk-ikev2/1x0" #6 complete v2 state STATE_V2_REKEY_CHILD_I0 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 | resume sending helper answer for #6 suppresed complete_v2_state_transition() | #6 spent 0.0857 milliseconds in resume sending helper answer | stop processing: state #6 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f6040000d18 | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00593 milliseconds in signal handler PLUTO_SIGCHLD | spent 0.00308 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 65 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 2e 20 25 00 00 00 00 02 00 00 00 41 2a 00 00 25 | f3 25 54 c6 77 46 67 7e 6a 5d 96 93 42 4b 27 0e | 2f 7f 41 97 00 55 7f 67 52 d5 ef b3 47 2f 3f 77 | 9a | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: none (0x0) | Message ID: 2 (0x2) | length: 65 (0x41) | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) | I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request | State DB: found IKEv2 state #1 in PARENT_I3 (find_v2_ike_sa) | start processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2016) | State DB: IKEv2 state not found (find_v2_sa_by_responder_wip) | [RE]START processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2064) | #1 st.st_msgid_lastrecv 1 md.hdr.isa_msgid 00000002 | Message ID: #1 not a duplicate - message is new; initiator.sent=3 initiator.recv=2 responder.sent=1 responder.recv=1 | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SK) | ***parse IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2D (0x2a) | flags: none (0x0) | length: 37 (0x25) | processing payload: ISAKMP_NEXT_v2SK (len=33) | Message ID: start-responder #1 request 2; ike: initiator.sent=3 initiator.recv=2 responder.sent=1 responder.recv=1 wip.initiator=-1 wip.responder=-1->2 | #1 in state PARENT_I3: PARENT SA established | #1 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success | Now let's proceed with payload (ISAKMP_NEXT_v2D) | **parse IKEv2 Delete Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 8 (0x8) | protocol ID: PROTO_v2_IKE (0x1) | SPI size: 0 (0x0) | number of SPIs: 0 (0x0) | processing payload: ISAKMP_NEXT_v2D (len=0) | selected state microcode I3: INFORMATIONAL Request | Now let's proceed with state specific processing | calling processor I3: INFORMATIONAL Request | an informational request should send a response | Received an INFORMATIONAL response, updating st_last_liveness, no pending_liveness | **emit ISAKMP Message: | initiator cookie: | e4 5f 3d fc 18 e0 ca 4e | responder cookie: | e7 fd 3a 72 b2 cd 7f e5 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: ISAKMP_FLAG_v2_IKE_INIT+ISAKMP_FLAG_v2_MSG_RESPONSE (0x28) | Message ID: 2 (0x2) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'information exchange reply packet' | emitting 8 zero bytes of IV into IKEv2 Encryption Payload | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload | emitting length of IKEv2 Encryption Payload: 29 | emitting length of ISAKMP Message: 57 | sending 57 bytes for reply packet for process_encrypted_informational_ikev2 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) | e4 5f 3d fc 18 e0 ca 4e e7 fd 3a 72 b2 cd 7f e5 | 2e 20 25 28 00 00 00 02 00 00 00 39 00 00 00 1d | 8f 79 15 bc 58 7d 2c 61 c3 c6 bf 87 a6 64 14 13 | 63 0c e7 c1 33 b5 c9 7c 55 | Message ID: #1 XXX: in process_encrypted_informational_ikev2() hacking around record'n'send bypassing send queue hacking around delete_my_family(); initiator.sent=3 initiator.recv=2 responder.sent=1 responder.recv=1 wip.initiator=-1 wip.responder=2 | Message ID: sent #1 response 2; ike: initiator.sent=3 initiator.recv=2 responder.sent=1->2 responder.recv=1 wip.initiator=-1 wip.responder=2 | child state #6: V2_REKEY_CHILD_I0(established IKE SA) => CHILDSA_DEL(informational) | pstats #6 ikev2.child deleted other | #6 spent 0.158 milliseconds in total | suspend processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in delete_state() at state.c:879) | start processing: state #6 connection "road-east-ipv4-psk-ikev2/1x0" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-east-ipv4-psk-ikev2/1x0" #6: deleting other state #6 connection (STATE_CHILDSA_DEL) "road-east-ipv4-psk-ikev2/1x0" aged 0.018s and NOT sending notification | child state #6: CHILDSA_DEL(informational) => delete | disconnecting state #6 from md | state #6 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x7f604c000d18 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56012a9665a8 | priority calculation of connection "road-east-ipv4-psk-ikev2/1x0" is 0xfe7e7 | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => unk255.10000@192.1.3.209 (raw_eroute) | raw_eroute result=success | in connection_discard for connection road-east-ipv4-psk-ikev2/1x0 | State DB: deleting IKEv2 state #6 in CHILDSA_DEL | child state #6: CHILDSA_DEL(informational) => UNDEFINED(ignore) | stop processing: state #6 from 192.1.2.23:500 (in delete_state() at state.c:1143) | resume processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in delete_state() at state.c:1143) | child state #5: V2_REKEY_CHILD_I0(established IKE SA) => CHILDSA_DEL(informational) | pstats #5 ikev2.child deleted other | #5 spent 0.106 milliseconds in total | suspend processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in delete_state() at state.c:879) | start processing: state #5 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-east-ipv4-psk-ikev2/2x0" #5: deleting other state #5 (STATE_CHILDSA_DEL) aged 0.029s and NOT sending notification | child state #5: CHILDSA_DEL(informational) => delete | disconnecting state #5 from md | state #5 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x56012a97dbe8 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56012a9654a8 | priority calculation of connection "road-east-ipv4-psk-ikev2/2x0" is 0xfe7e7 | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.11.0/24:0 => unk255.10000@192.1.3.209 (raw_eroute) | raw_eroute result=success | in connection_discard for connection road-east-ipv4-psk-ikev2/2x0 | State DB: deleting IKEv2 state #5 in CHILDSA_DEL | child state #5: CHILDSA_DEL(informational) => UNDEFINED(ignore) | stop processing: state #5 from 192.1.2.23:500 (in delete_state() at state.c:1143) | resume processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in delete_state() at state.c:1143) | State DB: IKEv2 state not found (delete_my_family) | parent state #1: PARENT_I3(established IKE SA) => IKESA_DEL(established IKE SA) | pstats #1 ikev2.ike deleted completed | #1 spent 23.8 milliseconds in total | [RE]START processing: state #1 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-east-ipv4-psk-ikev2/2x0" #1: deleting state (STATE_IKESA_DEL) aged 4.303s and NOT sending notification | parent state #1: IKESA_DEL(established IKE SA) => delete | state #1 requesting EVENT_SA_REKEY to be deleted | libevent_free: release ptr-libevent@0x56012a97e738 | free_event_entry: release EVENT_SA_REKEY-pe@0x56012a953588 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #1 "road-east-ipv4-psk-ikev2/2x0" #1: deleting IKE SA for connection 'road-east-ipv4-psk-ikev2/2x0' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-east-ipv4-psk-ikev2/2x0' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-east-ipv4-psk-ikev2/2x0 | State DB: deleting IKEv2 state #1 in IKESA_DEL | parent state #1: IKESA_DEL(established IKE SA) => UNDEFINED(ignore) | unreference key: 0x56012a9567a8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 2-- | stop processing: state #1 from 192.1.2.23:500 (in delete_state() at state.c:1143) | unreference key: 0x56012a9567a8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | unreference key: 0x56012a964c48 user-east@testing.libreswan.org cnt 1-- | unreference key: 0x56012a96d248 @east.testing.libreswan.org cnt 1-- | unreference key: 0x56012a978088 east@testing.libreswan.org cnt 1-- | unreference key: 0x56012a979ca8 192.1.2.23 cnt 1-- | in statetime_stop() and could not find #1 | skip start processing: state #0 (in complete_v2_state_transition() at ikev2.c:3379) | #0 complete_v2_state_transition() md.from_state=PARENT_I3 md.svm.state[from]=PARENT_I3 UNDEFINED->PARENT_I3 with status STF_OK | STF_OK but no state object remains | processing: STOP state #0 (in ikev2_process_packet() at ikev2.c:2018) | in statetime_stop() and could not find #1 | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.656 milliseconds in comm_handle_cb() reading and processing packet | processing global timer EVENT_REVIVE_CONNS Initiating connection road-east-ipv4-psk-ikev2/2x0 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-east-ipv4-psk-ikev2/2x0" (in initiate_a_connection() at initiate.c:186) | connection 'road-east-ipv4-psk-ikev2/2x0' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #7 at 0x56012a975668 | State DB: adding IKEv2 state #7 in UNDEFINED | pstats #7 ikev2.ike started | Message ID: init #7: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #7: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #7; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-east-ipv4-psk-ikev2/2x0" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #7 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-east-ipv4-psk-ikev2/2x0" IKE SA #7 "road-east-ipv4-psk-ikev2/2x0" "road-east-ipv4-psk-ikev2/2x0" #7: initiating v2 parent SA | using existing local IKE proposals for connection road-east-ipv4-psk-ikev2/2x0 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | adding ikev2_outI1 KE work-order 7 for state #7 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56012a8e2138 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #7 | libevent_malloc: new ptr-libevent@0x7f6040000d18 size 128 | #7 spent 0.0817 milliseconds in ikev2_parent_outI1() | RESET processing: state #7 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-east-ipv4-psk-ikev2/2x0" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | spent 0.0992 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 4 resuming | crypto helper 4 starting work-order 7 for state #7 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 7 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 7 time elapsed 0.000845 seconds | (#7) spent 0.831 milliseconds in crypto helper computing work-order 7: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 7 for state #7 to event queue | scheduling resume sending helper answer for #7 | libevent_malloc: new ptr-libevent@0x7f6044002888 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #7 | start processing: state #7 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 7 | calling continuation function 0x5601297a9b50 | ikev2_parent_outI1_continue for #7 | **emit ISAKMP Message: | initiator cookie: | 90 ad 86 24 e6 11 50 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-east-ipv4-psk-ikev2/2x0 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | discarding INTEG=NONE | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 11 (0xb) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding INTEG=NONE | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 100 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding INTEG=NONE | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 2 (0x2) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 11 (0xb) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding INTEG=NONE | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 100 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 3 (0x3) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 13 (0xd) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 116 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 4 (0x4) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 13 (0xd) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 116 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 436 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ca 9d e5 5e de d3 6f 8a 9d 0f 24 9f ed 3c 33 90 | ikev2 g^x e0 47 a3 44 ac 25 4f de f0 f6 33 c0 bd 5d 24 d3 | ikev2 g^x 55 a4 e4 ee 06 83 29 2f 21 69 72 36 10 25 e1 81 | ikev2 g^x d1 f4 62 0e 4d 81 26 da e3 bf 38 de 1e 36 22 27 | ikev2 g^x ee 2b 7d 0b f7 a6 3c 5f c5 7c 45 f3 83 8a cf 75 | ikev2 g^x 3a dc eb e5 5e 01 03 bc f0 7a 4f a4 c8 5b 43 3e | ikev2 g^x 4d 1d c5 1d 8e 48 b1 f9 43 4b 81 ec b5 4c 73 d2 | ikev2 g^x a7 ab af bf 45 31 b7 09 c8 55 32 d2 05 2d bd 83 | ikev2 g^x e3 cf 1f 50 1d d1 bb 71 ba 8c a1 f8 c5 b9 98 7e | ikev2 g^x 0d 32 27 02 c4 29 45 82 c8 bb e6 54 71 45 a0 b7 | ikev2 g^x 5e 9a cb e5 c0 b4 dc cc 43 c7 98 7b 82 e6 2f 95 | ikev2 g^x 2e 41 f4 47 8b 5a a0 5e c8 3d 78 2b f3 56 49 c7 | ikev2 g^x 43 1b d2 90 cb 9e a4 66 1e 50 3a 47 84 a2 3c 30 | ikev2 g^x d6 8d 29 e5 16 9e b6 b9 f0 d7 d9 dd 33 8e 6b ee | ikev2 g^x 29 f9 a6 6a b5 b5 d9 e2 20 14 cd fd 7d 04 c8 a6 | ikev2 g^x 5e 74 0a d9 7a b5 7c 87 34 47 c7 4c 91 ae b0 0e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b4 dd a5 25 58 e6 90 86 5d 8c 77 02 f7 31 6f 52 | IKEv2 nonce 91 9d 57 20 44 3b e9 bf dd eb bb 12 28 f8 6e f6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x56012987e800(20) | natd_hash: icookie= 90 ad 86 24 e6 11 50 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d1 | natd_hash: port=500 | natd_hash: hash= 24 6d 1b 9c 4f 85 ac c1 91 ac 22 08 30 0a 21 cd | natd_hash: hash= 62 3d 77 b1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 24 6d 1b 9c 4f 85 ac c1 91 ac 22 08 30 0a 21 cd | Notify data 62 3d 77 b1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x56012987e800(20) | natd_hash: icookie= 90 ad 86 24 e6 11 50 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= e7 a0 de 93 99 37 48 7a 44 b9 f4 98 79 da 4a a1 | natd_hash: hash= d1 b1 9b 27 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e7 a0 de 93 99 37 48 7a 44 b9 f4 98 79 da 4a a1 | Notify data d1 b1 9b 27 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 828 | stop processing: state #7 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #7 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #7 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #7: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #7 to 4294967295 after switching state | Message ID: IKE #7 skipping update_recv as MD is fake | Message ID: sent #7 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-east-ipv4-psk-ikev2/2x0" #7: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) | sending 828 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #7) | 90 ad 86 24 e6 11 50 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f | 28 00 01 08 00 0e 00 00 ca 9d e5 5e de d3 6f 8a | 9d 0f 24 9f ed 3c 33 90 e0 47 a3 44 ac 25 4f de | f0 f6 33 c0 bd 5d 24 d3 55 a4 e4 ee 06 83 29 2f | 21 69 72 36 10 25 e1 81 d1 f4 62 0e 4d 81 26 da | e3 bf 38 de 1e 36 22 27 ee 2b 7d 0b f7 a6 3c 5f | c5 7c 45 f3 83 8a cf 75 3a dc eb e5 5e 01 03 bc | f0 7a 4f a4 c8 5b 43 3e 4d 1d c5 1d 8e 48 b1 f9 | 43 4b 81 ec b5 4c 73 d2 a7 ab af bf 45 31 b7 09 | c8 55 32 d2 05 2d bd 83 e3 cf 1f 50 1d d1 bb 71 | ba 8c a1 f8 c5 b9 98 7e 0d 32 27 02 c4 29 45 82 | c8 bb e6 54 71 45 a0 b7 5e 9a cb e5 c0 b4 dc cc | 43 c7 98 7b 82 e6 2f 95 2e 41 f4 47 8b 5a a0 5e | c8 3d 78 2b f3 56 49 c7 43 1b d2 90 cb 9e a4 66 | 1e 50 3a 47 84 a2 3c 30 d6 8d 29 e5 16 9e b6 b9 | f0 d7 d9 dd 33 8e 6b ee 29 f9 a6 6a b5 b5 d9 e2 | 20 14 cd fd 7d 04 c8 a6 5e 74 0a d9 7a b5 7c 87 | 34 47 c7 4c 91 ae b0 0e 29 00 00 24 b4 dd a5 25 | 58 e6 90 86 5d 8c 77 02 f7 31 6f 52 91 9d 57 20 | 44 3b e9 bf dd eb bb 12 28 f8 6e f6 29 00 00 08 | 00 00 40 2e 29 00 00 1c 00 00 40 04 24 6d 1b 9c | 4f 85 ac c1 91 ac 22 08 30 0a 21 cd 62 3d 77 b1 | 00 00 00 1c 00 00 40 05 e7 a0 de 93 99 37 48 7a | 44 b9 f4 98 79 da 4a a1 d1 b1 9b 27 | state #7 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f6040000d18 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56012a8e2138 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x56012a8e2138 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #7 | libevent_malloc: new ptr-libevent@0x56012a94be68 size 128 | #7 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29165.556964 | resume sending helper answer for #7 suppresed complete_v2_state_transition() and stole MD | #7 spent 0.922 milliseconds in resume sending helper answer | stop processing: state #7 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f6044002888 | timer_event_cb: processing event@0x56012a8e2138 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-east-ipv4-psk-ikev2/2x0" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-east-ipv4-psk-ikev2/2x0" #7 keying attempt 1 of 0; retransmit 1 | retransmits: current time 29166.057549; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500585 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7f6044002b78 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #7 | libevent_malloc: new ptr-libevent@0x7f6044002888 size 128 "road-east-ipv4-psk-ikev2/2x0" #7: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 828 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #7) | 90 ad 86 24 e6 11 50 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f | 28 00 01 08 00 0e 00 00 ca 9d e5 5e de d3 6f 8a | 9d 0f 24 9f ed 3c 33 90 e0 47 a3 44 ac 25 4f de | f0 f6 33 c0 bd 5d 24 d3 55 a4 e4 ee 06 83 29 2f | 21 69 72 36 10 25 e1 81 d1 f4 62 0e 4d 81 26 da | e3 bf 38 de 1e 36 22 27 ee 2b 7d 0b f7 a6 3c 5f | c5 7c 45 f3 83 8a cf 75 3a dc eb e5 5e 01 03 bc | f0 7a 4f a4 c8 5b 43 3e 4d 1d c5 1d 8e 48 b1 f9 | 43 4b 81 ec b5 4c 73 d2 a7 ab af bf 45 31 b7 09 | c8 55 32 d2 05 2d bd 83 e3 cf 1f 50 1d d1 bb 71 | ba 8c a1 f8 c5 b9 98 7e 0d 32 27 02 c4 29 45 82 | c8 bb e6 54 71 45 a0 b7 5e 9a cb e5 c0 b4 dc cc | 43 c7 98 7b 82 e6 2f 95 2e 41 f4 47 8b 5a a0 5e | c8 3d 78 2b f3 56 49 c7 43 1b d2 90 cb 9e a4 66 | 1e 50 3a 47 84 a2 3c 30 d6 8d 29 e5 16 9e b6 b9 | f0 d7 d9 dd 33 8e 6b ee 29 f9 a6 6a b5 b5 d9 e2 | 20 14 cd fd 7d 04 c8 a6 5e 74 0a d9 7a b5 7c 87 | 34 47 c7 4c 91 ae b0 0e 29 00 00 24 b4 dd a5 25 | 58 e6 90 86 5d 8c 77 02 f7 31 6f 52 91 9d 57 20 | 44 3b e9 bf dd eb bb 12 28 f8 6e f6 29 00 00 08 | 00 00 40 2e 29 00 00 1c 00 00 40 04 24 6d 1b 9c | 4f 85 ac c1 91 ac 22 08 30 0a 21 cd 62 3d 77 b1 | 00 00 00 1c 00 00 40 05 e7 a0 de 93 99 37 48 7a | 44 b9 f4 98 79 da 4a a1 d1 b1 9b 27 | libevent_free: release ptr-libevent@0x56012a94be68 | free_event_entry: release EVENT_RETRANSMIT-pe@0x56012a8e2138 | #7 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) shutting down | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825) destroying root certificate cache | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' | unreference key: 0x56012a956258 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | unreference key: 0x56012a956038 user-east@testing.libreswan.org cnt 1-- | unreference key: 0x56012a9548c8 @east.testing.libreswan.org cnt 1-- | unreference key: 0x56012a9555d8 east@testing.libreswan.org cnt 1-- | unreference key: 0x56012a958d38 192.1.2.23 cnt 1-- | unreference key: 0x56012a94fae8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- | unreference key: 0x56012a94c618 user-road@testing.libreswan.org cnt 1-- | unreference key: 0x56012a958928 @road.testing.libreswan.org cnt 1-- | start processing: connection "road-east-ipv4-psk-ikev2/2x0" (in delete_connection() at connections.c:189) | removing pending policy for no connection {0x56012a93b998} | Deleting states for connection - including all other IPsec SA's of this IKE SA | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #7 | suspend processing: connection "road-east-ipv4-psk-ikev2/2x0" (in foreach_state_by_connection_func_delete() at state.c:1310) | start processing: state #7 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) | pstats #7 ikev2.ike deleted other | #7 spent 2.01 milliseconds in total | [RE]START processing: state #7 connection "road-east-ipv4-psk-ikev2/2x0" from 192.1.2.23 (in delete_state() at state.c:879) "road-east-ipv4-psk-ikev2/2x0" #7: deleting state (STATE_PARENT_I1) aged 0.717s and NOT sending notification | parent state #7: PARENT_I1(half-open IKE SA) => delete | state #7 requesting EVENT_RETRANSMIT to be deleted | #7 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7f6044002888 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f6044002b78 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #7 "road-east-ipv4-psk-ikev2/2x0" #7: deleting IKE SA for connection 'road-east-ipv4-psk-ikev2/2x0' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-east-ipv4-psk-ikev2/2x0' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | stop processing: connection "road-east-ipv4-psk-ikev2/2x0" (BACKGROUND) (in update_state_connection() at connections.c:4076) | start processing: connection NULL (in update_state_connection() at connections.c:4077) | in connection_discard for connection road-east-ipv4-psk-ikev2/2x0 | State DB: deleting IKEv2 state #7 in PARENT_I1 | parent state #7: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #7 from 192.1.2.23 (in delete_state() at state.c:1143) | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | shunt_eroute() called for connection 'road-east-ipv4-psk-ikev2/2x0' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "road-east-ipv4-psk-ikev2/2x0" is 0xfe7e7 | priority calculation of connection "road-east-ipv4-psk-ikev2/2x0" is 0xfe7e7 | FOR_EACH_CONNECTION_... in route_owner | conn road-east-ipv4-psk-ikev2/2x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv4-psk-ikev2/2x0 mark 0/00000000, 0/00000000 | conn road-east-ipv4-psk-ikev2/2x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv6-psk-ikev2 mark 0/00000000, 0/00000000 | conn road-east-ipv4-psk-ikev2/2x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv4-psk-ikev2/1x0 mark 0/00000000, 0/00000000 | route owner of "road-east-ipv4-psk-ikev2/2x0" unrouted: "road-east-ipv4-psk-ikev2/1x0" prospective erouted | flush revival: connection 'road-east-ipv4-psk-ikev2/2x0' revival flushed | processing: STOP connection NULL (in discard_connection() at connections.c:249) | start processing: connection "road-east-ipv6-psk-ikev2" (in delete_connection() at connections.c:189) | Deleting states for connection - including all other IPsec SA's of this IKE SA | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | flush revival: connection 'road-east-ipv6-psk-ikev2' wasn't on the list | stop processing: connection "road-east-ipv6-psk-ikev2" (in discard_connection() at connections.c:249) | start processing: connection "road-east-ipv4-psk-ikev2/1x0" (in delete_connection() at connections.c:189) | Deleting states for connection - including all other IPsec SA's of this IKE SA | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | shunt_eroute() called for connection 'road-east-ipv4-psk-ikev2/1x0' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "road-east-ipv4-psk-ikev2/1x0" is 0xfe7e7 | priority calculation of connection "road-east-ipv4-psk-ikev2/1x0" is 0xfe7e7 | FOR_EACH_CONNECTION_... in route_owner | conn road-east-ipv4-psk-ikev2/1x0 mark 0/00000000, 0/00000000 vs | conn road-east-ipv4-psk-ikev2/1x0 mark 0/00000000, 0/00000000 | route owner of "road-east-ipv4-psk-ikev2/1x0" unrouted: NULL | running updown command "ipsec _updown" for verb unroute | command executing unroute-client | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='road-east-ipv4-psk-ikev2/1x0' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' P | popen cmd is 1281 chars long | cmd( 0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='road-east-ipv4: | cmd( 80):-psk-ikev2/1x0' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192: | cmd( 160):.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Departm: | cmd( 240):ent, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_: | cmd( 320):CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.: | cmd( 400):255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_: | cmd( 480):SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toront: | cmd( 560):o, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@t: | cmd( 640):esting.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='19: | cmd( 720):2.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_P: | cmd( 800):ROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_P: | cmd( 880):OLICY='RSASIG+ENCRYPT+TUNNEL+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' P: | cmd( 960):LUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_: | cmd(1040):IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BA: | cmd(1120):NNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IF: | cmd(1200):ACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&: | cmd(1280):1: "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. "road-east-ipv4-psk-ikev2/1x0": unroute-client output: Error: Peer netns reference is invalid. | free hp@0x56012a954168 | flush revival: connection 'road-east-ipv4-psk-ikev2/1x0' wasn't on the list | stop processing: connection "road-east-ipv4-psk-ikev2/1x0" (in discard_connection() at connections.c:249) | crl fetch request list locked by 'free_crl_fetch' | crl fetch request list unlocked by 'free_crl_fetch' shutting down interface lo/lo [::1]:500 shutting down interface lo/lo 127.0.0.1:4500 shutting down interface lo/lo 127.0.0.1:500 shutting down interface eth0/eth0 192.1.3.209:4500 shutting down interface eth0/eth0 192.1.3.209:500 shutting down interface eth0:1/eth0:1 192.0.1.254:4500 shutting down interface eth0:1/eth0:1 192.0.1.254:500 shutting down interface eth0:11/eth0:11 192.0.11.254:4500 shutting down interface eth0:11/eth0:11 192.0.11.254:500 | FOR_EACH_STATE_... in delete_states_dead_interfaces | libevent_free: release ptr-libevent@0x56012a93c618 | free_event_entry: release EVENT_NULL-pe@0x56012a948538 | libevent_free: release ptr-libevent@0x56012a8e2ed8 | free_event_entry: release EVENT_NULL-pe@0x56012a9485e8 | libevent_free: release ptr-libevent@0x56012a8e2668 | free_event_entry: release EVENT_NULL-pe@0x56012a948698 | libevent_free: release ptr-libevent@0x56012a8e9fa8 | free_event_entry: release EVENT_NULL-pe@0x56012a948748 | libevent_free: release ptr-libevent@0x56012a8ea0a8 | free_event_entry: release EVENT_NULL-pe@0x56012a9487f8 | libevent_free: release ptr-libevent@0x56012a8ea1a8 | free_event_entry: release EVENT_NULL-pe@0x56012a948e18 | libevent_free: release ptr-libevent@0x56012a948ef8 | free_event_entry: release EVENT_NULL-pe@0x56012a948e88 | libevent_free: release ptr-libevent@0x56012a949058 | free_event_entry: release EVENT_NULL-pe@0x56012a948fe8 | libevent_free: release ptr-libevent@0x56012a9491b8 | free_event_entry: release EVENT_NULL-pe@0x56012a949148 | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | libevent_free: release ptr-libevent@0x56012a93c6c8 | free_event_entry: release EVENT_NULL-pe@0x56012a9307e8 | libevent_free: release ptr-libevent@0x56012a8e2e28 | free_event_entry: release EVENT_NULL-pe@0x56012a930348 | libevent_free: release ptr-libevent@0x56012a929438 | free_event_entry: release EVENT_NULL-pe@0x56012a8ea308 | global timer EVENT_REINIT_SECRET uninitialized | global timer EVENT_SHUNT_SCAN uninitialized | global timer EVENT_PENDING_DDNS uninitialized | global timer EVENT_PENDING_PHASE2 uninitialized | global timer EVENT_CHECK_CRLS uninitialized | global timer EVENT_REVIVE_CONNS uninitialized | global timer EVENT_FREE_ROOT_CERTS uninitialized | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized | global timer EVENT_NAT_T_KEEPALIVE uninitialized | libevent_free: release ptr-libevent@0x56012a8ee8c8 | signal event handler PLUTO_SIGCHLD uninstalled | libevent_free: release ptr-libevent@0x56012a864a68 | signal event handler PLUTO_SIGTERM uninstalled | libevent_free: release ptr-libevent@0x56012a85c598 | signal event handler PLUTO_SIGHUP uninstalled | libevent_free: release ptr-libevent@0x56012a85c668 | signal event handler PLUTO_SIGSYS uninstalled | releasing event base | libevent_free: release ptr-libevent@0x56012a947d28 | libevent_free: release ptr-libevent@0x56012a92ac08 | libevent_free: release ptr-libevent@0x56012a92abb8 | libevent_free: release ptr-libevent@0x56012a94b548 | libevent_free: release ptr-libevent@0x56012a92ab78 | libevent_free: release ptr-libevent@0x56012a9479b8 | libevent_free: release ptr-libevent@0x56012a947c28 | libevent_free: release ptr-libevent@0x56012a92adb8 | libevent_free: release ptr-libevent@0x56012a9303b8 | libevent_free: release ptr-libevent@0x56012a930018 | libevent_free: release ptr-libevent@0x56012a949268 | libevent_free: release ptr-libevent@0x56012a949108 | libevent_free: release ptr-libevent@0x56012a948fa8 | libevent_free: release ptr-libevent@0x56012a9488a8 | libevent_free: release ptr-libevent@0x56012a948868 | libevent_free: release ptr-libevent@0x56012a9487b8 | libevent_free: release ptr-libevent@0x56012a948708 | libevent_free: release ptr-libevent@0x56012a948658 | libevent_free: release ptr-libevent@0x56012a9485a8 | libevent_free: release ptr-libevent@0x56012a863028 | libevent_free: release ptr-libevent@0x56012a947ca8 | libevent_free: release ptr-libevent@0x56012a947c68 | libevent_free: release ptr-libevent@0x56012a947b28 | libevent_free: release ptr-libevent@0x56012a947ce8 | libevent_free: release ptr-libevent@0x56012a9479f8 | libevent_free: release ptr-libevent@0x56012a8f0458 | libevent_free: release ptr-libevent@0x56012a8f03d8 | libevent_free: release ptr-libevent@0x56012a863398 | releasing global libevent data | libevent_free: release ptr-libevent@0x56012a8f05d8 | libevent_free: release ptr-libevent@0x56012a8f0558 | libevent_free: release ptr-libevent@0x56012a8f04d8 leak detective found no leaks