Aug 26 18:24:49.287037: FIPS Product: YES
Aug 26 18:24:49.287119: FIPS Kernel: NO
Aug 26 18:24:49.287121: FIPS Mode: NO
Aug 26 18:24:49.287123: NSS DB directory: sql:/etc/ipsec.d
Aug 26 18:24:49.287242: Initializing NSS
Aug 26 18:24:49.287247: Opening NSS database "sql:/etc/ipsec.d" read-only
Aug 26 18:24:49.313161: NSS initialized
Aug 26 18:24:49.313181: NSS crypto library initialized
Aug 26 18:24:49.313184: FIPS HMAC integrity support [enabled]
Aug 26 18:24:49.313186: FIPS mode disabled for pluto daemon
Aug 26 18:24:49.345829: FIPS HMAC integrity verification self-test FAILED
Aug 26 18:24:49.346405: libcap-ng support [enabled]
Aug 26 18:24:49.346420: Linux audit support [enabled]
Aug 26 18:24:49.346482: Linux audit activated
Aug 26 18:24:49.346487: Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:29422
Aug 26 18:24:49.346490: core dump dir: /tmp
Aug 26 18:24:49.346492: secrets file: /etc/ipsec.secrets
Aug 26 18:24:49.346495: leak-detective enabled
Aug 26 18:24:49.346497: NSS crypto [enabled]
Aug 26 18:24:49.346500: XAUTH PAM support [enabled]
Aug 26 18:24:49.346590: | libevent is using pluto's memory allocator
Aug 26 18:24:49.346597: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800)
Aug 26 18:24:49.346613: | libevent_malloc: new ptr-libevent@0x55e7368be748 size 40
Aug 26 18:24:49.346635: | libevent_malloc: new ptr-libevent@0x55e7368b9cd8 size 40
Aug 26 18:24:49.346639: | libevent_malloc: new ptr-libevent@0x55e7368b9dd8 size 40
Aug 26 18:24:49.346642: | creating event base
Aug 26 18:24:49.346646: | libevent_malloc: new ptr-libevent@0x55e73693e5c8 size 56
Aug 26 18:24:49.346651: | libevent_malloc: new ptr-libevent@0x55e7368e2d88 size 664
Aug 26 18:24:49.346674: | libevent_malloc: new ptr-libevent@0x55e73693e638 size 24
Aug 26 18:24:49.346678: | libevent_malloc: new ptr-libevent@0x55e73693e688 size 384
Aug 26 18:24:49.346688: | libevent_malloc: new ptr-libevent@0x55e73693e588 size 16
Aug 26 18:24:49.346691: | libevent_malloc: new ptr-libevent@0x55e7368b9908 size 40
Aug 26 18:24:49.346693: | libevent_malloc: new ptr-libevent@0x55e7368b9d38 size 48
Aug 26 18:24:49.346698: | libevent_realloc: new ptr-libevent@0x55e7368e5ba8 size 256
Aug 26 18:24:49.346701: | libevent_malloc: new ptr-libevent@0x55e73693e838 size 16
Aug 26 18:24:49.346707: | libevent_free: release ptr-libevent@0x55e73693e5c8
Aug 26 18:24:49.346711: | libevent initialized
Aug 26 18:24:49.346716: | libevent_realloc: new ptr-libevent@0x55e73693e5c8 size 64
Aug 26 18:24:49.346720: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds
Aug 26 18:24:49.346738: | init_nat_traversal() initialized with keep_alive=0s
Aug 26 18:24:49.346741: NAT-Traversal support  [enabled]
Aug 26 18:24:49.346744: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized
Aug 26 18:24:49.346750: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized
Aug 26 18:24:49.346754: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds
Aug 26 18:24:49.346787: | global one-shot timer EVENT_REVIVE_CONNS initialized
Aug 26 18:24:49.346791: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds
Aug 26 18:24:49.346795: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds
Aug 26 18:24:49.346841: Encryption algorithms:
Aug 26 18:24:49.346850:   AES_CCM_16              IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm, aes_ccm_c
Aug 26 18:24:49.346855:   AES_CCM_12              IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm_b
Aug 26 18:24:49.346860:   AES_CCM_8               IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm_a
Aug 26 18:24:49.346863:   3DES_CBC                IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  [*192]  3des
Aug 26 18:24:49.346867:   CAMELLIA_CTR            IKEv1:     ESP     IKEv2:     ESP           {256,192,*128}
Aug 26 18:24:49.346875:   CAMELLIA_CBC            IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  camellia
Aug 26 18:24:49.346880:   AES_GCM_16              IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm, aes_gcm_c
Aug 26 18:24:49.346884:   AES_GCM_12              IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm_b
Aug 26 18:24:49.346888:   AES_GCM_8               IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm_a
Aug 26 18:24:49.346892:   AES_CTR                 IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aesctr
Aug 26 18:24:49.346896:   AES_CBC                 IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes
Aug 26 18:24:49.346900:   SERPENT_CBC             IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  serpent
Aug 26 18:24:49.346904:   TWOFISH_CBC             IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  twofish
Aug 26 18:24:49.346909:   TWOFISH_SSH             IKEv1: IKE         IKEv2: IKE ESP           {256,192,*128}  twofish_cbc_ssh
Aug 26 18:24:49.346912:   NULL_AUTH_AES_GMAC      IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_gmac
Aug 26 18:24:49.346916:   NULL                    IKEv1:     ESP     IKEv2:     ESP           []
Aug 26 18:24:49.346920:   CHACHA20_POLY1305       IKEv1:             IKEv2: IKE ESP           [*256]  chacha20poly1305
Aug 26 18:24:49.346927: Hash algorithms:
Aug 26 18:24:49.346931:   MD5                     IKEv1: IKE         IKEv2:                 
Aug 26 18:24:49.346935:   SHA1                    IKEv1: IKE         IKEv2:             FIPS  sha
Aug 26 18:24:49.346938:   SHA2_256                IKEv1: IKE         IKEv2:             FIPS  sha2, sha256
Aug 26 18:24:49.346941:   SHA2_384                IKEv1: IKE         IKEv2:             FIPS  sha384
Aug 26 18:24:49.346944:   SHA2_512                IKEv1: IKE         IKEv2:             FIPS  sha512
Aug 26 18:24:49.346958: PRF algorithms:
Aug 26 18:24:49.346963:   HMAC_MD5                IKEv1: IKE         IKEv2: IKE               md5
Aug 26 18:24:49.346966:   HMAC_SHA1               IKEv1: IKE         IKEv2: IKE         FIPS  sha, sha1
Aug 26 18:24:49.346970:   HMAC_SHA2_256           IKEv1: IKE         IKEv2: IKE         FIPS  sha2, sha256, sha2_256
Aug 26 18:24:49.346974:   HMAC_SHA2_384           IKEv1: IKE         IKEv2: IKE         FIPS  sha384, sha2_384
Aug 26 18:24:49.346978:   HMAC_SHA2_512           IKEv1: IKE         IKEv2: IKE         FIPS  sha512, sha2_512
Aug 26 18:24:49.346981:   AES_XCBC                IKEv1:             IKEv2: IKE               aes128_xcbc
Aug 26 18:24:49.347009: Integrity algorithms:
Aug 26 18:24:49.347013:   HMAC_MD5_96             IKEv1: IKE ESP AH  IKEv2: IKE ESP AH        md5, hmac_md5
Aug 26 18:24:49.347017:   HMAC_SHA1_96            IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha, sha1, sha1_96, hmac_sha1
Aug 26 18:24:49.347021:   HMAC_SHA2_512_256       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha512, sha2_512, sha2_512_256, hmac_sha2_512
Aug 26 18:24:49.347025:   HMAC_SHA2_384_192       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha384, sha2_384, sha2_384_192, hmac_sha2_384
Aug 26 18:24:49.347030:   HMAC_SHA2_256_128       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256
Aug 26 18:24:49.347033:   HMAC_SHA2_256_TRUNCBUG  IKEv1:     ESP AH  IKEv2:         AH      
Aug 26 18:24:49.347038:   AES_XCBC_96             IKEv1:     ESP AH  IKEv2: IKE ESP AH        aes_xcbc, aes128_xcbc, aes128_xcbc_96
Aug 26 18:24:49.347041:   AES_CMAC_96             IKEv1:     ESP AH  IKEv2:     ESP AH  FIPS  aes_cmac
Aug 26 18:24:49.347044:   NONE                    IKEv1:     ESP     IKEv2: IKE ESP     FIPS  null
Aug 26 18:24:49.347057: DH algorithms:
Aug 26 18:24:49.347061:   NONE                    IKEv1:             IKEv2: IKE ESP AH  FIPS  null, dh0
Aug 26 18:24:49.347065:   MODP1536                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH        dh5
Aug 26 18:24:49.347069:   MODP2048                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh14
Aug 26 18:24:49.347075:   MODP3072                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh15
Aug 26 18:24:49.347078:   MODP4096                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh16
Aug 26 18:24:49.347082:   MODP6144                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh17
Aug 26 18:24:49.347085:   MODP8192                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh18
Aug 26 18:24:49.347088:   DH19                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_256, ecp256
Aug 26 18:24:49.347092:   DH20                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_384, ecp384
Aug 26 18:24:49.347095:   DH21                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_521, ecp521
Aug 26 18:24:49.347098:   DH31                    IKEv1: IKE         IKEv2: IKE ESP AH        curve25519
Aug 26 18:24:49.347101: testing CAMELLIA_CBC:
Aug 26 18:24:49.347104:   Camellia: 16 bytes with 128-bit key
Aug 26 18:24:49.347228:   Camellia: 16 bytes with 128-bit key
Aug 26 18:24:49.347259:   Camellia: 16 bytes with 256-bit key
Aug 26 18:24:49.347312:   Camellia: 16 bytes with 256-bit key
Aug 26 18:24:49.347345: testing AES_GCM_16:
Aug 26 18:24:49.347349:   empty string
Aug 26 18:24:49.347396:   one block
Aug 26 18:24:49.347423:   two blocks
Aug 26 18:24:49.347450:   two blocks with associated data
Aug 26 18:24:49.347476: testing AES_CTR:
Aug 26 18:24:49.347480:   Encrypting 16 octets using AES-CTR with 128-bit key
Aug 26 18:24:49.347509:   Encrypting 32 octets using AES-CTR with 128-bit key
Aug 26 18:24:49.347538:   Encrypting 36 octets using AES-CTR with 128-bit key
Aug 26 18:24:49.347567:   Encrypting 16 octets using AES-CTR with 192-bit key
Aug 26 18:24:49.347597:   Encrypting 32 octets using AES-CTR with 192-bit key
Aug 26 18:24:49.347627:   Encrypting 36 octets using AES-CTR with 192-bit key
Aug 26 18:24:49.347654:   Encrypting 16 octets using AES-CTR with 256-bit key
Aug 26 18:24:49.347681:   Encrypting 32 octets using AES-CTR with 256-bit key
Aug 26 18:24:49.347727:   Encrypting 36 octets using AES-CTR with 256-bit key
Aug 26 18:24:49.347756: testing AES_CBC:
Aug 26 18:24:49.347759:   Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key
Aug 26 18:24:49.347785:   Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key
Aug 26 18:24:49.347818:   Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key
Aug 26 18:24:49.347835:   Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key
Aug 26 18:24:49.347855: testing AES_XCBC:
Aug 26 18:24:49.347858:   RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input
Aug 26 18:24:49.347932:   RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input
Aug 26 18:24:49.348011:   RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input
Aug 26 18:24:49.348084:   RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input
Aug 26 18:24:49.348158:   RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input
Aug 26 18:24:49.348234:   RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input
Aug 26 18:24:49.348359:   RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input
Aug 26 18:24:49.348529:   RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16)
Aug 26 18:24:49.348605:   RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10)
Aug 26 18:24:49.348701:   RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18)
Aug 26 18:24:49.348875: testing HMAC_MD5:
Aug 26 18:24:49.348880:   RFC 2104: MD5_HMAC test 1
Aug 26 18:24:49.349058:   RFC 2104: MD5_HMAC test 2
Aug 26 18:24:49.349218:   RFC 2104: MD5_HMAC test 3
Aug 26 18:24:49.349492: 8 CPU cores online
Aug 26 18:24:49.349502: starting up 7 crypto helpers
Aug 26 18:24:49.349627: started thread for crypto helper 0
Aug 26 18:24:49.349652: started thread for crypto helper 1
Aug 26 18:24:49.349673: | starting up helper thread 0
Aug 26 18:24:49.349682: | starting up helper thread 1
Aug 26 18:24:49.349699: | status value returned by setting the priority of this thread (crypto helper 1) 22
Aug 26 18:24:49.349701: | crypto helper 1 waiting (nothing to do)
Aug 26 18:24:49.349710: started thread for crypto helper 2
Aug 26 18:24:49.349701: | status value returned by setting the priority of this thread (crypto helper 0) 22
Aug 26 18:24:49.349716: | starting up helper thread 2
Aug 26 18:24:49.349724: | crypto helper 0 waiting (nothing to do)
Aug 26 18:24:49.349730: | status value returned by setting the priority of this thread (crypto helper 2) 22
Aug 26 18:24:49.349750: | crypto helper 2 waiting (nothing to do)
Aug 26 18:24:49.349757: started thread for crypto helper 3
Aug 26 18:24:49.349762: | starting up helper thread 3
Aug 26 18:24:49.349777: | status value returned by setting the priority of this thread (crypto helper 3) 22
Aug 26 18:24:49.349780: | crypto helper 3 waiting (nothing to do)
Aug 26 18:24:49.349788: started thread for crypto helper 4
Aug 26 18:24:49.349814: | starting up helper thread 4
Aug 26 18:24:49.349823: started thread for crypto helper 5
Aug 26 18:24:49.349826: | status value returned by setting the priority of this thread (crypto helper 4) 22
Aug 26 18:24:49.349830: | crypto helper 4 waiting (nothing to do)
Aug 26 18:24:49.349830: | starting up helper thread 5
Aug 26 18:24:49.349842: started thread for crypto helper 6
Aug 26 18:24:49.349847: | checking IKEv1 state table
Aug 26 18:24:49.349843: | status value returned by setting the priority of this thread (crypto helper 5) 22
Aug 26 18:24:49.349843: | starting up helper thread 6
Aug 26 18:24:49.349869: |   MAIN_R0: category: half-open IKE SA flags: 0:
Aug 26 18:24:49.349875: |     -> MAIN_R1 EVENT_SO_DISCARD
Aug 26 18:24:49.349873: | status value returned by setting the priority of this thread (crypto helper 6) 22
Aug 26 18:24:49.349869: | crypto helper 5 waiting (nothing to do)
Aug 26 18:24:49.349893: | crypto helper 6 waiting (nothing to do)
Aug 26 18:24:49.349879: |   MAIN_I1: category: half-open IKE SA flags: 0:
Aug 26 18:24:49.349922: |     -> MAIN_I2 EVENT_RETRANSMIT
Aug 26 18:24:49.349925: |   MAIN_R1: category: open IKE SA flags: 200:
Aug 26 18:24:49.349927: |     -> MAIN_R2 EVENT_RETRANSMIT
Aug 26 18:24:49.349928: |     -> UNDEFINED EVENT_RETRANSMIT
Aug 26 18:24:49.349930: |     -> UNDEFINED EVENT_RETRANSMIT
Aug 26 18:24:49.349932: |   MAIN_I2: category: open IKE SA flags: 0:
Aug 26 18:24:49.349933: |     -> MAIN_I3 EVENT_RETRANSMIT
Aug 26 18:24:49.349935: |     -> UNDEFINED EVENT_RETRANSMIT
Aug 26 18:24:49.349936: |     -> UNDEFINED EVENT_RETRANSMIT
Aug 26 18:24:49.349938: |   MAIN_R2: category: open IKE SA flags: 0:
Aug 26 18:24:49.349939: |     -> MAIN_R3 EVENT_SA_REPLACE
Aug 26 18:24:49.349941: |     -> MAIN_R3 EVENT_SA_REPLACE
Aug 26 18:24:49.349942: |     -> UNDEFINED EVENT_SA_REPLACE
Aug 26 18:24:49.349944: |   MAIN_I3: category: open IKE SA flags: 0:
Aug 26 18:24:49.349946: |     -> MAIN_I4 EVENT_SA_REPLACE
Aug 26 18:24:49.349947: |     -> MAIN_I4 EVENT_SA_REPLACE
Aug 26 18:24:49.349949: |     -> UNDEFINED EVENT_SA_REPLACE
Aug 26 18:24:49.349950: |   MAIN_R3: category: established IKE SA flags: 200:
Aug 26 18:24:49.349952: |     -> UNDEFINED EVENT_NULL
Aug 26 18:24:49.349954: |   MAIN_I4: category: established IKE SA flags: 0:
Aug 26 18:24:49.349955: |     -> UNDEFINED EVENT_NULL
Aug 26 18:24:49.349957: |   AGGR_R0: category: half-open IKE SA flags: 0:
Aug 26 18:24:49.349958: |     -> AGGR_R1 EVENT_SO_DISCARD
Aug 26 18:24:49.349960: |   AGGR_I1: category: half-open IKE SA flags: 0:
Aug 26 18:24:49.349962: |     -> AGGR_I2 EVENT_SA_REPLACE
Aug 26 18:24:49.349963: |     -> AGGR_I2 EVENT_SA_REPLACE
Aug 26 18:24:49.349965: |   AGGR_R1: category: open IKE SA flags: 200:
Aug 26 18:24:49.349966: |     -> AGGR_R2 EVENT_SA_REPLACE
Aug 26 18:24:49.349968: |     -> AGGR_R2 EVENT_SA_REPLACE
Aug 26 18:24:49.349970: |   AGGR_I2: category: established IKE SA flags: 200:
Aug 26 18:24:49.349973: |     -> UNDEFINED EVENT_NULL
Aug 26 18:24:49.349976: |   AGGR_R2: category: established IKE SA flags: 0:
Aug 26 18:24:49.349978: |     -> UNDEFINED EVENT_NULL
Aug 26 18:24:49.349981: |   QUICK_R0: category: established CHILD SA flags: 0:
Aug 26 18:24:49.349984: |     -> QUICK_R1 EVENT_RETRANSMIT
Aug 26 18:24:49.349990: |   QUICK_I1: category: established CHILD SA flags: 0:
Aug 26 18:24:49.349993: |     -> QUICK_I2 EVENT_SA_REPLACE
Aug 26 18:24:49.349995: |   QUICK_R1: category: established CHILD SA flags: 0:
Aug 26 18:24:49.349998: |     -> QUICK_R2 EVENT_SA_REPLACE
Aug 26 18:24:49.350001: |   QUICK_I2: category: established CHILD SA flags: 200:
Aug 26 18:24:49.350003: |     -> UNDEFINED EVENT_NULL
Aug 26 18:24:49.350006: |   QUICK_R2: category: established CHILD SA flags: 0:
Aug 26 18:24:49.350009: |     -> UNDEFINED EVENT_NULL
Aug 26 18:24:49.350012: |   INFO: category: informational flags: 0:
Aug 26 18:24:49.350015: |     -> UNDEFINED EVENT_NULL
Aug 26 18:24:49.350018: |   INFO_PROTECTED: category: informational flags: 0:
Aug 26 18:24:49.350020: |     -> UNDEFINED EVENT_NULL
Aug 26 18:24:49.350023: |   XAUTH_R0: category: established IKE SA flags: 0:
Aug 26 18:24:49.350026: |     -> XAUTH_R1 EVENT_NULL
Aug 26 18:24:49.350029: |   XAUTH_R1: category: established IKE SA flags: 0:
Aug 26 18:24:49.350032: |     -> MAIN_R3 EVENT_SA_REPLACE
Aug 26 18:24:49.350035: |   MODE_CFG_R0: category: informational flags: 0:
Aug 26 18:24:49.350038: |     -> MODE_CFG_R1 EVENT_SA_REPLACE
Aug 26 18:24:49.350040: |   MODE_CFG_R1: category: established IKE SA flags: 0:
Aug 26 18:24:49.350043: |     -> MODE_CFG_R2 EVENT_SA_REPLACE
Aug 26 18:24:49.350046: |   MODE_CFG_R2: category: established IKE SA flags: 0:
Aug 26 18:24:49.350049: |     -> UNDEFINED EVENT_NULL
Aug 26 18:24:49.350051: |   MODE_CFG_I1: category: established IKE SA flags: 0:
Aug 26 18:24:49.350054: |     -> MAIN_I4 EVENT_SA_REPLACE
Aug 26 18:24:49.350057: |   XAUTH_I0: category: established IKE SA flags: 0:
Aug 26 18:24:49.350059: |     -> XAUTH_I1 EVENT_RETRANSMIT
Aug 26 18:24:49.350062: |   XAUTH_I1: category: established IKE SA flags: 0:
Aug 26 18:24:49.350065: |     -> MAIN_I4 EVENT_RETRANSMIT
Aug 26 18:24:49.350071: | checking IKEv2 state table
Aug 26 18:24:49.350078: |   PARENT_I0: category: ignore flags: 0:
Aug 26 18:24:49.350081: |     -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT)
Aug 26 18:24:49.350084: |   PARENT_I1: category: half-open IKE SA flags: 0:
Aug 26 18:24:49.350087: |     -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification)
Aug 26 18:24:49.350090: |     -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH)
Aug 26 18:24:49.350093: |   PARENT_I2: category: open IKE SA flags: 0:
Aug 26 18:24:49.350096: |     -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification)
Aug 26 18:24:49.350099: |     -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification)
Aug 26 18:24:49.350101: |     -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification)
Aug 26 18:24:49.350104: |     -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response)
Aug 26 18:24:49.350107: |     -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification)
Aug 26 18:24:49.350110: |   PARENT_I3: category: established IKE SA flags: 0:
Aug 26 18:24:49.350113: |     -> PARENT_I3 EVENT_RETAIN (I3: Informational Request)
Aug 26 18:24:49.350115: |     -> PARENT_I3 EVENT_RETAIN (I3: Informational Response)
Aug 26 18:24:49.350118: |     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request)
Aug 26 18:24:49.350121: |     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response)
Aug 26 18:24:49.350123: |   PARENT_R0: category: half-open IKE SA flags: 0:
Aug 26 18:24:49.350126: |     -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT)
Aug 26 18:24:49.350129: |   PARENT_R1: category: half-open IKE SA flags: 0:
Aug 26 18:24:49.350132: |     -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED))
Aug 26 18:24:49.350135: |     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request)
Aug 26 18:24:49.350138: |   PARENT_R2: category: established IKE SA flags: 0:
Aug 26 18:24:49.350141: |     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request)
Aug 26 18:24:49.350146: |     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response)
Aug 26 18:24:49.350149: |     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request)
Aug 26 18:24:49.350152: |     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response)
Aug 26 18:24:49.350155: |   V2_CREATE_I0: category: established IKE SA flags: 0:
Aug 26 18:24:49.350158: |     -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA)
Aug 26 18:24:49.350161: |   V2_CREATE_I: category: established IKE SA flags: 0:
Aug 26 18:24:49.350164: |     -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response)
Aug 26 18:24:49.350167: |   V2_REKEY_IKE_I0: category: established IKE SA flags: 0:
Aug 26 18:24:49.350170: |     -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey)
Aug 26 18:24:49.350173: |   V2_REKEY_IKE_I: category: established IKE SA flags: 0:
Aug 26 18:24:49.350176: |     -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response)
Aug 26 18:24:49.350179: |   V2_REKEY_CHILD_I0: category: established IKE SA flags: 0:
Aug 26 18:24:49.350182: |     -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA)
Aug 26 18:24:49.350185: |   V2_REKEY_CHILD_I: category: established IKE SA flags: 0: <none>
Aug 26 18:24:49.350188: |   V2_CREATE_R: category: established IKE SA flags: 0:
Aug 26 18:24:49.350191: |     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request)
Aug 26 18:24:49.350194: |   V2_REKEY_IKE_R: category: established IKE SA flags: 0:
Aug 26 18:24:49.350196: |     -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey)
Aug 26 18:24:49.350199: |   V2_REKEY_CHILD_R: category: established IKE SA flags: 0: <none>
Aug 26 18:24:49.350202: |   V2_IPSEC_I: category: established CHILD SA flags: 0: <none>
Aug 26 18:24:49.350205: |   V2_IPSEC_R: category: established CHILD SA flags: 0: <none>
Aug 26 18:24:49.350208: |   IKESA_DEL: category: established IKE SA flags: 0:
Aug 26 18:24:49.350211: |     -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL)
Aug 26 18:24:49.350214: |   CHILDSA_DEL: category: informational flags: 0: <none>
Aug 26 18:24:49.350351: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64
Aug 26 18:24:49.350792: | Hard-wiring algorithms
Aug 26 18:24:49.350799: | adding AES_CCM_16 to kernel algorithm db
Aug 26 18:24:49.350804: | adding AES_CCM_12 to kernel algorithm db
Aug 26 18:24:49.350807: | adding AES_CCM_8 to kernel algorithm db
Aug 26 18:24:49.350809: | adding 3DES_CBC to kernel algorithm db
Aug 26 18:24:49.350812: | adding CAMELLIA_CBC to kernel algorithm db
Aug 26 18:24:49.350815: | adding AES_GCM_16 to kernel algorithm db
Aug 26 18:24:49.350818: | adding AES_GCM_12 to kernel algorithm db
Aug 26 18:24:49.350820: | adding AES_GCM_8 to kernel algorithm db
Aug 26 18:24:49.350823: | adding AES_CTR to kernel algorithm db
Aug 26 18:24:49.350825: | adding AES_CBC to kernel algorithm db
Aug 26 18:24:49.350828: | adding SERPENT_CBC to kernel algorithm db
Aug 26 18:24:49.350831: | adding TWOFISH_CBC to kernel algorithm db
Aug 26 18:24:49.350834: | adding NULL_AUTH_AES_GMAC to kernel algorithm db
Aug 26 18:24:49.350836: | adding NULL to kernel algorithm db
Aug 26 18:24:49.350840: | adding CHACHA20_POLY1305 to kernel algorithm db
Aug 26 18:24:49.350842: | adding HMAC_MD5_96 to kernel algorithm db
Aug 26 18:24:49.350845: | adding HMAC_SHA1_96 to kernel algorithm db
Aug 26 18:24:49.350847: | adding HMAC_SHA2_512_256 to kernel algorithm db
Aug 26 18:24:49.350850: | adding HMAC_SHA2_384_192 to kernel algorithm db
Aug 26 18:24:49.350853: | adding HMAC_SHA2_256_128 to kernel algorithm db
Aug 26 18:24:49.350856: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db
Aug 26 18:24:49.350858: | adding AES_XCBC_96 to kernel algorithm db
Aug 26 18:24:49.350861: | adding AES_CMAC_96 to kernel algorithm db
Aug 26 18:24:49.350863: | adding NONE to kernel algorithm db
Aug 26 18:24:49.350892: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes
Aug 26 18:24:49.350901: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds
Aug 26 18:24:49.350904: | setup kernel fd callback
Aug 26 18:24:49.350908: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x55e736943298
Aug 26 18:24:49.350913: | libevent_malloc: new ptr-libevent@0x55e736927668 size 128
Aug 26 18:24:49.350916: | libevent_malloc: new ptr-libevent@0x55e7369433a8 size 16
Aug 26 18:24:49.350923: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x55e736943dd8
Aug 26 18:24:49.350926: | libevent_malloc: new ptr-libevent@0x55e7368e5978 size 128
Aug 26 18:24:49.350929: | libevent_malloc: new ptr-libevent@0x55e736943d98 size 16
Aug 26 18:24:49.351168: | global one-shot timer EVENT_CHECK_CRLS initialized
Aug 26 18:24:49.351176: selinux support is enabled.
Aug 26 18:24:49.351832: | unbound context created - setting debug level to 5
Aug 26 18:24:49.351871: | /etc/hosts lookups activated
Aug 26 18:24:49.351890: | /etc/resolv.conf usage activated
Aug 26 18:24:49.351961: | outgoing-port-avoid set 0-65535
Aug 26 18:24:49.351996: | outgoing-port-permit set 32768-60999
Aug 26 18:24:49.352000: | Loading dnssec root key from:/var/lib/unbound/root.key
Aug 26 18:24:49.352004: | No additional dnssec trust anchors defined via dnssec-trusted= option
Aug 26 18:24:49.352008: | Setting up events, loop start
Aug 26 18:24:49.352013: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x55e736943e48
Aug 26 18:24:49.352017: | libevent_malloc: new ptr-libevent@0x55e736950058 size 128
Aug 26 18:24:49.352021: | libevent_malloc: new ptr-libevent@0x55e73695b328 size 16
Aug 26 18:24:49.352029: | libevent_realloc: new ptr-libevent@0x55e7368e2a18 size 256
Aug 26 18:24:49.352033: | libevent_malloc: new ptr-libevent@0x55e73695b368 size 8
Aug 26 18:24:49.352037: | libevent_realloc: new ptr-libevent@0x55e73695b3a8 size 144
Aug 26 18:24:49.352040: | libevent_malloc: new ptr-libevent@0x55e7368e38e8 size 152
Aug 26 18:24:49.352045: | libevent_malloc: new ptr-libevent@0x55e73695b468 size 16
Aug 26 18:24:49.352050: | signal event handler PLUTO_SIGCHLD installed
Aug 26 18:24:49.352053: | libevent_malloc: new ptr-libevent@0x55e73695b4a8 size 8
Aug 26 18:24:49.352069: | libevent_malloc: new ptr-libevent@0x55e7368ee958 size 152
Aug 26 18:24:49.352073: | signal event handler PLUTO_SIGTERM installed
Aug 26 18:24:49.352076: | libevent_malloc: new ptr-libevent@0x55e73695b4e8 size 8
Aug 26 18:24:49.352079: | libevent_malloc: new ptr-libevent@0x55e7368e6758 size 152
Aug 26 18:24:49.352083: | signal event handler PLUTO_SIGHUP installed
Aug 26 18:24:49.352086: | libevent_malloc: new ptr-libevent@0x55e73695b528 size 8
Aug 26 18:24:49.352089: | libevent_realloc: release ptr-libevent@0x55e73695b3a8
Aug 26 18:24:49.352092: | libevent_realloc: new ptr-libevent@0x55e73695b568 size 256
Aug 26 18:24:49.352095: | libevent_malloc: new ptr-libevent@0x55e73695b698 size 152
Aug 26 18:24:49.352098: | signal event handler PLUTO_SIGSYS installed
Aug 26 18:24:49.352506: | created addconn helper (pid:29485) using fork+execve
Aug 26 18:24:49.352526: | forked child 29485
Aug 26 18:24:49.352574: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:24:49.352588: listening for IKE messages
Aug 26 18:24:49.352635: | Inspecting interface lo 
Aug 26 18:24:49.352642: | found lo with address 127.0.0.1
Aug 26 18:24:49.352647: | Inspecting interface eth0 
Aug 26 18:24:49.352652: | found eth0 with address 192.0.3.254
Aug 26 18:24:49.352671: | Inspecting interface eth1 
Aug 26 18:24:49.352675: | found eth1 with address 192.1.3.33
Aug 26 18:24:49.352799: Kernel supports NIC esp-hw-offload
Aug 26 18:24:49.352809: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.3.33:500
Aug 26 18:24:49.352863: | NAT-Traversal: Trying sockopt style NAT-T
Aug 26 18:24:49.352866: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
Aug 26 18:24:49.352869: adding interface eth1/eth1 192.1.3.33:4500
Aug 26 18:24:49.352907: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.3.254:500
Aug 26 18:24:49.352922: | NAT-Traversal: Trying sockopt style NAT-T
Aug 26 18:24:49.352924: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
Aug 26 18:24:49.352927: adding interface eth0/eth0 192.0.3.254:4500
Aug 26 18:24:49.352944: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500
Aug 26 18:24:49.352959: | NAT-Traversal: Trying sockopt style NAT-T
Aug 26 18:24:49.352962: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
Aug 26 18:24:49.352964: adding interface lo/lo 127.0.0.1:4500
Aug 26 18:24:49.353016: | no interfaces to sort
Aug 26 18:24:49.353019: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
Aug 26 18:24:49.353024: | add_fd_read_event_handler: new ethX-pe@0x55e73695ba98
Aug 26 18:24:49.353026: | libevent_malloc: new ptr-libevent@0x55e73694ffa8 size 128
Aug 26 18:24:49.353029: | libevent_malloc: new ptr-libevent@0x55e73695bb08 size 16
Aug 26 18:24:49.353034: | setup callback for interface lo 127.0.0.1:4500 fd 22
Aug 26 18:24:49.353036: | add_fd_read_event_handler: new ethX-pe@0x55e73695bb48
Aug 26 18:24:49.353039: | libevent_malloc: new ptr-libevent@0x55e7368e63f8 size 128
Aug 26 18:24:49.353040: | libevent_malloc: new ptr-libevent@0x55e73695bbb8 size 16
Aug 26 18:24:49.353044: | setup callback for interface lo 127.0.0.1:500 fd 21
Aug 26 18:24:49.353045: | add_fd_read_event_handler: new ethX-pe@0x55e73695bbf8
Aug 26 18:24:49.353047: | libevent_malloc: new ptr-libevent@0x55e7368e6688 size 128
Aug 26 18:24:49.353049: | libevent_malloc: new ptr-libevent@0x55e73695bc68 size 16
Aug 26 18:24:49.353052: | setup callback for interface eth0 192.0.3.254:4500 fd 20
Aug 26 18:24:49.353054: | add_fd_read_event_handler: new ethX-pe@0x55e73695bca8
Aug 26 18:24:49.353055: | libevent_malloc: new ptr-libevent@0x55e7368dbb78 size 128
Aug 26 18:24:49.353057: | libevent_malloc: new ptr-libevent@0x55e73695bd18 size 16
Aug 26 18:24:49.353060: | setup callback for interface eth0 192.0.3.254:500 fd 19
Aug 26 18:24:49.353062: | add_fd_read_event_handler: new ethX-pe@0x55e73695bd58
Aug 26 18:24:49.353065: | libevent_malloc: new ptr-libevent@0x55e7368ba4e8 size 128
Aug 26 18:24:49.353066: | libevent_malloc: new ptr-libevent@0x55e73695bdc8 size 16
Aug 26 18:24:49.353070: | setup callback for interface eth1 192.1.3.33:4500 fd 18
Aug 26 18:24:49.353072: | add_fd_read_event_handler: new ethX-pe@0x55e73695be08
Aug 26 18:24:49.353073: | libevent_malloc: new ptr-libevent@0x55e7368ba1d8 size 128
Aug 26 18:24:49.353075: | libevent_malloc: new ptr-libevent@0x55e73695be78 size 16
Aug 26 18:24:49.353078: | setup callback for interface eth1 192.1.3.33:500 fd 17
Aug 26 18:24:49.353081: | certs and keys locked by 'free_preshared_secrets'
Aug 26 18:24:49.353083: | certs and keys unlocked by 'free_preshared_secrets'
Aug 26 18:24:49.353099: loading secrets from "/etc/ipsec.secrets"
Aug 26 18:24:49.353123: | saving Modulus
Aug 26 18:24:49.353127: | saving PublicExponent
Aug 26 18:24:49.353129: | ignoring PrivateExponent
Aug 26 18:24:49.353132: | ignoring Prime1
Aug 26 18:24:49.353134: | ignoring Prime2
Aug 26 18:24:49.353136: | ignoring Exponent1
Aug 26 18:24:49.353138: | ignoring Exponent2
Aug 26 18:24:49.353140: | ignoring Coefficient
Aug 26 18:24:49.353142: | ignoring CKAIDNSS
Aug 26 18:24:49.353168: | computed rsa CKAID  90 5d fc a1  08 68 74 7c  6f 20 d3 1b  2d 20 4b 8f
Aug 26 18:24:49.353170: | computed rsa CKAID  88 aa 7c 5d
Aug 26 18:24:49.353174: loaded private key for keyid: PKK_RSA:AQPl33O2P
Aug 26 18:24:49.353179: | certs and keys locked by 'process_secret'
Aug 26 18:24:49.353181: | certs and keys unlocked by 'process_secret'
Aug 26 18:24:49.353189: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:24:49.353194: | spent 0.63 milliseconds in whack
Aug 26 18:24:49.371409: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:24:49.371431: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:24:49.371439: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias
Aug 26 18:24:49.371443: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:24:49.371446: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias
Aug 26 18:24:49.371450: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:24:49.371457: | Added new connection north-east with policy ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
Aug 26 18:24:49.371461: | No AUTH policy was set - defaulting to RSASIG
Aug 26 18:24:49.371521: | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31
Aug 26 18:24:49.371526: | from whack: got --esp=
Aug 26 18:24:49.371566: | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128
Aug 26 18:24:49.371573: | counting wild cards for @north is 0
Aug 26 18:24:49.371576: | counting wild cards for @east is 0
Aug 26 18:24:49.371586: | connect_to_host_pair: 192.1.3.33:500 192.1.2.23:500 -> hp@(nil): none
Aug 26 18:24:49.371590: | new hp@0x55e73695e4a8
Aug 26 18:24:49.371595: added connection description "north-east"
Aug 26 18:24:49.371606: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
Aug 26 18:24:49.371618: | 192.0.3.254/32===192.1.3.33<192.1.3.33>[@north]...192.1.2.23<192.1.2.23>[@east]===192.0.2.0/24
Aug 26 18:24:49.371626: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:24:49.371632: | spent 0.233 milliseconds in whack
Aug 26 18:24:49.371674: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:24:49.371684: add keyid @north
Aug 26 18:24:49.371688: | add pubkey  01 03 e5 df  73 b6 3e d5  36 a8 f1 3d  0d d3 02 ab
Aug 26 18:24:49.371691: | add pubkey  7f ec 4c 9e  8b 0e 0e d2  cf 0f 59 bf  6d 88 21 86
Aug 26 18:24:49.371693: | add pubkey  93 9e 10 34  af 2d cf b3  7e eb e5 b2  24 b2 a5 b0
Aug 26 18:24:49.371696: | add pubkey  01 03 7d b5  96 ad 66 ee  48 c2 28 d9  9a 76 36 a9
Aug 26 18:24:49.371698: | add pubkey  10 84 b5 09  8f 17 4f 65  ce d8 2f 8e  78 80 8a 87
Aug 26 18:24:49.371701: | add pubkey  f4 6b 98 d9  91 94 6b 52  15 5b 9c 47  12 be d8 6f
Aug 26 18:24:49.371704: | add pubkey  25 b4 65 38  7e e4 8d c7  f0 58 d3 9f  69 14 cc 3e
Aug 26 18:24:49.371706: | add pubkey  c8 16 1f af  bb 5d 93 2b  33 39 0e 94  55 81 f4 b3
Aug 26 18:24:49.371709: | add pubkey  cc 92 58 6e  4a 5a 4e c3  76 ab 04 2e  11 08 06 55
Aug 26 18:24:49.371711: | add pubkey  13 0f 02 6c  dd d1 bc c0  b8 8d 65 f5  97 ed fc 18
Aug 26 18:24:49.371714: | add pubkey  39 f9 55 ab  fa 0d c5 49  99 7f 1b cf  c3 de 99 7d
Aug 26 18:24:49.371717: | add pubkey  9e ca 6f 9e  14 d6 5a ff  de d6 4f 57  6a 83 ab 51
Aug 26 18:24:49.371719: | add pubkey  ba 64 74 e0  22 e9 9a c5  10 71 bb d4  eb a4 99 28
Aug 26 18:24:49.371721: | add pubkey  9c 85 0e 31  ea cc ab ef  98 84 3f 59  c1 75 aa b3
Aug 26 18:24:49.371724: | add pubkey  61 eb 61 8c  58 a5 92 25  84 ad c7 79  f3 87 d0 c7
Aug 26 18:24:49.371726: | add pubkey  83 c2 d6 8a  fe 26 9d 2a  ff b1 dd 9b  89 21 7c ca
Aug 26 18:24:49.371728: | add pubkey  f5 38 2d 3f  64 0c 41 9c  34 e9 b2 55  0f 82 1a b3
Aug 26 18:24:49.371731: | add pubkey  c7 5e a5 99
Aug 26 18:24:49.371749: | computed rsa CKAID  90 5d fc a1  08 68 74 7c  6f 20 d3 1b  2d 20 4b 8f
Aug 26 18:24:49.371753: | computed rsa CKAID  88 aa 7c 5d
Aug 26 18:24:49.371764: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:24:49.371770: | spent 0.101 milliseconds in whack
Aug 26 18:24:49.371822: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:24:49.371832: add keyid @east
Aug 26 18:24:49.371836: | add pubkey  01 03 bd 6c  96 eb df 78  89 b3 ed 77  0d a1 7f 7b
Aug 26 18:24:49.371839: | add pubkey  e5 16 c2 c9  e4 7d 92 0a  90 9d 55 43  b4 62 13 03
Aug 26 18:24:49.371841: | add pubkey  85 7a e0 26  7b 54 1f ca  09 93 cf ff  25 c9 02 4c
Aug 26 18:24:49.371844: | add pubkey  78 ca 94 e5  3e ac d1 f9  a8 e5 bb 7f  cc 20 84 e0
Aug 26 18:24:49.371846: | add pubkey  21 c9 f0 0d  c5 44 ba f3  48 64 61 58  f6 0f 63 0d
Aug 26 18:24:49.371848: | add pubkey  d2 67 1e 59  8b ec f3 50  39 71 fb 39  da 11 64 b6
Aug 26 18:24:49.371851: | add pubkey  62 cd 5f d3  8d 2e c1 50  ed 9c 6e 22  0c 39 a7 ce
Aug 26 18:24:49.371853: | add pubkey  62 b5 af 8a  80 0f 2e 4c  05 5c 82 c7  8d 29 02 2e
Aug 26 18:24:49.371855: | add pubkey  bb 23 5f db  f2 9e b5 7d  e2 20 70 1a  63 f3 8e 5d
Aug 26 18:24:49.371857: | add pubkey  ac 47 f0 5c  26 4e b1 d0  42 60 52 4a  b0 77 25 ce
Aug 26 18:24:49.371860: | add pubkey  e0 98 2b 43  f4 c7 59 1a  64 01 83 ea  4e e3 1a 2a
Aug 26 18:24:49.371862: | add pubkey  92 b8 55 ab  63 dd 4b 70  47 29 dc e9  b4 60 bf 43
Aug 26 18:24:49.371864: | add pubkey  4d 58 8f 64  73 95 70 ac  35 89 b2 c2  9c d4 62 c0
Aug 26 18:24:49.371866: | add pubkey  5f 56 5f ad  1b e5 dd 49  93 6a f5 23  82 ed d4 e7
Aug 26 18:24:49.371868: | add pubkey  d5 f1 55 f2  2d a2 26 a6  36 53 2f 94  fb 99 22 5c
Aug 26 18:24:49.371870: | add pubkey  47 cc 6d 80  30 88 96 38  0c f5 f2 ed  37 d0 09 d5
Aug 26 18:24:49.371872: | add pubkey  07 8f 69 ef  a9 99 ce 4d  1a 77 9e 39  c4 38 f3 c5
Aug 26 18:24:49.371874: | add pubkey  51 51 48 ef
Aug 26 18:24:49.371882: | computed rsa CKAID  61 55 99 73  d3 ac ef 7d  3a 37 0e 3e  82 ad 92 c1
Aug 26 18:24:49.371886: | computed rsa CKAID  8a 82 25 f1
Aug 26 18:24:49.371896: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:24:49.371903: | spent 0.0845 milliseconds in whack
Aug 26 18:24:49.371922: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:24:49.371932: listening for IKE messages
Aug 26 18:24:49.371968: | Inspecting interface lo 
Aug 26 18:24:49.371975: | found lo with address 127.0.0.1
Aug 26 18:24:49.371979: | Inspecting interface eth0 
Aug 26 18:24:49.371984: | found eth0 with address 192.0.3.254
Aug 26 18:24:49.371987: | Inspecting interface eth1 
Aug 26 18:24:49.371991: | found eth1 with address 192.1.3.33
Aug 26 18:24:49.372059: | no interfaces to sort
Aug 26 18:24:49.372069: | libevent_free: release ptr-libevent@0x55e73694ffa8
Aug 26 18:24:49.372073: | free_event_entry: release EVENT_NULL-pe@0x55e73695ba98
Aug 26 18:24:49.372077: | add_fd_read_event_handler: new ethX-pe@0x55e73695ba98
Aug 26 18:24:49.372081: | libevent_malloc: new ptr-libevent@0x55e73694ffa8 size 128
Aug 26 18:24:49.372089: | setup callback for interface lo 127.0.0.1:4500 fd 22
Aug 26 18:24:49.372094: | libevent_free: release ptr-libevent@0x55e7368e63f8
Aug 26 18:24:49.372097: | free_event_entry: release EVENT_NULL-pe@0x55e73695bb48
Aug 26 18:24:49.372099: | add_fd_read_event_handler: new ethX-pe@0x55e73695bb48
Aug 26 18:24:49.372103: | libevent_malloc: new ptr-libevent@0x55e7368e63f8 size 128
Aug 26 18:24:49.372108: | setup callback for interface lo 127.0.0.1:500 fd 21
Aug 26 18:24:49.372112: | libevent_free: release ptr-libevent@0x55e7368e6688
Aug 26 18:24:49.372115: | free_event_entry: release EVENT_NULL-pe@0x55e73695bbf8
Aug 26 18:24:49.372117: | add_fd_read_event_handler: new ethX-pe@0x55e73695bbf8
Aug 26 18:24:49.372120: | libevent_malloc: new ptr-libevent@0x55e7368e6688 size 128
Aug 26 18:24:49.372124: | setup callback for interface eth0 192.0.3.254:4500 fd 20
Aug 26 18:24:49.372128: | libevent_free: release ptr-libevent@0x55e7368dbb78
Aug 26 18:24:49.372130: | free_event_entry: release EVENT_NULL-pe@0x55e73695bca8
Aug 26 18:24:49.372132: | add_fd_read_event_handler: new ethX-pe@0x55e73695bca8
Aug 26 18:24:49.372135: | libevent_malloc: new ptr-libevent@0x55e7368dbb78 size 128
Aug 26 18:24:49.372142: | setup callback for interface eth0 192.0.3.254:500 fd 19
Aug 26 18:24:49.372146: | libevent_free: release ptr-libevent@0x55e7368ba4e8
Aug 26 18:24:49.372148: | free_event_entry: release EVENT_NULL-pe@0x55e73695bd58
Aug 26 18:24:49.372151: | add_fd_read_event_handler: new ethX-pe@0x55e73695bd58
Aug 26 18:24:49.372153: | libevent_malloc: new ptr-libevent@0x55e7368ba4e8 size 128
Aug 26 18:24:49.372157: | setup callback for interface eth1 192.1.3.33:4500 fd 18
Aug 26 18:24:49.372161: | libevent_free: release ptr-libevent@0x55e7368ba1d8
Aug 26 18:24:49.372163: | free_event_entry: release EVENT_NULL-pe@0x55e73695be08
Aug 26 18:24:49.372165: | add_fd_read_event_handler: new ethX-pe@0x55e73695be08
Aug 26 18:24:49.372168: | libevent_malloc: new ptr-libevent@0x55e7368ba1d8 size 128
Aug 26 18:24:49.372172: | setup callback for interface eth1 192.1.3.33:500 fd 17
Aug 26 18:24:49.372176: | certs and keys locked by 'free_preshared_secrets'
Aug 26 18:24:49.372178: forgetting secrets
Aug 26 18:24:49.372186: | certs and keys unlocked by 'free_preshared_secrets'
Aug 26 18:24:49.372200: loading secrets from "/etc/ipsec.secrets"
Aug 26 18:24:49.372214: | saving Modulus
Aug 26 18:24:49.372218: | saving PublicExponent
Aug 26 18:24:49.372221: | ignoring PrivateExponent
Aug 26 18:24:49.372224: | ignoring Prime1
Aug 26 18:24:49.372227: | ignoring Prime2
Aug 26 18:24:49.372230: | ignoring Exponent1
Aug 26 18:24:49.372233: | ignoring Exponent2
Aug 26 18:24:49.372236: | ignoring Coefficient
Aug 26 18:24:49.372239: | ignoring CKAIDNSS
Aug 26 18:24:49.372250: | computed rsa CKAID  90 5d fc a1  08 68 74 7c  6f 20 d3 1b  2d 20 4b 8f
Aug 26 18:24:49.372254: | computed rsa CKAID  88 aa 7c 5d
Aug 26 18:24:49.372257: loaded private key for keyid: PKK_RSA:AQPl33O2P
Aug 26 18:24:49.372263: | certs and keys locked by 'process_secret'
Aug 26 18:24:49.372266: | certs and keys unlocked by 'process_secret'
Aug 26 18:24:49.372274: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:24:49.372279: | spent 0.36 milliseconds in whack
Aug 26 18:24:49.372307: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:24:49.372319: | FOR_EACH_CONNECTION_... in conn_by_name
Aug 26 18:24:49.372324: | start processing: connection "north-east" (in whack_route_connection() at rcv_whack.c:106)
Aug 26 18:24:49.372327: | could_route called for north-east (kind=CK_PERMANENT)
Aug 26 18:24:49.372330: | FOR_EACH_CONNECTION_... in route_owner
Aug 26 18:24:49.372333: |  conn north-east mark 0/00000000, 0/00000000 vs
Aug 26 18:24:49.372335: |  conn north-east mark 0/00000000, 0/00000000
Aug 26 18:24:49.372339: | route owner of "north-east" unrouted: NULL; eroute owner: NULL
Aug 26 18:24:49.372341: | route_and_eroute() for proto 0, and source port 0 dest port 0
Aug 26 18:24:49.372344: | FOR_EACH_CONNECTION_... in route_owner
Aug 26 18:24:49.372346: |  conn north-east mark 0/00000000, 0/00000000 vs
Aug 26 18:24:49.372349: |  conn north-east mark 0/00000000, 0/00000000
Aug 26 18:24:49.372352: | route owner of "north-east" unrouted: NULL; eroute owner: NULL
Aug 26 18:24:49.372355: | route_and_eroute with c: north-east (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #0
Aug 26 18:24:49.372359: | shunt_eroute() called for connection 'north-east' to 'add' for rt_kind 'prospective erouted' using protoports 0--0->-0
Aug 26 18:24:49.372361: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0
Aug 26 18:24:49.372364: | priority calculation of connection "north-east" is 0xfdfe7
Aug 26 18:24:49.372371: | IPsec Sa SPD priority set to 1040359
Aug 26 18:24:49.372408: | priority calculation of connection "north-east" is 0xfdfe7
Aug 26 18:24:49.372412: | route_and_eroute: firewall_notified: true
Aug 26 18:24:49.372414: | running updown command "ipsec _updown" for verb prepare 
Aug 26 18:24:49.372417: | command executing prepare-client
Aug 26 18:24:49.372442: | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.254/32' PLUTO_MY_CLIENT_NET='192.0.3.254' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_
Aug 26 18:24:49.372448: | popen cmd is 1028 chars long
Aug 26 18:24:49.372451: | cmd(   0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-east' PL:
Aug 26 18:24:49.372454: | cmd(  80):UTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_:
Aug 26 18:24:49.372456: | cmd( 160):ID='@north' PLUTO_MY_CLIENT='192.0.3.254/32' PLUTO_MY_CLIENT_NET='192.0.3.254' P:
Aug 26 18:24:49.372458: | cmd( 240):LUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PL:
Aug 26 18:24:49.372461: | cmd( 320):UTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID=:
Aug 26 18:24:49.372463: | cmd( 400):'@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO:
Aug 26 18:24:49.372466: | cmd( 480):_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PL:
Aug 26 18:24:49.372469: | cmd( 560):UTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+:
Aug 26 18:24:49.372471: | cmd( 640):ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIN:
Aug 26 18:24:49.372474: | cmd( 720):D='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO:
Aug 26 18:24:49.372476: | cmd( 800):='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO:
Aug 26 18:24:49.372479: | cmd( 880):_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_RO:
Aug 26 18:24:49.372482: | cmd( 960):UTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
Aug 26 18:24:49.383964: | running updown command "ipsec _updown" for verb route 
Aug 26 18:24:49.383987: | command executing route-client
Aug 26 18:24:49.384011: | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.254/32' PLUTO_MY_CLIENT_NET='192.0.3.254' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0
Aug 26 18:24:49.384014: | popen cmd is 1026 chars long
Aug 26 18:24:49.384016: | cmd(   0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-east' PLUT:
Aug 26 18:24:49.384018: | cmd(  80):O_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_ID:
Aug 26 18:24:49.384020: | cmd( 160):='@north' PLUTO_MY_CLIENT='192.0.3.254/32' PLUTO_MY_CLIENT_NET='192.0.3.254' PLU:
Aug 26 18:24:49.384026: | cmd( 240):TO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUT:
Aug 26 18:24:49.384027: | cmd( 320):O_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@:
Aug 26 18:24:49.384029: | cmd( 400):east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_P:
Aug 26 18:24:49.384031: | cmd( 480):EER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUT:
Aug 26 18:24:49.384033: | cmd( 560):O_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+EN:
Aug 26 18:24:49.384034: | cmd( 640):CRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND=:
Aug 26 18:24:49.384036: | cmd( 720):'CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO=':
Aug 26 18:24:49.384038: | cmd( 800):0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_C:
Aug 26 18:24:49.384040: | cmd( 880):FG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUT:
Aug 26 18:24:49.384041: | cmd( 960):ING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
Aug 26 18:24:49.394912: | stop processing: connection "north-east" (in whack_route_connection() at rcv_whack.c:116)
Aug 26 18:24:49.394939: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:24:49.394950: | spent 1.09 milliseconds in whack
Aug 26 18:24:49.394969: | processing signal PLUTO_SIGCHLD
Aug 26 18:24:49.394977: | waitpid returned nothing left to do (all child processes are busy)
Aug 26 18:24:49.394981: | spent 0.00582 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:24:49.394984: | processing signal PLUTO_SIGCHLD
Aug 26 18:24:49.394987: | waitpid returned nothing left to do (all child processes are busy)
Aug 26 18:24:49.394991: | spent 0.00356 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:24:49.395434: | processing signal PLUTO_SIGCHLD
Aug 26 18:24:49.395446: | waitpid returned pid 29485 (exited with status 0)
Aug 26 18:24:49.395449: | reaped addconn helper child (status 0)
Aug 26 18:24:49.395458: | waitpid returned ECHILD (no child processes left)
Aug 26 18:24:49.395461: | spent 0.0179 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:24:49.574145: |  kernel_process_msg_cb process netlink message
Aug 26 18:24:49.574169: | netlink_get: XFRM_MSG_ACQUIRE message
Aug 26 18:24:49.574172: | xfrm netlink msg len 376
Aug 26 18:24:49.574175: | xfrm acquire rtattribute type 5
Aug 26 18:24:49.574177: | xfrm acquire rtattribute type 16
Aug 26 18:24:49.574192: | add bare shunt 0x55e73695d758 192.0.3.254/32:8 --1--> 192.0.2.254/32:0 => %hold 0    %acquire-netlink
Aug 26 18:24:49.574199: initiate on demand from 192.0.3.254:8 to 192.0.2.254:0 proto=1 because: acquire
Aug 26 18:24:49.574207: | find_connection: looking for policy for connection: 192.0.3.254:1/8 -> 192.0.2.254:1/0
Aug 26 18:24:49.574211: | FOR_EACH_CONNECTION_... in find_connection_for_clients
Aug 26 18:24:49.574216: | find_connection: conn "north-east" has compatible peers: 192.0.3.254/32 -> 192.0.2.0/24 [pri: 33603594]
Aug 26 18:24:49.574220: | find_connection: first OK "north-east" [pri:33603594]{0x55e73695c748} (child none)
Aug 26 18:24:49.574223: | find_connection: concluding with "north-east" [pri:33603594]{0x55e73695c748} kind=CK_PERMANENT
Aug 26 18:24:49.574226: | assign hold, routing was prospective erouted, needs to be erouted HOLD
Aug 26 18:24:49.574229: | assign_holdpass() need broad(er) shunt
Aug 26 18:24:49.574232: | priority calculation of connection "north-east" is 0xfdfe7
Aug 26 18:24:49.574238: | eroute_connection replace %trap with broad %pass or %hold eroute 192.0.3.254/32:0 --0-> 192.0.2.0/24:0 => %hold>%hold (raw_eroute)
Aug 26 18:24:49.574244: | netlink_raw_eroute: SPI_HOLD implemented as no-op
Aug 26 18:24:49.574247: | raw_eroute result=success
Aug 26 18:24:49.574250: | assign_holdpass() eroute_connection() done
Aug 26 18:24:49.574252: | fiddle_bare_shunt called
Aug 26 18:24:49.574255: | fiddle_bare_shunt with transport_proto 1
Aug 26 18:24:49.574265: | removing specific host-to-host bare shunt
Aug 26 18:24:49.574270: | delete narrow %hold eroute 192.0.3.254/32:8 --1-> 192.0.2.254/32:0 => %hold (raw_eroute)
Aug 26 18:24:49.574273: | netlink_raw_eroute: SPI_PASS
Aug 26 18:24:49.574287: | raw_eroute result=success
Aug 26 18:24:49.574298: | raw_eroute with op='delete' for transport_proto='1' kernel shunt succeeded, bare shunt lookup succeeded
Aug 26 18:24:49.574305: | delete bare shunt 0x55e73695d758 192.0.3.254/32:8 --1--> 192.0.2.254/32:0 => %hold 0    %acquire-netlink
Aug 26 18:24:49.574308: assign_holdpass() delete_bare_shunt() failed
Aug 26 18:24:49.574311: initiate_ondemand_body() failed to install negotiation_shunt,
Aug 26 18:24:49.574314: | FOR_EACH_STATE_... in find_phase1_state
Aug 26 18:24:49.574336: | creating state object #1 at 0x55e73695eb68
Aug 26 18:24:49.574341: | State DB: adding IKEv2 state #1 in UNDEFINED
Aug 26 18:24:49.574351: | pstats #1 ikev2.ike started
Aug 26 18:24:49.574356: | Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0
Aug 26 18:24:49.574360: | parent state #1: UNDEFINED(ignore) => PARENT_I0(ignore)
Aug 26 18:24:49.574366: | Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1
Aug 26 18:24:49.574376: | start processing: state #1 connection "north-east" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535)
Aug 26 18:24:49.574380: | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551)
Aug 26 18:24:49.574385: | Queuing pending IPsec SA negotiating with 192.1.2.23 "north-east" IKE SA #1 "north-east"
Aug 26 18:24:49.574391: "north-east" #1: initiating v2 parent SA
Aug 26 18:24:49.574394: | constructing local IKE proposals for north-east (IKE SA initiator selecting KE)
Aug 26 18:24:49.574404: | converting ike_info AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ...
Aug 26 18:24:49.574412: | ...  ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519
Aug 26 18:24:49.574417: | converting ike_info AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ...
Aug 26 18:24:49.574422: | ...  ikev2_proposal: 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519
Aug 26 18:24:49.574426: | converting ike_info AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ...
Aug 26 18:24:49.574432: | ...  ikev2_proposal: 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519
Aug 26 18:24:49.574436: | converting ike_info AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ...
Aug 26 18:24:49.574442: | ...  ikev2_proposal: 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519
Aug 26 18:24:49.574454: "north-east": constructed local IKE proposals for north-east (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519
Aug 26 18:24:49.574461: | adding ikev2_outI1 KE work-order 1 for state #1
Aug 26 18:24:49.574468: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55e73695e588
Aug 26 18:24:49.574472: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1
Aug 26 18:24:49.574476: | libevent_malloc: new ptr-libevent@0x55e73695fb78 size 128
Aug 26 18:24:49.574490: | #1 spent 0.287 milliseconds in ikev2_parent_outI1()
Aug 26 18:24:49.574496: | RESET processing: state #1 connection "north-east" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610)
Aug 26 18:24:49.574501: | initiate on demand using RSASIG from 192.0.3.254 to 192.0.2.254
Aug 26 18:24:49.574507: | spent 0.338 milliseconds in kernel message
Aug 26 18:24:49.574521: | crypto helper 1 resuming
Aug 26 18:24:49.574532: | crypto helper 1 starting work-order 1 for state #1
Aug 26 18:24:49.574536: | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 1
Aug 26 18:24:49.575130: | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 1 time elapsed 0.000594 seconds
Aug 26 18:24:49.575136: | (#1) spent 0.599 milliseconds in crypto helper computing work-order 1: ikev2_outI1 KE (pcr)
Aug 26 18:24:49.575138: | crypto helper 1 sending results from work-order 1 for state #1 to event queue
Aug 26 18:24:49.575140: | scheduling resume sending helper answer for #1
Aug 26 18:24:49.575143: | libevent_malloc: new ptr-libevent@0x7fd538002888 size 128
Aug 26 18:24:49.575149: | crypto helper 1 waiting (nothing to do)
Aug 26 18:24:49.575185: | processing resume sending helper answer for #1
Aug 26 18:24:49.575194: | start processing: state #1 connection "north-east" from 192.1.2.23 (in resume_handler() at server.c:797)
Aug 26 18:24:49.575199: | crypto helper 1 replies to request ID 1
Aug 26 18:24:49.575200: | calling continuation function 0x55e734869b50
Aug 26 18:24:49.575202: | ikev2_parent_outI1_continue for #1
Aug 26 18:24:49.575229: | **emit ISAKMP Message:
Aug 26 18:24:49.575232: |    initiator cookie:
Aug 26 18:24:49.575234: |   14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:49.575236: |    responder cookie:
Aug 26 18:24:49.575237: |   00 00 00 00  00 00 00 00
Aug 26 18:24:49.575239: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:24:49.575241: |    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Aug 26 18:24:49.575243: |    exchange type: ISAKMP_v2_IKE_SA_INIT (0x22)
Aug 26 18:24:49.575246: |    flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Aug 26 18:24:49.575248: |    Message ID: 0 (0x0)
Aug 26 18:24:49.575250: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:24:49.575260: | using existing local IKE proposals for connection north-east (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519
Aug 26 18:24:49.575262: | Emitting ikev2_proposals ...
Aug 26 18:24:49.575264: | ***emit IKEv2 Security Association Payload:
Aug 26 18:24:49.575266: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:49.575268: |    flags: none (0x0)
Aug 26 18:24:49.575270: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA)
Aug 26 18:24:49.575272: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:24:49.575274: | discarding INTEG=NONE
Aug 26 18:24:49.575276: | ****emit IKEv2 Proposal Substructure Payload:
Aug 26 18:24:49.575278: |    last proposal: v2_PROPOSAL_NON_LAST (0x2)
Aug 26 18:24:49.575280: |    prop #: 1 (0x1)
Aug 26 18:24:49.575284: |    proto ID: IKEv2_SEC_PROTO_IKE (0x1)
Aug 26 18:24:49.575286: |    spi size: 0 (0x0)
Aug 26 18:24:49.575292: |    # transforms: 11 (0xb)
Aug 26 18:24:49.575298: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
Aug 26 18:24:49.575303: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575305: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575307: |    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
Aug 26 18:24:49.575308: |    IKEv2 transform ID: AES_GCM_C (0x14)
Aug 26 18:24:49.575310: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575312: | ******emit IKEv2 Attribute Substructure Payload:
Aug 26 18:24:49.575314: |    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
Aug 26 18:24:49.575316: |    length/value: 256 (0x100)
Aug 26 18:24:49.575318: | emitting length of IKEv2 Transform Substructure Payload: 12
Aug 26 18:24:49.575320: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575321: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575323: |    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
Aug 26 18:24:49.575325: |    IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7)
Aug 26 18:24:49.575327: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575329: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575331: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575332: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575334: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575336: |    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
Aug 26 18:24:49.575337: |    IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5)
Aug 26 18:24:49.575339: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575341: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575343: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575344: | discarding INTEG=NONE
Aug 26 18:24:49.575346: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575348: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575349: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575351: |    IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe)
Aug 26 18:24:49.575353: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575355: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575357: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575358: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575360: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575361: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575363: |    IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf)
Aug 26 18:24:49.575365: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575367: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575369: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575370: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575372: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575377: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575379: |    IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10)
Aug 26 18:24:49.575381: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575383: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575384: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575386: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575388: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575389: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575391: |    IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12)
Aug 26 18:24:49.575393: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575395: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575396: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575398: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575400: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575401: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575403: |    IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13)
Aug 26 18:24:49.575405: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575407: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575409: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575410: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575412: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575413: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575415: |    IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14)
Aug 26 18:24:49.575417: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575419: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575421: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575422: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575424: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575426: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575427: |    IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15)
Aug 26 18:24:49.575429: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575431: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575433: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575434: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575436: |    last transform: v2_TRANSFORM_LAST (0x0)
Aug 26 18:24:49.575438: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575439: |    IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f)
Aug 26 18:24:49.575441: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575443: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575445: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575447: | emitting length of IKEv2 Proposal Substructure Payload: 100
Aug 26 18:24:49.575449: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
Aug 26 18:24:49.575451: | discarding INTEG=NONE
Aug 26 18:24:49.575453: | ****emit IKEv2 Proposal Substructure Payload:
Aug 26 18:24:49.575455: |    last proposal: v2_PROPOSAL_NON_LAST (0x2)
Aug 26 18:24:49.575456: |    prop #: 2 (0x2)
Aug 26 18:24:49.575458: |    proto ID: IKEv2_SEC_PROTO_IKE (0x1)
Aug 26 18:24:49.575459: |    spi size: 0 (0x0)
Aug 26 18:24:49.575461: |    # transforms: 11 (0xb)
Aug 26 18:24:49.575463: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2)
Aug 26 18:24:49.575465: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
Aug 26 18:24:49.575467: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575468: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575470: |    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
Aug 26 18:24:49.575472: |    IKEv2 transform ID: AES_GCM_C (0x14)
Aug 26 18:24:49.575474: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575475: | ******emit IKEv2 Attribute Substructure Payload:
Aug 26 18:24:49.575477: |    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
Aug 26 18:24:49.575479: |    length/value: 128 (0x80)
Aug 26 18:24:49.575481: | emitting length of IKEv2 Transform Substructure Payload: 12
Aug 26 18:24:49.575482: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575484: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575486: |    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
Aug 26 18:24:49.575487: |    IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7)
Aug 26 18:24:49.575489: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575491: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575493: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575494: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575496: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575498: |    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
Aug 26 18:24:49.575499: |    IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5)
Aug 26 18:24:49.575501: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575503: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575505: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575507: | discarding INTEG=NONE
Aug 26 18:24:49.575508: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575510: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575511: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575513: |    IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe)
Aug 26 18:24:49.575515: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575517: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575519: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575520: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575522: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575523: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575526: |    IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf)
Aug 26 18:24:49.575528: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575530: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575532: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575533: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575535: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575537: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575538: |    IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10)
Aug 26 18:24:49.575540: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575542: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575544: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575545: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575547: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575549: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575550: |    IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12)
Aug 26 18:24:49.575552: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575554: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575556: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575557: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575559: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575561: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575562: |    IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13)
Aug 26 18:24:49.575564: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575566: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575568: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575569: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575571: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575573: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575574: |    IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14)
Aug 26 18:24:49.575576: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575578: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575580: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575582: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575583: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575585: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575586: |    IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15)
Aug 26 18:24:49.575588: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575590: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575592: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575595: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575596: |    last transform: v2_TRANSFORM_LAST (0x0)
Aug 26 18:24:49.575598: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575600: |    IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f)
Aug 26 18:24:49.575602: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575604: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575605: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575607: | emitting length of IKEv2 Proposal Substructure Payload: 100
Aug 26 18:24:49.575609: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
Aug 26 18:24:49.575611: | ****emit IKEv2 Proposal Substructure Payload:
Aug 26 18:24:49.575612: |    last proposal: v2_PROPOSAL_NON_LAST (0x2)
Aug 26 18:24:49.575614: |    prop #: 3 (0x3)
Aug 26 18:24:49.575615: |    proto ID: IKEv2_SEC_PROTO_IKE (0x1)
Aug 26 18:24:49.575617: |    spi size: 0 (0x0)
Aug 26 18:24:49.575619: |    # transforms: 13 (0xd)
Aug 26 18:24:49.575621: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2)
Aug 26 18:24:49.575623: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
Aug 26 18:24:49.575624: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575626: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575628: |    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
Aug 26 18:24:49.575629: |    IKEv2 transform ID: AES_CBC (0xc)
Aug 26 18:24:49.575631: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575633: | ******emit IKEv2 Attribute Substructure Payload:
Aug 26 18:24:49.575634: |    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
Aug 26 18:24:49.575636: |    length/value: 256 (0x100)
Aug 26 18:24:49.575638: | emitting length of IKEv2 Transform Substructure Payload: 12
Aug 26 18:24:49.575639: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575641: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575643: |    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
Aug 26 18:24:49.575644: |    IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7)
Aug 26 18:24:49.575646: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575648: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575650: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575651: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575653: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575655: |    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
Aug 26 18:24:49.575656: |    IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5)
Aug 26 18:24:49.575658: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575660: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575662: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575663: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575665: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575667: |    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
Aug 26 18:24:49.575668: |    IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe)
Aug 26 18:24:49.575671: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575673: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575675: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575676: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575678: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575680: |    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
Aug 26 18:24:49.575681: |    IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc)
Aug 26 18:24:49.575683: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575685: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575687: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575688: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575690: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575692: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575693: |    IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe)
Aug 26 18:24:49.575695: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575697: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575699: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575701: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575702: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575704: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575705: |    IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf)
Aug 26 18:24:49.575707: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575709: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575711: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575713: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575714: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575716: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575717: |    IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10)
Aug 26 18:24:49.575719: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575721: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575723: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575725: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575726: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575728: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575729: |    IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12)
Aug 26 18:24:49.575731: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575733: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575735: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575737: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575738: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575741: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575742: |    IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13)
Aug 26 18:24:49.575744: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575746: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575748: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575750: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575751: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575753: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575754: |    IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14)
Aug 26 18:24:49.575756: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575758: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575760: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575762: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575763: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575765: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575767: |    IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15)
Aug 26 18:24:49.575768: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575770: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575772: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575774: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575775: |    last transform: v2_TRANSFORM_LAST (0x0)
Aug 26 18:24:49.575777: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575779: |    IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f)
Aug 26 18:24:49.575781: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575783: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575784: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575786: | emitting length of IKEv2 Proposal Substructure Payload: 116
Aug 26 18:24:49.575788: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
Aug 26 18:24:49.575790: | ****emit IKEv2 Proposal Substructure Payload:
Aug 26 18:24:49.575791: |    last proposal: v2_PROPOSAL_LAST (0x0)
Aug 26 18:24:49.575793: |    prop #: 4 (0x4)
Aug 26 18:24:49.575794: |    proto ID: IKEv2_SEC_PROTO_IKE (0x1)
Aug 26 18:24:49.575796: |    spi size: 0 (0x0)
Aug 26 18:24:49.575798: |    # transforms: 13 (0xd)
Aug 26 18:24:49.575800: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2)
Aug 26 18:24:49.575802: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
Aug 26 18:24:49.575803: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575805: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575807: |    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
Aug 26 18:24:49.575808: |    IKEv2 transform ID: AES_CBC (0xc)
Aug 26 18:24:49.575810: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575813: | ******emit IKEv2 Attribute Substructure Payload:
Aug 26 18:24:49.575814: |    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
Aug 26 18:24:49.575816: |    length/value: 128 (0x80)
Aug 26 18:24:49.575818: | emitting length of IKEv2 Transform Substructure Payload: 12
Aug 26 18:24:49.575819: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575821: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575823: |    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
Aug 26 18:24:49.575824: |    IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7)
Aug 26 18:24:49.575826: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575828: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575830: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575831: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575833: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575835: |    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
Aug 26 18:24:49.575836: |    IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5)
Aug 26 18:24:49.575838: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575840: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575842: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575843: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575845: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575847: |    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
Aug 26 18:24:49.575848: |    IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe)
Aug 26 18:24:49.575850: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575852: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575854: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575855: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575857: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575859: |    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
Aug 26 18:24:49.575860: |    IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc)
Aug 26 18:24:49.575862: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575864: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575866: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575867: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575869: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575871: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575872: |    IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe)
Aug 26 18:24:49.575874: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575876: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575878: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575880: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575881: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575883: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575884: |    IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf)
Aug 26 18:24:49.575887: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575889: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575891: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575893: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575894: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575896: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575898: |    IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10)
Aug 26 18:24:49.575900: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575901: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575903: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575905: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575906: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575908: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575910: |    IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12)
Aug 26 18:24:49.575912: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575913: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575915: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575917: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575918: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575920: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575922: |    IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13)
Aug 26 18:24:49.575923: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575925: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575927: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575929: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575930: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575932: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575934: |    IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14)
Aug 26 18:24:49.575936: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575937: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575939: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575941: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575942: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575944: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575946: |    IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15)
Aug 26 18:24:49.575948: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575949: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575951: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575953: | *****emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.575956: |    last transform: v2_TRANSFORM_LAST (0x0)
Aug 26 18:24:49.575958: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.575960: |    IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f)
Aug 26 18:24:49.575962: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.575964: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.575965: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.575967: | emitting length of IKEv2 Proposal Substructure Payload: 116
Aug 26 18:24:49.575969: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
Aug 26 18:24:49.575971: | emitting length of IKEv2 Security Association Payload: 436
Aug 26 18:24:49.575972: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0
Aug 26 18:24:49.575974: | ***emit IKEv2 Key Exchange Payload:
Aug 26 18:24:49.575976: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:49.575978: |    flags: none (0x0)
Aug 26 18:24:49.575979: |    DH group: OAKLEY_GROUP_MODP2048 (0xe)
Aug 26 18:24:49.575982: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE)
Aug 26 18:24:49.575984: | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet'
Aug 26 18:24:49.575986: | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload
Aug 26 18:24:49.575988: | ikev2 g^x  a6 9a eb 38  9a 58 20 5a  0b 27 9a 75  36 6b 88 4a
Aug 26 18:24:49.575990: | ikev2 g^x  15 3a 1c f9  e1 96 34 a5  aa 1d 6e 33  82 ce 67 95
Aug 26 18:24:49.575991: | ikev2 g^x  35 a6 12 7f  e3 2d 01 1a  14 14 87 e1  22 61 1a a6
Aug 26 18:24:49.575993: | ikev2 g^x  56 93 9e b7  cd bb 29 ed  99 74 3d e4  d6 1c 90 53
Aug 26 18:24:49.575994: | ikev2 g^x  c8 16 31 19  95 c9 ab 61  2f 14 fb e8  20 2d f7 c1
Aug 26 18:24:49.575996: | ikev2 g^x  b6 be 64 b2  c6 d1 e2 21  21 94 8a 32  25 5c 87 42
Aug 26 18:24:49.575998: | ikev2 g^x  37 7b 3d 21  77 ed 6c 6e  7e 4e 6a b0  89 82 68 4c
Aug 26 18:24:49.575999: | ikev2 g^x  98 ba da 05  2e 9d 71 b0  22 d8 e7 9d  de 06 1b fc
Aug 26 18:24:49.576001: | ikev2 g^x  61 37 bc cf  a6 e7 e6 62  61 38 20 6b  b3 85 f3 c8
Aug 26 18:24:49.576002: | ikev2 g^x  8e 45 f1 72  7f 26 9e 55  e3 82 5c 14  a5 42 3c e0
Aug 26 18:24:49.576004: | ikev2 g^x  6f b0 2b 3e  d7 cc 91 52  07 a3 b1 5e  7a 0c df 0a
Aug 26 18:24:49.576005: | ikev2 g^x  fa b0 38 43  2c 55 63 6f  07 c6 7f 37  83 55 eb c5
Aug 26 18:24:49.576007: | ikev2 g^x  e1 41 9c 98  a4 3d 05 47  e9 cb ec 9b  bd 2c 6c b7
Aug 26 18:24:49.576009: | ikev2 g^x  52 9d 20 08  fb a9 01 29  e3 2f 67 bf  20 a6 67 88
Aug 26 18:24:49.576010: | ikev2 g^x  07 03 ff 61  ed c6 58 b0  08 23 9d cf  c3 01 05 87
Aug 26 18:24:49.576012: | ikev2 g^x  3f 61 12 ad  ad 53 23 e8  dd 95 5d c3  0e df 59 ac
Aug 26 18:24:49.576013: | emitting length of IKEv2 Key Exchange Payload: 264
Aug 26 18:24:49.576015: | ***emit IKEv2 Nonce Payload:
Aug 26 18:24:49.576017: |    next payload type: ISAKMP_NEXT_v2N (0x29)
Aug 26 18:24:49.576018: |    flags: none (0x0)
Aug 26 18:24:49.576020: | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N
Aug 26 18:24:49.576023: | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni)
Aug 26 18:24:49.576024: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet'
Aug 26 18:24:49.576026: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload
Aug 26 18:24:49.576028: | IKEv2 nonce  5f 4f c1 43  6a 2a 3f 8f  c5 68 e8 02  2f 0a a5 f7
Aug 26 18:24:49.576030: | IKEv2 nonce  41 79 53 e4  b7 8d 85 27  74 f3 14 8b  17 86 05 f0
Aug 26 18:24:49.576032: | emitting length of IKEv2 Nonce Payload: 36
Aug 26 18:24:49.576034: | Adding a v2N Payload
Aug 26 18:24:49.576036: | ***emit IKEv2 Notify Payload:
Aug 26 18:24:49.576038: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:49.576039: |    flags: none (0x0)
Aug 26 18:24:49.576041: |    Protocol ID: PROTO_v2_RESERVED (0x0)
Aug 26 18:24:49.576043: |    SPI size: 0 (0x0)
Aug 26 18:24:49.576045: |    Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e)
Aug 26 18:24:49.576047: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N)
Aug 26 18:24:49.576049: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet'
Aug 26 18:24:49.576051: | emitting length of IKEv2 Notify Payload: 8
Aug 26 18:24:49.576053: |  NAT-Traversal support  [enabled] add v2N payloads.
Aug 26 18:24:49.576055: | natd_hash: rcookie is zero
Aug 26 18:24:49.576063: | natd_hash: hasher=0x55e73493e800(20)
Aug 26 18:24:49.576065: | natd_hash: icookie=  14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:49.576067: | natd_hash: rcookie=  00 00 00 00  00 00 00 00
Aug 26 18:24:49.576069: | natd_hash: ip=  c0 01 03 21
Aug 26 18:24:49.576070: | natd_hash: port=500
Aug 26 18:24:49.576072: | natd_hash: hash=  9f 02 ab 20  5a 62 55 bb  22 21 a4 e6  8a 5d 26 e7
Aug 26 18:24:49.576073: | natd_hash: hash=  d3 ba ee c6
Aug 26 18:24:49.576075: | Adding a v2N Payload
Aug 26 18:24:49.576077: | ***emit IKEv2 Notify Payload:
Aug 26 18:24:49.576078: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:49.576080: |    flags: none (0x0)
Aug 26 18:24:49.576082: |    Protocol ID: PROTO_v2_RESERVED (0x0)
Aug 26 18:24:49.576083: |    SPI size: 0 (0x0)
Aug 26 18:24:49.576085: |    Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004)
Aug 26 18:24:49.576087: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N)
Aug 26 18:24:49.576089: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet'
Aug 26 18:24:49.576091: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload
Aug 26 18:24:49.576093: | Notify data  9f 02 ab 20  5a 62 55 bb  22 21 a4 e6  8a 5d 26 e7
Aug 26 18:24:49.576094: | Notify data  d3 ba ee c6
Aug 26 18:24:49.576096: | emitting length of IKEv2 Notify Payload: 28
Aug 26 18:24:49.576097: | natd_hash: rcookie is zero
Aug 26 18:24:49.576101: | natd_hash: hasher=0x55e73493e800(20)
Aug 26 18:24:49.576103: | natd_hash: icookie=  14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:49.576105: | natd_hash: rcookie=  00 00 00 00  00 00 00 00
Aug 26 18:24:49.576106: | natd_hash: ip=  c0 01 02 17
Aug 26 18:24:49.576108: | natd_hash: port=500
Aug 26 18:24:49.576110: | natd_hash: hash=  29 cf 89 09  0e c9 6c 8f  62 20 a9 ec  39 f6 a0 6a
Aug 26 18:24:49.576111: | natd_hash: hash=  c9 08 bd 47
Aug 26 18:24:49.576113: | Adding a v2N Payload
Aug 26 18:24:49.576114: | ***emit IKEv2 Notify Payload:
Aug 26 18:24:49.576116: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:49.576118: |    flags: none (0x0)
Aug 26 18:24:49.576119: |    Protocol ID: PROTO_v2_RESERVED (0x0)
Aug 26 18:24:49.576121: |    SPI size: 0 (0x0)
Aug 26 18:24:49.576122: |    Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005)
Aug 26 18:24:49.576124: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N)
Aug 26 18:24:49.576126: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet'
Aug 26 18:24:49.576128: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload
Aug 26 18:24:49.576130: | Notify data  29 cf 89 09  0e c9 6c 8f  62 20 a9 ec  39 f6 a0 6a
Aug 26 18:24:49.576131: | Notify data  c9 08 bd 47
Aug 26 18:24:49.576133: | emitting length of IKEv2 Notify Payload: 28
Aug 26 18:24:49.576135: | emitting length of ISAKMP Message: 828
Aug 26 18:24:49.576140: | stop processing: state #1 connection "north-east" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817)
Aug 26 18:24:49.576149: | start processing: state #1 connection "north-east" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379)
Aug 26 18:24:49.576152: | #1 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK
Aug 26 18:24:49.576154: | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1
Aug 26 18:24:49.576156: | parent state #1: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA)
Aug 26 18:24:49.576159: | Message ID: updating counters for #1 to 4294967295 after switching state
Aug 26 18:24:49.576161: | Message ID: IKE #1 skipping update_recv as MD is fake
Aug 26 18:24:49.576167: | Message ID: sent #1 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1
Aug 26 18:24:49.576170: "north-east" #1: STATE_PARENT_I1: sent v2I1, expected v2R1
Aug 26 18:24:49.576176: | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.33:500)
Aug 26 18:24:49.576186: | sending 828 bytes for STATE_PARENT_I0 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1)
Aug 26 18:24:49.576189: |   14 9a 4d e8  d7 d5 09 a7  00 00 00 00  00 00 00 00
Aug 26 18:24:49.576191: |   21 20 22 08  00 00 00 00  00 00 03 3c  22 00 01 b4
Aug 26 18:24:49.576194: |   02 00 00 64  01 01 00 0b  03 00 00 0c  01 00 00 14
Aug 26 18:24:49.576197: |   80 0e 01 00  03 00 00 08  02 00 00 07  03 00 00 08
Aug 26 18:24:49.576199: |   02 00 00 05  03 00 00 08  04 00 00 0e  03 00 00 08
Aug 26 18:24:49.576202: |   04 00 00 0f  03 00 00 08  04 00 00 10  03 00 00 08
Aug 26 18:24:49.576205: |   04 00 00 12  03 00 00 08  04 00 00 13  03 00 00 08
Aug 26 18:24:49.576207: |   04 00 00 14  03 00 00 08  04 00 00 15  00 00 00 08
Aug 26 18:24:49.576210: |   04 00 00 1f  02 00 00 64  02 01 00 0b  03 00 00 0c
Aug 26 18:24:49.576213: |   01 00 00 14  80 0e 00 80  03 00 00 08  02 00 00 07
Aug 26 18:24:49.576216: |   03 00 00 08  02 00 00 05  03 00 00 08  04 00 00 0e
Aug 26 18:24:49.576218: |   03 00 00 08  04 00 00 0f  03 00 00 08  04 00 00 10
Aug 26 18:24:49.576221: |   03 00 00 08  04 00 00 12  03 00 00 08  04 00 00 13
Aug 26 18:24:49.576224: |   03 00 00 08  04 00 00 14  03 00 00 08  04 00 00 15
Aug 26 18:24:49.576227: |   00 00 00 08  04 00 00 1f  02 00 00 74  03 01 00 0d
Aug 26 18:24:49.576229: |   03 00 00 0c  01 00 00 0c  80 0e 01 00  03 00 00 08
Aug 26 18:24:49.576232: |   02 00 00 07  03 00 00 08  02 00 00 05  03 00 00 08
Aug 26 18:24:49.576234: |   03 00 00 0e  03 00 00 08  03 00 00 0c  03 00 00 08
Aug 26 18:24:49.576237: |   04 00 00 0e  03 00 00 08  04 00 00 0f  03 00 00 08
Aug 26 18:24:49.576239: |   04 00 00 10  03 00 00 08  04 00 00 12  03 00 00 08
Aug 26 18:24:49.576242: |   04 00 00 13  03 00 00 08  04 00 00 14  03 00 00 08
Aug 26 18:24:49.576244: |   04 00 00 15  00 00 00 08  04 00 00 1f  00 00 00 74
Aug 26 18:24:49.576247: |   04 01 00 0d  03 00 00 0c  01 00 00 0c  80 0e 00 80
Aug 26 18:24:49.576249: |   03 00 00 08  02 00 00 07  03 00 00 08  02 00 00 05
Aug 26 18:24:49.576252: |   03 00 00 08  03 00 00 0e  03 00 00 08  03 00 00 0c
Aug 26 18:24:49.576254: |   03 00 00 08  04 00 00 0e  03 00 00 08  04 00 00 0f
Aug 26 18:24:49.576257: |   03 00 00 08  04 00 00 10  03 00 00 08  04 00 00 12
Aug 26 18:24:49.576259: |   03 00 00 08  04 00 00 13  03 00 00 08  04 00 00 14
Aug 26 18:24:49.576262: |   03 00 00 08  04 00 00 15  00 00 00 08  04 00 00 1f
Aug 26 18:24:49.576265: |   28 00 01 08  00 0e 00 00  a6 9a eb 38  9a 58 20 5a
Aug 26 18:24:49.576268: |   0b 27 9a 75  36 6b 88 4a  15 3a 1c f9  e1 96 34 a5
Aug 26 18:24:49.576270: |   aa 1d 6e 33  82 ce 67 95  35 a6 12 7f  e3 2d 01 1a
Aug 26 18:24:49.576273: |   14 14 87 e1  22 61 1a a6  56 93 9e b7  cd bb 29 ed
Aug 26 18:24:49.576275: |   99 74 3d e4  d6 1c 90 53  c8 16 31 19  95 c9 ab 61
Aug 26 18:24:49.576278: |   2f 14 fb e8  20 2d f7 c1  b6 be 64 b2  c6 d1 e2 21
Aug 26 18:24:49.576281: |   21 94 8a 32  25 5c 87 42  37 7b 3d 21  77 ed 6c 6e
Aug 26 18:24:49.576283: |   7e 4e 6a b0  89 82 68 4c  98 ba da 05  2e 9d 71 b0
Aug 26 18:24:49.576299: |   22 d8 e7 9d  de 06 1b fc  61 37 bc cf  a6 e7 e6 62
Aug 26 18:24:49.576305: |   61 38 20 6b  b3 85 f3 c8  8e 45 f1 72  7f 26 9e 55
Aug 26 18:24:49.576307: |   e3 82 5c 14  a5 42 3c e0  6f b0 2b 3e  d7 cc 91 52
Aug 26 18:24:49.576310: |   07 a3 b1 5e  7a 0c df 0a  fa b0 38 43  2c 55 63 6f
Aug 26 18:24:49.576312: |   07 c6 7f 37  83 55 eb c5  e1 41 9c 98  a4 3d 05 47
Aug 26 18:24:49.576315: |   e9 cb ec 9b  bd 2c 6c b7  52 9d 20 08  fb a9 01 29
Aug 26 18:24:49.576318: |   e3 2f 67 bf  20 a6 67 88  07 03 ff 61  ed c6 58 b0
Aug 26 18:24:49.576320: |   08 23 9d cf  c3 01 05 87  3f 61 12 ad  ad 53 23 e8
Aug 26 18:24:49.576323: |   dd 95 5d c3  0e df 59 ac  29 00 00 24  5f 4f c1 43
Aug 26 18:24:49.576325: |   6a 2a 3f 8f  c5 68 e8 02  2f 0a a5 f7  41 79 53 e4
Aug 26 18:24:49.576328: |   b7 8d 85 27  74 f3 14 8b  17 86 05 f0  29 00 00 08
Aug 26 18:24:49.576330: |   00 00 40 2e  29 00 00 1c  00 00 40 04  9f 02 ab 20
Aug 26 18:24:49.576333: |   5a 62 55 bb  22 21 a4 e6  8a 5d 26 e7  d3 ba ee c6
Aug 26 18:24:49.576335: |   00 00 00 1c  00 00 40 05  29 cf 89 09  0e c9 6c 8f
Aug 26 18:24:49.576338: |   62 20 a9 ec  39 f6 a0 6a  c9 08 bd 47
Aug 26 18:24:49.576431: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Aug 26 18:24:49.576437: | libevent_free: release ptr-libevent@0x55e73695fb78
Aug 26 18:24:49.576441: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55e73695e588
Aug 26 18:24:49.576444: | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms
Aug 26 18:24:49.576448: | event_schedule: new EVENT_RETRANSMIT-pe@0x55e73695e588
Aug 26 18:24:49.576452: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1
Aug 26 18:24:49.576455: | libevent_malloc: new ptr-libevent@0x55e73695f758 size 128
Aug 26 18:24:49.576461: | #1 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29175.318914
Aug 26 18:24:49.576465: | resume sending helper answer for #1 suppresed complete_v2_state_transition() and stole MD
Aug 26 18:24:49.576471: | #1 spent 1.19 milliseconds in resume sending helper answer
Aug 26 18:24:49.576477: | stop processing: state #1 connection "north-east" from 192.1.2.23 (in resume_handler() at server.c:833)
Aug 26 18:24:49.576481: | libevent_free: release ptr-libevent@0x7fd538002888
Aug 26 18:24:49.578870: | spent 0.00291 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:24:49.578894: | *received 432 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:24:49.578898: |   14 9a 4d e8  d7 d5 09 a7  4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:49.578901: |   21 20 22 20  00 00 00 00  00 00 01 b0  22 00 00 28
Aug 26 18:24:49.578903: |   00 00 00 24  01 01 00 03  03 00 00 0c  01 00 00 14
Aug 26 18:24:49.578904: |   80 0e 01 00  03 00 00 08  02 00 00 07  00 00 00 08
Aug 26 18:24:49.578906: |   04 00 00 0e  28 00 01 08  00 0e 00 00  3c 2f fe 0b
Aug 26 18:24:49.578907: |   15 e6 4e 6c  08 ff 54 00  e0 ba f5 64  7b 7e ec 3c
Aug 26 18:24:49.578909: |   60 1f 56 f4  8c ec 1c 9f  8e 73 d9 09  c0 e4 09 aa
Aug 26 18:24:49.578910: |   e4 1c f7 b7  22 47 fd ae  b9 58 fc ba  1a 1c 2b 3f
Aug 26 18:24:49.578912: |   00 b0 4d 52  91 22 c7 26  6b a7 40 2b  2a c6 94 4d
Aug 26 18:24:49.578913: |   fe 4a 75 d1  5e 48 4a 8f  6d 63 33 a0  5b 96 bc ba
Aug 26 18:24:49.578915: |   0d 66 5a 56  fc 67 90 fd  71 58 e6 88  33 e5 84 07
Aug 26 18:24:49.578916: |   52 22 75 f1  38 bf 5f 56  62 16 a4 12  d4 ba 48 4e
Aug 26 18:24:49.578918: |   30 ec bb a8  2c 61 28 df  8f 17 9f 50  c9 81 c0 4e
Aug 26 18:24:49.578920: |   8b 2c 19 8a  95 2a f4 3f  d6 4b d5 11  b3 5d 6c 42
Aug 26 18:24:49.578921: |   7b 3b fd af  0e ea 08 07  fe 87 47 19  3d 27 44 36
Aug 26 18:24:49.578923: |   47 76 ef 9d  03 63 0d 5f  5c 64 15 10  55 ff ab 1b
Aug 26 18:24:49.578924: |   15 67 a7 60  d6 1b 9c 36  ca 76 42 f9  d2 a6 f1 c2
Aug 26 18:24:49.578926: |   ab ec 8e d2  d6 b0 85 40  04 8d e5 06  89 b6 b9 e6
Aug 26 18:24:49.578927: |   f0 92 a3 1e  ee 97 cb 7a  f6 72 b2 49  25 41 35 70
Aug 26 18:24:49.578931: |   a6 18 01 53  4e 0e ea 3e  a9 a3 af b8  5c 1b 70 be
Aug 26 18:24:49.578932: |   fc 86 24 ae  0e 7a 83 61  aa 4a 33 a9  29 00 00 24
Aug 26 18:24:49.578934: |   05 26 2e b8  05 92 3c a8  77 c6 be 69  79 b4 3b 79
Aug 26 18:24:49.578936: |   73 d7 56 f5  95 f5 7b b6  0b 0d 48 e7  2a 2b de a6
Aug 26 18:24:49.578937: |   29 00 00 08  00 00 40 2e  29 00 00 1c  00 00 40 04
Aug 26 18:24:49.578939: |   b4 b4 60 00  93 f4 43 71  c8 ae aa 94  39 49 60 4e
Aug 26 18:24:49.578940: |   4e 54 e4 d2  00 00 00 1c  00 00 40 05  ed 93 9b 80
Aug 26 18:24:49.578942: |   e5 b5 36 a7  7d 61 dd cb  b5 db 41 87  70 09 f6 37
Aug 26 18:24:49.578945: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:24:49.578948: | **parse ISAKMP Message:
Aug 26 18:24:49.578950: |    initiator cookie:
Aug 26 18:24:49.578951: |   14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:49.578953: |    responder cookie:
Aug 26 18:24:49.578954: |   4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:49.578956: |    next payload type: ISAKMP_NEXT_v2SA (0x21)
Aug 26 18:24:49.578958: |    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Aug 26 18:24:49.578960: |    exchange type: ISAKMP_v2_IKE_SA_INIT (0x22)
Aug 26 18:24:49.578962: |    flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Aug 26 18:24:49.578964: |    Message ID: 0 (0x0)
Aug 26 18:24:49.578965: |    length: 432 (0x1b0)
Aug 26 18:24:49.578967: |  processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34)
Aug 26 18:24:49.578970: | I am the IKE SA Original Initiator receiving an IKEv2 IKE_SA_INIT response 
Aug 26 18:24:49.578972: | State DB: found IKEv2 state #1 in PARENT_I1 (find_v2_ike_sa_by_initiator_spi)
Aug 26 18:24:49.578976: | start processing: state #1 connection "north-east" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016)
Aug 26 18:24:49.578979: | [RE]START processing: state #1 connection "north-east" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062)
Aug 26 18:24:49.578981: | #1 is idle
Aug 26 18:24:49.578983: | #1 idle
Aug 26 18:24:49.578984: | unpacking clear payload
Aug 26 18:24:49.578986: | Now let's proceed with payload (ISAKMP_NEXT_v2SA)
Aug 26 18:24:49.578988: | ***parse IKEv2 Security Association Payload:
Aug 26 18:24:49.578990: |    next payload type: ISAKMP_NEXT_v2KE (0x22)
Aug 26 18:24:49.578992: |    flags: none (0x0)
Aug 26 18:24:49.578993: |    length: 40 (0x28)
Aug 26 18:24:49.578995: | processing payload: ISAKMP_NEXT_v2SA (len=36)
Aug 26 18:24:49.578997: | Now let's proceed with payload (ISAKMP_NEXT_v2KE)
Aug 26 18:24:49.578999: | ***parse IKEv2 Key Exchange Payload:
Aug 26 18:24:49.579000: |    next payload type: ISAKMP_NEXT_v2Ni (0x28)
Aug 26 18:24:49.579002: |    flags: none (0x0)
Aug 26 18:24:49.579004: |    length: 264 (0x108)
Aug 26 18:24:49.579005: |    DH group: OAKLEY_GROUP_MODP2048 (0xe)
Aug 26 18:24:49.579007: | processing payload: ISAKMP_NEXT_v2KE (len=256)
Aug 26 18:24:49.579009: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni)
Aug 26 18:24:49.579010: | ***parse IKEv2 Nonce Payload:
Aug 26 18:24:49.579012: |    next payload type: ISAKMP_NEXT_v2N (0x29)
Aug 26 18:24:49.579013: |    flags: none (0x0)
Aug 26 18:24:49.579015: |    length: 36 (0x24)
Aug 26 18:24:49.579017: | processing payload: ISAKMP_NEXT_v2Ni (len=32)
Aug 26 18:24:49.579018: | Now let's proceed with payload (ISAKMP_NEXT_v2N)
Aug 26 18:24:49.579020: | ***parse IKEv2 Notify Payload:
Aug 26 18:24:49.579022: |    next payload type: ISAKMP_NEXT_v2N (0x29)
Aug 26 18:24:49.579023: |    flags: none (0x0)
Aug 26 18:24:49.579025: |    length: 8 (0x8)
Aug 26 18:24:49.579027: |    Protocol ID: PROTO_v2_RESERVED (0x0)
Aug 26 18:24:49.579028: |    SPI size: 0 (0x0)
Aug 26 18:24:49.579030: |    Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e)
Aug 26 18:24:49.579032: | processing payload: ISAKMP_NEXT_v2N (len=0)
Aug 26 18:24:49.579033: | Now let's proceed with payload (ISAKMP_NEXT_v2N)
Aug 26 18:24:49.579035: | ***parse IKEv2 Notify Payload:
Aug 26 18:24:49.579037: |    next payload type: ISAKMP_NEXT_v2N (0x29)
Aug 26 18:24:49.579038: |    flags: none (0x0)
Aug 26 18:24:49.579041: |    length: 28 (0x1c)
Aug 26 18:24:49.579043: |    Protocol ID: PROTO_v2_RESERVED (0x0)
Aug 26 18:24:49.579044: |    SPI size: 0 (0x0)
Aug 26 18:24:49.579046: |    Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004)
Aug 26 18:24:49.579048: | processing payload: ISAKMP_NEXT_v2N (len=20)
Aug 26 18:24:49.579049: | Now let's proceed with payload (ISAKMP_NEXT_v2N)
Aug 26 18:24:49.579051: | ***parse IKEv2 Notify Payload:
Aug 26 18:24:49.579053: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:49.579054: |    flags: none (0x0)
Aug 26 18:24:49.579056: |    length: 28 (0x1c)
Aug 26 18:24:49.579057: |    Protocol ID: PROTO_v2_RESERVED (0x0)
Aug 26 18:24:49.579059: |    SPI size: 0 (0x0)
Aug 26 18:24:49.579060: |    Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005)
Aug 26 18:24:49.579062: | processing payload: ISAKMP_NEXT_v2N (len=20)
Aug 26 18:24:49.579064: | State DB: re-hashing IKEv2 state #1 IKE SPIi and SPI[ir]
Aug 26 18:24:49.579067: | #1 in state PARENT_I1: sent v2I1, expected v2R1
Aug 26 18:24:49.579069: | selected state microcode Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH
Aug 26 18:24:49.579070: | Now let's proceed with state specific processing
Aug 26 18:24:49.579072: | calling processor Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH
Aug 26 18:24:49.579075: | ikev2 parent inR1: calculating g^{xy} in order to send I2
Aug 26 18:24:49.579085: | using existing local IKE proposals for connection north-east (IKE SA initiator accepting remote proposal): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519
Aug 26 18:24:49.579088: | Comparing remote proposals against IKE initiator (accepting) 4 local proposals
Aug 26 18:24:49.579091: | local proposal 1 type ENCR has 1 transforms
Aug 26 18:24:49.579092: | local proposal 1 type PRF has 2 transforms
Aug 26 18:24:49.579094: | local proposal 1 type INTEG has 1 transforms
Aug 26 18:24:49.579096: | local proposal 1 type DH has 8 transforms
Aug 26 18:24:49.579097: | local proposal 1 type ESN has 0 transforms
Aug 26 18:24:49.579100: | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG
Aug 26 18:24:49.579101: | local proposal 2 type ENCR has 1 transforms
Aug 26 18:24:49.579103: | local proposal 2 type PRF has 2 transforms
Aug 26 18:24:49.579105: | local proposal 2 type INTEG has 1 transforms
Aug 26 18:24:49.579106: | local proposal 2 type DH has 8 transforms
Aug 26 18:24:49.579108: | local proposal 2 type ESN has 0 transforms
Aug 26 18:24:49.579110: | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG
Aug 26 18:24:49.579112: | local proposal 3 type ENCR has 1 transforms
Aug 26 18:24:49.579113: | local proposal 3 type PRF has 2 transforms
Aug 26 18:24:49.579115: | local proposal 3 type INTEG has 2 transforms
Aug 26 18:24:49.579117: | local proposal 3 type DH has 8 transforms
Aug 26 18:24:49.579118: | local proposal 3 type ESN has 0 transforms
Aug 26 18:24:49.579120: | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none
Aug 26 18:24:49.579122: | local proposal 4 type ENCR has 1 transforms
Aug 26 18:24:49.579124: | local proposal 4 type PRF has 2 transforms
Aug 26 18:24:49.579125: | local proposal 4 type INTEG has 2 transforms
Aug 26 18:24:49.579127: | local proposal 4 type DH has 8 transforms
Aug 26 18:24:49.579129: | local proposal 4 type ESN has 0 transforms
Aug 26 18:24:49.579131: | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none
Aug 26 18:24:49.579133: | ****parse IKEv2 Proposal Substructure Payload:
Aug 26 18:24:49.579135: |    last proposal: v2_PROPOSAL_LAST (0x0)
Aug 26 18:24:49.579137: |    length: 36 (0x24)
Aug 26 18:24:49.579139: |    prop #: 1 (0x1)
Aug 26 18:24:49.579140: |    proto ID: IKEv2_SEC_PROTO_IKE (0x1)
Aug 26 18:24:49.579142: |    spi size: 0 (0x0)
Aug 26 18:24:49.579144: |    # transforms: 3 (0x3)
Aug 26 18:24:49.579146: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 4 local proposals
Aug 26 18:24:49.579148: | *****parse IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.579150: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.579151: |    length: 12 (0xc)
Aug 26 18:24:49.579153: |    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
Aug 26 18:24:49.579155: |    IKEv2 transform ID: AES_GCM_C (0x14)
Aug 26 18:24:49.579156: | ******parse IKEv2 Attribute Substructure Payload:
Aug 26 18:24:49.579158: |    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
Aug 26 18:24:49.579160: |    length/value: 256 (0x100)
Aug 26 18:24:49.579163: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0
Aug 26 18:24:49.579165: | *****parse IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.579166: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.579168: |    length: 8 (0x8)
Aug 26 18:24:49.579170: |    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
Aug 26 18:24:49.579171: |    IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7)
Aug 26 18:24:49.579174: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0
Aug 26 18:24:49.579175: | *****parse IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.579177: |    last transform: v2_TRANSFORM_LAST (0x0)
Aug 26 18:24:49.579178: |    length: 8 (0x8)
Aug 26 18:24:49.579180: |    IKEv2 transform type: TRANS_TYPE_DH (0x4)
Aug 26 18:24:49.579182: |    IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe)
Aug 26 18:24:49.579184: | remote proposal 1 transform 2 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0
Aug 26 18:24:49.579187: | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none
Aug 26 18:24:49.579189: | comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH
Aug 26 18:24:49.579191: | remote proposal 1 matches local proposal 1
Aug 26 18:24:49.579193: | remote accepted the proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048[first-match]
Aug 26 18:24:49.579195: | converting proposal to internal trans attrs
Aug 26 18:24:49.579206: | natd_hash: hasher=0x55e73493e800(20)
Aug 26 18:24:49.579209: | natd_hash: icookie=  14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:49.579210: | natd_hash: rcookie=  4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:49.579212: | natd_hash: ip=  c0 01 03 21
Aug 26 18:24:49.579213: | natd_hash: port=500
Aug 26 18:24:49.579215: | natd_hash: hash=  ed 93 9b 80  e5 b5 36 a7  7d 61 dd cb  b5 db 41 87
Aug 26 18:24:49.579217: | natd_hash: hash=  70 09 f6 37
Aug 26 18:24:49.579221: | natd_hash: hasher=0x55e73493e800(20)
Aug 26 18:24:49.579222: | natd_hash: icookie=  14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:49.579224: | natd_hash: rcookie=  4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:49.579225: | natd_hash: ip=  c0 01 02 17
Aug 26 18:24:49.579227: | natd_hash: port=500
Aug 26 18:24:49.579229: | natd_hash: hash=  b4 b4 60 00  93 f4 43 71  c8 ae aa 94  39 49 60 4e
Aug 26 18:24:49.579230: | natd_hash: hash=  4e 54 e4 d2
Aug 26 18:24:49.579232: | NAT_TRAVERSAL encaps using auto-detect
Aug 26 18:24:49.579234: | NAT_TRAVERSAL this end is NOT behind NAT
Aug 26 18:24:49.579236: | NAT_TRAVERSAL that end is NOT behind NAT
Aug 26 18:24:49.579240: | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23
Aug 26 18:24:49.579244: | offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_512 integ=NONE cipherkey=AES_GCM_16
Aug 26 18:24:49.579247: | adding ikev2_inR1outI2 KE work-order 2 for state #1
Aug 26 18:24:49.579250: | state #1 requesting EVENT_RETRANSMIT to be deleted
Aug 26 18:24:49.579254: | #1 STATE_PARENT_I1: retransmits: cleared
Aug 26 18:24:49.579259: | libevent_free: release ptr-libevent@0x55e73695f758
Aug 26 18:24:49.579262: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55e73695e588
Aug 26 18:24:49.579266: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55e73695e588
Aug 26 18:24:49.579270: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1
Aug 26 18:24:49.579274: | libevent_malloc: new ptr-libevent@0x7fd538002888 size 128
Aug 26 18:24:49.579284: |   #1 spent 0.208 milliseconds in processing: Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH in ikev2_process_state_packet()
Aug 26 18:24:49.579294: | [RE]START processing: state #1 connection "north-east" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379)
Aug 26 18:24:49.579300: | #1 complete_v2_state_transition() PARENT_I1->PARENT_I2 with status STF_SUSPEND
Aug 26 18:24:49.579303: | suspending state #1 and saving MD
Aug 26 18:24:49.579306: | #1 is busy; has a suspended MD
Aug 26 18:24:49.579306: | crypto helper 0 resuming
Aug 26 18:24:49.579310: | [RE]START processing: state #1 connection "north-east" from 192.1.2.23 (in log_stf_suspend() at ikev2.c:3269)
Aug 26 18:24:49.579327: | crypto helper 0 starting work-order 2 for state #1
Aug 26 18:24:49.579334: | "north-east" #1 complete v2 state STATE_PARENT_I1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451
Aug 26 18:24:49.579338: | crypto helper 0 doing compute dh (V2) (ikev2_inR1outI2 KE); request ID 2
Aug 26 18:24:49.579341: | stop processing: state #1 connection "north-east" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018)
Aug 26 18:24:49.579347: | #1 spent 0.451 milliseconds in ikev2_process_packet()
Aug 26 18:24:49.579352: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380)
Aug 26 18:24:49.579355: | processing: STOP state #0 (in process_md() at demux.c:382)
Aug 26 18:24:49.579358: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:24:49.579363: | spent 0.467 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:24:49.579872: | calculating skeyseed using prf=sha2_512 integ=none cipherkey-size=32 salt-size=4
Aug 26 18:24:49.580145: | crypto helper 0 finished compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 time elapsed 0.000807 seconds
Aug 26 18:24:49.580151: | (#1) spent 0.812 milliseconds in crypto helper computing work-order 2: ikev2_inR1outI2 KE (pcr)
Aug 26 18:24:49.580153: | crypto helper 0 sending results from work-order 2 for state #1 to event queue
Aug 26 18:24:49.580155: | scheduling resume sending helper answer for #1
Aug 26 18:24:49.580157: | libevent_malloc: new ptr-libevent@0x7fd530000f48 size 128
Aug 26 18:24:49.580163: | crypto helper 0 waiting (nothing to do)
Aug 26 18:24:49.580198: | processing resume sending helper answer for #1
Aug 26 18:24:49.580208: | start processing: state #1 connection "north-east" from 192.1.2.23 (in resume_handler() at server.c:797)
Aug 26 18:24:49.580212: | crypto helper 0 replies to request ID 2
Aug 26 18:24:49.580214: | calling continuation function 0x55e734869b50
Aug 26 18:24:49.580216: | ikev2_parent_inR1outI2_continue for #1: calculating g^{xy}, sending I2
Aug 26 18:24:49.580223: | creating state object #2 at 0x55e736963fa8
Aug 26 18:24:49.580225: | State DB: adding IKEv2 state #2 in UNDEFINED
Aug 26 18:24:49.580228: | pstats #2 ikev2.child started
Aug 26 18:24:49.580230: | duplicating state object #1 "north-east" as #2 for IPSEC SA
Aug 26 18:24:49.580234: | #2 setting local endpoint to 192.1.3.33:500 from #1.st_localport (in duplicate_state() at state.c:1484)
Aug 26 18:24:49.580238: | Message ID: init_child #1.#2; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1
Aug 26 18:24:49.580241: | Message ID: switch-from #1 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=0->-1 wip.responder=-1
Aug 26 18:24:49.580244: | Message ID: switch-to #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->0 wip.responder=-1
Aug 26 18:24:49.580248: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Aug 26 18:24:49.580251: | libevent_free: release ptr-libevent@0x7fd538002888
Aug 26 18:24:49.580253: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55e73695e588
Aug 26 18:24:49.580255: | event_schedule: new EVENT_SA_REPLACE-pe@0x55e73695e588
Aug 26 18:24:49.580257: | inserting event EVENT_SA_REPLACE, timeout in 60 seconds for #1
Aug 26 18:24:49.580259: | libevent_malloc: new ptr-libevent@0x7fd538002888 size 128
Aug 26 18:24:49.580262: | parent state #1: PARENT_I1(half-open IKE SA) => PARENT_I2(open IKE SA)
Aug 26 18:24:49.580266: | **emit ISAKMP Message:
Aug 26 18:24:49.580268: |    initiator cookie:
Aug 26 18:24:49.580270: |   14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:49.580272: |    responder cookie:
Aug 26 18:24:49.580273: |   4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:49.580275: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:24:49.580277: |    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Aug 26 18:24:49.580279: |    exchange type: ISAKMP_v2_IKE_AUTH (0x23)
Aug 26 18:24:49.580281: |    flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Aug 26 18:24:49.580283: |    Message ID: 1 (0x1)
Aug 26 18:24:49.580285: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:24:49.580287: | ***emit IKEv2 Encryption Payload:
Aug 26 18:24:49.580303: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:49.580305: |    flags: none (0x0)
Aug 26 18:24:49.580307: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK)
Aug 26 18:24:49.580309: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet'
Aug 26 18:24:49.580311: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload
Aug 26 18:24:49.580317: | IKEv2 CERT: send a certificate?
Aug 26 18:24:49.580319: | IKEv2 CERT: no certificate to send
Aug 26 18:24:49.580321: | IDr payload will be sent
Aug 26 18:24:49.580331: | ****emit IKEv2 Identification - Initiator - Payload:
Aug 26 18:24:49.580334: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:49.580335: |    flags: none (0x0)
Aug 26 18:24:49.580337: |    ID type: ID_FQDN (0x2)
Aug 26 18:24:49.580340: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Initiator - Payload (35:ISAKMP_NEXT_v2IDi)
Aug 26 18:24:49.580341: | next payload chain: saving location 'IKEv2 Identification - Initiator - Payload'.'next payload type' in 'reply packet'
Aug 26 18:24:49.580344: | emitting 5 raw bytes of my identity into IKEv2 Identification - Initiator - Payload
Aug 26 18:24:49.580346: | my identity  6e 6f 72 74  68
Aug 26 18:24:49.580347: | emitting length of IKEv2 Identification - Initiator - Payload: 13
Aug 26 18:24:49.580353: | ****emit IKEv2 Identification - Responder - Payload:
Aug 26 18:24:49.580355: |    next payload type: ISAKMP_NEXT_v2AUTH (0x27)
Aug 26 18:24:49.580357: |    flags: none (0x0)
Aug 26 18:24:49.580359: |    ID type: ID_FQDN (0x2)
Aug 26 18:24:49.580361: | next payload chain: ignoring supplied 'IKEv2 Identification - Responder - Payload'.'next payload type' value 39:ISAKMP_NEXT_v2AUTH
Aug 26 18:24:49.580363: | next payload chain: setting previous 'IKEv2 Identification - Initiator - Payload'.'next payload type' to current IKEv2 Identification - Responder - Payload (36:ISAKMP_NEXT_v2IDr)
Aug 26 18:24:49.580365: | next payload chain: saving location 'IKEv2 Identification - Responder - Payload'.'next payload type' in 'reply packet'
Aug 26 18:24:49.580367: | emitting 4 raw bytes of IDr into IKEv2 Identification - Responder - Payload
Aug 26 18:24:49.580369: | IDr  65 61 73 74
Aug 26 18:24:49.580370: | emitting length of IKEv2 Identification - Responder - Payload: 12
Aug 26 18:24:49.580372: | not sending INITIAL_CONTACT
Aug 26 18:24:49.580374: | ****emit IKEv2 Authentication Payload:
Aug 26 18:24:49.580376: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:49.580381: |    flags: none (0x0)
Aug 26 18:24:49.580383: |    auth method: IKEv2_AUTH_RSA (0x1)
Aug 26 18:24:49.580385: | next payload chain: setting previous 'IKEv2 Identification - Responder - Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH)
Aug 26 18:24:49.580387: | next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet'
Aug 26 18:24:49.580391: | started looking for secret for @north->@east of kind PKK_RSA
Aug 26 18:24:49.580394: | actually looking for secret for @north->@east of kind PKK_RSA
Aug 26 18:24:49.580396: | line 1: key type PKK_RSA(@north) to type PKK_RSA
Aug 26 18:24:49.580399: | 1: compared key (none) to @north / @east -> 002
Aug 26 18:24:49.580401: | 2: compared key (none) to @north / @east -> 002
Aug 26 18:24:49.580402: | line 1: match=002
Aug 26 18:24:49.580404: | match 002 beats previous best_match 000 match=0x55e7368b5b58 (line=1)
Aug 26 18:24:49.580406: | concluding with best_match=002 best=0x55e7368b5b58 (lineno=1)
Aug 26 18:24:49.583824: |     #1 spent 3.39 milliseconds in ikev2_calculate_rsa_hash() calling sign_hash_RSA()
Aug 26 18:24:49.583834: | emitting 274 raw bytes of rsa signature into IKEv2 Authentication Payload
Aug 26 18:24:49.583837: | rsa signature  b2 d8 b8 5f  8c 88 24 36  3b 0f 19 85  7b a0 9e dc
Aug 26 18:24:49.583839: | rsa signature  78 99 9a 49  9d 2c de 6d  c5 08 cc 21  37 76 50 6f
Aug 26 18:24:49.583840: | rsa signature  95 b3 35 d9  75 4b 28 73  9d d6 1b b7  53 74 87 6c
Aug 26 18:24:49.583842: | rsa signature  55 3a 74 2d  3f d6 8b e7  86 1c 02 e2  ba 63 03 a0
Aug 26 18:24:49.583843: | rsa signature  23 7a 44 7d  a5 34 04 a2  b1 81 0c e3  3b 34 66 a1
Aug 26 18:24:49.583845: | rsa signature  2d 3f 4d 71  21 ba 6b 1e  53 2a fd 90  fd da 72 8e
Aug 26 18:24:49.583847: | rsa signature  9a 2c bb c2  f1 09 55 e4  bd f4 ec 72  53 6e 73 4a
Aug 26 18:24:49.583848: | rsa signature  3c 53 40 26  5b 89 aa e1  99 7d 50 f9  70 28 3c 4a
Aug 26 18:24:49.583850: | rsa signature  38 5d 0c f6  da f2 43 2f  7b 94 1a 36  ef 89 e7 5c
Aug 26 18:24:49.583852: | rsa signature  c1 03 c8 e8  82 61 12 da  46 9d a1 68  a3 15 1a b6
Aug 26 18:24:49.583853: | rsa signature  82 63 d7 cc  de 49 1a 47  d2 f5 2c 38  a3 d8 dd bd
Aug 26 18:24:49.583855: | rsa signature  1e 3b d2 f2  3a 6e 2f 1b  24 02 4b a9  30 26 a4 83
Aug 26 18:24:49.583857: | rsa signature  b8 f2 10 9b  a0 e5 e2 c3  21 c8 a2 27  11 22 37 13
Aug 26 18:24:49.583858: | rsa signature  58 75 4a 1f  19 1d ae 2c  ff 59 ee 5b  cc 61 b4 4e
Aug 26 18:24:49.583860: | rsa signature  1d 5b 0e b2  09 1d 2a 0e  a1 59 b8 62  0d bd 71 37
Aug 26 18:24:49.583861: | rsa signature  7b ee b9 bc  59 1a 86 08  1b 79 db ba  85 a6 49 55
Aug 26 18:24:49.583863: | rsa signature  a8 a2 e8 27  18 27 98 ec  80 83 28 a2  42 29 ab c0
Aug 26 18:24:49.583865: | rsa signature  f9 76
Aug 26 18:24:49.583868: |   #1 spent 3.46 milliseconds in ikev2_calculate_rsa_hash()
Aug 26 18:24:49.583870: | emitting length of IKEv2 Authentication Payload: 282
Aug 26 18:24:49.583872: | getting first pending from state #1
Aug 26 18:24:49.583888: | netlink_get_spi: allocated 0x63063891 for esp.0@192.1.3.33
Aug 26 18:24:49.583891: | constructing ESP/AH proposals with all DH removed  for north-east (IKE SA initiator emitting ESP/AH proposals)
Aug 26 18:24:49.583895: | converting proposal AES_GCM_16_256-NONE to ikev2 ...
Aug 26 18:24:49.583899: | ...  ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED
Aug 26 18:24:49.583901: | converting proposal AES_GCM_16_128-NONE to ikev2 ...
Aug 26 18:24:49.583904: | ...  ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED
Aug 26 18:24:49.583906: | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ...
Aug 26 18:24:49.583909: | ...  ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED
Aug 26 18:24:49.583911: | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ...
Aug 26 18:24:49.583913: | ...  ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED
Aug 26 18:24:49.583920: "north-east": constructed local ESP/AH proposals for north-east (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED
Aug 26 18:24:49.583923: | Emitting ikev2_proposals ...
Aug 26 18:24:49.583925: | ****emit IKEv2 Security Association Payload:
Aug 26 18:24:49.583927: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:49.583929: |    flags: none (0x0)
Aug 26 18:24:49.583931: | next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA)
Aug 26 18:24:49.583933: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet'
Aug 26 18:24:49.583935: | discarding INTEG=NONE
Aug 26 18:24:49.583937: | discarding DH=NONE
Aug 26 18:24:49.583939: | *****emit IKEv2 Proposal Substructure Payload:
Aug 26 18:24:49.583942: |    last proposal: v2_PROPOSAL_NON_LAST (0x2)
Aug 26 18:24:49.583945: |    prop #: 1 (0x1)
Aug 26 18:24:49.583948: |    proto ID: IKEv2_SEC_PROTO_ESP (0x3)
Aug 26 18:24:49.583950: |    spi size: 4 (0x4)
Aug 26 18:24:49.583953: |    # transforms: 2 (0x2)
Aug 26 18:24:49.583956: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
Aug 26 18:24:49.583959: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
Aug 26 18:24:49.583962: | our spi  63 06 38 91
Aug 26 18:24:49.583965: | ******emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.583968: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.583971: |    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
Aug 26 18:24:49.583974: |    IKEv2 transform ID: AES_GCM_C (0x14)
Aug 26 18:24:49.583977: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.583980: | *******emit IKEv2 Attribute Substructure Payload:
Aug 26 18:24:49.583983: |    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
Aug 26 18:24:49.583987: |    length/value: 256 (0x100)
Aug 26 18:24:49.583990: | emitting length of IKEv2 Transform Substructure Payload: 12
Aug 26 18:24:49.583992: | discarding INTEG=NONE
Aug 26 18:24:49.583995: | discarding DH=NONE
Aug 26 18:24:49.583997: | ******emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.584000: |    last transform: v2_TRANSFORM_LAST (0x0)
Aug 26 18:24:49.584003: |    IKEv2 transform type: TRANS_TYPE_ESN (0x5)
Aug 26 18:24:49.584006: |    IKEv2 transform ID: ESN_DISABLED (0x0)
Aug 26 18:24:49.584009: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584013: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.584016: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.584018: | emitting length of IKEv2 Proposal Substructure Payload: 32
Aug 26 18:24:49.584022: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
Aug 26 18:24:49.584024: | discarding INTEG=NONE
Aug 26 18:24:49.584027: | discarding DH=NONE
Aug 26 18:24:49.584029: | *****emit IKEv2 Proposal Substructure Payload:
Aug 26 18:24:49.584032: |    last proposal: v2_PROPOSAL_NON_LAST (0x2)
Aug 26 18:24:49.584035: |    prop #: 2 (0x2)
Aug 26 18:24:49.584038: |    proto ID: IKEv2_SEC_PROTO_ESP (0x3)
Aug 26 18:24:49.584040: |    spi size: 4 (0x4)
Aug 26 18:24:49.584043: |    # transforms: 2 (0x2)
Aug 26 18:24:49.584047: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2)
Aug 26 18:24:49.584052: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
Aug 26 18:24:49.584056: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
Aug 26 18:24:49.584059: | our spi  63 06 38 91
Aug 26 18:24:49.584062: | ******emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.584066: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584069: |    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
Aug 26 18:24:49.584072: |    IKEv2 transform ID: AES_GCM_C (0x14)
Aug 26 18:24:49.584075: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.584078: | *******emit IKEv2 Attribute Substructure Payload:
Aug 26 18:24:49.584081: |    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
Aug 26 18:24:49.584084: |    length/value: 128 (0x80)
Aug 26 18:24:49.584086: | emitting length of IKEv2 Transform Substructure Payload: 12
Aug 26 18:24:49.584089: | discarding INTEG=NONE
Aug 26 18:24:49.584091: | discarding DH=NONE
Aug 26 18:24:49.584093: | ******emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.584096: |    last transform: v2_TRANSFORM_LAST (0x0)
Aug 26 18:24:49.584099: |    IKEv2 transform type: TRANS_TYPE_ESN (0x5)
Aug 26 18:24:49.584101: |    IKEv2 transform ID: ESN_DISABLED (0x0)
Aug 26 18:24:49.584104: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584108: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.584111: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.584113: | emitting length of IKEv2 Proposal Substructure Payload: 32
Aug 26 18:24:49.584116: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
Aug 26 18:24:49.584119: | discarding DH=NONE
Aug 26 18:24:49.584121: | *****emit IKEv2 Proposal Substructure Payload:
Aug 26 18:24:49.584124: |    last proposal: v2_PROPOSAL_NON_LAST (0x2)
Aug 26 18:24:49.584126: |    prop #: 3 (0x3)
Aug 26 18:24:49.584128: |    proto ID: IKEv2_SEC_PROTO_ESP (0x3)
Aug 26 18:24:49.584131: |    spi size: 4 (0x4)
Aug 26 18:24:49.584133: |    # transforms: 4 (0x4)
Aug 26 18:24:49.584137: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2)
Aug 26 18:24:49.584140: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
Aug 26 18:24:49.584143: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
Aug 26 18:24:49.584146: | our spi  63 06 38 91
Aug 26 18:24:49.584148: | ******emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.584151: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584154: |    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
Aug 26 18:24:49.584157: |    IKEv2 transform ID: AES_CBC (0xc)
Aug 26 18:24:49.584159: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.584162: | *******emit IKEv2 Attribute Substructure Payload:
Aug 26 18:24:49.584165: |    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
Aug 26 18:24:49.584168: |    length/value: 256 (0x100)
Aug 26 18:24:49.584171: | emitting length of IKEv2 Transform Substructure Payload: 12
Aug 26 18:24:49.584173: | ******emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.584176: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584179: |    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
Aug 26 18:24:49.584182: |    IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe)
Aug 26 18:24:49.584185: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584190: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.584193: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.584195: | ******emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.584198: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584201: |    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
Aug 26 18:24:49.584204: |    IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc)
Aug 26 18:24:49.584207: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584210: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.584213: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.584215: | discarding DH=NONE
Aug 26 18:24:49.584218: | ******emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.584221: |    last transform: v2_TRANSFORM_LAST (0x0)
Aug 26 18:24:49.584224: |    IKEv2 transform type: TRANS_TYPE_ESN (0x5)
Aug 26 18:24:49.584226: |    IKEv2 transform ID: ESN_DISABLED (0x0)
Aug 26 18:24:49.584229: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584233: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.584236: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.584238: | emitting length of IKEv2 Proposal Substructure Payload: 48
Aug 26 18:24:49.584241: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
Aug 26 18:24:49.584244: | discarding DH=NONE
Aug 26 18:24:49.584247: | *****emit IKEv2 Proposal Substructure Payload:
Aug 26 18:24:49.584250: |    last proposal: v2_PROPOSAL_LAST (0x0)
Aug 26 18:24:49.584253: |    prop #: 4 (0x4)
Aug 26 18:24:49.584256: |    proto ID: IKEv2_SEC_PROTO_ESP (0x3)
Aug 26 18:24:49.584258: |    spi size: 4 (0x4)
Aug 26 18:24:49.584261: |    # transforms: 4 (0x4)
Aug 26 18:24:49.584264: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2)
Aug 26 18:24:49.584267: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
Aug 26 18:24:49.584271: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
Aug 26 18:24:49.584274: | our spi  63 06 38 91
Aug 26 18:24:49.584276: | ******emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.584280: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584283: |    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
Aug 26 18:24:49.584285: |    IKEv2 transform ID: AES_CBC (0xc)
Aug 26 18:24:49.584294: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.584300: | *******emit IKEv2 Attribute Substructure Payload:
Aug 26 18:24:49.584304: |    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
Aug 26 18:24:49.584307: |    length/value: 128 (0x80)
Aug 26 18:24:49.584310: | emitting length of IKEv2 Transform Substructure Payload: 12
Aug 26 18:24:49.584313: | ******emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.584315: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584319: |    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
Aug 26 18:24:49.584322: |    IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe)
Aug 26 18:24:49.584325: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584332: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.584335: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.584338: | ******emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.584341: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584343: |    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
Aug 26 18:24:49.584346: |    IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc)
Aug 26 18:24:49.584350: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584353: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.584356: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.584358: | discarding DH=NONE
Aug 26 18:24:49.584362: | ******emit IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.584364: |    last transform: v2_TRANSFORM_LAST (0x0)
Aug 26 18:24:49.584367: |    IKEv2 transform type: TRANS_TYPE_ESN (0x5)
Aug 26 18:24:49.584370: |    IKEv2 transform ID: ESN_DISABLED (0x0)
Aug 26 18:24:49.584373: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.584377: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
Aug 26 18:24:49.584380: | emitting length of IKEv2 Transform Substructure Payload: 8
Aug 26 18:24:49.584382: | emitting length of IKEv2 Proposal Substructure Payload: 48
Aug 26 18:24:49.584386: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
Aug 26 18:24:49.584389: | emitting length of IKEv2 Security Association Payload: 164
Aug 26 18:24:49.584392: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0
Aug 26 18:24:49.584395: | ****emit IKEv2 Traffic Selector - Initiator - Payload:
Aug 26 18:24:49.584398: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:49.584401: |    flags: none (0x0)
Aug 26 18:24:49.584404: |    number of TS: 1 (0x1)
Aug 26 18:24:49.584408: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi)
Aug 26 18:24:49.584411: | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet'
Aug 26 18:24:49.584415: | *****emit IKEv2 Traffic Selector:
Aug 26 18:24:49.584417: |    TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7)
Aug 26 18:24:49.584420: |    IP Protocol ID: 0 (0x0)
Aug 26 18:24:49.584423: |    start port: 0 (0x0)
Aug 26 18:24:49.584425: |    end port: 65535 (0xffff)
Aug 26 18:24:49.584429: | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector
Aug 26 18:24:49.584432: | ipv4 start  c0 00 03 fe
Aug 26 18:24:49.584435: | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector
Aug 26 18:24:49.584438: | ipv4 end  c0 00 03 fe
Aug 26 18:24:49.584441: | emitting length of IKEv2 Traffic Selector: 16
Aug 26 18:24:49.584444: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24
Aug 26 18:24:49.584447: | ****emit IKEv2 Traffic Selector - Responder - Payload:
Aug 26 18:24:49.584450: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:49.584453: |    flags: none (0x0)
Aug 26 18:24:49.584455: |    number of TS: 1 (0x1)
Aug 26 18:24:49.584459: | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr)
Aug 26 18:24:49.584462: | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet'
Aug 26 18:24:49.584467: | *****emit IKEv2 Traffic Selector:
Aug 26 18:24:49.584471: |    TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7)
Aug 26 18:24:49.584473: |    IP Protocol ID: 0 (0x0)
Aug 26 18:24:49.584476: |    start port: 0 (0x0)
Aug 26 18:24:49.584479: |    end port: 65535 (0xffff)
Aug 26 18:24:49.584482: | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector
Aug 26 18:24:49.584485: | ipv4 start  c0 00 02 00
Aug 26 18:24:49.584488: | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector
Aug 26 18:24:49.584490: | ipv4 end  c0 00 02 ff
Aug 26 18:24:49.584493: | emitting length of IKEv2 Traffic Selector: 16
Aug 26 18:24:49.584496: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24
Aug 26 18:24:49.584499: | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE
Aug 26 18:24:49.584502: | Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED
Aug 26 18:24:49.584505: | adding 1 bytes of padding (including 1 byte padding-length)
Aug 26 18:24:49.584509: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload
Aug 26 18:24:49.584512: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload
Aug 26 18:24:49.584515: | emitting length of IKEv2 Encryption Payload: 548
Aug 26 18:24:49.584518: | emitting length of ISAKMP Message: 576
Aug 26 18:24:49.584523: | **parse ISAKMP Message:
Aug 26 18:24:49.584526: |    initiator cookie:
Aug 26 18:24:49.584529: |   14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:49.584531: |    responder cookie:
Aug 26 18:24:49.584534: |   4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:49.584536: |    next payload type: ISAKMP_NEXT_v2SK (0x2e)
Aug 26 18:24:49.584539: |    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Aug 26 18:24:49.584542: |    exchange type: ISAKMP_v2_IKE_AUTH (0x23)
Aug 26 18:24:49.584545: |    flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Aug 26 18:24:49.584548: |    Message ID: 1 (0x1)
Aug 26 18:24:49.584550: |    length: 576 (0x240)
Aug 26 18:24:49.584553: | **parse IKEv2 Encryption Payload:
Aug 26 18:24:49.584556: |    next payload type: ISAKMP_NEXT_v2IDi (0x23)
Aug 26 18:24:49.584559: |    flags: none (0x0)
Aug 26 18:24:49.584561: |    length: 548 (0x224)
Aug 26 18:24:49.584564: | **emit ISAKMP Message:
Aug 26 18:24:49.584567: |    initiator cookie:
Aug 26 18:24:49.584569: |   14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:49.584572: |    responder cookie:
Aug 26 18:24:49.584574: |   4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:49.584577: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:24:49.584580: |    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Aug 26 18:24:49.584583: |    exchange type: ISAKMP_v2_IKE_AUTH (0x23)
Aug 26 18:24:49.584586: |    flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Aug 26 18:24:49.584588: |    Message ID: 1 (0x1)
Aug 26 18:24:49.584591: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:24:49.584594: | ***emit IKEv2 Encrypted Fragment:
Aug 26 18:24:49.584597: |    next payload type: ISAKMP_NEXT_v2IDi (0x23)
Aug 26 18:24:49.584600: |    flags: none (0x0)
Aug 26 18:24:49.584602: |    fragment number: 1 (0x1)
Aug 26 18:24:49.584605: |    total fragments: 2 (0x2)
Aug 26 18:24:49.584608: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 35:ISAKMP_NEXT_v2IDi
Aug 26 18:24:49.584612: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF)
Aug 26 18:24:49.584615: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet'
Aug 26 18:24:49.584618: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment
Aug 26 18:24:49.584625: | emitting 478 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment
Aug 26 18:24:49.584628: | cleartext fragment  24 00 00 0d  02 00 00 00  6e 6f 72 74  68 27 00 00
Aug 26 18:24:49.584631: | cleartext fragment  0c 02 00 00  00 65 61 73  74 21 00 01  1a 01 00 00
Aug 26 18:24:49.584635: | cleartext fragment  00 b2 d8 b8  5f 8c 88 24  36 3b 0f 19  85 7b a0 9e
Aug 26 18:24:49.584638: | cleartext fragment  dc 78 99 9a  49 9d 2c de  6d c5 08 cc  21 37 76 50
Aug 26 18:24:49.584640: | cleartext fragment  6f 95 b3 35  d9 75 4b 28  73 9d d6 1b  b7 53 74 87
Aug 26 18:24:49.584643: | cleartext fragment  6c 55 3a 74  2d 3f d6 8b  e7 86 1c 02  e2 ba 63 03
Aug 26 18:24:49.584646: | cleartext fragment  a0 23 7a 44  7d a5 34 04  a2 b1 81 0c  e3 3b 34 66
Aug 26 18:24:49.584648: | cleartext fragment  a1 2d 3f 4d  71 21 ba 6b  1e 53 2a fd  90 fd da 72
Aug 26 18:24:49.584651: | cleartext fragment  8e 9a 2c bb  c2 f1 09 55  e4 bd f4 ec  72 53 6e 73
Aug 26 18:24:49.584654: | cleartext fragment  4a 3c 53 40  26 5b 89 aa  e1 99 7d 50  f9 70 28 3c
Aug 26 18:24:49.584656: | cleartext fragment  4a 38 5d 0c  f6 da f2 43  2f 7b 94 1a  36 ef 89 e7
Aug 26 18:24:49.584659: | cleartext fragment  5c c1 03 c8  e8 82 61 12  da 46 9d a1  68 a3 15 1a
Aug 26 18:24:49.584661: | cleartext fragment  b6 82 63 d7  cc de 49 1a  47 d2 f5 2c  38 a3 d8 dd
Aug 26 18:24:49.584664: | cleartext fragment  bd 1e 3b d2  f2 3a 6e 2f  1b 24 02 4b  a9 30 26 a4
Aug 26 18:24:49.584667: | cleartext fragment  83 b8 f2 10  9b a0 e5 e2  c3 21 c8 a2  27 11 22 37
Aug 26 18:24:49.584669: | cleartext fragment  13 58 75 4a  1f 19 1d ae  2c ff 59 ee  5b cc 61 b4
Aug 26 18:24:49.584672: | cleartext fragment  4e 1d 5b 0e  b2 09 1d 2a  0e a1 59 b8  62 0d bd 71
Aug 26 18:24:49.584675: | cleartext fragment  37 7b ee b9  bc 59 1a 86  08 1b 79 db  ba 85 a6 49
Aug 26 18:24:49.584677: | cleartext fragment  55 a8 a2 e8  27 18 27 98  ec 80 83 28  a2 42 29 ab
Aug 26 18:24:49.584680: | cleartext fragment  c0 f9 76 2c  00 00 a4 02  00 00 20 01  03 04 02 63
Aug 26 18:24:49.584682: | cleartext fragment  06 38 91 03  00 00 0c 01  00 00 14 80  0e 01 00 00
Aug 26 18:24:49.584685: | cleartext fragment  00 00 08 05  00 00 00 02  00 00 20 02  03 04 02 63
Aug 26 18:24:49.584688: | cleartext fragment  06 38 91 03  00 00 0c 01  00 00 14 80  0e 00 80 00
Aug 26 18:24:49.584690: | cleartext fragment  00 00 08 05  00 00 00 02  00 00 30 03  03 04 04 63
Aug 26 18:24:49.584693: | cleartext fragment  06 38 91 03  00 00 0c 01  00 00 0c 80  0e 01 00 03
Aug 26 18:24:49.584696: | cleartext fragment  00 00 08 03  00 00 0e 03  00 00 08 03  00 00 0c 00
Aug 26 18:24:49.584698: | cleartext fragment  00 00 08 05  00 00 00 00  00 00 30 04  03 04 04 63
Aug 26 18:24:49.584700: | cleartext fragment  06 38 91 03  00 00 0c 01  00 00 0c 80  0e 00 80 03
Aug 26 18:24:49.584702: | cleartext fragment  00 00 08 03  00 00 0e 03  00 00 08 03  00 00 0c 00
Aug 26 18:24:49.584705: | cleartext fragment  00 00 08 05  00 00 00 2d  00 00 18 01  00 00
Aug 26 18:24:49.584708: | adding 1 bytes of padding (including 1 byte padding-length)
Aug 26 18:24:49.584712: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment
Aug 26 18:24:49.584715: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment
Aug 26 18:24:49.584718: | emitting length of IKEv2 Encrypted Fragment: 511
Aug 26 18:24:49.584721: | emitting length of ISAKMP Message: 539
Aug 26 18:24:49.584733: | **emit ISAKMP Message:
Aug 26 18:24:49.584737: |    initiator cookie:
Aug 26 18:24:49.584739: |   14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:49.584742: |    responder cookie:
Aug 26 18:24:49.584744: |   4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:49.584747: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:24:49.584749: |    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Aug 26 18:24:49.584752: |    exchange type: ISAKMP_v2_IKE_AUTH (0x23)
Aug 26 18:24:49.584755: |    flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Aug 26 18:24:49.584758: |    Message ID: 1 (0x1)
Aug 26 18:24:49.584760: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:24:49.584763: | ***emit IKEv2 Encrypted Fragment:
Aug 26 18:24:49.584766: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:49.584768: |    flags: none (0x0)
Aug 26 18:24:49.584771: |    fragment number: 2 (0x2)
Aug 26 18:24:49.584775: |    total fragments: 2 (0x2)
Aug 26 18:24:49.584778: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE
Aug 26 18:24:49.584782: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF)
Aug 26 18:24:49.584785: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet'
Aug 26 18:24:49.584788: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment
Aug 26 18:24:49.584796: | emitting 41 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment
Aug 26 18:24:49.584800: | cleartext fragment  00 07 00 00  10 00 00 ff  ff c0 00 03  fe c0 00 03
Aug 26 18:24:49.584802: | cleartext fragment  fe 00 00 00  18 01 00 00  00 07 00 00  10 00 00 ff
Aug 26 18:24:49.584805: | cleartext fragment  ff c0 00 02  00 c0 00 02  ff
Aug 26 18:24:49.584808: | adding 1 bytes of padding (including 1 byte padding-length)
Aug 26 18:24:49.584811: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment
Aug 26 18:24:49.584814: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment
Aug 26 18:24:49.584817: | emitting length of IKEv2 Encrypted Fragment: 74
Aug 26 18:24:49.584820: | emitting length of ISAKMP Message: 102
Aug 26 18:24:49.584833: | suspend processing: state #1 connection "north-east" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379)
Aug 26 18:24:49.584839: | start processing: state #2 connection "north-east" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379)
Aug 26 18:24:49.584844: | #2 complete_v2_state_transition() md.from_state=PARENT_I1 md.svm.state[from]=PARENT_I1 UNDEFINED->PARENT_I2 with status STF_OK
Aug 26 18:24:49.584848: | IKEv2: transition from state STATE_PARENT_I1 to state STATE_PARENT_I2
Aug 26 18:24:49.584851: | child state #2: UNDEFINED(ignore) => PARENT_I2(open IKE SA)
Aug 26 18:24:49.584855: | Message ID: updating counters for #2 to 0 after switching state
Aug 26 18:24:49.584861: | Message ID: recv #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1->0 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=-1
Aug 26 18:24:49.584867: | Message ID: sent #1.#2 request 1; ike: initiator.sent=0->1 initiator.recv=0 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->1 wip.responder=-1
Aug 26 18:24:49.584872: "north-east" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
Aug 26 18:24:49.584878: | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.33:500)
Aug 26 18:24:49.584881: | sending fragments ...
Aug 26 18:24:49.584888: | sending 539 bytes for STATE_PARENT_I1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1)
Aug 26 18:24:49.584891: |   14 9a 4d e8  d7 d5 09 a7  4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:49.584894: |   35 20 23 08  00 00 00 01  00 00 02 1b  23 00 01 ff
Aug 26 18:24:49.584897: |   00 01 00 02  99 03 6e 07  0f 59 dc a8  2b 6c 58 cb
Aug 26 18:24:49.584899: |   1d 34 be 14  18 a7 45 27  ec 08 e0 41  e9 f4 aa ea
Aug 26 18:24:49.584902: |   90 b9 91 5e  c6 46 20 a1  30 86 03 72  2d fe 4c 6c
Aug 26 18:24:49.584905: |   80 7b 55 a6  af 58 4d c5  60 55 28 9d  d2 73 90 06
Aug 26 18:24:49.584908: |   2d ee 18 30  d0 16 be e0  77 49 ae 1e  92 7d b9 95
Aug 26 18:24:49.584911: |   6b 42 65 f6  01 fa 53 eb  20 61 c1 16  a8 f7 44 51
Aug 26 18:24:49.584913: |   0b 07 40 56  8f 99 4a 56  9c f2 c0 28  19 01 48 6e
Aug 26 18:24:49.584916: |   a3 f6 52 ac  df 8f a4 74  a4 89 7d c8  2b 62 c8 be
Aug 26 18:24:49.584918: |   fb f5 b4 bc  8a cb 96 25  2b 45 f0 6f  c9 f3 b5 c4
Aug 26 18:24:49.584921: |   43 7f 90 a0  b8 ea 6b f4  74 6a 04 ed  90 29 d0 a9
Aug 26 18:24:49.584925: |   c5 72 3e 0f  16 3a 76 04  33 cb bc 31  e2 a6 b9 54
Aug 26 18:24:49.584927: |   be ae 96 f9  f4 4c 9c 79  43 4e b1 dd  25 f8 c7 1e
Aug 26 18:24:49.584930: |   3a 41 57 4f  13 ef 17 a7  b4 b7 ec 04  00 0a 7b 06
Aug 26 18:24:49.584934: |   13 e7 45 d1  6f 20 0a d6  5a 1f ba 63  83 8d b8 7d
Aug 26 18:24:49.584937: |   a8 07 2b cd  83 54 29 de  e1 a3 24 42  47 a1 ed 47
Aug 26 18:24:49.584940: |   c3 87 2e 64  48 34 ad 01  72 13 7f d7  06 f6 0e 10
Aug 26 18:24:49.584943: |   ea 48 56 ce  70 95 53 5e  e7 ea 2c 25  0d 85 f2 b9
Aug 26 18:24:49.584946: |   b6 be a3 06  85 b9 34 d5  f4 d3 2e 77  01 7d cc 2f
Aug 26 18:24:49.584949: |   ba c4 b2 27  e1 09 f3 6e  bd 62 15 55  a4 b2 21 88
Aug 26 18:24:49.584951: |   d8 a8 1e 8a  4a 9c 48 d0  d3 51 eb 8d  d6 6d 98 f5
Aug 26 18:24:49.584954: |   28 99 97 f3  48 34 1d 34  b8 88 a8 64  72 63 bd e1
Aug 26 18:24:49.584957: |   18 54 8b cc  d9 da 5b 06  32 32 b0 8a  ad a3 e6 c3
Aug 26 18:24:49.584959: |   cc 50 f2 ee  33 12 de e8  cd a3 dd 9c  89 aa 28 e1
Aug 26 18:24:49.584962: |   b0 23 25 87  e3 22 be 02  74 e5 19 49  b1 a4 32 0a
Aug 26 18:24:49.584965: |   6b 18 bb 27  a4 40 38 ed  90 36 d2 b3  07 1d 4b f9
Aug 26 18:24:49.584967: |   74 66 f0 c1  b9 26 9a 11  14 ed 8f b0  d7 9e 19 58
Aug 26 18:24:49.584970: |   a3 67 3e 35  7c ca 39 e9  56 61 59 fb  15 61 6e 6c
Aug 26 18:24:49.584973: |   10 ac 6e 5d  a3 e1 68 6f  7b bd 11 2d  b1 19 1e b0
Aug 26 18:24:49.584975: |   76 95 6e b5  54 e3 1e c1  08 85 03 6b  4a 42 3f 23
Aug 26 18:24:49.584978: |   d5 34 42 7e  f7 f4 62 25  97 7c 0b 7d  35 f9 1a 52
Aug 26 18:24:49.584981: |   4f e0 d7 e2  12 15 9e 6d  dd 15 a3 1a  48 a4 30 3e
Aug 26 18:24:49.584983: |   b8 c8 ee 37  b1 7b 43 f9  31 93 57
Aug 26 18:24:49.585030: | sending 102 bytes for STATE_PARENT_I1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1)
Aug 26 18:24:49.585035: |   14 9a 4d e8  d7 d5 09 a7  4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:49.585038: |   35 20 23 08  00 00 00 01  00 00 00 66  00 00 00 4a
Aug 26 18:24:49.585040: |   00 02 00 02  dd 58 08 9d  bc 05 e8 c4  45 75 52 29
Aug 26 18:24:49.585042: |   3a 59 3b f5  3b 64 a5 fc  68 5d 78 38  15 08 0a b8
Aug 26 18:24:49.585045: |   bf 1b 03 e2  30 63 00 0f  85 90 72 35  0f c6 99 92
Aug 26 18:24:49.585048: |   59 c6 09 24  c7 95 68 4d  94 20 c7 9f  af dd 12 f5
Aug 26 18:24:49.585050: |   f2 bb 96 fa  34 7b
Aug 26 18:24:49.585065: | sent 2 fragments
Aug 26 18:24:49.585070: | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms
Aug 26 18:24:49.585074: | event_schedule: new EVENT_RETRANSMIT-pe@0x55e736961878
Aug 26 18:24:49.585079: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #2
Aug 26 18:24:49.585084: | libevent_malloc: new ptr-libevent@0x55e736961688 size 128
Aug 26 18:24:49.585090: | #2 STATE_PARENT_I2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29175.32754
Aug 26 18:24:49.585095: | resume sending helper answer for #1 suppresed complete_v2_state_transition()
Aug 26 18:24:49.585100: |   #1 spent 1.19 milliseconds
Aug 26 18:24:49.585104: | #1 spent 4.83 milliseconds in resume sending helper answer
Aug 26 18:24:49.585109: | stop processing: state #2 connection "north-east" from 192.1.2.23 (in resume_handler() at server.c:833)
Aug 26 18:24:49.585113: | libevent_free: release ptr-libevent@0x7fd530000f48
Aug 26 18:24:49.604530: | spent 0.00271 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:24:49.604550: | *received 435 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:24:49.604553: |   14 9a 4d e8  d7 d5 09 a7  4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:49.604555: |   2e 20 23 20  00 00 00 01  00 00 01 b3  24 00 01 97
Aug 26 18:24:49.604557: |   ee b6 f9 72  76 91 10 c5  48 2b 26 aa  7d 6b 37 d9
Aug 26 18:24:49.604558: |   de 74 a7 ec  60 9b 9b c8  3d a4 c8 1e  29 e5 1d f6
Aug 26 18:24:49.604560: |   72 f9 d8 5f  af 82 ec 0b  32 28 dc 6e  47 a0 6f 5c
Aug 26 18:24:49.604561: |   6c cf 16 d0  aa 94 5e b0  9e ac 09 74  7e 6a b5 bf
Aug 26 18:24:49.604563: |   a6 79 65 14  32 5c 26 9f  7f 92 5d 1b  bb da 98 55
Aug 26 18:24:49.604564: |   1e 55 4a c8  ef 9e 69 6f  d2 3b 0e 14  0b aa 66 85
Aug 26 18:24:49.604566: |   ef 11 c0 88  c1 1f 23 1b  83 8d 81 8d  8d 10 0a dd
Aug 26 18:24:49.604568: |   1f a9 31 ac  83 92 79 33  ad e6 28 52  f8 01 6f f6
Aug 26 18:24:49.604571: |   46 9f 66 c3  c3 ca ec 1c  f1 87 db e0  cb c1 0e 50
Aug 26 18:24:49.604573: |   e0 0d f7 8d  2e 56 76 c8  82 ed 83 7f  15 d5 9f 29
Aug 26 18:24:49.604574: |   de 6a 9f 49  06 fd f8 93  11 49 f6 6a  2c 48 a0 38
Aug 26 18:24:49.604576: |   cb 75 7d e9  69 ad 9c cc  31 67 9c c1  ea 1f 5f dd
Aug 26 18:24:49.604578: |   8e 26 5b 41  52 e3 34 62  1b 35 41 3b  db f5 23 61
Aug 26 18:24:49.604579: |   3b d5 9e 98  3f 90 d7 4d  9f db cc 9b  80 60 82 b0
Aug 26 18:24:49.604581: |   c9 bf 4c ca  45 7e 5f 60  2b 6b 72 42  6f 1c b6 69
Aug 26 18:24:49.604582: |   9f 83 2a 84  0b b2 30 e8  82 c1 64 22  fa 84 95 65
Aug 26 18:24:49.604584: |   6d 9f b4 77  4b 28 56 e7  70 0b b2 72  f4 61 b3 29
Aug 26 18:24:49.604585: |   38 ac bc c1  97 2b d5 a0  96 5b 53 11  6d 02 7c e0
Aug 26 18:24:49.604587: |   ae 95 fe e3  a7 a9 7d 59  1f 7f fe b9  80 df 86 19
Aug 26 18:24:49.604589: |   ca 8f 58 25  2c 59 ea fa  4d bc 75 3a  1e d2 e4 09
Aug 26 18:24:49.604590: |   d9 92 83 98  02 80 eb 9f  3e 19 2b 76  0e e6 2d eb
Aug 26 18:24:49.604592: |   cf 86 64 24  ae e6 d1 ec  d5 b2 3e 65  43 a9 7b f0
Aug 26 18:24:49.604593: |   d0 5b 17 20  9e e1 f1 3f  94 9a 0a dd  83 8b f6 d8
Aug 26 18:24:49.604595: |   15 20 ae 24  db 75 d7 9e  20 e3 a5 14  98 c6 0f be
Aug 26 18:24:49.604596: |   11 55 05 d8  66 e8 e4 1d  43 78 26 8e  9e 4a 18 41
Aug 26 18:24:49.604598: |   5c 5e 2d
Aug 26 18:24:49.604601: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:24:49.604604: | **parse ISAKMP Message:
Aug 26 18:24:49.604606: |    initiator cookie:
Aug 26 18:24:49.604608: |   14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:49.604609: |    responder cookie:
Aug 26 18:24:49.604611: |   4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:49.604613: |    next payload type: ISAKMP_NEXT_v2SK (0x2e)
Aug 26 18:24:49.604615: |    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Aug 26 18:24:49.604617: |    exchange type: ISAKMP_v2_IKE_AUTH (0x23)
Aug 26 18:24:49.604618: |    flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Aug 26 18:24:49.604620: |    Message ID: 1 (0x1)
Aug 26 18:24:49.604622: |    length: 435 (0x1b3)
Aug 26 18:24:49.604624: |  processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35)
Aug 26 18:24:49.604627: | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response 
Aug 26 18:24:49.604630: | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa)
Aug 26 18:24:49.604634: | start processing: state #1 connection "north-east" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016)
Aug 26 18:24:49.604636: | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip)
Aug 26 18:24:49.604639: | suspend processing: state #1 connection "north-east" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062)
Aug 26 18:24:49.604641: | start processing: state #2 connection "north-east" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062)
Aug 26 18:24:49.604643: | #2 is idle
Aug 26 18:24:49.604645: | #2 idle
Aug 26 18:24:49.604647: | unpacking clear payload
Aug 26 18:24:49.604648: | Now let's proceed with payload (ISAKMP_NEXT_v2SK)
Aug 26 18:24:49.604650: | ***parse IKEv2 Encryption Payload:
Aug 26 18:24:49.604652: |    next payload type: ISAKMP_NEXT_v2IDr (0x24)
Aug 26 18:24:49.604654: |    flags: none (0x0)
Aug 26 18:24:49.604656: |    length: 407 (0x197)
Aug 26 18:24:49.604657: | processing payload: ISAKMP_NEXT_v2SK (len=403)
Aug 26 18:24:49.604659: | #2 in state PARENT_I2: sent v2I2, expected v2R2
Aug 26 18:24:49.604671: | #2 ikev2 ISAKMP_v2_IKE_AUTH decrypt success
Aug 26 18:24:49.604673: | Now let's proceed with payload (ISAKMP_NEXT_v2IDr)
Aug 26 18:24:49.604675: | **parse IKEv2 Identification - Responder - Payload:
Aug 26 18:24:49.604677: |    next payload type: ISAKMP_NEXT_v2AUTH (0x27)
Aug 26 18:24:49.604679: |    flags: none (0x0)
Aug 26 18:24:49.604680: |    length: 12 (0xc)
Aug 26 18:24:49.604682: |    ID type: ID_FQDN (0x2)
Aug 26 18:24:49.604684: | processing payload: ISAKMP_NEXT_v2IDr (len=4)
Aug 26 18:24:49.604685: | Now let's proceed with payload (ISAKMP_NEXT_v2AUTH)
Aug 26 18:24:49.604688: | **parse IKEv2 Authentication Payload:
Aug 26 18:24:49.604690: |    next payload type: ISAKMP_NEXT_v2SA (0x21)
Aug 26 18:24:49.604692: |    flags: none (0x0)
Aug 26 18:24:49.604694: |    length: 282 (0x11a)
Aug 26 18:24:49.604696: |    auth method: IKEv2_AUTH_RSA (0x1)
Aug 26 18:24:49.604699: | processing payload: ISAKMP_NEXT_v2AUTH (len=274)
Aug 26 18:24:49.604702: | Now let's proceed with payload (ISAKMP_NEXT_v2SA)
Aug 26 18:24:49.604704: | **parse IKEv2 Security Association Payload:
Aug 26 18:24:49.604707: |    next payload type: ISAKMP_NEXT_v2TSi (0x2c)
Aug 26 18:24:49.604710: |    flags: none (0x0)
Aug 26 18:24:49.604712: |    length: 36 (0x24)
Aug 26 18:24:49.604715: | processing payload: ISAKMP_NEXT_v2SA (len=32)
Aug 26 18:24:49.604717: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi)
Aug 26 18:24:49.604720: | **parse IKEv2 Traffic Selector - Initiator - Payload:
Aug 26 18:24:49.604722: |    next payload type: ISAKMP_NEXT_v2TSr (0x2d)
Aug 26 18:24:49.604725: |    flags: none (0x0)
Aug 26 18:24:49.604728: |    length: 24 (0x18)
Aug 26 18:24:49.604730: |    number of TS: 1 (0x1)
Aug 26 18:24:49.604733: | processing payload: ISAKMP_NEXT_v2TSi (len=16)
Aug 26 18:24:49.604735: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr)
Aug 26 18:24:49.604738: | **parse IKEv2 Traffic Selector - Responder - Payload:
Aug 26 18:24:49.604741: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:49.604743: |    flags: none (0x0)
Aug 26 18:24:49.604746: |    length: 24 (0x18)
Aug 26 18:24:49.604748: |    number of TS: 1 (0x1)
Aug 26 18:24:49.604751: | processing payload: ISAKMP_NEXT_v2TSr (len=16)
Aug 26 18:24:49.604754: | selected state microcode Initiator: process IKE_AUTH response
Aug 26 18:24:49.604756: | Now let's proceed with state specific processing
Aug 26 18:24:49.604759: | calling processor Initiator: process IKE_AUTH response
Aug 26 18:24:49.604765: | offered CA: '%none'
Aug 26 18:24:49.604769: "north-east" #2: IKEv2 mode peer ID is ID_FQDN: '@east'
Aug 26 18:24:49.604800: | verifying AUTH payload
Aug 26 18:24:49.604817: | required RSA CA is '%any'
Aug 26 18:24:49.604821: | checking RSA keyid '@east' for match with '@east'
Aug 26 18:24:49.604825: | key issuer CA is '%any'
Aug 26 18:24:49.604889: | an RSA Sig check passed with *AQO9bJbr3 [preloaded key]
Aug 26 18:24:49.604897: |     #1 spent 0.0673 milliseconds in try_all_RSA_keys() trying a pubkey
Aug 26 18:24:49.604901: "north-east" #2: Authenticated using RSA
Aug 26 18:24:49.604907: |   #1 spent 0.1 milliseconds in ikev2_verify_rsa_hash()
Aug 26 18:24:49.604911: | parent state #1: PARENT_I2(open IKE SA) => PARENT_I3(established IKE SA)
Aug 26 18:24:49.604916: | #1 will start re-keying in 2607 seconds with margin of 993 seconds (attempting re-key)
Aug 26 18:24:49.604919: | state #1 requesting EVENT_SA_REPLACE to be deleted
Aug 26 18:24:49.604923: | libevent_free: release ptr-libevent@0x7fd538002888
Aug 26 18:24:49.604927: | free_event_entry: release EVENT_SA_REPLACE-pe@0x55e73695e588
Aug 26 18:24:49.604931: | event_schedule: new EVENT_SA_REKEY-pe@0x55e73695e588
Aug 26 18:24:49.604935: | inserting event EVENT_SA_REKEY, timeout in 2607 seconds for #1
Aug 26 18:24:49.604938: | libevent_malloc: new ptr-libevent@0x7fd530000f48 size 128
Aug 26 18:24:49.605005: | pstats #1 ikev2.ike established
Aug 26 18:24:49.605011: | TSi: parsing 1 traffic selectors
Aug 26 18:24:49.605015: | ***parse IKEv2 Traffic Selector:
Aug 26 18:24:49.605018: |    TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7)
Aug 26 18:24:49.605021: |    IP Protocol ID: 0 (0x0)
Aug 26 18:24:49.605024: |    length: 16 (0x10)
Aug 26 18:24:49.605026: |    start port: 0 (0x0)
Aug 26 18:24:49.605029: |    end port: 65535 (0xffff)
Aug 26 18:24:49.605032: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low
Aug 26 18:24:49.605035: | TS low  c0 00 03 fe
Aug 26 18:24:49.605039: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high
Aug 26 18:24:49.605041: | TS high  c0 00 03 fe
Aug 26 18:24:49.605044: | TSi: parsed 1 traffic selectors
Aug 26 18:24:49.605049: | TSr: parsing 1 traffic selectors
Aug 26 18:24:49.605052: | ***parse IKEv2 Traffic Selector:
Aug 26 18:24:49.605055: |    TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7)
Aug 26 18:24:49.605058: |    IP Protocol ID: 0 (0x0)
Aug 26 18:24:49.605060: |    length: 16 (0x10)
Aug 26 18:24:49.605063: |    start port: 0 (0x0)
Aug 26 18:24:49.605066: |    end port: 65535 (0xffff)
Aug 26 18:24:49.605069: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low
Aug 26 18:24:49.605071: | TS low  c0 00 02 00
Aug 26 18:24:49.605074: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high
Aug 26 18:24:49.605077: | TS high  c0 00 02 ff
Aug 26 18:24:49.605079: | TSr: parsed 1 traffic selectors
Aug 26 18:24:49.605086: | evaluating our conn="north-east" I=192.0.3.254/32:0/0 R=192.0.2.0/24:0/0 to their:
Aug 26 18:24:49.605091: |     TSi[0] .net=192.0.3.254-192.0.3.254 .iporotoid=0 .{start,end}port=0..65535
Aug 26 18:24:49.605098: |         match address end->client=192.0.3.254/32 == TSi[0]net=192.0.3.254-192.0.3.254: YES fitness 32
Aug 26 18:24:49.605102: |         narrow port end=0..65535 == TSi[0]=0..65535: 0
Aug 26 18:24:49.605104: |           TSi[0] port match: YES fitness 65536
Aug 26 18:24:49.605108: |         narrow protocol end=*0 == TSi[0]=*0: 0
Aug 26 18:24:49.605111: |         match end->protocol=*0 == TSi[0].ipprotoid=*0: YES fitness 255
Aug 26 18:24:49.605116: |     TSr[0] .net=192.0.2.0-192.0.2.255 .iporotoid=0 .{start,end}port=0..65535
Aug 26 18:24:49.605122: |         match address end->client=192.0.2.0/24 == TSr[0]net=192.0.2.0-192.0.2.255: YES fitness 32
Aug 26 18:24:49.605125: |         narrow port end=0..65535 == TSr[0]=0..65535: 0
Aug 26 18:24:49.605128: |           TSr[0] port match: YES fitness 65536
Aug 26 18:24:49.605131: |         narrow protocol end=*0 == TSr[0]=*0: 0
Aug 26 18:24:49.605134: |         match end->protocol=*0 == TSr[0].ipprotoid=*0: YES fitness 255
Aug 26 18:24:49.605137: | best fit so far: TSi[0] TSr[0]
Aug 26 18:24:49.605140: | found an acceptable TSi/TSr Traffic Selector
Aug 26 18:24:49.605142: | printing contents struct traffic_selector
Aug 26 18:24:49.605145: |   ts_type: IKEv2_TS_IPV6_ADDR_RANGE
Aug 26 18:24:49.605147: |   ipprotoid: 0
Aug 26 18:24:49.605150: |   port range: 0-65535
Aug 26 18:24:49.605154: |   ip range: 192.0.3.254-192.0.3.254
Aug 26 18:24:49.605157: | printing contents struct traffic_selector
Aug 26 18:24:49.605159: |   ts_type: IKEv2_TS_IPV6_ADDR_RANGE
Aug 26 18:24:49.605162: |   ipprotoid: 0
Aug 26 18:24:49.605164: |   port range: 0-65535
Aug 26 18:24:49.605168: |   ip range: 192.0.2.0-192.0.2.255
Aug 26 18:24:49.605183: | using existing local ESP/AH proposals for north-east (IKE_AUTH initiator accepting remote ESP/AH proposal): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED
Aug 26 18:24:49.605187: | Comparing remote proposals against IKE_AUTH initiator accepting remote ESP/AH proposal 4 local proposals
Aug 26 18:24:49.605191: | local proposal 1 type ENCR has 1 transforms
Aug 26 18:24:49.605194: | local proposal 1 type PRF has 0 transforms
Aug 26 18:24:49.605196: | local proposal 1 type INTEG has 1 transforms
Aug 26 18:24:49.605199: | local proposal 1 type DH has 1 transforms
Aug 26 18:24:49.605202: | local proposal 1 type ESN has 1 transforms
Aug 26 18:24:49.605206: | local proposal 1 transforms: required: ENCR+ESN; optional: INTEG+DH
Aug 26 18:24:49.605209: | local proposal 2 type ENCR has 1 transforms
Aug 26 18:24:49.605211: | local proposal 2 type PRF has 0 transforms
Aug 26 18:24:49.605213: | local proposal 2 type INTEG has 1 transforms
Aug 26 18:24:49.605216: | local proposal 2 type DH has 1 transforms
Aug 26 18:24:49.605219: | local proposal 2 type ESN has 1 transforms
Aug 26 18:24:49.605223: | local proposal 2 transforms: required: ENCR+ESN; optional: INTEG+DH
Aug 26 18:24:49.605226: | local proposal 3 type ENCR has 1 transforms
Aug 26 18:24:49.605230: | local proposal 3 type PRF has 0 transforms
Aug 26 18:24:49.605233: | local proposal 3 type INTEG has 2 transforms
Aug 26 18:24:49.605235: | local proposal 3 type DH has 1 transforms
Aug 26 18:24:49.605238: | local proposal 3 type ESN has 1 transforms
Aug 26 18:24:49.605241: | local proposal 3 transforms: required: ENCR+INTEG+ESN; optional: DH
Aug 26 18:24:49.605243: | local proposal 4 type ENCR has 1 transforms
Aug 26 18:24:49.605246: | local proposal 4 type PRF has 0 transforms
Aug 26 18:24:49.605249: | local proposal 4 type INTEG has 2 transforms
Aug 26 18:24:49.605252: | local proposal 4 type DH has 1 transforms
Aug 26 18:24:49.605254: | local proposal 4 type ESN has 1 transforms
Aug 26 18:24:49.605257: | local proposal 4 transforms: required: ENCR+INTEG+ESN; optional: DH
Aug 26 18:24:49.605261: | ***parse IKEv2 Proposal Substructure Payload:
Aug 26 18:24:49.605264: |    last proposal: v2_PROPOSAL_LAST (0x0)
Aug 26 18:24:49.605266: |    length: 32 (0x20)
Aug 26 18:24:49.605269: |    prop #: 1 (0x1)
Aug 26 18:24:49.605271: |    proto ID: IKEv2_SEC_PROTO_ESP (0x3)
Aug 26 18:24:49.605274: |    spi size: 4 (0x4)
Aug 26 18:24:49.605276: |    # transforms: 2 (0x2)
Aug 26 18:24:49.605280: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI
Aug 26 18:24:49.605282: | remote SPI  4a 38 49 86
Aug 26 18:24:49.605286: | Comparing remote proposal 1 containing 2 transforms against local proposal [1..1] of 4 local proposals
Aug 26 18:24:49.605296: | ****parse IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.605300: |    last transform: v2_TRANSFORM_NON_LAST (0x3)
Aug 26 18:24:49.605303: |    length: 12 (0xc)
Aug 26 18:24:49.605305: |    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
Aug 26 18:24:49.605308: |    IKEv2 transform ID: AES_GCM_C (0x14)
Aug 26 18:24:49.605311: | *****parse IKEv2 Attribute Substructure Payload:
Aug 26 18:24:49.605314: |    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
Aug 26 18:24:49.605317: |    length/value: 256 (0x100)
Aug 26 18:24:49.605322: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0
Aug 26 18:24:49.605325: | ****parse IKEv2 Transform Substructure Payload:
Aug 26 18:24:49.605328: |    last transform: v2_TRANSFORM_LAST (0x0)
Aug 26 18:24:49.605330: |    length: 8 (0x8)
Aug 26 18:24:49.605333: |    IKEv2 transform type: TRANS_TYPE_ESN (0x5)
Aug 26 18:24:49.605336: |    IKEv2 transform ID: ESN_DISABLED (0x0)
Aug 26 18:24:49.605340: | remote proposal 1 transform 1 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0
Aug 26 18:24:49.605344: | remote proposal 1 proposed transforms: ENCR+ESN; matched: ENCR+ESN; unmatched: none
Aug 26 18:24:49.605349: | comparing remote proposal 1 containing ENCR+ESN transforms to local proposal 1; required: ENCR+ESN; optional: INTEG+DH; matched: ENCR+ESN
Aug 26 18:24:49.605353: | remote proposal 1 matches local proposal 1
Aug 26 18:24:49.605356: | remote accepted the proposal 1:ESP:ENCR=AES_GCM_C_256;ESN=DISABLED[first-match]
Aug 26 18:24:49.605362: | IKE_AUTH initiator accepting remote ESP/AH proposal ikev2_proposal: 1:ESP:SPI=4a384986;ENCR=AES_GCM_C_256;ESN=DISABLED
Aug 26 18:24:49.605365: | converting proposal to internal trans attrs
Aug 26 18:24:49.605371: | integ=none: .key_size=0 encrypt=aes_gcm_16: .key_size=32 .salt_size=4 keymat_len=36
Aug 26 18:24:49.605541: | install_ipsec_sa() for #2: inbound and outbound
Aug 26 18:24:49.605547: | could_route called for north-east (kind=CK_PERMANENT)
Aug 26 18:24:49.605551: | FOR_EACH_CONNECTION_... in route_owner
Aug 26 18:24:49.605554: |  conn north-east mark 0/00000000, 0/00000000 vs
Aug 26 18:24:49.605557: |  conn north-east mark 0/00000000, 0/00000000
Aug 26 18:24:49.605561: | route owner of "north-east" prospective erouted: self; eroute owner: self
Aug 26 18:24:49.605565: | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE
Aug 26 18:24:49.605569: | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20
Aug 26 18:24:49.605572: | AES_GCM_16 requires 4 salt bytes
Aug 26 18:24:49.605577: | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0
Aug 26 18:24:49.605583: | setting IPsec SA replay-window to 32
Aug 26 18:24:49.605586: | NIC esp-hw-offload not for connection 'north-east' not available on interface eth1
Aug 26 18:24:49.605589: | netlink: enabling tunnel mode
Aug 26 18:24:49.605592: | netlink: setting IPsec SA replay-window to 32 using old-style req
Aug 26 18:24:49.605595: | netlink: esp-hw-offload not set for IPsec SA
Aug 26 18:24:49.605661: | netlink response for Add SA esp.4a384986@192.1.2.23 included non-error error
Aug 26 18:24:49.605666: | set up outgoing SA, ref=0/0
Aug 26 18:24:49.605668: | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE
Aug 26 18:24:49.605676: | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20
Aug 26 18:24:49.605680: | AES_GCM_16 requires 4 salt bytes
Aug 26 18:24:49.605684: | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0
Aug 26 18:24:49.605689: | setting IPsec SA replay-window to 32
Aug 26 18:24:49.605693: | NIC esp-hw-offload not for connection 'north-east' not available on interface eth1
Aug 26 18:24:49.605696: | netlink: enabling tunnel mode
Aug 26 18:24:49.605699: | netlink: setting IPsec SA replay-window to 32 using old-style req
Aug 26 18:24:49.605703: | netlink: esp-hw-offload not set for IPsec SA
Aug 26 18:24:49.605732: | netlink response for Add SA esp.63063891@192.1.3.33 included non-error error
Aug 26 18:24:49.605736: | priority calculation of connection "north-east" is 0xfdfe7
Aug 26 18:24:49.605745: | add inbound eroute 192.0.2.0/24:0 --0-> 192.0.3.254/32:0 => tun.10000@192.1.3.33 (raw_eroute)
Aug 26 18:24:49.605749: | IPsec Sa SPD priority set to 1040359
Aug 26 18:24:49.605773: | raw_eroute result=success
Aug 26 18:24:49.605778: | set up incoming SA, ref=0/0
Aug 26 18:24:49.605782: | sr for #2: prospective erouted
Aug 26 18:24:49.605786: | route_and_eroute() for proto 0, and source port 0 dest port 0
Aug 26 18:24:49.605789: | FOR_EACH_CONNECTION_... in route_owner
Aug 26 18:24:49.605793: |  conn north-east mark 0/00000000, 0/00000000 vs
Aug 26 18:24:49.605797: |  conn north-east mark 0/00000000, 0/00000000
Aug 26 18:24:49.605801: | route owner of "north-east" prospective erouted: self; eroute owner: self
Aug 26 18:24:49.605806: | route_and_eroute with c: north-east (next: none) ero:north-east esr:{(nil)} ro:north-east rosr:{(nil)} and state: #2
Aug 26 18:24:49.605809: | priority calculation of connection "north-east" is 0xfdfe7
Aug 26 18:24:49.605815: | eroute_connection replace eroute 192.0.3.254/32:0 --0-> 192.0.2.0/24:0 => tun.0@192.1.2.23>tun.0@192.1.2.23 (raw_eroute)
Aug 26 18:24:49.605817: | IPsec Sa SPD priority set to 1040359
Aug 26 18:24:49.605827: | raw_eroute result=success
Aug 26 18:24:49.605830: | running updown command "ipsec _updown" for verb up 
Aug 26 18:24:49.605833: | command executing up-client
Aug 26 18:24:49.605858: | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.254/32' PLUTO_MY_CLIENT_NET='192.0.3.254' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x4a3849
Aug 26 18:24:49.605862: | popen cmd is 1036 chars long
Aug 26 18:24:49.605864: | cmd(   0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-east' PLUTO_I:
Aug 26 18:24:49.605868: | cmd(  80):NTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='@:
Aug 26 18:24:49.605870: | cmd( 160):north' PLUTO_MY_CLIENT='192.0.3.254/32' PLUTO_MY_CLIENT_NET='192.0.3.254' PLUTO_:
Aug 26 18:24:49.605871: | cmd( 240):MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_S:
Aug 26 18:24:49.605873: | cmd( 320):A_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east:
Aug 26 18:24:49.605875: | cmd( 400):' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_:
Aug 26 18:24:49.605876: | cmd( 480):CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PE:
Aug 26 18:24:49.605878: | cmd( 560):ER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYP:
Aug 26 18:24:49.605880: | cmd( 640):T+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_:
Aug 26 18:24:49.605882: | cmd( 720):PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' P:
Aug 26 18:24:49.605883: | cmd( 800):LUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_S:
Aug 26 18:24:49.605885: | cmd( 880):ERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING=:
Aug 26 18:24:49.605887: | cmd( 960):'no' VTI_SHARED='no' SPI_IN=0x4a384986 SPI_OUT=0x63063891 ipsec _updown 2>&1:
Aug 26 18:24:49.614773: | route_and_eroute: firewall_notified: true
Aug 26 18:24:49.614788: | route_and_eroute: instance "north-east", setting eroute_owner {spd=0x55e73695c898,sr=0x55e73695c898} to #2 (was #0) (newest_ipsec_sa=#0)
Aug 26 18:24:49.614892: |   #1 spent 0.89 milliseconds in install_ipsec_sa()
Aug 26 18:24:49.614903: | inR2: instance north-east[0], setting IKEv2 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1
Aug 26 18:24:49.614907: | state #2 requesting EVENT_RETRANSMIT to be deleted
Aug 26 18:24:49.614912: | #2 STATE_PARENT_I2: retransmits: cleared
Aug 26 18:24:49.614923: | libevent_free: release ptr-libevent@0x55e736961688
Aug 26 18:24:49.614930: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55e736961878
Aug 26 18:24:49.614937: | #2 spent 1.71 milliseconds in processing: Initiator: process IKE_AUTH response in ikev2_process_state_packet()
Aug 26 18:24:49.614947: | [RE]START processing: state #2 connection "north-east" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379)
Aug 26 18:24:49.614952: | #2 complete_v2_state_transition() PARENT_I2->V2_IPSEC_I with status STF_OK
Aug 26 18:24:49.614956: | IKEv2: transition from state STATE_PARENT_I2 to state STATE_V2_IPSEC_I
Aug 26 18:24:49.614960: | child state #2: PARENT_I2(open IKE SA) => V2_IPSEC_I(established CHILD SA)
Aug 26 18:24:49.614964: | Message ID: updating counters for #2 to 1 after switching state
Aug 26 18:24:49.614972: | Message ID: recv #1.#2 response 1; ike: initiator.sent=1 initiator.recv=0->1 responder.sent=-1 responder.recv=-1; child: wip.initiator=1->-1 wip.responder=-1
Aug 26 18:24:49.614978: | Message ID: #1.#2 skipping update_send as nothing to send; initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1
Aug 26 18:24:49.614982: | pstats #2 ikev2.child established
Aug 26 18:24:49.614992: "north-east" #2: negotiated connection [192.0.3.254-192.0.3.254:0-65535 0] -> [192.0.2.0-192.0.2.255:0-65535 0]
Aug 26 18:24:49.614997: | NAT-T: encaps is 'auto'
Aug 26 18:24:49.615002: "north-east" #2: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0x4a384986 <0x63063891 xfrm=AES_GCM_16_256-NONE NATOA=none NATD=none DPD=passive}
Aug 26 18:24:49.615005: | releasing whack for #2 (sock=fd@-1)
Aug 26 18:24:49.615008: | releasing whack and unpending for parent #1
Aug 26 18:24:49.615011: | unpending state #1 connection "north-east"
Aug 26 18:24:49.615017: | delete from pending Child SA with 192.1.2.23 "north-east"
Aug 26 18:24:49.615020: | removing pending policy for no connection {0x55e73694f438}
Aug 26 18:24:49.615025: | #2 will start re-keying in 28048 seconds with margin of 752 seconds (attempting re-key)
Aug 26 18:24:49.615034: | event_schedule: new EVENT_SA_REKEY-pe@0x55e736961878
Aug 26 18:24:49.615038: | inserting event EVENT_SA_REKEY, timeout in 28048 seconds for #2
Aug 26 18:24:49.615041: | libevent_malloc: new ptr-libevent@0x55e736967758 size 128
Aug 26 18:24:49.615047: | stop processing: state #2 connection "north-east" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018)
Aug 26 18:24:49.615051: | #1 spent 2.05 milliseconds in ikev2_process_packet()
Aug 26 18:24:49.615055: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380)
Aug 26 18:24:49.615058: | processing: STOP state #0 (in process_md() at demux.c:382)
Aug 26 18:24:49.615060: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:24:49.615063: | spent 2.06 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:24:49.615074: | processing signal PLUTO_SIGCHLD
Aug 26 18:24:49.615078: | waitpid returned ECHILD (no child processes left)
Aug 26 18:24:49.615081: | spent 0.00344 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:24:50.640255: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:24:50.640275: | FOR_EACH_STATE_... in show_traffic_status (sort_states)
Aug 26 18:24:50.640279: | FOR_EACH_STATE_... in sort_states
Aug 26 18:24:50.640286: | get_sa_info esp.63063891@192.1.3.33
Aug 26 18:24:50.640306: | get_sa_info esp.4a384986@192.1.2.23
Aug 26 18:24:50.640324: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:24:50.640330: | spent 0.0732 milliseconds in whack
Aug 26 18:24:53.910984: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:24:53.911008: | FOR_EACH_STATE_... in show_traffic_status (sort_states)
Aug 26 18:24:53.911014: | FOR_EACH_STATE_... in sort_states
Aug 26 18:24:53.911023: | get_sa_info esp.63063891@192.1.3.33
Aug 26 18:24:53.911042: | get_sa_info esp.4a384986@192.1.2.23
Aug 26 18:24:53.911065: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:24:53.911074: | spent 0.339 milliseconds in whack
Aug 26 18:24:55.844285: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:24:55.872581: | FOR_EACH_CONNECTION_... in show_connections_status
Aug 26 18:24:55.872606: | FOR_EACH_CONNECTION_... in show_connections_status
Aug 26 18:24:55.872672: | FOR_EACH_STATE_... in show_states_status (sort_states)
Aug 26 18:24:55.872677: | FOR_EACH_STATE_... in sort_states
Aug 26 18:24:55.872689: | get_sa_info esp.63063891@192.1.3.33
Aug 26 18:24:55.873053: | get_sa_info esp.4a384986@192.1.2.23
Aug 26 18:24:55.873081: | close_any(fd@16) (in whack_process() at rcv_whack.c:700)
Aug 26 18:24:55.873090: | spent 0.822 milliseconds in whack
Aug 26 18:24:56.565020: | spent 0.00253 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:24:56.565043: | *received 69 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:24:56.565046: |   14 9a 4d e8  d7 d5 09 a7  4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:56.565048: |   2e 20 25 00  00 00 00 00  00 00 00 45  2a 00 00 29
Aug 26 18:24:56.565049: |   0d 77 42 1c  18 d1 a2 d2  39 f6 f0 6a  f4 45 c2 0a
Aug 26 18:24:56.565051: |   bb d4 9f 44  b1 83 94 38  c2 9a 42 0f  29 19 a1 22
Aug 26 18:24:56.565052: |   be 23 e4 86  6c
Aug 26 18:24:56.565056: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:24:56.565058: | **parse ISAKMP Message:
Aug 26 18:24:56.565060: |    initiator cookie:
Aug 26 18:24:56.565062: |   14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:56.565064: |    responder cookie:
Aug 26 18:24:56.565065: |   4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:56.565067: |    next payload type: ISAKMP_NEXT_v2SK (0x2e)
Aug 26 18:24:56.565069: |    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Aug 26 18:24:56.565071: |    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
Aug 26 18:24:56.565074: |    flags: none (0x0)
Aug 26 18:24:56.565078: |    Message ID: 0 (0x0)
Aug 26 18:24:56.565080: |    length: 69 (0x45)
Aug 26 18:24:56.565082: |  processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37)
Aug 26 18:24:56.565084: | I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request 
Aug 26 18:24:56.565087: | State DB: found IKEv2 state #1 in PARENT_I3 (find_v2_ike_sa)
Aug 26 18:24:56.565092: | start processing: state #1 connection "north-east" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016)
Aug 26 18:24:56.565094: | State DB: IKEv2 state not found (find_v2_sa_by_responder_wip)
Aug 26 18:24:56.565097: | [RE]START processing: state #1 connection "north-east" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2064)
Aug 26 18:24:56.565099: | #1 st.st_msgid_lastrecv -1 md.hdr.isa_msgid 00000000
Aug 26 18:24:56.565102: | Message ID: #1 not a duplicate - message is new; initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1
Aug 26 18:24:56.565104: | unpacking clear payload
Aug 26 18:24:56.565106: | Now let's proceed with payload (ISAKMP_NEXT_v2SK)
Aug 26 18:24:56.565108: | ***parse IKEv2 Encryption Payload:
Aug 26 18:24:56.565109: |    next payload type: ISAKMP_NEXT_v2D (0x2a)
Aug 26 18:24:56.565111: |    flags: none (0x0)
Aug 26 18:24:56.565113: |    length: 41 (0x29)
Aug 26 18:24:56.565115: | processing payload: ISAKMP_NEXT_v2SK (len=37)
Aug 26 18:24:56.565118: | Message ID: start-responder #1 request 0; ike: initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1->0
Aug 26 18:24:56.565120: | #1 in state PARENT_I3: PARENT SA established
Aug 26 18:24:56.565139: | #1 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success
Aug 26 18:24:56.565141: | Now let's proceed with payload (ISAKMP_NEXT_v2D)
Aug 26 18:24:56.565143: | **parse IKEv2 Delete Payload:
Aug 26 18:24:56.565145: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:56.565147: |    flags: none (0x0)
Aug 26 18:24:56.565148: |    length: 12 (0xc)
Aug 26 18:24:56.565150: |    protocol ID: PROTO_v2_ESP (0x3)
Aug 26 18:24:56.565152: |    SPI size: 4 (0x4)
Aug 26 18:24:56.565154: |    number of SPIs: 1 (0x1)
Aug 26 18:24:56.565155: | processing payload: ISAKMP_NEXT_v2D (len=4)
Aug 26 18:24:56.565157: | selected state microcode I3: INFORMATIONAL Request
Aug 26 18:24:56.565159: | Now let's proceed with state specific processing
Aug 26 18:24:56.565160: | calling processor I3: INFORMATIONAL Request
Aug 26 18:24:56.565163: | an informational request should send a response 
Aug 26 18:24:56.565184: | Received an INFORMATIONAL response, updating st_last_liveness, no pending_liveness
Aug 26 18:24:56.565186: | **emit ISAKMP Message:
Aug 26 18:24:56.565188: |    initiator cookie:
Aug 26 18:24:56.565190: |   14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:56.565191: |    responder cookie:
Aug 26 18:24:56.565193: |   4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:56.565196: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:24:56.565199: |    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Aug 26 18:24:56.565201: |    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
Aug 26 18:24:56.565205: |    flags: ISAKMP_FLAG_v2_IKE_INIT+ISAKMP_FLAG_v2_MSG_RESPONSE (0x28)
Aug 26 18:24:56.565208: |    Message ID: 0 (0x0)
Aug 26 18:24:56.565211: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:24:56.565215: | ***emit IKEv2 Encryption Payload:
Aug 26 18:24:56.565218: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:56.565220: |    flags: none (0x0)
Aug 26 18:24:56.565224: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK)
Aug 26 18:24:56.565227: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'information exchange reply packet'
Aug 26 18:24:56.565231: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload
Aug 26 18:24:56.565243: | parsing 4 raw bytes of IKEv2 Delete Payload into SPI
Aug 26 18:24:56.565246: | SPI  4a 38 49 86
Aug 26 18:24:56.565252: | delete PROTO_v2_ESP SA(0x4a384986)
Aug 26 18:24:56.565255: | v2 CHILD SA #2 found using their inbound (our outbound) SPI, in STATE_V2_IPSEC_I
Aug 26 18:24:56.565259: | State DB: found IKEv2 state #2 in V2_IPSEC_I (find_v2_child_sa_by_outbound_spi)
Aug 26 18:24:56.565262: | our side SPI that needs to be deleted: PROTO_v2_ESP SA(0x4a384986)
Aug 26 18:24:56.565265: "north-east" #1: received Delete SA payload: delete IPsec State #2 now
Aug 26 18:24:56.565269: | pstats #2 ikev2.child deleted completed
Aug 26 18:24:56.565274: | #2 spent 1.71 milliseconds in total
Aug 26 18:24:56.565279: | suspend processing: state #1 connection "north-east" from 192.1.2.23 (in delete_state() at state.c:879)
Aug 26 18:24:56.565284: | start processing: state #2 connection "north-east" from 192.1.2.23 (in delete_state() at state.c:879)
Aug 26 18:24:56.565293: "north-east" #2: deleting other state #2 (STATE_V2_IPSEC_I) aged 6.985s and NOT sending notification
Aug 26 18:24:56.565299: | child state #2: V2_IPSEC_I(established CHILD SA) => delete
Aug 26 18:24:56.565304: | get_sa_info esp.4a384986@192.1.2.23
Aug 26 18:24:56.565321: | get_sa_info esp.63063891@192.1.3.33
Aug 26 18:24:56.565329: "north-east" #2: ESP traffic information: in=336B out=336B
Aug 26 18:24:56.565333: | child state #2: V2_IPSEC_I(established CHILD SA) => CHILDSA_DEL(informational)
Aug 26 18:24:56.565336: | state #2 requesting EVENT_SA_REKEY to be deleted
Aug 26 18:24:56.565340: | libevent_free: release ptr-libevent@0x55e736967758
Aug 26 18:24:56.565344: | free_event_entry: release EVENT_SA_REKEY-pe@0x55e736961878
Aug 26 18:24:56.565386: | running updown command "ipsec _updown" for verb down 
Aug 26 18:24:56.565392: | command executing down-client
Aug 26 18:24:56.565416: | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.254/32' PLUTO_MY_CLIENT_NET='192.0.3.254' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566843889' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SP
Aug 26 18:24:56.565420: | popen cmd is 1047 chars long
Aug 26 18:24:56.565422: | cmd(   0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-east' PLUTO:
Aug 26 18:24:56.565424: | cmd(  80):_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_ID=:
Aug 26 18:24:56.565426: | cmd( 160):'@north' PLUTO_MY_CLIENT='192.0.3.254/32' PLUTO_MY_CLIENT_NET='192.0.3.254' PLUT:
Aug 26 18:24:56.565427: | cmd( 240):O_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO:
Aug 26 18:24:56.565429: | cmd( 320):_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@ea:
Aug 26 18:24:56.565431: | cmd( 400):st' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEE:
Aug 26 18:24:56.565432: | cmd( 480):R_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_:
Aug 26 18:24:56.565434: | cmd( 560):PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566843889' PLUTO_CONN_POLICY='RS:
Aug 26 18:24:56.565436: | cmd( 640):ASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CON:
Aug 26 18:24:56.565438: | cmd( 720):N_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_:
Aug 26 18:24:56.565439: | cmd( 800):CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' :
Aug 26 18:24:56.565443: | cmd( 880):PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' V:
Aug 26 18:24:56.565445: | cmd( 960):TI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x4a384986 SPI_OUT=0x63063891 ipsec _updo:
Aug 26 18:24:56.565446: | cmd(1040):wn 2>&1:
Aug 26 18:24:56.575762: | shunt_eroute() called for connection 'north-east' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0
Aug 26 18:24:56.575778: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0
Aug 26 18:24:56.575783: | priority calculation of connection "north-east" is 0xfdfe7
Aug 26 18:24:56.575788: | IPsec Sa SPD priority set to 1040359
Aug 26 18:24:56.575827: | delete esp.4a384986@192.1.2.23
Aug 26 18:24:56.575850: | netlink response for Del SA esp.4a384986@192.1.2.23 included non-error error
Aug 26 18:24:56.575857: | priority calculation of connection "north-east" is 0xfdfe7
Aug 26 18:24:56.575865: | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.3.254/32:0 => unk255.10000@192.1.3.33 (raw_eroute)
Aug 26 18:24:56.575887: | raw_eroute result=success
Aug 26 18:24:56.575892: | delete esp.63063891@192.1.3.33
Aug 26 18:24:56.575904: | netlink response for Del SA esp.63063891@192.1.3.33 included non-error error
Aug 26 18:24:56.575916: | in connection_discard for connection north-east
Aug 26 18:24:56.575921: | State DB: deleting IKEv2 state #2 in CHILDSA_DEL
Aug 26 18:24:56.575930: | child state #2: CHILDSA_DEL(informational) => UNDEFINED(ignore)
Aug 26 18:24:56.575941: | stop processing: state #2 from 192.1.2.23 (in delete_state() at state.c:1143)
Aug 26 18:24:56.575947: | resume processing: state #1 connection "north-east" from 192.1.2.23 (in delete_state() at state.c:1143)
Aug 26 18:24:56.575964: | ****emit IKEv2 Delete Payload:
Aug 26 18:24:56.575968: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:56.575973: |    flags: none (0x0)
Aug 26 18:24:56.575980: |    protocol ID: PROTO_v2_ESP (0x3)
Aug 26 18:24:56.575983: |    SPI size: 4 (0x4)
Aug 26 18:24:56.575986: |    number of SPIs: 1 (0x1)
Aug 26 18:24:56.575992: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Delete Payload (42:ISAKMP_NEXT_v2D)
Aug 26 18:24:56.575996: | next payload chain: saving location 'IKEv2 Delete Payload'.'next payload type' in 'information exchange reply packet'
Aug 26 18:24:56.576001: | emitting 4 raw bytes of local SPIs into IKEv2 Delete Payload
Aug 26 18:24:56.576005: | local SPIs  63 06 38 91
Aug 26 18:24:56.576008: | emitting length of IKEv2 Delete Payload: 12
Aug 26 18:24:56.576011: | adding 1 bytes of padding (including 1 byte padding-length)
Aug 26 18:24:56.576016: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload
Aug 26 18:24:56.576020: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload
Aug 26 18:24:56.576023: | emitting length of IKEv2 Encryption Payload: 41
Aug 26 18:24:56.576027: | emitting length of ISAKMP Message: 69
Aug 26 18:24:56.576064: | sending 69 bytes for reply packet for process_encrypted_informational_ikev2 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1)
Aug 26 18:24:56.576072: |   14 9a 4d e8  d7 d5 09 a7  4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:56.576076: |   2e 20 25 28  00 00 00 00  00 00 00 45  2a 00 00 29
Aug 26 18:24:56.576079: |   7b 8a 51 89  15 aa b5 33  95 37 64 2d  fe aa 38 52
Aug 26 18:24:56.576081: |   27 d3 b0 54  ba 39 cc 55  a1 1d e5 03  70 ef 2e 42
Aug 26 18:24:56.576084: |   e3 12 d9 61  64
Aug 26 18:24:56.576142: | Message ID: #1 XXX: in process_encrypted_informational_ikev2() hacking around record'n'send bypassing send queue hacking around delete_my_family(); initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=0
Aug 26 18:24:56.576149: | Message ID: sent #1 response 0; ike: initiator.sent=1 initiator.recv=1 responder.sent=-1->0 responder.recv=-1 wip.initiator=-1 wip.responder=0
Aug 26 18:24:56.576158: |   #1 spent 0.978 milliseconds in processing: I3: INFORMATIONAL Request in ikev2_process_state_packet()
Aug 26 18:24:56.576168: | [RE]START processing: state #1 connection "north-east" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379)
Aug 26 18:24:56.576173: | #1 complete_v2_state_transition() PARENT_I3->PARENT_I3 with status STF_OK
Aug 26 18:24:56.576176: | Message ID: updating counters for #1 to 0 after switching state
Aug 26 18:24:56.576181: | Message ID: recv #1 request 0; ike: initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=-1->0 wip.initiator=-1 wip.responder=0->-1
Aug 26 18:24:56.576186: | Message ID: #1 skipping update_send as nothing to send; initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=-1
Aug 26 18:24:56.576190: "north-east" #1: STATE_PARENT_I3: PARENT SA established
Aug 26 18:24:56.576196: | stop processing: state #1 connection "north-east" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018)
Aug 26 18:24:56.576202: | #1 spent 1.16 milliseconds in ikev2_process_packet()
Aug 26 18:24:56.576207: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380)
Aug 26 18:24:56.576213: | processing: STOP state #0 (in process_md() at demux.c:382)
Aug 26 18:24:56.576217: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:24:56.576221: | spent 1.18 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:24:56.576239: | processing signal PLUTO_SIGCHLD
Aug 26 18:24:56.576245: | waitpid returned ECHILD (no child processes left)
Aug 26 18:24:56.576249: | spent 0.00503 milliseconds in signal handler PLUTO_SIGCHLD
Aug 26 18:24:56.576418: | spent 0.00222 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
Aug 26 18:24:56.576444: | *received 65 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500)
Aug 26 18:24:56.576448: |   14 9a 4d e8  d7 d5 09 a7  4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:56.576451: |   2e 20 25 00  00 00 00 01  00 00 00 41  2a 00 00 25
Aug 26 18:24:56.576454: |   34 ed 6f 55  77 45 b0 0c  54 1f 18 2d  f7 02 51 b1
Aug 26 18:24:56.576456: |   18 6a 01 24  bb f7 ad ac  91 7a 6e 5c  c9 8c a3 dc
Aug 26 18:24:56.576458: |   29
Aug 26 18:24:56.576463: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
Aug 26 18:24:56.576467: | **parse ISAKMP Message:
Aug 26 18:24:56.576470: |    initiator cookie:
Aug 26 18:24:56.576473: |   14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:56.576475: |    responder cookie:
Aug 26 18:24:56.576478: |   4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:56.576481: |    next payload type: ISAKMP_NEXT_v2SK (0x2e)
Aug 26 18:24:56.576484: |    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Aug 26 18:24:56.576486: |    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
Aug 26 18:24:56.576489: |    flags: none (0x0)
Aug 26 18:24:56.576492: |    Message ID: 1 (0x1)
Aug 26 18:24:56.576494: |    length: 65 (0x41)
Aug 26 18:24:56.576497: |  processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37)
Aug 26 18:24:56.576501: | I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request 
Aug 26 18:24:56.576504: | State DB: found IKEv2 state #1 in PARENT_I3 (find_v2_ike_sa)
Aug 26 18:24:56.576510: | start processing: state #1 connection "north-east" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016)
Aug 26 18:24:56.576514: | State DB: IKEv2 state not found (find_v2_sa_by_responder_wip)
Aug 26 18:24:56.576518: | [RE]START processing: state #1 connection "north-east" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2064)
Aug 26 18:24:56.576521: | #1 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001
Aug 26 18:24:56.576526: | Message ID: #1 not a duplicate - message is new; initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0
Aug 26 18:24:56.576528: | unpacking clear payload
Aug 26 18:24:56.576531: | Now let's proceed with payload (ISAKMP_NEXT_v2SK)
Aug 26 18:24:56.576534: | ***parse IKEv2 Encryption Payload:
Aug 26 18:24:56.576537: |    next payload type: ISAKMP_NEXT_v2D (0x2a)
Aug 26 18:24:56.576542: |    flags: none (0x0)
Aug 26 18:24:56.576544: |    length: 37 (0x25)
Aug 26 18:24:56.576547: | processing payload: ISAKMP_NEXT_v2SK (len=33)
Aug 26 18:24:56.576552: | Message ID: start-responder #1 request 1; ike: initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=-1->1
Aug 26 18:24:56.576555: | #1 in state PARENT_I3: PARENT SA established
Aug 26 18:24:56.576570: | #1 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success
Aug 26 18:24:56.576573: | Now let's proceed with payload (ISAKMP_NEXT_v2D)
Aug 26 18:24:56.576576: | **parse IKEv2 Delete Payload:
Aug 26 18:24:56.576579: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:56.576582: |    flags: none (0x0)
Aug 26 18:24:56.576584: |    length: 8 (0x8)
Aug 26 18:24:56.576587: |    protocol ID: PROTO_v2_IKE (0x1)
Aug 26 18:24:56.576590: |    SPI size: 0 (0x0)
Aug 26 18:24:56.576592: |    number of SPIs: 0 (0x0)
Aug 26 18:24:56.576595: | processing payload: ISAKMP_NEXT_v2D (len=0)
Aug 26 18:24:56.576598: | selected state microcode I3: INFORMATIONAL Request
Aug 26 18:24:56.576600: | Now let's proceed with state specific processing
Aug 26 18:24:56.576603: | calling processor I3: INFORMATIONAL Request
Aug 26 18:24:56.576606: | an informational request should send a response 
Aug 26 18:24:56.576629: | Received an INFORMATIONAL response, updating st_last_liveness, no pending_liveness
Aug 26 18:24:56.576632: | **emit ISAKMP Message:
Aug 26 18:24:56.576635: |    initiator cookie:
Aug 26 18:24:56.576637: |   14 9a 4d e8  d7 d5 09 a7
Aug 26 18:24:56.576640: |    responder cookie:
Aug 26 18:24:56.576642: |   4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:56.576645: |    next payload type: ISAKMP_NEXT_NONE (0x0)
Aug 26 18:24:56.576648: |    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Aug 26 18:24:56.576651: |    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
Aug 26 18:24:56.576654: |    flags: ISAKMP_FLAG_v2_IKE_INIT+ISAKMP_FLAG_v2_MSG_RESPONSE (0x28)
Aug 26 18:24:56.576656: |    Message ID: 1 (0x1)
Aug 26 18:24:56.576659: | next payload chain: saving message location 'ISAKMP Message'.'next payload type'
Aug 26 18:24:56.576662: | ***emit IKEv2 Encryption Payload:
Aug 26 18:24:56.576665: |    next payload type: ISAKMP_NEXT_v2NONE (0x0)
Aug 26 18:24:56.576668: |    flags: none (0x0)
Aug 26 18:24:56.576671: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK)
Aug 26 18:24:56.576674: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'information exchange reply packet'
Aug 26 18:24:56.576677: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload
Aug 26 18:24:56.576688: | adding 1 bytes of padding (including 1 byte padding-length)
Aug 26 18:24:56.576692: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload
Aug 26 18:24:56.576695: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload
Aug 26 18:24:56.576698: | emitting length of IKEv2 Encryption Payload: 29
Aug 26 18:24:56.576700: | emitting length of ISAKMP Message: 57
Aug 26 18:24:56.576712: | sending 57 bytes for reply packet for process_encrypted_informational_ikev2 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1)
Aug 26 18:24:56.576715: |   14 9a 4d e8  d7 d5 09 a7  4b cd 8a 2e  e4 de e3 b3
Aug 26 18:24:56.576717: |   2e 20 25 28  00 00 00 01  00 00 00 39  00 00 00 1d
Aug 26 18:24:56.576720: |   89 38 21 e0  81 85 8d d4  60 15 c9 46  05 5f c3 78
Aug 26 18:24:56.576722: |   a4 6c 4d b3  7f b3 62 ed  78
Aug 26 18:24:56.576749: | Message ID: #1 XXX: in process_encrypted_informational_ikev2() hacking around record'n'send bypassing send queue hacking around delete_my_family(); initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=1
Aug 26 18:24:56.576754: | Message ID: sent #1 response 1; ike: initiator.sent=1 initiator.recv=1 responder.sent=0->1 responder.recv=0 wip.initiator=-1 wip.responder=1
Aug 26 18:24:56.576758: | State DB: IKEv2 state not found (delete_my_family)
Aug 26 18:24:56.576764: | parent state #1: PARENT_I3(established IKE SA) => IKESA_DEL(established IKE SA)
Aug 26 18:24:56.576767: | pstats #1 ikev2.ike deleted completed
Aug 26 18:24:56.576771: | #1 spent 11.4 milliseconds in total
Aug 26 18:24:56.576776: | [RE]START processing: state #1 connection "north-east" from 192.1.2.23 (in delete_state() at state.c:879)
Aug 26 18:24:56.576780: "north-east" #1: deleting state (STATE_IKESA_DEL) aged 7.002s and NOT sending notification
Aug 26 18:24:56.576783: | parent state #1: IKESA_DEL(established IKE SA) => delete
Aug 26 18:24:56.576833: | state #1 requesting EVENT_SA_REKEY to be deleted
Aug 26 18:24:56.576840: | libevent_free: release ptr-libevent@0x7fd530000f48
Aug 26 18:24:56.576845: | free_event_entry: release EVENT_SA_REKEY-pe@0x55e73695e588
Aug 26 18:24:56.576848: | State DB: IKEv2 state not found (flush_incomplete_children)
Aug 26 18:24:56.576851: | in connection_discard for connection north-east
Aug 26 18:24:56.576854: | State DB: deleting IKEv2 state #1 in IKESA_DEL
Aug 26 18:24:56.576857: | parent state #1: IKESA_DEL(established IKE SA) => UNDEFINED(ignore)
Aug 26 18:24:56.576861: | unreference key: 0x55e73695e818 @east cnt 2--
Aug 26 18:24:56.576888: | stop processing: state #1 from 192.1.2.23 (in delete_state() at state.c:1143)
Aug 26 18:24:56.576914: | in statetime_stop() and could not find #1
Aug 26 18:24:56.576917: | skip start processing: state #0 (in complete_v2_state_transition() at ikev2.c:3379)
Aug 26 18:24:56.576921: | #0 complete_v2_state_transition() md.from_state=PARENT_I3 md.svm.state[from]=PARENT_I3 UNDEFINED->PARENT_I3 with status STF_OK
Aug 26 18:24:56.576924: | STF_OK but no state object remains
Aug 26 18:24:56.576927: | processing: STOP state #0 (in ikev2_process_packet() at ikev2.c:2018)
Aug 26 18:24:56.576930: | in statetime_stop() and could not find #1
Aug 26 18:24:56.576935: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380)
Aug 26 18:24:56.576938: | processing: STOP state #0 (in process_md() at demux.c:382)
Aug 26 18:24:56.576941: | processing: STOP connection NULL (in process_md() at demux.c:383)
Aug 26 18:24:56.576946: | spent 0.497 milliseconds in comm_handle_cb() reading and processing packet
Aug 26 18:24:57.181620: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
Aug 26 18:24:57.181645: shutting down
Aug 26 18:24:57.181656: | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825)
Aug 26 18:24:57.181661: | certs and keys locked by 'free_preshared_secrets'
Aug 26 18:24:57.181663: forgetting secrets
Aug 26 18:24:57.181673: | certs and keys unlocked by 'free_preshared_secrets'
Aug 26 18:24:57.181678: | unreference key: 0x55e73695e818 @east cnt 1--
Aug 26 18:24:57.181682: | unreference key: 0x55e7368b5c48 @north cnt 1--
Aug 26 18:24:57.181688: | start processing: connection "north-east" (in delete_connection() at connections.c:189)
Aug 26 18:24:57.181692: | Deleting states for connection - including all other IPsec SA's of this IKE SA
Aug 26 18:24:57.181694: | pass 0
Aug 26 18:24:57.181697: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
Aug 26 18:24:57.181699: | pass 1
Aug 26 18:24:57.181702: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
Aug 26 18:24:57.181706: | shunt_eroute() called for connection 'north-east' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
Aug 26 18:24:57.181710: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0
Aug 26 18:24:57.181713: | priority calculation of connection "north-east" is 0xfdfe7
Aug 26 18:24:57.181745: | priority calculation of connection "north-east" is 0xfdfe7
Aug 26 18:24:57.181755: | FOR_EACH_CONNECTION_... in route_owner
Aug 26 18:24:57.181758: |  conn north-east mark 0/00000000, 0/00000000 vs
Aug 26 18:24:57.181760: |  conn north-east mark 0/00000000, 0/00000000
Aug 26 18:24:57.181763: | route owner of "north-east" unrouted: NULL
Aug 26 18:24:57.181766: | running updown command "ipsec _updown" for verb unroute 
Aug 26 18:24:57.181771: | command executing unroute-client
Aug 26 18:24:57.181796: | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-east' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.254/32' PLUTO_MY_CLIENT_NET='192.0.3.254' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_
Aug 26 18:24:57.181799: | popen cmd is 1028 chars long
Aug 26 18:24:57.181802: | cmd(   0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-east' PL:
Aug 26 18:24:57.181805: | cmd(  80):UTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_:
Aug 26 18:24:57.181807: | cmd( 160):ID='@north' PLUTO_MY_CLIENT='192.0.3.254/32' PLUTO_MY_CLIENT_NET='192.0.3.254' P:
Aug 26 18:24:57.181810: | cmd( 240):LUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PL:
Aug 26 18:24:57.181812: | cmd( 320):UTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID=:
Aug 26 18:24:57.181815: | cmd( 400):'@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO:
Aug 26 18:24:57.181817: | cmd( 480):_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PL:
Aug 26 18:24:57.181819: | cmd( 560):UTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+:
Aug 26 18:24:57.181822: | cmd( 640):ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIN:
Aug 26 18:24:57.181825: | cmd( 720):D='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO:
Aug 26 18:24:57.181827: | cmd( 800):='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO:
Aug 26 18:24:57.181830: | cmd( 880):_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_RO:
Aug 26 18:24:57.181833: | cmd( 960):UTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
Aug 26 18:24:57.203686: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.203776: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.203793: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.203809: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.203833: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.203869: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.203892: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.203917: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.203931: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.203944: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.203957: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.203972: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.203991: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.204000: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.204026: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.204041: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.204069: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.204402: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.204414: "north-east": unroute-client output: Error: Peer netns reference is invalid.
Aug 26 18:24:57.216565: | free hp@0x55e73695e4a8
Aug 26 18:24:57.216587: | flush revival: connection 'north-east' wasn't on the list
Aug 26 18:24:57.216593: | stop processing: connection "north-east" (in discard_connection() at connections.c:249)
Aug 26 18:24:57.216614: | crl fetch request list locked by 'free_crl_fetch'
Aug 26 18:24:57.216617: | crl fetch request list unlocked by 'free_crl_fetch'
Aug 26 18:24:57.216630: shutting down interface lo/lo 127.0.0.1:4500
Aug 26 18:24:57.216635: shutting down interface lo/lo 127.0.0.1:500
Aug 26 18:24:57.216639: shutting down interface eth0/eth0 192.0.3.254:4500
Aug 26 18:24:57.216643: shutting down interface eth0/eth0 192.0.3.254:500
Aug 26 18:24:57.216647: shutting down interface eth1/eth1 192.1.3.33:4500
Aug 26 18:24:57.216650: shutting down interface eth1/eth1 192.1.3.33:500
Aug 26 18:24:57.216655: | FOR_EACH_STATE_... in delete_states_dead_interfaces
Aug 26 18:24:57.216668: | libevent_free: release ptr-libevent@0x55e73694ffa8
Aug 26 18:24:57.216674: | free_event_entry: release EVENT_NULL-pe@0x55e73695ba98
Aug 26 18:24:57.216686: | libevent_free: release ptr-libevent@0x55e7368e63f8
Aug 26 18:24:57.216690: | free_event_entry: release EVENT_NULL-pe@0x55e73695bb48
Aug 26 18:24:57.216697: | libevent_free: release ptr-libevent@0x55e7368e6688
Aug 26 18:24:57.216701: | free_event_entry: release EVENT_NULL-pe@0x55e73695bbf8
Aug 26 18:24:57.216710: | libevent_free: release ptr-libevent@0x55e7368dbb78
Aug 26 18:24:57.216714: | free_event_entry: release EVENT_NULL-pe@0x55e73695bca8
Aug 26 18:24:57.216720: | libevent_free: release ptr-libevent@0x55e7368ba4e8
Aug 26 18:24:57.216724: | free_event_entry: release EVENT_NULL-pe@0x55e73695bd58
Aug 26 18:24:57.216731: | libevent_free: release ptr-libevent@0x55e7368ba1d8
Aug 26 18:24:57.216734: | free_event_entry: release EVENT_NULL-pe@0x55e73695be08
Aug 26 18:24:57.216740: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
Aug 26 18:24:57.217360: | libevent_free: release ptr-libevent@0x55e736950058
Aug 26 18:24:57.217372: | free_event_entry: release EVENT_NULL-pe@0x55e736943e48
Aug 26 18:24:57.217380: | libevent_free: release ptr-libevent@0x55e7368e5978
Aug 26 18:24:57.217383: | free_event_entry: release EVENT_NULL-pe@0x55e736943dd8
Aug 26 18:24:57.217388: | libevent_free: release ptr-libevent@0x55e736927668
Aug 26 18:24:57.217391: | free_event_entry: release EVENT_NULL-pe@0x55e736943298
Aug 26 18:24:57.217396: | global timer EVENT_REINIT_SECRET uninitialized
Aug 26 18:24:57.217399: | global timer EVENT_SHUNT_SCAN uninitialized
Aug 26 18:24:57.217401: | global timer EVENT_PENDING_DDNS uninitialized
Aug 26 18:24:57.217404: | global timer EVENT_PENDING_PHASE2 uninitialized
Aug 26 18:24:57.217406: | global timer EVENT_CHECK_CRLS uninitialized
Aug 26 18:24:57.217408: | global timer EVENT_REVIVE_CONNS uninitialized
Aug 26 18:24:57.217412: | global timer EVENT_FREE_ROOT_CERTS uninitialized
Aug 26 18:24:57.217415: | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized
Aug 26 18:24:57.217417: | global timer EVENT_NAT_T_KEEPALIVE uninitialized
Aug 26 18:24:57.217423: | libevent_free: release ptr-libevent@0x55e7368e38e8
Aug 26 18:24:57.217426: | signal event handler PLUTO_SIGCHLD uninstalled
Aug 26 18:24:57.217429: | libevent_free: release ptr-libevent@0x55e7368ee958
Aug 26 18:24:57.217432: | signal event handler PLUTO_SIGTERM uninstalled
Aug 26 18:24:57.217436: | libevent_free: release ptr-libevent@0x55e7368e6758
Aug 26 18:24:57.217438: | signal event handler PLUTO_SIGHUP uninstalled
Aug 26 18:24:57.217442: | libevent_free: release ptr-libevent@0x55e73695b698
Aug 26 18:24:57.217448: | signal event handler PLUTO_SIGSYS uninstalled
Aug 26 18:24:57.217450: | releasing event base
Aug 26 18:24:57.217463: | libevent_free: release ptr-libevent@0x55e73695b568
Aug 26 18:24:57.217467: | libevent_free: release ptr-libevent@0x55e73693e688
Aug 26 18:24:57.217471: | libevent_free: release ptr-libevent@0x55e73693e638
Aug 26 18:24:57.217474: | libevent_free: release ptr-libevent@0x55e73693e5c8
Aug 26 18:24:57.217477: | libevent_free: release ptr-libevent@0x55e73693e588
Aug 26 18:24:57.217480: | libevent_free: release ptr-libevent@0x55e73695b328
Aug 26 18:24:57.217483: | libevent_free: release ptr-libevent@0x55e73695b468
Aug 26 18:24:57.217486: | libevent_free: release ptr-libevent@0x55e73693e838
Aug 26 18:24:57.217488: | libevent_free: release ptr-libevent@0x55e7369433a8
Aug 26 18:24:57.217491: | libevent_free: release ptr-libevent@0x55e736943d98
Aug 26 18:24:57.217494: | libevent_free: release ptr-libevent@0x55e73695be78
Aug 26 18:24:57.217497: | libevent_free: release ptr-libevent@0x55e73695bdc8
Aug 26 18:24:57.217500: | libevent_free: release ptr-libevent@0x55e73695bd18
Aug 26 18:24:57.217502: | libevent_free: release ptr-libevent@0x55e73695bc68
Aug 26 18:24:57.217505: | libevent_free: release ptr-libevent@0x55e73695bbb8
Aug 26 18:24:57.217508: | libevent_free: release ptr-libevent@0x55e73695bb08
Aug 26 18:24:57.217511: | libevent_free: release ptr-libevent@0x55e7368e5ba8
Aug 26 18:24:57.217514: | libevent_free: release ptr-libevent@0x55e73695b4e8
Aug 26 18:24:57.217517: | libevent_free: release ptr-libevent@0x55e73695b4a8
Aug 26 18:24:57.217520: | libevent_free: release ptr-libevent@0x55e73695b368
Aug 26 18:24:57.217523: | libevent_free: release ptr-libevent@0x55e73695b528
Aug 26 18:24:57.217526: | libevent_free: release ptr-libevent@0x55e7368e2a18
Aug 26 18:24:57.217529: | libevent_free: release ptr-libevent@0x55e7368b9908
Aug 26 18:24:57.217532: | libevent_free: release ptr-libevent@0x55e7368b9d38
Aug 26 18:24:57.217535: | libevent_free: release ptr-libevent@0x55e7368e2d88
Aug 26 18:24:57.217538: | releasing global libevent data
Aug 26 18:24:57.217541: | libevent_free: release ptr-libevent@0x55e7368be748
Aug 26 18:24:57.217545: | libevent_free: release ptr-libevent@0x55e7368b9cd8
Aug 26 18:24:57.217548: | libevent_free: release ptr-libevent@0x55e7368b9dd8
Aug 26 18:24:57.217594: leak detective found no leaks