Aug 26 18:24:26.010045: FIPS Product: YES Aug 26 18:24:26.010148: FIPS Kernel: NO Aug 26 18:24:26.010151: FIPS Mode: NO Aug 26 18:24:26.010154: NSS DB directory: sql:/etc/ipsec.d Aug 26 18:24:26.010308: Initializing NSS Aug 26 18:24:26.010318: Opening NSS database "sql:/etc/ipsec.d" read-only Aug 26 18:24:26.062340: NSS initialized Aug 26 18:24:26.062351: NSS crypto library initialized Aug 26 18:24:26.062353: FIPS HMAC integrity support [enabled] Aug 26 18:24:26.062355: FIPS mode disabled for pluto daemon Aug 26 18:24:26.118444: FIPS HMAC integrity verification self-test FAILED Aug 26 18:24:26.118903: libcap-ng support [enabled] Aug 26 18:24:26.118910: Linux audit support [enabled] Aug 26 18:24:26.119254: Linux audit activated Aug 26 18:24:26.119266: Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:20419 Aug 26 18:24:26.119268: core dump dir: /tmp Aug 26 18:24:26.119271: secrets file: /etc/ipsec.secrets Aug 26 18:24:26.119273: leak-detective enabled Aug 26 18:24:26.119275: NSS crypto [enabled] Aug 26 18:24:26.119277: XAUTH PAM support [enabled] Aug 26 18:24:26.119357: | libevent is using pluto's memory allocator Aug 26 18:24:26.119368: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Aug 26 18:24:26.119385: | libevent_malloc: new ptr-libevent@0x55bb360ad9f8 size 40 Aug 26 18:24:26.119390: | libevent_malloc: new ptr-libevent@0x55bb360ad978 size 40 Aug 26 18:24:26.119394: | libevent_malloc: new ptr-libevent@0x55bb360ad8f8 size 40 Aug 26 18:24:26.119396: | creating event base Aug 26 18:24:26.119400: | libevent_malloc: new ptr-libevent@0x55bb3609f528 size 56 Aug 26 18:24:26.119405: | libevent_malloc: new ptr-libevent@0x55bb36020d18 size 664 Aug 26 18:24:26.119417: | libevent_malloc: new ptr-libevent@0x55bb360e8018 size 24 Aug 26 18:24:26.119420: | libevent_malloc: new ptr-libevent@0x55bb360e8068 size 384 Aug 26 18:24:26.119430: | libevent_malloc: new ptr-libevent@0x55bb360e7fd8 size 16 Aug 26 18:24:26.119433: | libevent_malloc: new ptr-libevent@0x55bb360ad878 size 40 Aug 26 18:24:26.119436: | libevent_malloc: new ptr-libevent@0x55bb360ad7f8 size 48 Aug 26 18:24:26.119441: | libevent_realloc: new ptr-libevent@0x55bb360209a8 size 256 Aug 26 18:24:26.119444: | libevent_malloc: new ptr-libevent@0x55bb360e8218 size 16 Aug 26 18:24:26.119449: | libevent_free: release ptr-libevent@0x55bb3609f528 Aug 26 18:24:26.119453: | libevent initialized Aug 26 18:24:26.119457: | libevent_realloc: new ptr-libevent@0x55bb3609f528 size 64 Aug 26 18:24:26.119463: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Aug 26 18:24:26.119480: | init_nat_traversal() initialized with keep_alive=0s Aug 26 18:24:26.119482: NAT-Traversal support [enabled] Aug 26 18:24:26.119485: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Aug 26 18:24:26.119491: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Aug 26 18:24:26.119495: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Aug 26 18:24:26.119523: | global one-shot timer EVENT_REVIVE_CONNS initialized Aug 26 18:24:26.119527: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Aug 26 18:24:26.119530: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Aug 26 18:24:26.119576: Encryption algorithms: Aug 26 18:24:26.119584: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Aug 26 18:24:26.119588: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Aug 26 18:24:26.119592: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Aug 26 18:24:26.119595: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Aug 26 18:24:26.119599: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Aug 26 18:24:26.119609: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Aug 26 18:24:26.119613: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Aug 26 18:24:26.119617: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Aug 26 18:24:26.119620: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Aug 26 18:24:26.119624: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Aug 26 18:24:26.119628: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Aug 26 18:24:26.119632: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Aug 26 18:24:26.119635: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Aug 26 18:24:26.119639: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Aug 26 18:24:26.119643: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Aug 26 18:24:26.119646: NULL IKEv1: ESP IKEv2: ESP [] Aug 26 18:24:26.119649: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Aug 26 18:24:26.119656: Hash algorithms: Aug 26 18:24:26.119659: MD5 IKEv1: IKE IKEv2: Aug 26 18:24:26.119662: SHA1 IKEv1: IKE IKEv2: FIPS sha Aug 26 18:24:26.119665: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Aug 26 18:24:26.119668: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Aug 26 18:24:26.119672: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Aug 26 18:24:26.119685: PRF algorithms: Aug 26 18:24:26.119688: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Aug 26 18:24:26.119691: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Aug 26 18:24:26.119695: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Aug 26 18:24:26.119699: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Aug 26 18:24:26.119702: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Aug 26 18:24:26.119706: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Aug 26 18:24:26.119731: Integrity algorithms: Aug 26 18:24:26.119735: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Aug 26 18:24:26.119739: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Aug 26 18:24:26.119743: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Aug 26 18:24:26.119747: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Aug 26 18:24:26.119751: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Aug 26 18:24:26.119754: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Aug 26 18:24:26.119758: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Aug 26 18:24:26.119761: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Aug 26 18:24:26.119764: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Aug 26 18:24:26.119776: DH algorithms: Aug 26 18:24:26.119779: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Aug 26 18:24:26.119782: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Aug 26 18:24:26.119785: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Aug 26 18:24:26.119791: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Aug 26 18:24:26.119794: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Aug 26 18:24:26.119797: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Aug 26 18:24:26.119800: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Aug 26 18:24:26.119803: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Aug 26 18:24:26.119807: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Aug 26 18:24:26.119810: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Aug 26 18:24:26.119813: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Aug 26 18:24:26.119816: testing CAMELLIA_CBC: Aug 26 18:24:26.119819: Camellia: 16 bytes with 128-bit key Aug 26 18:24:26.119936: Camellia: 16 bytes with 128-bit key Aug 26 18:24:26.119966: Camellia: 16 bytes with 256-bit key Aug 26 18:24:26.119995: Camellia: 16 bytes with 256-bit key Aug 26 18:24:26.120022: testing AES_GCM_16: Aug 26 18:24:26.120025: empty string Aug 26 18:24:26.120051: one block Aug 26 18:24:26.120075: two blocks Aug 26 18:24:26.120099: two blocks with associated data Aug 26 18:24:26.120125: testing AES_CTR: Aug 26 18:24:26.120128: Encrypting 16 octets using AES-CTR with 128-bit key Aug 26 18:24:26.120153: Encrypting 32 octets using AES-CTR with 128-bit key Aug 26 18:24:26.120179: Encrypting 36 octets using AES-CTR with 128-bit key Aug 26 18:24:26.120209: Encrypting 16 octets using AES-CTR with 192-bit key Aug 26 18:24:26.120234: Encrypting 32 octets using AES-CTR with 192-bit key Aug 26 18:24:26.120261: Encrypting 36 octets using AES-CTR with 192-bit key Aug 26 18:24:26.120293: Encrypting 16 octets using AES-CTR with 256-bit key Aug 26 18:24:26.120322: Encrypting 32 octets using AES-CTR with 256-bit key Aug 26 18:24:26.120348: Encrypting 36 octets using AES-CTR with 256-bit key Aug 26 18:24:26.120375: testing AES_CBC: Aug 26 18:24:26.120378: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Aug 26 18:24:26.120403: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Aug 26 18:24:26.120432: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Aug 26 18:24:26.120460: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Aug 26 18:24:26.120492: testing AES_XCBC: Aug 26 18:24:26.120495: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Aug 26 18:24:26.120606: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Aug 26 18:24:26.120727: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Aug 26 18:24:26.120848: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Aug 26 18:24:26.120967: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Aug 26 18:24:26.121084: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Aug 26 18:24:26.121206: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Aug 26 18:24:26.121489: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Aug 26 18:24:26.121615: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Aug 26 18:24:26.121745: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Aug 26 18:24:26.121968: testing HMAC_MD5: Aug 26 18:24:26.121972: RFC 2104: MD5_HMAC test 1 Aug 26 18:24:26.122137: RFC 2104: MD5_HMAC test 2 Aug 26 18:24:26.122283: RFC 2104: MD5_HMAC test 3 Aug 26 18:24:26.122517: 8 CPU cores online Aug 26 18:24:26.122524: starting up 7 crypto helpers Aug 26 18:24:26.122562: started thread for crypto helper 0 Aug 26 18:24:26.122569: | starting up helper thread 0 Aug 26 18:24:26.122582: | status value returned by setting the priority of this thread (crypto helper 0) 22 Aug 26 18:24:26.122583: started thread for crypto helper 1 Aug 26 18:24:26.122586: | crypto helper 0 waiting (nothing to do) Aug 26 18:24:26.122589: | starting up helper thread 1 Aug 26 18:24:26.122607: started thread for crypto helper 2 Aug 26 18:24:26.122609: | status value returned by setting the priority of this thread (crypto helper 1) 22 Aug 26 18:24:26.122614: | crypto helper 1 waiting (nothing to do) Aug 26 18:24:26.122626: started thread for crypto helper 3 Aug 26 18:24:26.122645: started thread for crypto helper 4 Aug 26 18:24:26.122649: | starting up helper thread 4 Aug 26 18:24:26.122658: | status value returned by setting the priority of this thread (crypto helper 4) 22 Aug 26 18:24:26.122661: | crypto helper 4 waiting (nothing to do) Aug 26 18:24:26.122662: started thread for crypto helper 5 Aug 26 18:24:26.122667: | starting up helper thread 5 Aug 26 18:24:26.122694: | starting up helper thread 6 Aug 26 18:24:26.122714: | status value returned by setting the priority of this thread (crypto helper 6) 22 Aug 26 18:24:26.122718: | crypto helper 6 waiting (nothing to do) Aug 26 18:24:26.122691: started thread for crypto helper 6 Aug 26 18:24:26.122966: | checking IKEv1 state table Aug 26 18:24:26.122975: | MAIN_R0: category: half-open IKE SA flags: 0: Aug 26 18:24:26.122978: | -> MAIN_R1 EVENT_SO_DISCARD Aug 26 18:24:26.122981: | MAIN_I1: category: half-open IKE SA flags: 0: Aug 26 18:24:26.122983: | -> MAIN_I2 EVENT_RETRANSMIT Aug 26 18:24:26.122986: | MAIN_R1: category: open IKE SA flags: 200: Aug 26 18:24:26.122989: | -> MAIN_R2 EVENT_RETRANSMIT Aug 26 18:24:26.122991: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:24:26.122994: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:24:26.122996: | MAIN_I2: category: open IKE SA flags: 0: Aug 26 18:24:26.122999: | -> MAIN_I3 EVENT_RETRANSMIT Aug 26 18:24:26.123001: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:24:26.123004: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:24:26.123006: | MAIN_R2: category: open IKE SA flags: 0: Aug 26 18:24:26.123009: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:24:26.123011: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:24:26.123014: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 18:24:26.123016: | MAIN_I3: category: open IKE SA flags: 0: Aug 26 18:24:26.123019: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:24:26.123021: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:24:26.123024: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 18:24:26.123026: | MAIN_R3: category: established IKE SA flags: 200: Aug 26 18:24:26.123029: | -> UNDEFINED EVENT_NULL Aug 26 18:24:26.123032: | MAIN_I4: category: established IKE SA flags: 0: Aug 26 18:24:26.123034: | -> UNDEFINED EVENT_NULL Aug 26 18:24:26.123037: | AGGR_R0: category: half-open IKE SA flags: 0: Aug 26 18:24:26.123039: | -> AGGR_R1 EVENT_SO_DISCARD Aug 26 18:24:26.123042: | AGGR_I1: category: half-open IKE SA flags: 0: Aug 26 18:24:26.123044: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 18:24:26.123047: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 18:24:26.123049: | AGGR_R1: category: open IKE SA flags: 200: Aug 26 18:24:26.123052: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 18:24:26.123054: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 18:24:26.123057: | AGGR_I2: category: established IKE SA flags: 200: Aug 26 18:24:26.123059: | -> UNDEFINED EVENT_NULL Aug 26 18:24:26.123062: | AGGR_R2: category: established IKE SA flags: 0: Aug 26 18:24:26.123065: | -> UNDEFINED EVENT_NULL Aug 26 18:24:26.123067: | QUICK_R0: category: established CHILD SA flags: 0: Aug 26 18:24:26.123070: | -> QUICK_R1 EVENT_RETRANSMIT Aug 26 18:24:26.123073: | QUICK_I1: category: established CHILD SA flags: 0: Aug 26 18:24:26.123075: | -> QUICK_I2 EVENT_SA_REPLACE Aug 26 18:24:26.123078: | QUICK_R1: category: established CHILD SA flags: 0: Aug 26 18:24:26.123080: | -> QUICK_R2 EVENT_SA_REPLACE Aug 26 18:24:26.123083: | QUICK_I2: category: established CHILD SA flags: 200: Aug 26 18:24:26.123085: | -> UNDEFINED EVENT_NULL Aug 26 18:24:26.123088: | QUICK_R2: category: established CHILD SA flags: 0: Aug 26 18:24:26.123091: | -> UNDEFINED EVENT_NULL Aug 26 18:24:26.123093: | INFO: category: informational flags: 0: Aug 26 18:24:26.123099: | -> UNDEFINED EVENT_NULL Aug 26 18:24:26.123102: | INFO_PROTECTED: category: informational flags: 0: Aug 26 18:24:26.123104: | -> UNDEFINED EVENT_NULL Aug 26 18:24:26.122708: | status value returned by setting the priority of this thread (crypto helper 5) 22 Aug 26 18:24:26.123112: | crypto helper 5 waiting (nothing to do) Aug 26 18:24:26.123107: | XAUTH_R0: category: established IKE SA flags: 0: Aug 26 18:24:26.123121: | -> XAUTH_R1 EVENT_NULL Aug 26 18:24:26.123125: | XAUTH_R1: category: established IKE SA flags: 0: Aug 26 18:24:26.123128: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:24:26.123131: | MODE_CFG_R0: category: informational flags: 0: Aug 26 18:24:26.123133: | -> MODE_CFG_R1 EVENT_SA_REPLACE Aug 26 18:24:26.123136: | MODE_CFG_R1: category: established IKE SA flags: 0: Aug 26 18:24:26.123139: | -> MODE_CFG_R2 EVENT_SA_REPLACE Aug 26 18:24:26.123142: | MODE_CFG_R2: category: established IKE SA flags: 0: Aug 26 18:24:26.123144: | -> UNDEFINED EVENT_NULL Aug 26 18:24:26.123147: | MODE_CFG_I1: category: established IKE SA flags: 0: Aug 26 18:24:26.123150: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:24:26.123153: | XAUTH_I0: category: established IKE SA flags: 0: Aug 26 18:24:26.123155: | -> XAUTH_I1 EVENT_RETRANSMIT Aug 26 18:24:26.123158: | XAUTH_I1: category: established IKE SA flags: 0: Aug 26 18:24:26.123161: | -> MAIN_I4 EVENT_RETRANSMIT Aug 26 18:24:26.123166: | checking IKEv2 state table Aug 26 18:24:26.123173: | PARENT_I0: category: ignore flags: 0: Aug 26 18:24:26.123176: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Aug 26 18:24:26.123179: | PARENT_I1: category: half-open IKE SA flags: 0: Aug 26 18:24:26.123183: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Aug 26 18:24:26.123186: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Aug 26 18:24:26.123189: | PARENT_I2: category: open IKE SA flags: 0: Aug 26 18:24:26.123192: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Aug 26 18:24:26.123195: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Aug 26 18:24:26.123197: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Aug 26 18:24:26.123200: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Aug 26 18:24:26.123203: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Aug 26 18:24:26.123206: | PARENT_I3: category: established IKE SA flags: 0: Aug 26 18:24:26.123209: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Aug 26 18:24:26.123212: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Aug 26 18:24:26.123214: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Aug 26 18:24:26.123217: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Aug 26 18:24:26.123220: | PARENT_R0: category: half-open IKE SA flags: 0: Aug 26 18:24:26.123223: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Aug 26 18:24:26.123226: | PARENT_R1: category: half-open IKE SA flags: 0: Aug 26 18:24:26.123228: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Aug 26 18:24:26.123231: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Aug 26 18:24:26.123234: | PARENT_R2: category: established IKE SA flags: 0: Aug 26 18:24:26.123237: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Aug 26 18:24:26.123240: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Aug 26 18:24:26.123242: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Aug 26 18:24:26.123245: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Aug 26 18:24:26.123248: | V2_CREATE_I0: category: established IKE SA flags: 0: Aug 26 18:24:26.123251: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Aug 26 18:24:26.123257: | V2_CREATE_I: category: established IKE SA flags: 0: Aug 26 18:24:26.123261: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Aug 26 18:24:26.123264: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Aug 26 18:24:26.123267: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Aug 26 18:24:26.123270: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Aug 26 18:24:26.123272: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Aug 26 18:24:26.123275: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Aug 26 18:24:26.123278: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Aug 26 18:24:26.123281: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Aug 26 18:24:26.123284: | V2_CREATE_R: category: established IKE SA flags: 0: Aug 26 18:24:26.123287: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Aug 26 18:24:26.123299: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Aug 26 18:24:26.123302: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Aug 26 18:24:26.123305: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Aug 26 18:24:26.123308: | V2_IPSEC_I: category: established CHILD SA flags: 0: Aug 26 18:24:26.123311: | V2_IPSEC_R: category: established CHILD SA flags: 0: Aug 26 18:24:26.123314: | IKESA_DEL: category: established IKE SA flags: 0: Aug 26 18:24:26.123317: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Aug 26 18:24:26.123320: | CHILDSA_DEL: category: informational flags: 0: Aug 26 18:24:26.123335: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 Aug 26 18:24:26.123403: | Hard-wiring algorithms Aug 26 18:24:26.123407: | adding AES_CCM_16 to kernel algorithm db Aug 26 18:24:26.123411: | adding AES_CCM_12 to kernel algorithm db Aug 26 18:24:26.123414: | adding AES_CCM_8 to kernel algorithm db Aug 26 18:24:26.123416: | adding 3DES_CBC to kernel algorithm db Aug 26 18:24:26.123419: | adding CAMELLIA_CBC to kernel algorithm db Aug 26 18:24:26.123422: | adding AES_GCM_16 to kernel algorithm db Aug 26 18:24:26.123424: | adding AES_GCM_12 to kernel algorithm db Aug 26 18:24:26.123427: | adding AES_GCM_8 to kernel algorithm db Aug 26 18:24:26.123429: | adding AES_CTR to kernel algorithm db Aug 26 18:24:26.123432: | adding AES_CBC to kernel algorithm db Aug 26 18:24:26.123435: | adding SERPENT_CBC to kernel algorithm db Aug 26 18:24:26.123437: | adding TWOFISH_CBC to kernel algorithm db Aug 26 18:24:26.123440: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Aug 26 18:24:26.123442: | adding NULL to kernel algorithm db Aug 26 18:24:26.123445: | adding CHACHA20_POLY1305 to kernel algorithm db Aug 26 18:24:26.123448: | adding HMAC_MD5_96 to kernel algorithm db Aug 26 18:24:26.123450: | adding HMAC_SHA1_96 to kernel algorithm db Aug 26 18:24:26.123453: | adding HMAC_SHA2_512_256 to kernel algorithm db Aug 26 18:24:26.123455: | adding HMAC_SHA2_384_192 to kernel algorithm db Aug 26 18:24:26.123458: | adding HMAC_SHA2_256_128 to kernel algorithm db Aug 26 18:24:26.123460: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Aug 26 18:24:26.123463: | adding AES_XCBC_96 to kernel algorithm db Aug 26 18:24:26.123465: | adding AES_CMAC_96 to kernel algorithm db Aug 26 18:24:26.123468: | adding NONE to kernel algorithm db Aug 26 18:24:26.123488: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Aug 26 18:24:26.123496: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Aug 26 18:24:26.123498: | setup kernel fd callback Aug 26 18:24:26.123502: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x55bb360a7718 Aug 26 18:24:26.123506: | libevent_malloc: new ptr-libevent@0x55bb360e6788 size 128 Aug 26 18:24:26.123509: | libevent_malloc: new ptr-libevent@0x55bb360ed818 size 16 Aug 26 18:24:26.123519: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x55bb360ed7a8 Aug 26 18:24:26.123524: | libevent_malloc: new ptr-libevent@0x55bb360a01d8 size 128 Aug 26 18:24:26.123527: | libevent_malloc: new ptr-libevent@0x55bb360ed478 size 16 Aug 26 18:24:26.123769: | global one-shot timer EVENT_CHECK_CRLS initialized Aug 26 18:24:26.123777: selinux support is enabled. Aug 26 18:24:26.124088: | unbound context created - setting debug level to 5 Aug 26 18:24:26.124115: | /etc/hosts lookups activated Aug 26 18:24:26.124131: | /etc/resolv.conf usage activated Aug 26 18:24:26.124194: | outgoing-port-avoid set 0-65535 Aug 26 18:24:26.124224: | outgoing-port-permit set 32768-60999 Aug 26 18:24:26.124228: | Loading dnssec root key from:/var/lib/unbound/root.key Aug 26 18:24:26.124231: | No additional dnssec trust anchors defined via dnssec-trusted= option Aug 26 18:24:26.124234: | Setting up events, loop start Aug 26 18:24:26.123105: | starting up helper thread 2 Aug 26 18:24:26.124237: | starting up helper thread 3 Aug 26 18:24:26.124250: | status value returned by setting the priority of this thread (crypto helper 2) 22 Aug 26 18:24:26.124238: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x55bb360edc48 Aug 26 18:24:26.124263: | libevent_malloc: new ptr-libevent@0x55bb360f9aa8 size 128 Aug 26 18:24:26.124267: | libevent_malloc: new ptr-libevent@0x55bb36104d98 size 16 Aug 26 18:24:26.124273: | libevent_realloc: new ptr-libevent@0x55bb36104dd8 size 256 Aug 26 18:24:26.124277: | libevent_malloc: new ptr-libevent@0x55bb36104f08 size 8 Aug 26 18:24:26.124280: | libevent_realloc: new ptr-libevent@0x55bb36104f48 size 144 Aug 26 18:24:26.124283: | libevent_malloc: new ptr-libevent@0x55bb360abce8 size 152 Aug 26 18:24:26.124287: | libevent_malloc: new ptr-libevent@0x55bb36105008 size 16 Aug 26 18:24:26.125890: | signal event handler PLUTO_SIGCHLD installed Aug 26 18:24:26.125898: | libevent_malloc: new ptr-libevent@0x55bb36105048 size 8 Aug 26 18:24:26.125904: | libevent_malloc: new ptr-libevent@0x55bb360211c8 size 152 Aug 26 18:24:26.125908: | signal event handler PLUTO_SIGTERM installed Aug 26 18:24:26.125911: | libevent_malloc: new ptr-libevent@0x55bb36105088 size 8 Aug 26 18:24:26.125914: | libevent_malloc: new ptr-libevent@0x55bb3602c6f8 size 152 Aug 26 18:24:26.125917: | signal event handler PLUTO_SIGHUP installed Aug 26 18:24:26.125920: | libevent_malloc: new ptr-libevent@0x55bb361050c8 size 8 Aug 26 18:24:26.125923: | libevent_realloc: release ptr-libevent@0x55bb36104f48 Aug 26 18:24:26.125926: | libevent_realloc: new ptr-libevent@0x55bb36105108 size 256 Aug 26 18:24:26.125929: | libevent_malloc: new ptr-libevent@0x55bb36024378 size 152 Aug 26 18:24:26.125933: | signal event handler PLUTO_SIGSYS installed Aug 26 18:24:26.126264: | created addconn helper (pid:20678) using fork+execve Aug 26 18:24:26.126279: | forked child 20678 Aug 26 18:24:26.126336: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:24:26.126355: listening for IKE messages Aug 26 18:24:26.126395: | Inspecting interface lo Aug 26 18:24:26.126402: | found lo with address 127.0.0.1 Aug 26 18:24:26.126415: | Inspecting interface eth0 Aug 26 18:24:26.126420: | found eth0 with address 192.0.3.254 Aug 26 18:24:26.126424: | Inspecting interface eth1 Aug 26 18:24:26.126429: | found eth1 with address 192.1.3.33 Aug 26 18:24:26.126521: Kernel supports NIC esp-hw-offload Aug 26 18:24:26.126533: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.3.33:500 Aug 26 18:24:26.126555: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 18:24:26.126560: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 18:24:26.126564: adding interface eth1/eth1 192.1.3.33:4500 Aug 26 18:24:26.126587: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.3.254:500 Aug 26 18:24:26.126605: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 18:24:26.126610: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 18:24:26.126619: adding interface eth0/eth0 192.0.3.254:4500 Aug 26 18:24:26.126642: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Aug 26 18:24:26.126661: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 18:24:26.126665: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 18:24:26.126669: adding interface lo/lo 127.0.0.1:4500 Aug 26 18:24:26.126727: | no interfaces to sort Aug 26 18:24:26.126732: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 18:24:26.126741: | add_fd_read_event_handler: new ethX-pe@0x55bb361056c8 Aug 26 18:24:26.126744: | libevent_malloc: new ptr-libevent@0x55bb360f99f8 size 128 Aug 26 18:24:26.126748: | libevent_malloc: new ptr-libevent@0x55bb36105738 size 16 Aug 26 18:24:26.126754: | setup callback for interface lo 127.0.0.1:4500 fd 22 Aug 26 18:24:26.126757: | add_fd_read_event_handler: new ethX-pe@0x55bb36105778 Aug 26 18:24:26.126763: | libevent_malloc: new ptr-libevent@0x55bb360a0288 size 128 Aug 26 18:24:26.126766: | libevent_malloc: new ptr-libevent@0x55bb361057e8 size 16 Aug 26 18:24:26.126771: | setup callback for interface lo 127.0.0.1:500 fd 21 Aug 26 18:24:26.126774: | add_fd_read_event_handler: new ethX-pe@0x55bb36105828 Aug 26 18:24:26.126779: | libevent_malloc: new ptr-libevent@0x55bb3609fba8 size 128 Aug 26 18:24:26.126782: | libevent_malloc: new ptr-libevent@0x55bb36105898 size 16 Aug 26 18:24:26.126787: | setup callback for interface eth0 192.0.3.254:4500 fd 20 Aug 26 18:24:26.126790: | add_fd_read_event_handler: new ethX-pe@0x55bb361058d8 Aug 26 18:24:26.126795: | libevent_malloc: new ptr-libevent@0x55bb360a7468 size 128 Aug 26 18:24:26.126799: | libevent_malloc: new ptr-libevent@0x55bb36105948 size 16 Aug 26 18:24:26.126803: | setup callback for interface eth0 192.0.3.254:500 fd 19 Aug 26 18:24:26.126806: | add_fd_read_event_handler: new ethX-pe@0x55bb36105988 Aug 26 18:24:26.126809: | libevent_malloc: new ptr-libevent@0x55bb360a7568 size 128 Aug 26 18:24:26.126812: | libevent_malloc: new ptr-libevent@0x55bb361059f8 size 16 Aug 26 18:24:26.126817: | setup callback for interface eth1 192.1.3.33:4500 fd 18 Aug 26 18:24:26.126820: | add_fd_read_event_handler: new ethX-pe@0x55bb36105a38 Aug 26 18:24:26.126823: | libevent_malloc: new ptr-libevent@0x55bb360a7668 size 128 Aug 26 18:24:26.126826: | libevent_malloc: new ptr-libevent@0x55bb36105aa8 size 16 Aug 26 18:24:26.126830: | setup callback for interface eth1 192.1.3.33:500 fd 17 Aug 26 18:24:26.126836: | certs and keys locked by 'free_preshared_secrets' Aug 26 18:24:26.126838: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 18:24:26.126859: loading secrets from "/etc/ipsec.secrets" Aug 26 18:24:26.126876: | saving Modulus Aug 26 18:24:26.126880: | saving PublicExponent Aug 26 18:24:26.126884: | ignoring PrivateExponent Aug 26 18:24:26.126888: | ignoring Prime1 Aug 26 18:24:26.126891: | ignoring Prime2 Aug 26 18:24:26.126894: | ignoring Exponent1 Aug 26 18:24:26.126898: | ignoring Exponent2 Aug 26 18:24:26.126901: | ignoring Coefficient Aug 26 18:24:26.126904: | ignoring CKAIDNSS Aug 26 18:24:26.126947: | computed rsa CKAID 90 5d fc a1 08 68 74 7c 6f 20 d3 1b 2d 20 4b 8f Aug 26 18:24:26.126951: | computed rsa CKAID 88 aa 7c 5d Aug 26 18:24:26.126955: loaded private key for keyid: PKK_RSA:AQPl33O2P Aug 26 18:24:26.126962: | certs and keys locked by 'process_secret' Aug 26 18:24:26.126967: | certs and keys unlocked by 'process_secret' Aug 26 18:24:26.126978: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:24:26.126986: | spent 0.66 milliseconds in whack Aug 26 18:24:26.126999: | crypto helper 2 waiting (nothing to do) Aug 26 18:24:26.124254: | status value returned by setting the priority of this thread (crypto helper 3) 22 Aug 26 18:24:26.127082: | crypto helper 3 waiting (nothing to do) Aug 26 18:24:26.166592: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:24:26.166619: listening for IKE messages Aug 26 18:24:26.166663: | Inspecting interface lo Aug 26 18:24:26.166671: | found lo with address 127.0.0.1 Aug 26 18:24:26.166674: | Inspecting interface eth0 Aug 26 18:24:26.166678: | found eth0 with address 192.0.3.254 Aug 26 18:24:26.166681: | Inspecting interface eth1 Aug 26 18:24:26.166685: | found eth1 with address 192.1.3.33 Aug 26 18:24:26.166750: | no interfaces to sort Aug 26 18:24:26.166759: | libevent_free: release ptr-libevent@0x55bb360f99f8 Aug 26 18:24:26.166763: | free_event_entry: release EVENT_NULL-pe@0x55bb361056c8 Aug 26 18:24:26.166766: | add_fd_read_event_handler: new ethX-pe@0x55bb361056c8 Aug 26 18:24:26.166770: | libevent_malloc: new ptr-libevent@0x55bb360f99f8 size 128 Aug 26 18:24:26.166778: | setup callback for interface lo 127.0.0.1:4500 fd 22 Aug 26 18:24:26.166783: | libevent_free: release ptr-libevent@0x55bb360a0288 Aug 26 18:24:26.166786: | free_event_entry: release EVENT_NULL-pe@0x55bb36105778 Aug 26 18:24:26.166789: | add_fd_read_event_handler: new ethX-pe@0x55bb36105778 Aug 26 18:24:26.166792: | libevent_malloc: new ptr-libevent@0x55bb360a0288 size 128 Aug 26 18:24:26.166797: | setup callback for interface lo 127.0.0.1:500 fd 21 Aug 26 18:24:26.166801: | libevent_free: release ptr-libevent@0x55bb3609fba8 Aug 26 18:24:26.166804: | free_event_entry: release EVENT_NULL-pe@0x55bb36105828 Aug 26 18:24:26.166807: | add_fd_read_event_handler: new ethX-pe@0x55bb36105828 Aug 26 18:24:26.166810: | libevent_malloc: new ptr-libevent@0x55bb3609fba8 size 128 Aug 26 18:24:26.166815: | setup callback for interface eth0 192.0.3.254:4500 fd 20 Aug 26 18:24:26.166819: | libevent_free: release ptr-libevent@0x55bb360a7468 Aug 26 18:24:26.166822: | free_event_entry: release EVENT_NULL-pe@0x55bb361058d8 Aug 26 18:24:26.166824: | add_fd_read_event_handler: new ethX-pe@0x55bb361058d8 Aug 26 18:24:26.166827: | libevent_malloc: new ptr-libevent@0x55bb360a7468 size 128 Aug 26 18:24:26.166832: | setup callback for interface eth0 192.0.3.254:500 fd 19 Aug 26 18:24:26.166835: | libevent_free: release ptr-libevent@0x55bb360a7568 Aug 26 18:24:26.166838: | free_event_entry: release EVENT_NULL-pe@0x55bb36105988 Aug 26 18:24:26.166841: | add_fd_read_event_handler: new ethX-pe@0x55bb36105988 Aug 26 18:24:26.166844: | libevent_malloc: new ptr-libevent@0x55bb360a7568 size 128 Aug 26 18:24:26.166849: | setup callback for interface eth1 192.1.3.33:4500 fd 18 Aug 26 18:24:26.166853: | libevent_free: release ptr-libevent@0x55bb360a7668 Aug 26 18:24:26.166856: | free_event_entry: release EVENT_NULL-pe@0x55bb36105a38 Aug 26 18:24:26.166859: | add_fd_read_event_handler: new ethX-pe@0x55bb36105a38 Aug 26 18:24:26.166861: | libevent_malloc: new ptr-libevent@0x55bb360a7668 size 128 Aug 26 18:24:26.166866: | setup callback for interface eth1 192.1.3.33:500 fd 17 Aug 26 18:24:26.166869: | certs and keys locked by 'free_preshared_secrets' Aug 26 18:24:26.166872: forgetting secrets Aug 26 18:24:26.166881: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 18:24:26.166896: loading secrets from "/etc/ipsec.secrets" Aug 26 18:24:26.166912: | saving Modulus Aug 26 18:24:26.166916: | saving PublicExponent Aug 26 18:24:26.166920: | ignoring PrivateExponent Aug 26 18:24:26.166924: | ignoring Prime1 Aug 26 18:24:26.166927: | ignoring Prime2 Aug 26 18:24:26.166931: | ignoring Exponent1 Aug 26 18:24:26.166934: | ignoring Exponent2 Aug 26 18:24:26.166937: | ignoring Coefficient Aug 26 18:24:26.166941: | ignoring CKAIDNSS Aug 26 18:24:26.166966: | computed rsa CKAID 90 5d fc a1 08 68 74 7c 6f 20 d3 1b 2d 20 4b 8f Aug 26 18:24:26.166969: | computed rsa CKAID 88 aa 7c 5d Aug 26 18:24:26.166973: loaded private key for keyid: PKK_RSA:AQPl33O2P Aug 26 18:24:26.166980: | certs and keys locked by 'process_secret' Aug 26 18:24:26.166983: | certs and keys unlocked by 'process_secret' Aug 26 18:24:26.166994: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:24:26.167001: | spent 0.42 milliseconds in whack Aug 26 18:24:26.168092: | processing signal PLUTO_SIGCHLD Aug 26 18:24:26.168119: | waitpid returned pid 20678 (exited with status 0) Aug 26 18:24:26.168128: | reaped addconn helper child (status 0) Aug 26 18:24:26.168135: | waitpid returned ECHILD (no child processes left) Aug 26 18:24:26.168142: | spent 0.0297 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 18:24:26.207375: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:24:26.207392: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:24:26.207395: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 18:24:26.207396: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:24:26.207398: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 18:24:26.207401: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:24:26.207407: | Added new connection northnet-eastnet-ipv4 with policy ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 18:24:26.207409: | No AUTH policy was set - defaulting to RSASIG Aug 26 18:24:26.207452: | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 Aug 26 18:24:26.207455: | from whack: got --esp= Aug 26 18:24:26.207480: | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 Aug 26 18:24:26.207484: | counting wild cards for @north is 0 Aug 26 18:24:26.207487: | counting wild cards for @east is 0 Aug 26 18:24:26.207495: | connect_to_host_pair: 192.1.3.33:500 192.1.2.23:500 -> hp@(nil): none Aug 26 18:24:26.207498: | new hp@0x55bb36108278 Aug 26 18:24:26.207501: added connection description "northnet-eastnet-ipv4" Aug 26 18:24:26.207511: | ike_life: 50s; ipsec_life: 180s; rekey_margin: 5s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 18:24:26.207522: | 192.0.3.0/24===192.1.3.33<192.1.3.33>[@north]...192.1.2.23<192.1.2.23>[@east]===192.0.2.0/24 Aug 26 18:24:26.207531: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:24:26.207537: | spent 0.17 milliseconds in whack Aug 26 18:24:26.207706: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:24:26.207716: add keyid @north Aug 26 18:24:26.207720: | add pubkey 01 03 e5 df 73 b6 3e d5 36 a8 f1 3d 0d d3 02 ab Aug 26 18:24:26.207722: | add pubkey 7f ec 4c 9e 8b 0e 0e d2 cf 0f 59 bf 6d 88 21 86 Aug 26 18:24:26.207723: | add pubkey 93 9e 10 34 af 2d cf b3 7e eb e5 b2 24 b2 a5 b0 Aug 26 18:24:26.207725: | add pubkey 01 03 7d b5 96 ad 66 ee 48 c2 28 d9 9a 76 36 a9 Aug 26 18:24:26.207727: | add pubkey 10 84 b5 09 8f 17 4f 65 ce d8 2f 8e 78 80 8a 87 Aug 26 18:24:26.207728: | add pubkey f4 6b 98 d9 91 94 6b 52 15 5b 9c 47 12 be d8 6f Aug 26 18:24:26.207730: | add pubkey 25 b4 65 38 7e e4 8d c7 f0 58 d3 9f 69 14 cc 3e Aug 26 18:24:26.207731: | add pubkey c8 16 1f af bb 5d 93 2b 33 39 0e 94 55 81 f4 b3 Aug 26 18:24:26.207733: | add pubkey cc 92 58 6e 4a 5a 4e c3 76 ab 04 2e 11 08 06 55 Aug 26 18:24:26.207734: | add pubkey 13 0f 02 6c dd d1 bc c0 b8 8d 65 f5 97 ed fc 18 Aug 26 18:24:26.207736: | add pubkey 39 f9 55 ab fa 0d c5 49 99 7f 1b cf c3 de 99 7d Aug 26 18:24:26.207737: | add pubkey 9e ca 6f 9e 14 d6 5a ff de d6 4f 57 6a 83 ab 51 Aug 26 18:24:26.207739: | add pubkey ba 64 74 e0 22 e9 9a c5 10 71 bb d4 eb a4 99 28 Aug 26 18:24:26.207741: | add pubkey 9c 85 0e 31 ea cc ab ef 98 84 3f 59 c1 75 aa b3 Aug 26 18:24:26.207742: | add pubkey 61 eb 61 8c 58 a5 92 25 84 ad c7 79 f3 87 d0 c7 Aug 26 18:24:26.207744: | add pubkey 83 c2 d6 8a fe 26 9d 2a ff b1 dd 9b 89 21 7c ca Aug 26 18:24:26.207748: | add pubkey f5 38 2d 3f 64 0c 41 9c 34 e9 b2 55 0f 82 1a b3 Aug 26 18:24:26.207750: | add pubkey c7 5e a5 99 Aug 26 18:24:26.207767: | computed rsa CKAID 90 5d fc a1 08 68 74 7c 6f 20 d3 1b 2d 20 4b 8f Aug 26 18:24:26.207769: | computed rsa CKAID 88 aa 7c 5d Aug 26 18:24:26.207777: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:24:26.207783: | spent 0.0805 milliseconds in whack Aug 26 18:24:26.207807: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:24:26.207814: add keyid @east Aug 26 18:24:26.207818: | add pubkey 01 03 bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b Aug 26 18:24:26.207820: | add pubkey e5 16 c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 Aug 26 18:24:26.207821: | add pubkey 85 7a e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c Aug 26 18:24:26.207823: | add pubkey 78 ca 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 Aug 26 18:24:26.207824: | add pubkey 21 c9 f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d Aug 26 18:24:26.207826: | add pubkey d2 67 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 Aug 26 18:24:26.207827: | add pubkey 62 cd 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce Aug 26 18:24:26.207829: | add pubkey 62 b5 af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e Aug 26 18:24:26.207831: | add pubkey bb 23 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d Aug 26 18:24:26.207832: | add pubkey ac 47 f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce Aug 26 18:24:26.207834: | add pubkey e0 98 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a Aug 26 18:24:26.207835: | add pubkey 92 b8 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 Aug 26 18:24:26.207837: | add pubkey 4d 58 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 Aug 26 18:24:26.207838: | add pubkey 5f 56 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 Aug 26 18:24:26.207840: | add pubkey d5 f1 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c Aug 26 18:24:26.207841: | add pubkey 47 cc 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 Aug 26 18:24:26.207843: | add pubkey 07 8f 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 Aug 26 18:24:26.207844: | add pubkey 51 51 48 ef Aug 26 18:24:26.207852: | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Aug 26 18:24:26.207854: | computed rsa CKAID 8a 82 25 f1 Aug 26 18:24:26.207860: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:24:26.207865: | spent 0.0607 milliseconds in whack Aug 26 18:24:26.274370: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:24:26.274978: | FOR_EACH_CONNECTION_... in show_connections_status Aug 26 18:24:26.274988: | FOR_EACH_CONNECTION_... in show_connections_status Aug 26 18:24:26.275057: | FOR_EACH_STATE_... in show_states_status (sort_states) Aug 26 18:24:26.275073: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:24:26.275082: | spent 0.72 milliseconds in whack Aug 26 18:24:26.393044: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:24:26.393071: | dup_any(fd@16) -> fd@23 (in whack_process() at rcv_whack.c:590) Aug 26 18:24:26.393076: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:24:26.393081: | start processing: connection "northnet-eastnet-ipv4" (in initiate_a_connection() at initiate.c:186) Aug 26 18:24:26.393085: | connection 'northnet-eastnet-ipv4' +POLICY_UP Aug 26 18:24:26.393089: | dup_any(fd@23) -> fd@24 (in initiate_a_connection() at initiate.c:342) Aug 26 18:24:26.393092: | FOR_EACH_STATE_... in find_phase1_state Aug 26 18:24:26.393108: | creating state object #1 at 0x55bb361088c8 Aug 26 18:24:26.393112: | State DB: adding IKEv2 state #1 in UNDEFINED Aug 26 18:24:26.393120: | pstats #1 ikev2.ike started Aug 26 18:24:26.393124: | Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 Aug 26 18:24:26.393127: | parent state #1: UNDEFINED(ignore) => PARENT_I0(ignore) Aug 26 18:24:26.393133: | Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 Aug 26 18:24:26.393144: | suspend processing: connection "northnet-eastnet-ipv4" (in ikev2_parent_outI1() at ikev2_parent.c:535) Aug 26 18:24:26.393150: | start processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) Aug 26 18:24:26.393154: | dup_any(fd@24) -> fd@25 (in ikev2_parent_outI1() at ikev2_parent.c:551) Aug 26 18:24:26.393158: | Queuing pending IPsec SA negotiating with 192.1.2.23 "northnet-eastnet-ipv4" IKE SA #1 "northnet-eastnet-ipv4" Aug 26 18:24:26.393163: "northnet-eastnet-ipv4" #1: initiating v2 parent SA Aug 26 18:24:26.393172: | constructing local IKE proposals for northnet-eastnet-ipv4 (IKE SA initiator selecting KE) Aug 26 18:24:26.393181: | converting ike_info AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 18:24:26.393189: | ... ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 18:24:26.393193: | converting ike_info AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 18:24:26.393199: | ... ikev2_proposal: 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 18:24:26.393203: | converting ike_info AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 18:24:26.393209: | ... ikev2_proposal: 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 18:24:26.393212: | converting ike_info AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 18:24:26.393218: | ... ikev2_proposal: 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 18:24:26.393229: "northnet-eastnet-ipv4": constructed local IKE proposals for northnet-eastnet-ipv4 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 18:24:26.393236: | adding ikev2_outI1 KE work-order 1 for state #1 Aug 26 18:24:26.393239: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55bb36108358 Aug 26 18:24:26.393244: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 18:24:26.393247: | libevent_malloc: new ptr-libevent@0x55bb361086d8 size 128 Aug 26 18:24:26.393266: | crypto helper 0 resuming Aug 26 18:24:26.393271: | crypto helper 0 starting work-order 1 for state #1 Aug 26 18:24:26.393275: | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 1 Aug 26 18:24:26.394296: | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 1 time elapsed 0.00102 seconds Aug 26 18:24:26.394309: | (#1) spent 1.02 milliseconds in crypto helper computing work-order 1: ikev2_outI1 KE (pcr) Aug 26 18:24:26.394312: | crypto helper 0 sending results from work-order 1 for state #1 to event queue Aug 26 18:24:26.394315: | scheduling resume sending helper answer for #1 Aug 26 18:24:26.394319: | libevent_malloc: new ptr-libevent@0x7f8cd8002888 size 128 Aug 26 18:24:26.394327: | crypto helper 0 waiting (nothing to do) Aug 26 18:24:26.394336: | #1 spent 0.181 milliseconds in ikev2_parent_outI1() Aug 26 18:24:26.394339: | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) Aug 26 18:24:26.394344: | RESET processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) Aug 26 18:24:26.394347: | RESET processing: connection "northnet-eastnet-ipv4" (in ikev2_parent_outI1() at ikev2_parent.c:610) Aug 26 18:24:26.394350: | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) Aug 26 18:24:26.394354: | close_any(fd@23) (in initiate_connection() at initiate.c:372) Aug 26 18:24:26.394357: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:24:26.394361: | spent 0.256 milliseconds in whack Aug 26 18:24:26.394369: | processing resume sending helper answer for #1 Aug 26 18:24:26.394374: | start processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 18:24:26.394378: | crypto helper 0 replies to request ID 1 Aug 26 18:24:26.394381: | calling continuation function 0x55bb35b82b50 Aug 26 18:24:26.394383: | ikev2_parent_outI1_continue for #1 Aug 26 18:24:26.394412: | **emit ISAKMP Message: Aug 26 18:24:26.394415: | initiator cookie: Aug 26 18:24:26.394418: | a2 24 da 50 b9 cc 37 1e Aug 26 18:24:26.394420: | responder cookie: Aug 26 18:24:26.394423: | 00 00 00 00 00 00 00 00 Aug 26 18:24:26.394425: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:24:26.394428: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 18:24:26.394431: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Aug 26 18:24:26.394434: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 18:24:26.394437: | Message ID: 0 (0x0) Aug 26 18:24:26.394440: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:24:26.394455: | using existing local IKE proposals for connection northnet-eastnet-ipv4 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 18:24:26.394458: | Emitting ikev2_proposals ... Aug 26 18:24:26.394461: | ***emit IKEv2 Security Association Payload: Aug 26 18:24:26.394464: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:24:26.394467: | flags: none (0x0) Aug 26 18:24:26.394470: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Aug 26 18:24:26.394473: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:24:26.394476: | discarding INTEG=NONE Aug 26 18:24:26.394479: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 18:24:26.394482: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:24:26.394485: | prop #: 1 (0x1) Aug 26 18:24:26.394487: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 18:24:26.394490: | spi size: 0 (0x0) Aug 26 18:24:26.394492: | # transforms: 11 (0xb) Aug 26 18:24:26.394495: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 18:24:26.394498: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394501: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394503: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:24:26.394508: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 18:24:26.394511: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394515: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 18:24:26.394517: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:24:26.394520: | length/value: 256 (0x100) Aug 26 18:24:26.394523: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 18:24:26.394526: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394528: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394531: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:24:26.394533: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 18:24:26.394537: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394540: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394542: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394545: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394547: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394550: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:24:26.394552: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 18:24:26.394555: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394558: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394561: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394563: | discarding INTEG=NONE Aug 26 18:24:26.394566: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394568: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394571: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394574: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 18:24:26.394577: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394580: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394583: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394586: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394588: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394591: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394593: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 18:24:26.394596: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394599: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394602: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394604: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394607: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394609: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394612: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 18:24:26.394615: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394618: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394620: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394624: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394627: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394630: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394632: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 18:24:26.394635: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394638: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394641: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394643: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394646: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394648: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394651: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 18:24:26.394654: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394657: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394659: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394662: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394664: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394667: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394670: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 18:24:26.394673: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394675: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394678: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394681: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394683: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394686: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394688: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 18:24:26.394691: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394694: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394697: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394699: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394702: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:24:26.394704: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394707: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 18:24:26.394710: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394713: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394715: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394718: | emitting length of IKEv2 Proposal Substructure Payload: 100 Aug 26 18:24:26.394721: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 18:24:26.394723: | discarding INTEG=NONE Aug 26 18:24:26.394726: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 18:24:26.394728: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:24:26.394731: | prop #: 2 (0x2) Aug 26 18:24:26.394734: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 18:24:26.394737: | spi size: 0 (0x0) Aug 26 18:24:26.394740: | # transforms: 11 (0xb) Aug 26 18:24:26.394743: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:24:26.394746: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 18:24:26.394749: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394751: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394754: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:24:26.394756: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 18:24:26.394759: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394762: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 18:24:26.394764: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:24:26.394767: | length/value: 128 (0x80) Aug 26 18:24:26.394769: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 18:24:26.394772: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394774: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394777: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:24:26.394780: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 18:24:26.394782: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394785: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394788: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394790: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394793: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394796: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:24:26.394798: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 18:24:26.394801: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394804: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394807: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394809: | discarding INTEG=NONE Aug 26 18:24:26.394811: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394814: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394816: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394819: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 18:24:26.394822: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394825: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394827: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394830: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394832: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394835: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394837: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 18:24:26.394840: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394843: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394846: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394855: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394858: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394861: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394863: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 18:24:26.394867: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394870: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394872: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394875: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394877: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394880: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394882: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 18:24:26.394885: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394888: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394891: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394893: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394896: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394899: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394901: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 18:24:26.394904: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394907: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394909: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394912: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394914: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394917: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394920: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 18:24:26.394923: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394925: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394928: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394931: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394933: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394936: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394938: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 18:24:26.394941: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394944: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394946: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394949: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394951: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:24:26.394954: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.394956: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 18:24:26.394959: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.394962: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.394966: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.394969: | emitting length of IKEv2 Proposal Substructure Payload: 100 Aug 26 18:24:26.394972: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 18:24:26.394975: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 18:24:26.394977: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:24:26.394980: | prop #: 3 (0x3) Aug 26 18:24:26.394982: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 18:24:26.394985: | spi size: 0 (0x0) Aug 26 18:24:26.394987: | # transforms: 13 (0xd) Aug 26 18:24:26.394990: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:24:26.394993: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 18:24:26.394996: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.394998: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395001: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:24:26.395003: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 18:24:26.395006: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395009: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 18:24:26.395012: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:24:26.395014: | length/value: 256 (0x100) Aug 26 18:24:26.395017: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 18:24:26.395019: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395022: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395024: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:24:26.395027: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 18:24:26.395030: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395033: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395036: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395038: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395041: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395044: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:24:26.395046: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 18:24:26.395049: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395052: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395055: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395057: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395060: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395063: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 18:24:26.395065: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 18:24:26.395068: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395071: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395074: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395076: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395079: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395082: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 18:24:26.395085: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 18:24:26.395088: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395091: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395093: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395096: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395098: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395101: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395103: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 18:24:26.395106: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395109: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395112: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395114: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395117: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395119: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395122: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 18:24:26.395125: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395128: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395131: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395133: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395136: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395138: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395141: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 18:24:26.395144: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395147: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395149: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395152: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395155: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395158: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395160: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 18:24:26.395163: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395166: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395169: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395171: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395174: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395177: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395179: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 18:24:26.395182: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395185: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395188: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395193: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395195: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395198: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395200: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 18:24:26.395203: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395206: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395209: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395212: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395214: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395217: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395219: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 18:24:26.395222: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395225: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395228: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395230: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395233: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:24:26.395235: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395238: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 18:24:26.395241: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395244: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395246: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395249: | emitting length of IKEv2 Proposal Substructure Payload: 116 Aug 26 18:24:26.395252: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 18:24:26.395255: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 18:24:26.395257: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 18:24:26.395260: | prop #: 4 (0x4) Aug 26 18:24:26.395262: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 18:24:26.395265: | spi size: 0 (0x0) Aug 26 18:24:26.395267: | # transforms: 13 (0xd) Aug 26 18:24:26.395270: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:24:26.395273: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 18:24:26.395276: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395278: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395281: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:24:26.395284: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 18:24:26.395286: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395294: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 18:24:26.395297: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:24:26.395299: | length/value: 128 (0x80) Aug 26 18:24:26.395302: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 18:24:26.395305: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395307: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395310: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:24:26.395312: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 18:24:26.395317: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395320: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395322: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395325: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395327: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395330: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:24:26.395332: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 18:24:26.395335: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395338: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395341: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395343: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395346: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395348: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 18:24:26.395351: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 18:24:26.395354: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395357: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395359: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395362: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395364: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395367: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 18:24:26.395369: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 18:24:26.395372: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395375: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395378: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395380: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395383: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395385: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395388: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 18:24:26.395391: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395394: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395396: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395399: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395401: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395404: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395406: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 18:24:26.395409: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395412: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395414: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395417: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395421: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395423: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395426: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 18:24:26.395429: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395431: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395434: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395437: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395439: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395442: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395444: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 18:24:26.395447: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395450: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395453: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395456: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395458: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395461: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395463: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 18:24:26.395466: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395469: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395472: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395474: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395477: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395479: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395482: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 18:24:26.395485: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395488: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395491: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395493: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395496: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395498: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395501: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 18:24:26.395504: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395507: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395509: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395512: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:24:26.395514: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:24:26.395517: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.395519: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 18:24:26.395522: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.395525: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:24:26.395529: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:24:26.395532: | emitting length of IKEv2 Proposal Substructure Payload: 116 Aug 26 18:24:26.395534: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 18:24:26.395537: | emitting length of IKEv2 Security Association Payload: 436 Aug 26 18:24:26.395540: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Aug 26 18:24:26.395542: | ***emit IKEv2 Key Exchange Payload: Aug 26 18:24:26.395545: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:24:26.395548: | flags: none (0x0) Aug 26 18:24:26.395550: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 18:24:26.395554: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) Aug 26 18:24:26.395556: | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' Aug 26 18:24:26.395560: | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload Aug 26 18:24:26.395562: | ikev2 g^x 07 65 35 cd e6 cf c8 4f 18 30 b8 42 ae 05 e1 c2 Aug 26 18:24:26.395565: | ikev2 g^x cf 14 1d 6f f1 06 28 59 5c 09 fc 31 18 f4 5d 57 Aug 26 18:24:26.395567: | ikev2 g^x 52 b7 06 2d ee 72 12 13 55 1b f8 12 df c5 15 f7 Aug 26 18:24:26.395570: | ikev2 g^x 33 88 f1 ca 6a 5a b2 6a e9 2d 8b 7c 6d 76 42 3e Aug 26 18:24:26.395572: | ikev2 g^x 9c d0 0d 36 67 41 b2 76 7c 1b c2 16 a5 3d 28 ff Aug 26 18:24:26.395575: | ikev2 g^x 5c 50 b9 c5 83 cb 4c 64 de 4a af 98 ed 38 14 ac Aug 26 18:24:26.395577: | ikev2 g^x 80 9b 85 87 67 d5 14 55 ca 3a f6 c0 b1 04 aa af Aug 26 18:24:26.395580: | ikev2 g^x a7 e1 ea 21 17 b8 f7 11 b3 c6 e5 c4 6e 80 10 be Aug 26 18:24:26.395582: | ikev2 g^x 74 1d 64 f7 2b 1a a9 18 f6 77 e4 7c f6 39 65 37 Aug 26 18:24:26.395585: | ikev2 g^x 10 0e d7 e6 41 ec e6 5e fc b0 f3 2f fb 0f 0f f3 Aug 26 18:24:26.395587: | ikev2 g^x 2c ed 8f d2 68 04 b7 6b 59 55 f1 e4 9a 00 60 6b Aug 26 18:24:26.395589: | ikev2 g^x 5d a0 85 20 71 fc 03 12 65 e0 4f f0 04 dd 8c a9 Aug 26 18:24:26.395592: | ikev2 g^x 30 7e 14 39 e4 cc ac c2 47 b2 3d ae 64 4a 06 ea Aug 26 18:24:26.395594: | ikev2 g^x 37 d5 94 79 4e 7d bc ca 3f 36 47 83 39 0c 6b 42 Aug 26 18:24:26.395597: | ikev2 g^x b1 85 c7 d0 91 d1 be 07 c1 54 50 d0 32 1b b9 c6 Aug 26 18:24:26.395599: | ikev2 g^x 31 34 08 11 32 bc 3c 43 08 c5 dd 0e 00 c8 4f 5a Aug 26 18:24:26.395602: | emitting length of IKEv2 Key Exchange Payload: 264 Aug 26 18:24:26.395604: | ***emit IKEv2 Nonce Payload: Aug 26 18:24:26.395607: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 18:24:26.395609: | flags: none (0x0) Aug 26 18:24:26.395612: | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N Aug 26 18:24:26.395615: | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Aug 26 18:24:26.395618: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' Aug 26 18:24:26.395621: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Aug 26 18:24:26.395623: | IKEv2 nonce 83 e1 ba 32 a6 2c 80 69 c6 c9 04 24 19 ca 07 3e Aug 26 18:24:26.395626: | IKEv2 nonce d3 2b a5 fc 84 21 ce e6 e2 e7 3d 46 c1 b5 60 a7 Aug 26 18:24:26.395629: | emitting length of IKEv2 Nonce Payload: 36 Aug 26 18:24:26.395631: | Adding a v2N Payload Aug 26 18:24:26.395634: | ***emit IKEv2 Notify Payload: Aug 26 18:24:26.395636: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:24:26.395639: | flags: none (0x0) Aug 26 18:24:26.395642: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 18:24:26.395644: | SPI size: 0 (0x0) Aug 26 18:24:26.395647: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Aug 26 18:24:26.395651: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 18:24:26.395654: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 18:24:26.395657: | emitting length of IKEv2 Notify Payload: 8 Aug 26 18:24:26.395660: | NAT-Traversal support [enabled] add v2N payloads. Aug 26 18:24:26.395663: | natd_hash: rcookie is zero Aug 26 18:24:26.395674: | natd_hash: hasher=0x55bb35c57800(20) Aug 26 18:24:26.395677: | natd_hash: icookie= a2 24 da 50 b9 cc 37 1e Aug 26 18:24:26.395680: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Aug 26 18:24:26.395682: | natd_hash: ip= c0 01 03 21 Aug 26 18:24:26.395685: | natd_hash: port=500 Aug 26 18:24:26.395687: | natd_hash: hash= 41 5f a3 9f 31 71 32 fa 16 9c 17 b8 1a 76 6e 49 Aug 26 18:24:26.395690: | natd_hash: hash= d6 a0 32 22 Aug 26 18:24:26.395692: | Adding a v2N Payload Aug 26 18:24:26.395695: | ***emit IKEv2 Notify Payload: Aug 26 18:24:26.395698: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:24:26.395700: | flags: none (0x0) Aug 26 18:24:26.395703: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 18:24:26.395705: | SPI size: 0 (0x0) Aug 26 18:24:26.395708: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Aug 26 18:24:26.395711: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 18:24:26.395714: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 18:24:26.395716: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Aug 26 18:24:26.395719: | Notify data 41 5f a3 9f 31 71 32 fa 16 9c 17 b8 1a 76 6e 49 Aug 26 18:24:26.395721: | Notify data d6 a0 32 22 Aug 26 18:24:26.395724: | emitting length of IKEv2 Notify Payload: 28 Aug 26 18:24:26.395726: | natd_hash: rcookie is zero Aug 26 18:24:26.395732: | natd_hash: hasher=0x55bb35c57800(20) Aug 26 18:24:26.395735: | natd_hash: icookie= a2 24 da 50 b9 cc 37 1e Aug 26 18:24:26.395738: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Aug 26 18:24:26.395740: | natd_hash: ip= c0 01 02 17 Aug 26 18:24:26.395742: | natd_hash: port=500 Aug 26 18:24:26.395745: | natd_hash: hash= 5e 3b 5e f4 c2 89 d4 be 3e 69 2e eb 65 c4 c4 15 Aug 26 18:24:26.395747: | natd_hash: hash= e6 91 d8 ba Aug 26 18:24:26.395750: | Adding a v2N Payload Aug 26 18:24:26.395752: | ***emit IKEv2 Notify Payload: Aug 26 18:24:26.395755: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:24:26.395757: | flags: none (0x0) Aug 26 18:24:26.395760: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 18:24:26.395762: | SPI size: 0 (0x0) Aug 26 18:24:26.395765: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Aug 26 18:24:26.395768: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 18:24:26.395771: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 18:24:26.395774: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Aug 26 18:24:26.395776: | Notify data 5e 3b 5e f4 c2 89 d4 be 3e 69 2e eb 65 c4 c4 15 Aug 26 18:24:26.395779: | Notify data e6 91 d8 ba Aug 26 18:24:26.395781: | emitting length of IKEv2 Notify Payload: 28 Aug 26 18:24:26.395784: | emitting length of ISAKMP Message: 828 Aug 26 18:24:26.395791: | stop processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) Aug 26 18:24:26.395800: | start processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 18:24:26.395804: | #1 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK Aug 26 18:24:26.395807: | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 Aug 26 18:24:26.395811: | parent state #1: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) Aug 26 18:24:26.395815: | Message ID: updating counters for #1 to 4294967295 after switching state Aug 26 18:24:26.395818: | Message ID: IKE #1 skipping update_recv as MD is fake Aug 26 18:24:26.395823: | Message ID: sent #1 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 Aug 26 18:24:26.395826: "northnet-eastnet-ipv4" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 Aug 26 18:24:26.395834: | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.33:500) Aug 26 18:24:26.395843: | sending 828 bytes for STATE_PARENT_I0 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Aug 26 18:24:26.395846: | a2 24 da 50 b9 cc 37 1e 00 00 00 00 00 00 00 00 Aug 26 18:24:26.395849: | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 Aug 26 18:24:26.395851: | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 Aug 26 18:24:26.395853: | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 Aug 26 18:24:26.395856: | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 Aug 26 18:24:26.395858: | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 Aug 26 18:24:26.395861: | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 Aug 26 18:24:26.395863: | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 Aug 26 18:24:26.395866: | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c Aug 26 18:24:26.395868: | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 Aug 26 18:24:26.395871: | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e Aug 26 18:24:26.395873: | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 Aug 26 18:24:26.395876: | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 Aug 26 18:24:26.395878: | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 Aug 26 18:24:26.395881: | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d Aug 26 18:24:26.395883: | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 Aug 26 18:24:26.395886: | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 Aug 26 18:24:26.395888: | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 Aug 26 18:24:26.395890: | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 Aug 26 18:24:26.395893: | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 Aug 26 18:24:26.395895: | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 Aug 26 18:24:26.395898: | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 Aug 26 18:24:26.395900: | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 Aug 26 18:24:26.395902: | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 Aug 26 18:24:26.395905: | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c Aug 26 18:24:26.395907: | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f Aug 26 18:24:26.395910: | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 Aug 26 18:24:26.395912: | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 Aug 26 18:24:26.395915: | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f Aug 26 18:24:26.395917: | 28 00 01 08 00 0e 00 00 07 65 35 cd e6 cf c8 4f Aug 26 18:24:26.395920: | 18 30 b8 42 ae 05 e1 c2 cf 14 1d 6f f1 06 28 59 Aug 26 18:24:26.395922: | 5c 09 fc 31 18 f4 5d 57 52 b7 06 2d ee 72 12 13 Aug 26 18:24:26.395925: | 55 1b f8 12 df c5 15 f7 33 88 f1 ca 6a 5a b2 6a Aug 26 18:24:26.395927: | e9 2d 8b 7c 6d 76 42 3e 9c d0 0d 36 67 41 b2 76 Aug 26 18:24:26.395930: | 7c 1b c2 16 a5 3d 28 ff 5c 50 b9 c5 83 cb 4c 64 Aug 26 18:24:26.395932: | de 4a af 98 ed 38 14 ac 80 9b 85 87 67 d5 14 55 Aug 26 18:24:26.395935: | ca 3a f6 c0 b1 04 aa af a7 e1 ea 21 17 b8 f7 11 Aug 26 18:24:26.395937: | b3 c6 e5 c4 6e 80 10 be 74 1d 64 f7 2b 1a a9 18 Aug 26 18:24:26.395939: | f6 77 e4 7c f6 39 65 37 10 0e d7 e6 41 ec e6 5e Aug 26 18:24:26.395942: | fc b0 f3 2f fb 0f 0f f3 2c ed 8f d2 68 04 b7 6b Aug 26 18:24:26.395944: | 59 55 f1 e4 9a 00 60 6b 5d a0 85 20 71 fc 03 12 Aug 26 18:24:26.395947: | 65 e0 4f f0 04 dd 8c a9 30 7e 14 39 e4 cc ac c2 Aug 26 18:24:26.395949: | 47 b2 3d ae 64 4a 06 ea 37 d5 94 79 4e 7d bc ca Aug 26 18:24:26.395953: | 3f 36 47 83 39 0c 6b 42 b1 85 c7 d0 91 d1 be 07 Aug 26 18:24:26.395955: | c1 54 50 d0 32 1b b9 c6 31 34 08 11 32 bc 3c 43 Aug 26 18:24:26.395958: | 08 c5 dd 0e 00 c8 4f 5a 29 00 00 24 83 e1 ba 32 Aug 26 18:24:26.395960: | a6 2c 80 69 c6 c9 04 24 19 ca 07 3e d3 2b a5 fc Aug 26 18:24:26.395963: | 84 21 ce e6 e2 e7 3d 46 c1 b5 60 a7 29 00 00 08 Aug 26 18:24:26.395965: | 00 00 40 2e 29 00 00 1c 00 00 40 04 41 5f a3 9f Aug 26 18:24:26.395967: | 31 71 32 fa 16 9c 17 b8 1a 76 6e 49 d6 a0 32 22 Aug 26 18:24:26.395970: | 00 00 00 1c 00 00 40 05 5e 3b 5e f4 c2 89 d4 be Aug 26 18:24:26.395972: | 3e 69 2e eb 65 c4 c4 15 e6 91 d8 ba Aug 26 18:24:26.396051: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 18:24:26.396057: | libevent_free: release ptr-libevent@0x55bb361086d8 Aug 26 18:24:26.396060: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55bb36108358 Aug 26 18:24:26.396063: | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms Aug 26 18:24:26.396067: | event_schedule: new EVENT_RETRANSMIT-pe@0x55bb36108358 Aug 26 18:24:26.396071: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 Aug 26 18:24:26.396074: | libevent_malloc: new ptr-libevent@0x55bb3610b0b8 size 128 Aug 26 18:24:26.396079: | #1 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29152.138533 Aug 26 18:24:26.396083: | resume sending helper answer for #1 suppresed complete_v2_state_transition() and stole MD Aug 26 18:24:26.396088: | #1 spent 1.67 milliseconds in resume sending helper answer Aug 26 18:24:26.396093: | stop processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 18:24:26.396096: | libevent_free: release ptr-libevent@0x7f8cd8002888 Aug 26 18:24:26.399534: | spent 0.00237 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:24:26.399557: | *received 432 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Aug 26 18:24:26.399561: | a2 24 da 50 b9 cc 37 1e 91 19 95 72 d6 80 ce 22 Aug 26 18:24:26.399564: | 21 20 22 20 00 00 00 00 00 00 01 b0 22 00 00 28 Aug 26 18:24:26.399566: | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 Aug 26 18:24:26.399569: | 80 0e 01 00 03 00 00 08 02 00 00 07 00 00 00 08 Aug 26 18:24:26.399571: | 04 00 00 0e 28 00 01 08 00 0e 00 00 42 c4 1a aa Aug 26 18:24:26.399574: | 9b 41 7a d2 1e 33 83 68 2b 76 88 c9 22 5b 82 7f Aug 26 18:24:26.399576: | c6 06 ac 6e 12 71 53 a8 80 24 85 f7 cc bf 8d 1c Aug 26 18:24:26.399578: | 45 05 64 35 c5 6b 58 37 bb 69 44 c7 98 b6 c5 09 Aug 26 18:24:26.399581: | fa 72 5e 89 20 bd 92 fe f4 94 d1 24 c0 8e cd 5e Aug 26 18:24:26.399583: | 4c 6b 14 52 36 10 eb 6f 9c 25 47 03 7b 77 5b 02 Aug 26 18:24:26.399586: | 24 8e b6 e8 0c 7a 10 7a 51 bf 7e be c2 d1 27 9f Aug 26 18:24:26.399588: | 2f 43 62 c6 5e c4 99 e9 3a 23 8d 54 7f 18 0d 75 Aug 26 18:24:26.399590: | 49 87 47 4d 06 63 aa 79 6a 25 af f9 cd 47 da 1b Aug 26 18:24:26.399593: | a4 8c e4 e9 0d b3 ea 35 4d 51 94 9d 46 22 c6 84 Aug 26 18:24:26.399595: | e0 f3 11 67 45 c6 49 d1 f1 00 8e 27 7d 8e 28 66 Aug 26 18:24:26.399598: | 93 51 7c 0b 44 2e 3f 2c d4 35 4c 74 96 6c dd ed Aug 26 18:24:26.399600: | a6 55 a8 8b b9 f8 ec 62 6c 28 8e 34 c2 09 c9 7e Aug 26 18:24:26.399603: | a0 46 f6 d7 2f f1 11 d7 21 d0 cb bc 10 43 8d 9d Aug 26 18:24:26.399605: | 7d 0d f9 da fd 81 53 a8 61 82 6b e9 06 59 18 02 Aug 26 18:24:26.399608: | 70 3d d7 64 54 9a dc a4 91 33 7c 62 f7 82 cf c3 Aug 26 18:24:26.399610: | c9 e5 0c 75 fd 93 ba ce 68 26 ef 9f 29 00 00 24 Aug 26 18:24:26.399612: | e5 22 99 1e 2c 57 a8 63 f3 c3 dd 7d 1e 55 3c ba Aug 26 18:24:26.399615: | c5 ef b3 1d cd c9 ac ad b4 0b 15 6c 7d c2 9f 0f Aug 26 18:24:26.399617: | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 Aug 26 18:24:26.399620: | 56 cf 1d 37 d5 55 d5 5d f7 d3 31 a8 a7 22 4c a6 Aug 26 18:24:26.399622: | d9 bc 7e 8e 00 00 00 1c 00 00 40 05 be 87 54 04 Aug 26 18:24:26.399627: | 10 a2 66 07 ad 6f 68 28 5e 90 f5 2d 47 23 12 39 Aug 26 18:24:26.399631: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 18:24:26.399635: | **parse ISAKMP Message: Aug 26 18:24:26.399638: | initiator cookie: Aug 26 18:24:26.399641: | a2 24 da 50 b9 cc 37 1e Aug 26 18:24:26.399643: | responder cookie: Aug 26 18:24:26.399646: | 91 19 95 72 d6 80 ce 22 Aug 26 18:24:26.399648: | next payload type: ISAKMP_NEXT_v2SA (0x21) Aug 26 18:24:26.399651: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 18:24:26.399654: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Aug 26 18:24:26.399657: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Aug 26 18:24:26.399660: | Message ID: 0 (0x0) Aug 26 18:24:26.399662: | length: 432 (0x1b0) Aug 26 18:24:26.399665: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) Aug 26 18:24:26.399669: | I am the IKE SA Original Initiator receiving an IKEv2 IKE_SA_INIT response Aug 26 18:24:26.399673: | State DB: found IKEv2 state #1 in PARENT_I1 (find_v2_ike_sa_by_initiator_spi) Aug 26 18:24:26.399679: | start processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) Aug 26 18:24:26.399683: | [RE]START processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) Aug 26 18:24:26.399686: | #1 is idle Aug 26 18:24:26.399689: | #1 idle Aug 26 18:24:26.399691: | unpacking clear payload Aug 26 18:24:26.399694: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Aug 26 18:24:26.399697: | ***parse IKEv2 Security Association Payload: Aug 26 18:24:26.399700: | next payload type: ISAKMP_NEXT_v2KE (0x22) Aug 26 18:24:26.399702: | flags: none (0x0) Aug 26 18:24:26.399705: | length: 40 (0x28) Aug 26 18:24:26.399708: | processing payload: ISAKMP_NEXT_v2SA (len=36) Aug 26 18:24:26.399710: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) Aug 26 18:24:26.399713: | ***parse IKEv2 Key Exchange Payload: Aug 26 18:24:26.399716: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Aug 26 18:24:26.399718: | flags: none (0x0) Aug 26 18:24:26.399721: | length: 264 (0x108) Aug 26 18:24:26.399723: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 18:24:26.399726: | processing payload: ISAKMP_NEXT_v2KE (len=256) Aug 26 18:24:26.399729: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Aug 26 18:24:26.399731: | ***parse IKEv2 Nonce Payload: Aug 26 18:24:26.399734: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 18:24:26.399736: | flags: none (0x0) Aug 26 18:24:26.399739: | length: 36 (0x24) Aug 26 18:24:26.399742: | processing payload: ISAKMP_NEXT_v2Ni (len=32) Aug 26 18:24:26.399744: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 18:24:26.399747: | ***parse IKEv2 Notify Payload: Aug 26 18:24:26.399750: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 18:24:26.399752: | flags: none (0x0) Aug 26 18:24:26.399755: | length: 8 (0x8) Aug 26 18:24:26.399757: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 18:24:26.399760: | SPI size: 0 (0x0) Aug 26 18:24:26.399763: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Aug 26 18:24:26.399766: | processing payload: ISAKMP_NEXT_v2N (len=0) Aug 26 18:24:26.399768: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 18:24:26.399771: | ***parse IKEv2 Notify Payload: Aug 26 18:24:26.399773: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 18:24:26.399776: | flags: none (0x0) Aug 26 18:24:26.399778: | length: 28 (0x1c) Aug 26 18:24:26.399781: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 18:24:26.399783: | SPI size: 0 (0x0) Aug 26 18:24:26.399786: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Aug 26 18:24:26.399789: | processing payload: ISAKMP_NEXT_v2N (len=20) Aug 26 18:24:26.399791: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 18:24:26.399794: | ***parse IKEv2 Notify Payload: Aug 26 18:24:26.399796: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:24:26.399802: | flags: none (0x0) Aug 26 18:24:26.399804: | length: 28 (0x1c) Aug 26 18:24:26.399807: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 18:24:26.399810: | SPI size: 0 (0x0) Aug 26 18:24:26.399812: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Aug 26 18:24:26.399815: | processing payload: ISAKMP_NEXT_v2N (len=20) Aug 26 18:24:26.399818: | State DB: re-hashing IKEv2 state #1 IKE SPIi and SPI[ir] Aug 26 18:24:26.399823: | #1 in state PARENT_I1: sent v2I1, expected v2R1 Aug 26 18:24:26.399826: | selected state microcode Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH Aug 26 18:24:26.399829: | Now let's proceed with state specific processing Aug 26 18:24:26.399831: | calling processor Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH Aug 26 18:24:26.399835: | ikev2 parent inR1: calculating g^{xy} in order to send I2 Aug 26 18:24:26.399852: | using existing local IKE proposals for connection northnet-eastnet-ipv4 (IKE SA initiator accepting remote proposal): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 18:24:26.399856: | Comparing remote proposals against IKE initiator (accepting) 4 local proposals Aug 26 18:24:26.399859: | local proposal 1 type ENCR has 1 transforms Aug 26 18:24:26.399862: | local proposal 1 type PRF has 2 transforms Aug 26 18:24:26.399865: | local proposal 1 type INTEG has 1 transforms Aug 26 18:24:26.399867: | local proposal 1 type DH has 8 transforms Aug 26 18:24:26.399870: | local proposal 1 type ESN has 0 transforms Aug 26 18:24:26.399874: | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG Aug 26 18:24:26.399876: | local proposal 2 type ENCR has 1 transforms Aug 26 18:24:26.399879: | local proposal 2 type PRF has 2 transforms Aug 26 18:24:26.399882: | local proposal 2 type INTEG has 1 transforms Aug 26 18:24:26.399884: | local proposal 2 type DH has 8 transforms Aug 26 18:24:26.399887: | local proposal 2 type ESN has 0 transforms Aug 26 18:24:26.399890: | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG Aug 26 18:24:26.399892: | local proposal 3 type ENCR has 1 transforms Aug 26 18:24:26.399895: | local proposal 3 type PRF has 2 transforms Aug 26 18:24:26.399898: | local proposal 3 type INTEG has 2 transforms Aug 26 18:24:26.399900: | local proposal 3 type DH has 8 transforms Aug 26 18:24:26.399903: | local proposal 3 type ESN has 0 transforms Aug 26 18:24:26.399906: | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none Aug 26 18:24:26.399909: | local proposal 4 type ENCR has 1 transforms Aug 26 18:24:26.399911: | local proposal 4 type PRF has 2 transforms Aug 26 18:24:26.399914: | local proposal 4 type INTEG has 2 transforms Aug 26 18:24:26.399916: | local proposal 4 type DH has 8 transforms Aug 26 18:24:26.399919: | local proposal 4 type ESN has 0 transforms Aug 26 18:24:26.399922: | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none Aug 26 18:24:26.399925: | ****parse IKEv2 Proposal Substructure Payload: Aug 26 18:24:26.399928: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 18:24:26.399931: | length: 36 (0x24) Aug 26 18:24:26.399933: | prop #: 1 (0x1) Aug 26 18:24:26.399936: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 18:24:26.399938: | spi size: 0 (0x0) Aug 26 18:24:26.399941: | # transforms: 3 (0x3) Aug 26 18:24:26.399944: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 4 local proposals Aug 26 18:24:26.399949: | *****parse IKEv2 Transform Substructure Payload: Aug 26 18:24:26.399952: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.399954: | length: 12 (0xc) Aug 26 18:24:26.399957: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:24:26.399959: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 18:24:26.399962: | ******parse IKEv2 Attribute Substructure Payload: Aug 26 18:24:26.399965: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:24:26.399968: | length/value: 256 (0x100) Aug 26 18:24:26.399972: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 Aug 26 18:24:26.399975: | *****parse IKEv2 Transform Substructure Payload: Aug 26 18:24:26.399978: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:24:26.399980: | length: 8 (0x8) Aug 26 18:24:26.399983: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:24:26.399986: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 18:24:26.399989: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 Aug 26 18:24:26.399992: | *****parse IKEv2 Transform Substructure Payload: Aug 26 18:24:26.399995: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:24:26.399997: | length: 8 (0x8) Aug 26 18:24:26.400000: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:24:26.400002: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 18:24:26.400006: | remote proposal 1 transform 2 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Aug 26 18:24:26.400010: | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none Aug 26 18:24:26.400014: | comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH Aug 26 18:24:26.400017: | remote proposal 1 matches local proposal 1 Aug 26 18:24:26.400020: | remote accepted the proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048[first-match] Aug 26 18:24:26.400023: | converting proposal to internal trans attrs Aug 26 18:24:26.400036: | natd_hash: hasher=0x55bb35c57800(20) Aug 26 18:24:26.400039: | natd_hash: icookie= a2 24 da 50 b9 cc 37 1e Aug 26 18:24:26.400042: | natd_hash: rcookie= 91 19 95 72 d6 80 ce 22 Aug 26 18:24:26.400044: | natd_hash: ip= c0 01 03 21 Aug 26 18:24:26.400047: | natd_hash: port=500 Aug 26 18:24:26.400050: | natd_hash: hash= be 87 54 04 10 a2 66 07 ad 6f 68 28 5e 90 f5 2d Aug 26 18:24:26.400052: | natd_hash: hash= 47 23 12 39 Aug 26 18:24:26.400058: | natd_hash: hasher=0x55bb35c57800(20) Aug 26 18:24:26.400061: | natd_hash: icookie= a2 24 da 50 b9 cc 37 1e Aug 26 18:24:26.400063: | natd_hash: rcookie= 91 19 95 72 d6 80 ce 22 Aug 26 18:24:26.400066: | natd_hash: ip= c0 01 02 17 Aug 26 18:24:26.400068: | natd_hash: port=500 Aug 26 18:24:26.400071: | natd_hash: hash= 56 cf 1d 37 d5 55 d5 5d f7 d3 31 a8 a7 22 4c a6 Aug 26 18:24:26.400073: | natd_hash: hash= d9 bc 7e 8e Aug 26 18:24:26.400076: | NAT_TRAVERSAL encaps using auto-detect Aug 26 18:24:26.400078: | NAT_TRAVERSAL this end is NOT behind NAT Aug 26 18:24:26.400081: | NAT_TRAVERSAL that end is NOT behind NAT Aug 26 18:24:26.400084: | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 Aug 26 18:24:26.400094: | offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_512 integ=NONE cipherkey=AES_GCM_16 Aug 26 18:24:26.400098: | adding ikev2_inR1outI2 KE work-order 2 for state #1 Aug 26 18:24:26.400101: | state #1 requesting EVENT_RETRANSMIT to be deleted Aug 26 18:24:26.400104: | #1 STATE_PARENT_I1: retransmits: cleared Aug 26 18:24:26.400108: | libevent_free: release ptr-libevent@0x55bb3610b0b8 Aug 26 18:24:26.400112: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55bb36108358 Aug 26 18:24:26.400115: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55bb36108358 Aug 26 18:24:26.400119: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 18:24:26.400122: | libevent_malloc: new ptr-libevent@0x7f8cd8002888 size 128 Aug 26 18:24:26.400140: | crypto helper 1 resuming Aug 26 18:24:26.400145: | crypto helper 1 starting work-order 2 for state #1 Aug 26 18:24:26.400148: | crypto helper 1 doing compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 Aug 26 18:24:26.401090: | calculating skeyseed using prf=sha2_512 integ=none cipherkey-size=32 salt-size=4 Aug 26 18:24:26.401508: | crypto helper 1 finished compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 time elapsed 0.001358 seconds Aug 26 18:24:26.401518: | (#1) spent 1.36 milliseconds in crypto helper computing work-order 2: ikev2_inR1outI2 KE (pcr) Aug 26 18:24:26.401521: | crypto helper 1 sending results from work-order 2 for state #1 to event queue Aug 26 18:24:26.401524: | scheduling resume sending helper answer for #1 Aug 26 18:24:26.401528: | libevent_malloc: new ptr-libevent@0x7f8cd0000f48 size 128 Aug 26 18:24:26.401533: | crypto helper 1 waiting (nothing to do) Aug 26 18:24:26.401542: | #1 spent 0.3 milliseconds in processing: Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH in ikev2_process_state_packet() Aug 26 18:24:26.401548: | [RE]START processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 18:24:26.401551: | #1 complete_v2_state_transition() PARENT_I1->PARENT_I2 with status STF_SUSPEND Aug 26 18:24:26.401554: | suspending state #1 and saving MD Aug 26 18:24:26.401557: | #1 is busy; has a suspended MD Aug 26 18:24:26.401561: | [RE]START processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in log_stf_suspend() at ikev2.c:3269) Aug 26 18:24:26.401565: | "northnet-eastnet-ipv4" #1 complete v2 state STATE_PARENT_I1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 Aug 26 18:24:26.401569: | stop processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) Aug 26 18:24:26.401574: | #1 spent 0.622 milliseconds in ikev2_process_packet() Aug 26 18:24:26.401578: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Aug 26 18:24:26.401581: | processing: STOP state #0 (in process_md() at demux.c:382) Aug 26 18:24:26.401584: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:24:26.401587: | spent 0.636 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:24:26.401595: | processing resume sending helper answer for #1 Aug 26 18:24:26.401600: | start processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 18:24:26.401604: | crypto helper 1 replies to request ID 2 Aug 26 18:24:26.401607: | calling continuation function 0x55bb35b82b50 Aug 26 18:24:26.401610: | ikev2_parent_inR1outI2_continue for #1: calculating g^{xy}, sending I2 Aug 26 18:24:26.401616: | creating state object #2 at 0x55bb3610d928 Aug 26 18:24:26.401620: | State DB: adding IKEv2 state #2 in UNDEFINED Aug 26 18:24:26.401623: | pstats #2 ikev2.child started Aug 26 18:24:26.401626: | duplicating state object #1 "northnet-eastnet-ipv4" as #2 for IPSEC SA Aug 26 18:24:26.401631: | #2 setting local endpoint to 192.1.3.33:500 from #1.st_localport (in duplicate_state() at state.c:1484) Aug 26 18:24:26.401637: | Message ID: init_child #1.#2; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1 Aug 26 18:24:26.401642: | Message ID: switch-from #1 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=0->-1 wip.responder=-1 Aug 26 18:24:26.401647: | Message ID: switch-to #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->0 wip.responder=-1 Aug 26 18:24:26.401650: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 18:24:26.401653: | libevent_free: release ptr-libevent@0x7f8cd8002888 Aug 26 18:24:26.401656: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55bb36108358 Aug 26 18:24:26.401660: | event_schedule: new EVENT_SA_REPLACE-pe@0x55bb36108358 Aug 26 18:24:26.401666: | inserting event EVENT_SA_REPLACE, timeout in 60 seconds for #1 Aug 26 18:24:26.401669: | libevent_malloc: new ptr-libevent@0x7f8cd8002888 size 128 Aug 26 18:24:26.401673: | parent state #1: PARENT_I1(half-open IKE SA) => PARENT_I2(open IKE SA) Aug 26 18:24:26.401679: | **emit ISAKMP Message: Aug 26 18:24:26.401682: | initiator cookie: Aug 26 18:24:26.401684: | a2 24 da 50 b9 cc 37 1e Aug 26 18:24:26.401687: | responder cookie: Aug 26 18:24:26.401689: | 91 19 95 72 d6 80 ce 22 Aug 26 18:24:26.401692: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:24:26.401695: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 18:24:26.401698: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Aug 26 18:24:26.401701: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 18:24:26.401704: | Message ID: 1 (0x1) Aug 26 18:24:26.401707: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:24:26.401710: | ***emit IKEv2 Encryption Payload: Aug 26 18:24:26.401713: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:24:26.401715: | flags: none (0x0) Aug 26 18:24:26.401718: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Aug 26 18:24:26.401721: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' Aug 26 18:24:26.401725: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload Aug 26 18:24:26.401733: | IKEv2 CERT: send a certificate? Aug 26 18:24:26.401736: | IKEv2 CERT: no certificate to send Aug 26 18:24:26.401738: | IDr payload will be sent Aug 26 18:24:26.401751: | ****emit IKEv2 Identification - Initiator - Payload: Aug 26 18:24:26.401754: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:24:26.401757: | flags: none (0x0) Aug 26 18:24:26.401759: | ID type: ID_FQDN (0x2) Aug 26 18:24:26.401763: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Initiator - Payload (35:ISAKMP_NEXT_v2IDi) Aug 26 18:24:26.401766: | next payload chain: saving location 'IKEv2 Identification - Initiator - Payload'.'next payload type' in 'reply packet' Aug 26 18:24:26.401769: | emitting 5 raw bytes of my identity into IKEv2 Identification - Initiator - Payload Aug 26 18:24:26.401772: | my identity 6e 6f 72 74 68 Aug 26 18:24:26.401775: | emitting length of IKEv2 Identification - Initiator - Payload: 13 Aug 26 18:24:26.401783: | ****emit IKEv2 Identification - Responder - Payload: Aug 26 18:24:26.401786: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) Aug 26 18:24:26.401789: | flags: none (0x0) Aug 26 18:24:26.401791: | ID type: ID_FQDN (0x2) Aug 26 18:24:26.401795: | next payload chain: ignoring supplied 'IKEv2 Identification - Responder - Payload'.'next payload type' value 39:ISAKMP_NEXT_v2AUTH Aug 26 18:24:26.401798: | next payload chain: setting previous 'IKEv2 Identification - Initiator - Payload'.'next payload type' to current IKEv2 Identification - Responder - Payload (36:ISAKMP_NEXT_v2IDr) Aug 26 18:24:26.401801: | next payload chain: saving location 'IKEv2 Identification - Responder - Payload'.'next payload type' in 'reply packet' Aug 26 18:24:26.401804: | emitting 4 raw bytes of IDr into IKEv2 Identification - Responder - Payload Aug 26 18:24:26.401806: | IDr 65 61 73 74 Aug 26 18:24:26.401809: | emitting length of IKEv2 Identification - Responder - Payload: 12 Aug 26 18:24:26.401811: | not sending INITIAL_CONTACT Aug 26 18:24:26.401814: | ****emit IKEv2 Authentication Payload: Aug 26 18:24:26.401817: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:24:26.401820: | flags: none (0x0) Aug 26 18:24:26.401823: | auth method: IKEv2_AUTH_RSA (0x1) Aug 26 18:24:26.401826: | next payload chain: setting previous 'IKEv2 Identification - Responder - Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH) Aug 26 18:24:26.401829: | next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet' Aug 26 18:24:26.401835: | started looking for secret for @north->@east of kind PKK_RSA Aug 26 18:24:26.401839: | actually looking for secret for @north->@east of kind PKK_RSA Aug 26 18:24:26.401842: | line 1: key type PKK_RSA(@north) to type PKK_RSA Aug 26 18:24:26.401846: | 1: compared key (none) to @north / @east -> 002 Aug 26 18:24:26.401849: | 2: compared key (none) to @north / @east -> 002 Aug 26 18:24:26.401851: | line 1: match=002 Aug 26 18:24:26.401854: | match 002 beats previous best_match 000 match=0x55bb35ff3b58 (line=1) Aug 26 18:24:26.401857: | concluding with best_match=002 best=0x55bb35ff3b58 (lineno=1) Aug 26 18:24:26.407401: "northnet-eastnet-ipv4" #1: Can't find the certificate or private key from the NSS CKA_ID Aug 26 18:24:26.407435: | #1 spent 5.53 milliseconds in ikev2_calculate_rsa_hash() calling sign_hash_RSA() Aug 26 18:24:26.407441: "northnet-eastnet-ipv4" #1: Failed to find our RSA key Aug 26 18:24:26.407454: | suspend processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 18:24:26.407460: | start processing: state #2 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 18:24:26.407466: | #2 complete_v2_state_transition() md.from_state=PARENT_I1 md.svm.state[from]=PARENT_I1 UNDEFINED->PARENT_I2 with status STF_FATAL Aug 26 18:24:26.408767: | release_pending_whacks: state #2 has no whack fd Aug 26 18:24:26.408783: | release_pending_whacks: IKE SA #1 fd@24 has pending CHILD SA with socket fd@25 Aug 26 18:24:26.408788: | pstats #2 ikev2.child deleted other Aug 26 18:24:26.408793: | [RE]START processing: state #2 connection "northnet-eastnet-ipv4" from 192.1.2.23 (in delete_state() at state.c:879) Aug 26 18:24:26.408799: "northnet-eastnet-ipv4" #2: deleting state (STATE_UNDEFINED) aged 0.007s and NOT sending notification Aug 26 18:24:26.410659: | child state #2: UNDEFINED(ignore) => delete Aug 26 18:24:26.410666: | child state #2: UNDEFINED(ignore) => CHILDSA_DEL(informational) Aug 26 18:24:26.410671: | priority calculation of connection "northnet-eastnet-ipv4" is 0xfe7e7 Aug 26 18:24:26.410680: | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.3.0/24:0 => unk255.10000@192.1.3.33 (raw_eroute) Aug 26 18:24:26.411041: | raw_eroute result=success Aug 26 18:24:26.411049: | in connection_discard for connection northnet-eastnet-ipv4 Aug 26 18:24:26.411053: | State DB: deleting IKEv2 state #2 in CHILDSA_DEL Aug 26 18:24:26.411058: | child state #2: CHILDSA_DEL(informational) => UNDEFINED(ignore) Aug 26 18:24:26.411065: | stop processing: state #2 from 192.1.2.23 (in delete_state() at state.c:1143) Aug 26 18:24:26.411073: | resume sending helper answer for #1 suppresed complete_v2_state_transition() Aug 26 18:24:26.411082: | #1 spent 6.76 milliseconds in resume sending helper answer Aug 26 18:24:26.411085: | processing: STOP state #0 (in resume_handler() at server.c:833) Aug 26 18:24:26.411091: | libevent_free: release ptr-libevent@0x7f8cd0000f48 Aug 26 18:24:46.152311: | processing global timer EVENT_SHUNT_SCAN Aug 26 18:24:46.152326: | expiring aged bare shunts from shunt table Aug 26 18:24:46.152331: | spent 0.00396 milliseconds in global timer EVENT_SHUNT_SCAN Aug 26 18:25:06.143329: | processing global timer EVENT_SHUNT_SCAN Aug 26 18:25:06.143350: | expiring aged bare shunts from shunt table Aug 26 18:25:06.143356: | spent 0.00433 milliseconds in global timer EVENT_SHUNT_SCAN