FIPS Product: YES FIPS Kernel: NO FIPS Mode: NO NSS DB directory: sql:/etc/ipsec.d Initializing NSS Opening NSS database "sql:/etc/ipsec.d" read-only NSS initialized NSS crypto library initialized FIPS HMAC integrity support [enabled] FIPS mode disabled for pluto daemon FIPS HMAC integrity verification self-test FAILED libcap-ng support [enabled] Linux audit support [enabled] Linux audit activated Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:602 core dump dir: /tmp secrets file: /etc/ipsec.secrets leak-detective enabled NSS crypto [enabled] XAUTH PAM support [enabled] | libevent is using pluto's memory allocator Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) | libevent_malloc: new ptr-libevent@0x56091f2e97b8 size 40 | libevent_malloc: new ptr-libevent@0x56091f2e9738 size 40 | libevent_malloc: new ptr-libevent@0x56091f2e96b8 size 40 | creating event base | libevent_malloc: new ptr-libevent@0x56091f2db2e8 size 56 | libevent_malloc: new ptr-libevent@0x56091f264e88 size 664 | libevent_malloc: new ptr-libevent@0x56091f323da8 size 24 | libevent_malloc: new ptr-libevent@0x56091f323df8 size 384 | libevent_malloc: new ptr-libevent@0x56091f323d68 size 16 | libevent_malloc: new ptr-libevent@0x56091f2e9638 size 40 | libevent_malloc: new ptr-libevent@0x56091f2e95b8 size 48 | libevent_realloc: new ptr-libevent@0x56091f264b18 size 256 | libevent_malloc: new ptr-libevent@0x56091f323fa8 size 16 | libevent_free: release ptr-libevent@0x56091f2db2e8 | libevent initialized | libevent_realloc: new ptr-libevent@0x56091f2db2e8 size 64 | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds | init_nat_traversal() initialized with keep_alive=0s NAT-Traversal support [enabled] | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized | global one-shot timer EVENT_FREE_ROOT_CERTS initialized | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds | global one-shot timer EVENT_REVIVE_CONNS initialized | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Encryption algorithms: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac NULL IKEv1: ESP IKEv2: ESP [] CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Hash algorithms: MD5 IKEv1: IKE IKEv2: SHA1 IKEv1: IKE IKEv2: FIPS sha SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 PRF algorithms: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Integrity algorithms: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac NONE IKEv1: ESP IKEv2: IKE ESP FIPS null DH algorithms: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 testing CAMELLIA_CBC: Camellia: 16 bytes with 128-bit key Camellia: 16 bytes with 128-bit key Camellia: 16 bytes with 256-bit key Camellia: 16 bytes with 256-bit key testing AES_GCM_16: empty string one block two blocks two blocks with associated data testing AES_CTR: Encrypting 16 octets using AES-CTR with 128-bit key Encrypting 32 octets using AES-CTR with 128-bit key Encrypting 36 octets using AES-CTR with 128-bit key Encrypting 16 octets using AES-CTR with 192-bit key Encrypting 32 octets using AES-CTR with 192-bit key Encrypting 36 octets using AES-CTR with 192-bit key Encrypting 16 octets using AES-CTR with 256-bit key Encrypting 32 octets using AES-CTR with 256-bit key Encrypting 36 octets using AES-CTR with 256-bit key testing AES_CBC: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key testing AES_XCBC: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) testing HMAC_MD5: RFC 2104: MD5_HMAC test 1 RFC 2104: MD5_HMAC test 2 RFC 2104: MD5_HMAC test 3 8 CPU cores online starting up 7 crypto helpers started thread for crypto helper 0 started thread for crypto helper 1 started thread for crypto helper 2 started thread for crypto helper 3 started thread for crypto helper 4 started thread for crypto helper 5 started thread for crypto helper 6 | checking IKEv1 state table | MAIN_R0: category: half-open IKE SA flags: 0: | -> MAIN_R1 EVENT_SO_DISCARD | MAIN_I1: category: half-open IKE SA flags: 0: | -> MAIN_I2 EVENT_RETRANSMIT | MAIN_R1: category: open IKE SA flags: 200: | -> MAIN_R2 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_I2: category: open IKE SA flags: 0: | -> MAIN_I3 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_R2: category: open IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | -> MAIN_R3 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_I3: category: open IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | -> MAIN_I4 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_R3: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | MAIN_I4: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | AGGR_R0: category: half-open IKE SA flags: 0: | -> AGGR_R1 EVENT_SO_DISCARD | AGGR_I1: category: half-open IKE SA flags: 0: | -> AGGR_I2 EVENT_SA_REPLACE | -> AGGR_I2 EVENT_SA_REPLACE | AGGR_R1: category: open IKE SA flags: 200: | -> AGGR_R2 EVENT_SA_REPLACE | -> AGGR_R2 EVENT_SA_REPLACE | AGGR_I2: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | AGGR_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | QUICK_R0: category: established CHILD SA flags: 0: | -> QUICK_R1 EVENT_RETRANSMIT | QUICK_I1: category: established CHILD SA flags: 0: | -> QUICK_I2 EVENT_SA_REPLACE | QUICK_R1: category: established CHILD SA flags: 0: | -> QUICK_R2 EVENT_SA_REPLACE | QUICK_I2: category: established CHILD SA flags: 200: | -> UNDEFINED EVENT_NULL | QUICK_R2: category: established CHILD SA flags: 0: | -> UNDEFINED EVENT_NULL | INFO: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | INFO_PROTECTED: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | XAUTH_R0: category: established IKE SA flags: 0: | -> XAUTH_R1 EVENT_NULL | XAUTH_R1: category: established IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | MODE_CFG_R0: category: informational flags: 0: | -> MODE_CFG_R1 EVENT_SA_REPLACE | MODE_CFG_R1: category: established IKE SA flags: 0: | -> MODE_CFG_R2 EVENT_SA_REPLACE | MODE_CFG_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | MODE_CFG_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | XAUTH_I0: category: established IKE SA flags: 0: | -> XAUTH_I1 EVENT_RETRANSMIT | XAUTH_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_RETRANSMIT | checking IKEv2 state table | PARENT_I0: category: ignore flags: 0: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) | PARENT_I1: category: half-open IKE SA flags: 0: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) | PARENT_I2: category: open IKE SA flags: 0: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) | PARENT_I3: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) | PARENT_R0: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) | PARENT_R1: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) | PARENT_R2: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) | V2_CREATE_I0: category: established IKE SA flags: 0: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) | V2_CREATE_I: category: established IKE SA flags: 0: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) | V2_REKEY_IKE_I: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: | V2_CREATE_R: category: established IKE SA flags: 0: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) | V2_REKEY_IKE_R: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: | V2_IPSEC_I: category: established CHILD SA flags: 0: | V2_IPSEC_R: category: established CHILD SA flags: 0: | IKESA_DEL: category: established IKE SA flags: 0: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) | CHILDSA_DEL: category: informational flags: 0: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 | Hard-wiring algorithms | adding AES_CCM_16 to kernel algorithm db | adding AES_CCM_12 to kernel algorithm db | adding AES_CCM_8 to kernel algorithm db | adding 3DES_CBC to kernel algorithm db | adding CAMELLIA_CBC to kernel algorithm db | adding AES_GCM_16 to kernel algorithm db | adding AES_GCM_12 to kernel algorithm db | adding AES_GCM_8 to kernel algorithm db | adding AES_CTR to kernel algorithm db | adding AES_CBC to kernel algorithm db | adding SERPENT_CBC to kernel algorithm db | adding TWOFISH_CBC to kernel algorithm db | adding NULL_AUTH_AES_GMAC to kernel algorithm db | adding NULL to kernel algorithm db | adding CHACHA20_POLY1305 to kernel algorithm db | adding HMAC_MD5_96 to kernel algorithm db | adding HMAC_SHA1_96 to kernel algorithm db | adding HMAC_SHA2_512_256 to kernel algorithm db | adding HMAC_SHA2_384_192 to kernel algorithm db | adding HMAC_SHA2_256_128 to kernel algorithm db | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db | adding AES_XCBC_96 to kernel algorithm db | adding AES_CMAC_96 to kernel algorithm db | adding NONE to kernel algorithm db | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds | setup kernel fd callback | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x56091f2e34d8 | libevent_malloc: new ptr-libevent@0x56091f322568 size 128 | libevent_malloc: new ptr-libevent@0x56091f3295a8 size 16 | starting up helper thread 1 | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x56091f329538 | libevent_malloc: new ptr-libevent@0x56091f2dbef8 size 128 | libevent_malloc: new ptr-libevent@0x56091f329208 size 16 | status value returned by setting the priority of this thread (crypto helper 1) 22 | crypto helper 1 waiting (nothing to do) | starting up helper thread 2 | status value returned by setting the priority of this thread (crypto helper 2) 22 | crypto helper 2 waiting (nothing to do) | starting up helper thread 5 | status value returned by setting the priority of this thread (crypto helper 5) 22 | crypto helper 5 waiting (nothing to do) | starting up helper thread 6 | status value returned by setting the priority of this thread (crypto helper 6) 22 | crypto helper 6 waiting (nothing to do) | global one-shot timer EVENT_CHECK_CRLS initialized selinux support is enabled. | unbound context created - setting debug level to 5 | /etc/hosts lookups activated | /etc/resolv.conf usage activated | outgoing-port-avoid set 0-65535 | outgoing-port-permit set 32768-60999 | Loading dnssec root key from:/var/lib/unbound/root.key | No additional dnssec trust anchors defined via dnssec-trusted= option | Setting up events, loop start | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x56091f3299d8 | libevent_malloc: new ptr-libevent@0x56091f335838 size 128 | libevent_malloc: new ptr-libevent@0x56091f340aa8 size 16 | libevent_realloc: new ptr-libevent@0x56091f340ae8 size 256 | libevent_malloc: new ptr-libevent@0x56091f340c18 size 8 | libevent_realloc: new ptr-libevent@0x56091f340c58 size 144 | libevent_malloc: new ptr-libevent@0x56091f2e7aa8 size 152 | libevent_malloc: new ptr-libevent@0x56091f340d18 size 16 | signal event handler PLUTO_SIGCHLD installed | libevent_malloc: new ptr-libevent@0x56091f340d58 size 8 | libevent_malloc: new ptr-libevent@0x56091f2657f8 size 152 | signal event handler PLUTO_SIGTERM installed | libevent_malloc: new ptr-libevent@0x56091f340d98 size 8 | libevent_malloc: new ptr-libevent@0x56091f340dd8 size 152 | starting up helper thread 3 | status value returned by setting the priority of this thread (crypto helper 3) 22 | crypto helper 3 waiting (nothing to do) | starting up helper thread 0 | status value returned by setting the priority of this thread (crypto helper 0) 22 | crypto helper 0 waiting (nothing to do) | starting up helper thread 4 | status value returned by setting the priority of this thread (crypto helper 4) 22 | crypto helper 4 waiting (nothing to do) | signal event handler PLUTO_SIGHUP installed | libevent_malloc: new ptr-libevent@0x56091f340ea8 size 8 | libevent_realloc: release ptr-libevent@0x56091f340c58 | libevent_realloc: new ptr-libevent@0x56091f340ee8 size 256 | libevent_malloc: new ptr-libevent@0x56091f341018 size 152 | signal event handler PLUTO_SIGSYS installed | created addconn helper (pid:854) using fork+execve | forked child 854 | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.1.3.209 Kernel supports NIC esp-hw-offload adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.209:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.209:4500 adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface lo/lo 127.0.0.1:4500 | no interfaces to sort | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | add_fd_read_event_handler: new ethX-pe@0x56091f341418 | libevent_malloc: new ptr-libevent@0x56091f335788 size 128 | libevent_malloc: new ptr-libevent@0x56091f341488 size 16 | setup callback for interface lo 127.0.0.1:4500 fd 20 | add_fd_read_event_handler: new ethX-pe@0x56091f3414c8 | libevent_malloc: new ptr-libevent@0x56091f2dbfa8 size 128 | libevent_malloc: new ptr-libevent@0x56091f341538 size 16 | setup callback for interface lo 127.0.0.1:500 fd 19 | add_fd_read_event_handler: new ethX-pe@0x56091f341578 | libevent_malloc: new ptr-libevent@0x56091f2db8c8 size 128 | libevent_malloc: new ptr-libevent@0x56091f3415e8 size 16 | setup callback for interface eth0 192.1.3.209:4500 fd 18 | add_fd_read_event_handler: new ethX-pe@0x56091f341628 | libevent_malloc: new ptr-libevent@0x56091f2e3228 size 128 | libevent_malloc: new ptr-libevent@0x56091f341698 size 16 | setup callback for interface eth0 192.1.3.209:500 fd 17 | certs and keys locked by 'free_preshared_secrets' | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | id type added to secret(0x56091f231c48) PKK_PSK: @east | id type added to secret(0x56091f231c48) PKK_PSK: @road | Processing PSK at line 1: passed | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.503 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | old debugging base+cpu-usage + none | base debugging = base+cpu-usage | old impairing none + suppress-retransmits | base impairing = suppress-retransmits | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.058 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.1.3.209 | no interfaces to sort | libevent_free: release ptr-libevent@0x56091f335788 | free_event_entry: release EVENT_NULL-pe@0x56091f341418 | add_fd_read_event_handler: new ethX-pe@0x56091f341418 | libevent_malloc: new ptr-libevent@0x56091f335788 size 128 | setup callback for interface lo 127.0.0.1:4500 fd 20 | libevent_free: release ptr-libevent@0x56091f2dbfa8 | free_event_entry: release EVENT_NULL-pe@0x56091f3414c8 | add_fd_read_event_handler: new ethX-pe@0x56091f3414c8 | libevent_malloc: new ptr-libevent@0x56091f2dbfa8 size 128 | setup callback for interface lo 127.0.0.1:500 fd 19 | libevent_free: release ptr-libevent@0x56091f2db8c8 | free_event_entry: release EVENT_NULL-pe@0x56091f341578 | add_fd_read_event_handler: new ethX-pe@0x56091f341578 | libevent_malloc: new ptr-libevent@0x56091f2db8c8 size 128 | setup callback for interface eth0 192.1.3.209:4500 fd 18 | libevent_free: release ptr-libevent@0x56091f2e3228 | free_event_entry: release EVENT_NULL-pe@0x56091f341628 | add_fd_read_event_handler: new ethX-pe@0x56091f341628 | libevent_malloc: new ptr-libevent@0x56091f2e3228 size 128 | setup callback for interface eth0 192.1.3.209:500 fd 17 | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | id type added to secret(0x56091f231c48) PKK_PSK: @east | id type added to secret(0x56091f231c48) PKK_PSK: @road | Processing PSK at line 1: passed | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.255 milliseconds in whack | processing signal PLUTO_SIGCHLD | waitpid returned pid 854 (exited with status 0) | reaped addconn helper child (status 0) | waitpid returned ECHILD (no child processes left) | spent 0.0201 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection westnet-eastnet-ipv4-psk-ikev2 with policy ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | No AUTH policy was set - defaulting to RSASIG | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | setting ID to ID_DER_ASN1_DN: 'E=user-road@testing.libreswan.org,CN=road.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' | loading left certificate 'road' pubkey | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f3479b8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f344a78 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f344a28 | unreference key: 0x56091f347a08 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- | certs and keys locked by 'lsw_add_rsa_secret' | certs and keys unlocked by 'lsw_add_rsa_secret' | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org is 0 | counting wild cards for %fromcert is 0 | based upon policy narrowing=yes, the connection is a template. | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x56091f3493c8 added connection description "westnet-eastnet-ipv4-psk-ikev2" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.209[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org,+MC+S=C]---192.1.3.254...192.1.2.23<192.1.2.23>[%fromcert] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 1.37 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | dup_any(fd@16) -> fd@21 (in whack_process() at rcv_whack.c:590) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in initiate_a_connection() at initiate.c:186) | find_host_pair: comparing 192.1.3.209:500 to 192.1.2.23:500 but ignoring ports | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@0x56091f3493c8: westnet-eastnet-ipv4-psk-ikev2 | connection 'westnet-eastnet-ipv4-psk-ikev2' +POLICY_UP | dup_any(fd@21) -> fd@22 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #1 at 0x56091f349738 | State DB: adding IKEv2 state #1 in UNDEFINED | pstats #1 ikev2.ike started | Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #1: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@22) -> fd@23 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 IKE SA #1 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #1: initiating v2 parent SA | constructing local IKE proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator selecting KE) | converting ike_info AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: constructed local IKE proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | adding ikev2_outI1 KE work-order 1 for state #1 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56091f3494a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x56091f3446c8 size 128 | #1 spent 0.189 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@21) (in initiate_connection() at initiate.c:372) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.674 milliseconds in whack | crypto helper 1 resuming | crypto helper 1 starting work-order 1 for state #1 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 1 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 1 time elapsed 0.000834 seconds | (#1) spent 0.843 milliseconds in crypto helper computing work-order 1: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 1 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7f7bc4002888 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 1 | calling continuation function 0x56091de22b50 | ikev2_parent_outI1_continue for #1 | **emit ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | discarding INTEG=NONE | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 11 (0xb) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding INTEG=NONE | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 100 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding INTEG=NONE | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 2 (0x2) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 11 (0xb) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding INTEG=NONE | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 100 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 3 (0x3) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 13 (0xd) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 116 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 4 (0x4) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 13 (0xd) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 116 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 436 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c5 26 a1 71 e7 14 76 c0 ad 26 9c 7b 82 b9 d2 1e | ikev2 g^x 80 76 92 2c e0 c7 12 4d e2 fe e7 f5 66 a0 52 e7 | ikev2 g^x 5d 21 36 91 26 07 c3 e7 b4 6b ec c1 7c 53 5e 61 | ikev2 g^x 15 3c fa 19 6e 91 4e ef b9 14 91 79 a8 f5 14 7d | ikev2 g^x 5c e0 9e 95 7b 35 83 ca 3b b9 5e 13 40 61 39 08 | ikev2 g^x 18 bc 7e 21 3c 8f fc 0d 2f a3 83 37 7d ae 3d c8 | ikev2 g^x fb eb 52 12 f4 5c f4 dc 5b a9 e0 a9 8d d5 e9 43 | ikev2 g^x 99 92 c5 7e d6 9b 98 12 31 49 c7 79 3c 07 e0 4d | ikev2 g^x 6b 4e 92 d5 27 00 a8 4c 7f a5 16 14 3f 41 6c 96 | ikev2 g^x 70 80 58 53 42 03 fa eb 6c 8d d3 53 88 8f 12 22 | ikev2 g^x 1f 73 fc 99 27 cf 38 1b de 3f ef 3c ea 39 06 80 | ikev2 g^x 5d c8 78 cd ff 41 28 01 55 6c 16 ec 78 01 97 43 | ikev2 g^x 79 8e ec c9 75 81 1c 67 6a 91 59 6a 3d e1 a0 7a | ikev2 g^x 60 3e 4e 71 7b 95 41 f9 78 21 14 ec 16 66 ae 9a | ikev2 g^x c7 45 91 b6 57 0d 78 42 c7 76 8c 56 c8 76 ff 85 | ikev2 g^x 9a 77 d3 77 95 0d 1e c3 ec a8 fe 3f 8a 88 54 51 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7c 21 14 76 1f 25 8b 28 53 1b b4 59 50 09 5d 9e | IKEv2 nonce 50 5c ba 6c 86 d7 da 9c f6 e1 7c 1b dc bf 84 22 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= 6f dc 9b f3 fd b3 b0 92 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d1 | natd_hash: port=500 | natd_hash: hash= 36 28 85 16 bd d3 09 d5 23 04 4f 30 2b 46 b1 75 | natd_hash: hash= b1 29 fb bc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 36 28 85 16 bd d3 09 d5 23 04 4f 30 2b 46 b1 75 | Notify data b1 29 fb bc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= 6f dc 9b f3 fd b3 b0 92 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 37 96 a4 5b 74 51 ec 09 df e1 ac 32 1a 7d ae 66 | natd_hash: hash= bc 1c 5c ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 37 96 a4 5b 74 51 ec 09 df e1 ac 32 1a 7d ae 66 | Notify data bc 1c 5c ed | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 828 | stop processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #1 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #1: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #1 to 4294967295 after switching state | Message ID: IKE #1 skipping update_recv as MD is fake | Message ID: sent #1 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #1: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) | sending 828 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) | 6f dc 9b f3 fd b3 b0 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f | 28 00 01 08 00 0e 00 00 c5 26 a1 71 e7 14 76 c0 | ad 26 9c 7b 82 b9 d2 1e 80 76 92 2c e0 c7 12 4d | e2 fe e7 f5 66 a0 52 e7 5d 21 36 91 26 07 c3 e7 | b4 6b ec c1 7c 53 5e 61 15 3c fa 19 6e 91 4e ef | b9 14 91 79 a8 f5 14 7d 5c e0 9e 95 7b 35 83 ca | 3b b9 5e 13 40 61 39 08 18 bc 7e 21 3c 8f fc 0d | 2f a3 83 37 7d ae 3d c8 fb eb 52 12 f4 5c f4 dc | 5b a9 e0 a9 8d d5 e9 43 99 92 c5 7e d6 9b 98 12 | 31 49 c7 79 3c 07 e0 4d 6b 4e 92 d5 27 00 a8 4c | 7f a5 16 14 3f 41 6c 96 70 80 58 53 42 03 fa eb | 6c 8d d3 53 88 8f 12 22 1f 73 fc 99 27 cf 38 1b | de 3f ef 3c ea 39 06 80 5d c8 78 cd ff 41 28 01 | 55 6c 16 ec 78 01 97 43 79 8e ec c9 75 81 1c 67 | 6a 91 59 6a 3d e1 a0 7a 60 3e 4e 71 7b 95 41 f9 | 78 21 14 ec 16 66 ae 9a c7 45 91 b6 57 0d 78 42 | c7 76 8c 56 c8 76 ff 85 9a 77 d3 77 95 0d 1e c3 | ec a8 fe 3f 8a 88 54 51 29 00 00 24 7c 21 14 76 | 1f 25 8b 28 53 1b b4 59 50 09 5d 9e 50 5c ba 6c | 86 d7 da 9c f6 e1 7c 1b dc bf 84 22 29 00 00 08 | 00 00 40 2e 29 00 00 1c 00 00 40 04 36 28 85 16 | bd d3 09 d5 23 04 4f 30 2b 46 b1 75 b1 29 fb bc | 00 00 00 1c 00 00 40 05 37 96 a4 5b 74 51 ec 09 | df e1 ac 32 1a 7d ae 66 bc 1c 5c ed | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x56091f3446c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56091f3494a8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x56091f3494a8 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x56091f34be88 size 128 | #1 STATE_PARENT_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29396.552573 | resume sending helper answer for #1 suppresed complete_v2_state_transition() and stole MD | #1 spent 1.57 milliseconds in resume sending helper answer | stop processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f7bc4002888 | spent 0.00277 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 437 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | 6f dc 9b f3 fd b3 b0 92 61 0e b0 28 e2 6e 0b a2 | 21 20 22 20 00 00 00 00 00 00 01 b5 22 00 00 28 | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 | 80 0e 01 00 03 00 00 08 02 00 00 07 00 00 00 08 | 04 00 00 0e 28 00 01 08 00 0e 00 00 ed 98 f8 af | 12 6b ec c0 64 db 1c 65 92 14 97 e3 3e e1 40 fd | d9 ad a3 da 4b ba 93 23 33 73 d9 3f 5d 18 92 9a | 6b 6a 84 87 81 62 9b 7d 8e 12 69 15 98 13 65 e8 | bd cd 73 90 9b e4 43 7d 94 72 29 c9 cc 99 02 99 | 58 9f fe 9d 81 1b 4e cf 8d 9c e1 ec 7d 27 5e 3d | a2 fa 87 32 84 bd 01 24 45 75 b1 9b 12 3e a9 38 | 33 8f 92 a7 29 cd 71 62 f7 f3 14 61 8a 83 34 c5 | bc ad 84 72 75 de 3b 02 cc a1 0c de 5d 24 8d 14 | a7 1f 14 d0 fd d9 22 12 06 b9 33 c2 82 bd 6d 32 | 33 80 db 6c a7 f9 c2 59 86 db df d7 21 bc 1d 8c | 5d 16 9f 54 95 cb d3 b1 47 46 2f ef c7 f3 7c 91 | 78 cc ca 4f 81 51 21 11 8c 99 17 6c af 1f 8b 06 | 18 d4 21 04 0a 56 3b 8e 4e 3b 64 2d ff d6 c8 f5 | d8 2a fe 9b a6 17 c1 1c cf 43 da b0 6b 82 51 99 | bb 73 9c dc 68 56 7d 19 d8 ee b3 b2 74 ad e6 5b | 45 41 1f dd 77 b5 1d be 76 d1 2e d5 29 00 00 24 | fd 6d 0c e4 fb 3a 9f d1 f5 2a c0 e6 a0 3d d1 04 | 32 d9 4e 4c c8 98 90 99 36 9b 76 56 d6 e6 30 81 | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 | aa 5b e5 55 b1 f5 82 75 14 f9 6d 5c bf e2 c9 d7 | ac 9f c5 ec 26 00 00 1c 00 00 40 05 aa 00 e4 5e | b2 6b 23 06 7c 44 10 7f c6 24 3f db c2 6d 6d 69 | 00 00 00 05 04 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_v2SA (0x21) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 0 (0x0) | length: 437 (0x1b5) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_SA_INIT response | State DB: found IKEv2 state #1 in PARENT_I1 (find_v2_ike_sa_by_initiator_spi) | start processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | [RE]START processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #1 is idle | #1 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SA) | ***parse IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2KE (0x22) | flags: none (0x0) | length: 40 (0x28) | processing payload: ISAKMP_NEXT_v2SA (len=36) | Now let's proceed with payload (ISAKMP_NEXT_v2KE) | ***parse IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2Ni (0x28) | flags: none (0x0) | length: 264 (0x108) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | processing payload: ISAKMP_NEXT_v2KE (len=256) | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) | ***parse IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 36 (0x24) | processing payload: ISAKMP_NEXT_v2Ni (len=32) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 8 (0x8) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | processing payload: ISAKMP_NEXT_v2N (len=0) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 28 (0x1c) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | processing payload: ISAKMP_NEXT_v2N (len=20) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26) | flags: none (0x0) | length: 28 (0x1c) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | processing payload: ISAKMP_NEXT_v2N (len=20) | Now let's proceed with payload (ISAKMP_NEXT_v2CERTREQ) | ***parse IKEv2 Certificate Request Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 5 (0x5) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | processing payload: ISAKMP_NEXT_v2CERTREQ (len=0) | State DB: re-hashing IKEv2 state #1 IKE SPIi and SPI[ir] | #1 in state PARENT_I1: sent v2I1, expected v2R1 | selected state microcode Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH | Now let's proceed with state specific processing | calling processor Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH | ikev2 parent inR1: calculating g^{xy} in order to send I2 | using existing local IKE proposals for connection westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator accepting remote proposal): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | Comparing remote proposals against IKE initiator (accepting) 4 local proposals | local proposal 1 type ENCR has 1 transforms | local proposal 1 type PRF has 2 transforms | local proposal 1 type INTEG has 1 transforms | local proposal 1 type DH has 8 transforms | local proposal 1 type ESN has 0 transforms | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG | local proposal 2 type ENCR has 1 transforms | local proposal 2 type PRF has 2 transforms | local proposal 2 type INTEG has 1 transforms | local proposal 2 type DH has 8 transforms | local proposal 2 type ESN has 0 transforms | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG | local proposal 3 type ENCR has 1 transforms | local proposal 3 type PRF has 2 transforms | local proposal 3 type INTEG has 2 transforms | local proposal 3 type DH has 8 transforms | local proposal 3 type ESN has 0 transforms | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none | local proposal 4 type ENCR has 1 transforms | local proposal 4 type PRF has 2 transforms | local proposal 4 type INTEG has 2 transforms | local proposal 4 type DH has 8 transforms | local proposal 4 type ESN has 0 transforms | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none | ****parse IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | length: 36 (0x24) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 3 (0x3) | Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 4 local proposals | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 12 (0xc) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | ******parse IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | remote proposal 1 transform 2 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none | comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH | remote proposal 1 matches local proposal 1 | remote accepted the proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048[first-match] | converting proposal to internal trans attrs | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= 6f dc 9b f3 fd b3 b0 92 | natd_hash: rcookie= 61 0e b0 28 e2 6e 0b a2 | natd_hash: ip= c0 01 03 d1 | natd_hash: port=500 | natd_hash: hash= ed 84 07 7d 87 2c e9 6f 90 b9 8c bc 32 2e 95 79 | natd_hash: hash= 74 1d d3 ba | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= 6f dc 9b f3 fd b3 b0 92 | natd_hash: rcookie= 61 0e b0 28 e2 6e 0b a2 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= aa 5b e5 55 b1 f5 82 75 14 f9 6d 5c bf e2 c9 d7 | natd_hash: hash= ac 9f c5 ec | NAT_TRAVERSAL encaps using auto-detect | NAT_TRAVERSAL this end is behind NAT | NAT_TRAVERSAL that end is NOT behind NAT | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 | NAT: #1 floating local endpoint from 192.1.3.209:500 to 192.1.3.209:4500 using pluto_nat_port (in ikev2_parent_inR1outI2() at ikev2_parent.c:1695) | NAT: #1 floating endpoint ended up on interface eth0 192.1.3.209:4500 | NAT-T: #1 floating remote port from 500 to 4500 using pluto_nat_port (in ikev2_parent_inR1outI2() at ikev2_parent.c:1695) | offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_512 integ=NONE cipherkey=AES_GCM_16 | adding ikev2_inR1outI2 KE work-order 2 for state #1 | state #1 requesting EVENT_RETRANSMIT to be deleted | #1 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x56091f34be88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x56091f3494a8 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56091f3494a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f7bc4002888 size 128 | #1 spent 0.238 milliseconds in processing: Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH in ikev2_process_state_packet() | [RE]START processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #1 complete_v2_state_transition() PARENT_I1->PARENT_I2 with status STF_SUSPEND | suspending state #1 and saving MD | #1 is busy; has a suspended MD | [RE]START processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in log_stf_suspend() at ikev2.c:3269) | "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #1 complete v2 state STATE_PARENT_I1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 | stop processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 0.495 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.506 milliseconds in comm_handle_cb() reading and processing packet | crypto helper 2 resuming | crypto helper 2 starting work-order 2 for state #1 | crypto helper 2 doing compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 | calculating skeyseed using prf=sha2_512 integ=none cipherkey-size=32 salt-size=4 | crypto helper 2 finished compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 time elapsed 0.001407 seconds | (#1) spent 1.39 milliseconds in crypto helper computing work-order 2: ikev2_inR1outI2 KE (pcr) | crypto helper 2 sending results from work-order 2 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7f7bbc000f48 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 2 | calling continuation function 0x56091de22b50 | ikev2_parent_inR1outI2_continue for #1: calculating g^{xy}, sending I2 | creating state object #2 at 0x56091f34e5f8 | State DB: adding IKEv2 state #2 in UNDEFINED | pstats #2 ikev2.child started | duplicating state object #1 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 as #2 for IPSEC SA | #2 setting local endpoint to 192.1.3.209:4500 from #1.st_localport (in duplicate_state() at state.c:1484) | Message ID: init_child #1.#2; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1 | Message ID: switch-from #1 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=0->-1 wip.responder=-1 | Message ID: switch-to #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->0 wip.responder=-1 | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f7bc4002888 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56091f3494a8 | event_schedule: new EVENT_SA_REPLACE-pe@0x56091f3494a8 | inserting event EVENT_SA_REPLACE, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f7bc4002888 size 128 | parent state #1: PARENT_I1(half-open IKE SA) => PARENT_I2(open IKE SA) | **emit ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' | emitting 8 zero bytes of IV into IKEv2 Encryption Payload | IKEv2 CERT: send a certificate? | IKEv2 CERT: OK to send a certificate (always) | IDr payload will NOT be sent | ****emit IKEv2 Identification - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | ID type: ID_DER_ASN1_DN (0x9) | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Initiator - Payload (35:ISAKMP_NEXT_v2IDi) | next payload chain: saving location 'IKEv2 Identification - Initiator - Payload'.'next payload type' in 'reply packet' | emitting 183 raw bytes of my identity into IKEv2 Identification - Initiator - Payload | my identity 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 | my identity 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | my identity 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | my identity 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | my identity 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | my identity 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | my identity 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 72 6f 61 | my identity 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | my identity 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 | my identity 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 72 6f 61 | my identity 64 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | my identity 77 61 6e 2e 6f 72 67 | emitting length of IKEv2 Identification - Initiator - Payload: 191 | Sending [CERT] of certificate: E=user-road@testing.libreswan.org,CN=road.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | ****emit IKEv2 Certificate Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | next payload chain: setting previous 'IKEv2 Identification - Initiator - Payload'.'next payload type' to current IKEv2 Certificate Payload (37:ISAKMP_NEXT_v2CERT) | next payload chain: saving location 'IKEv2 Certificate Payload'.'next payload type' in 'reply packet' | emitting 1224 raw bytes of CERT into IKEv2 Certificate Payload | CERT 30 82 04 c4 30 82 04 2d a0 03 02 01 02 02 01 05 | CERT 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 | CERT 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 31 | CERT 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 69 | CERT 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 6f | CERT 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c 69 | CERT 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 0b | CERT 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 6e | CERT 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 72 | CERT 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 6f | CERT 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a 86 | CERT 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e 67 | CERT 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 30 22 | CERT 18 0f 32 30 31 39 30 38 32 34 30 39 30 37 35 33 | CERT 5a 18 0f 32 30 32 32 30 38 32 33 30 39 30 37 35 | CERT 33 5a 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 | CERT 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 | CERT 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 | CERT 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c | CERT 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 | CERT 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 | CERT 6d 65 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 72 | CERT 6f 61 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a | CERT 86 48 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 72 | CERT 6f 61 64 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 30 82 01 a2 30 0d 06 | CERT 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 8f | CERT 00 30 82 01 8a 02 82 01 81 00 de eb 73 26 86 d7 | CERT 2c 84 21 13 0e a4 23 30 11 c6 d4 b1 e8 99 58 5b | CERT 54 fa 8c cb 90 bf aa 54 64 e2 ef 00 f9 df b2 5a | CERT 20 d0 1f fd fb 02 a8 d4 60 ac 44 ab c0 91 e1 eb | CERT 81 59 f7 6d 08 30 04 c9 63 5f 07 58 6a d7 e6 ff | CERT 96 d3 79 c2 a1 6b d3 24 00 31 74 f3 8f b4 e9 17 | CERT af d1 3c 33 ee 8b a9 19 b2 03 f1 98 8a 60 f2 f6 | CERT 14 4b 31 a3 8b cb cb ae 31 d9 70 5a 88 2d cc c8 | CERT 77 e8 27 1f 75 07 9a 9b cc 5a 53 bd 69 be 82 0e | CERT 9c b9 3b c8 4f fa 84 87 bb b6 0d 2d ff 11 a1 2d | CERT 51 d4 3f c2 93 09 22 b4 2e 48 0e 77 81 b6 79 ee | CERT 31 37 3d 55 2f 3d 4f 0e 26 7e 73 34 4f 0d d1 90 | CERT 84 c9 06 53 b6 31 7f 6e 62 51 c6 35 3b a1 03 8a | CERT 8b 62 bb 4d 37 a5 44 42 54 a2 10 80 5f 75 0e 17 | CERT a0 4e d8 46 e8 02 bf a1 f5 e5 2a 2e 5c dc b2 d7 | CERT 93 d9 04 45 51 1d 5e 7d d8 fd 03 96 0c d5 02 5b | CERT 72 03 26 b7 d6 cd a0 18 86 a7 07 d0 74 c6 07 e8 | CERT 5c 1f 7a af be d0 ae b8 e7 7a 3b cf 5c fa ca ea | CERT ae c3 6f 85 22 9b 46 81 be 7c 89 15 4f 06 47 30 | CERT 9f bb ee 24 55 e2 21 cd 8e 93 f5 0e 33 49 5d 50 | CERT 48 39 ac ab 37 59 f8 a2 61 be a0 81 d5 25 97 2f | CERT 8b 2f bd d9 47 a4 5c a5 3b c0 99 19 c5 fb 43 da | CERT 6f 6c 33 54 60 af 00 d5 41 12 60 e5 bb 07 b8 76 | CERT 8a 55 c4 c3 47 8b bd 12 bc e8 5e 94 62 7a 20 91 | CERT 11 fb 23 b7 2d f5 6f 73 b6 a9 02 03 01 00 01 a3 | CERT 81 e3 30 81 e0 30 09 06 03 55 1d 13 04 02 30 00 | CERT 30 25 06 03 55 1d 11 04 1e 30 1c 82 1a 72 6f 61 | CERT 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | CERT 77 61 6e 2e 6f 72 67 30 0b 06 03 55 1d 0f 04 04 | CERT 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 | CERT 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 | CERT 07 03 02 30 41 06 08 2b 06 01 05 05 07 01 01 04 | CERT 35 30 33 30 31 06 08 2b 06 01 05 05 07 30 01 86 | CERT 25 68 74 74 70 3a 2f 2f 6e 69 63 2e 74 65 73 74 | CERT 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 | CERT 67 3a 32 35 36 30 30 3d 06 03 55 1d 1f 04 36 30 | CERT 34 30 32 a0 30 a0 2e 86 2c 68 74 74 70 3a 2f 2f | CERT 6e 69 63 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 2f 72 65 76 6f 6b 65 | CERT 64 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 | CERT 01 0b 05 00 03 81 81 00 79 c0 dc 4f ca 3c 5f 4e | CERT 21 3c 76 b0 44 66 c8 74 40 7b 34 5d 63 96 6e ee | CERT c5 df ef 0f fe c2 e4 25 18 39 25 d8 f8 6a b8 87 | CERT f9 17 94 73 7f 8d fb 7d 9d 24 5e c5 95 19 96 3e | CERT 04 dd 8a d0 ad 11 f4 97 32 43 d2 f3 1a d3 1c b1 | CERT e9 01 90 f2 72 36 cf d4 bd 14 e6 ad 8d d2 84 3b | CERT 92 94 99 40 21 16 68 aa e7 5e ac 95 88 11 40 55 | CERT 28 90 af 7f 98 b1 80 36 c5 18 f7 6e 43 40 bc 93 | CERT 86 b3 f1 aa b3 89 b4 15 | emitting length of IKEv2 Certificate Payload: 1229 | IKEv2 CERTREQ: send a cert request? | IKEv2 CERTREQ: no CA DN known to send | not sending INITIAL_CONTACT | ****emit IKEv2 Authentication Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | auth method: IKEv2_AUTH_RSA (0x1) | next payload chain: setting previous 'IKEv2 Certificate Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH) | next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet' | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org->%fromcert of kind PKK_RSA | searching for certificate PKK_RSA:AwEAAd7rc vs PKK_RSA:AwEAAd7rc | #1 spent 9.11 milliseconds in ikev2_calculate_rsa_hash() calling sign_hash_RSA() | emitting 384 raw bytes of rsa signature into IKEv2 Authentication Payload | rsa signature d2 6f e9 d8 38 30 c6 66 af 55 bd bb 67 72 0d 97 | rsa signature 76 ac 10 4c 37 c2 49 66 35 2f c0 56 c4 de 00 75 | rsa signature 6f ad 3e 35 69 cc 64 f1 58 94 b5 36 55 69 05 66 | rsa signature cc 33 2b 41 2a 01 2c 82 8a 47 8c 02 7c c8 68 70 | rsa signature ca db eb db 43 48 ff 08 2e 39 e9 a1 b6 5c f5 ab | rsa signature 59 f8 50 77 40 0d fc 1c 6a 8c c4 c7 a4 26 03 72 | rsa signature 2a 6e f5 41 fa 8d 9a 6f 09 3a ca 6e d1 e5 3c df | rsa signature a6 f7 c8 1c b6 eb 24 0e d1 df ca b1 a8 4f c9 fb | rsa signature e5 17 a2 78 1b 6f a2 9b 0b a1 a2 ba cd 17 cc 36 | rsa signature ad ad 24 e8 d2 ca b3 32 66 26 7f f9 1c 1b 31 72 | rsa signature 3f b7 51 7f 7b fc 14 20 84 cc 9b 1e 4f fe 46 a8 | rsa signature 53 ec c6 6c 2a eb 92 0c 90 50 c2 8d cd 67 a2 fc | rsa signature f1 cf d5 f2 43 8b 28 bf 42 ff b6 1f 4a dd 06 7b | rsa signature a3 df 6d de d1 04 0d c0 b1 e8 04 9e fb 56 3e da | rsa signature 5f 25 ed ca f5 be c9 63 6a 63 0c b2 18 08 0b 60 | rsa signature 34 10 34 0a c0 7f 30 cf a4 97 08 96 61 17 a5 a6 | rsa signature f6 50 63 e9 f4 fa 49 36 53 ae f3 af 39 39 3e 7b | rsa signature 0f 3c 76 8b d3 92 23 9a 58 24 6e 64 c4 fc 4d 6f | rsa signature d9 31 6a bf e8 40 42 98 16 2f 38 d9 46 cb 60 77 | rsa signature a2 0b 95 25 7e 0b 28 82 6a 84 59 67 b6 e1 b4 86 | rsa signature d0 ed df 6c 8b e3 f2 f0 fa 17 3d be 87 e9 36 e0 | rsa signature 2f bb 84 78 c9 94 ae 16 ff c4 57 57 d8 b9 1e 69 | rsa signature a3 6a 08 e3 44 5d 48 23 2b 7a 04 aa 53 cb 09 53 | rsa signature 22 41 7b 1e 85 c3 ad 70 24 51 d9 97 2b aa 58 66 | #1 spent 9.31 milliseconds in ikev2_calculate_rsa_hash() | emitting length of IKEv2 Authentication Payload: 392 | Send Configuration Payload request | ****emit IKEv2 Configuration Payload: | next payload type: ISAKMP_NEXT_v2SA (0x21) | flags: none (0x0) | ikev2_cfg_type: IKEv2_CP_CFG_REQUEST (0x1) | next payload chain: ignoring supplied 'IKEv2 Configuration Payload'.'next payload type' value 33:ISAKMP_NEXT_v2SA | next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Configuration Payload (47:ISAKMP_NEXT_v2CP) | next payload chain: saving location 'IKEv2 Configuration Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_ADDRESS (0x1) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_DNS (0x3) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP6_ADDRESS (0x8) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP6_DNS (0xa) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_DNS_DOMAIN (0x19) | emitting length of IKEv2 Configuration Payload Attribute: 0 | emitting length of IKEv2 Configuration Payload: 28 | getting first pending from state #1 | netlink_get_spi: allocated 0x367c52cb for esp.0@192.1.3.209 | constructing ESP/AH proposals with all DH removed for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator emitting ESP/AH proposals) | converting proposal AES_GCM_16_256-NONE to ikev2 ... | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED | converting proposal AES_GCM_16_128-NONE to ikev2 ... | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: constructed local ESP/AH proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | Emitting ikev2_proposals ... | ****emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'IKEv2 Configuration Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | discarding INTEG=NONE | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 36 7c 52 cb | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 32 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding INTEG=NONE | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 2 (0x2) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 36 7c 52 cb | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 32 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 3 (0x3) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 4 (0x4) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 36 7c 52 cb | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 48 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 4 (0x4) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 4 (0x4) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 36 7c 52 cb | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 48 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 164 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ****emit IKEv2 Traffic Selector - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | number of TS: 1 (0x1) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | start port: 0 (0x0) | end port: 65535 (0xffff) | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector | ipv4 start c0 01 03 d1 | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector | ipv4 end c0 01 03 d1 | emitting length of IKEv2 Traffic Selector: 16 | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 | ****emit IKEv2 Traffic Selector - Responder - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | number of TS: 1 (0x1) | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | start port: 0 (0x0) | end port: 65535 (0xffff) | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector | ipv4 start c0 01 02 17 | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector | ipv4 end c0 01 02 17 | emitting length of IKEv2 Traffic Selector: 16 | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE | Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload | emitting length of IKEv2 Encryption Payload: 2081 | emitting length of ISAKMP Message: 2109 | **parse ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | length: 2109 (0x83d) | **parse IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2IDi (0x23) | flags: none (0x0) | length: 2081 (0x821) | **emit ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2IDi (0x23) | flags: none (0x0) | fragment number: 1 (0x1) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 35:ISAKMP_NEXT_v2IDi | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 25 00 00 bf 09 00 00 00 30 81 b4 31 0b 30 09 06 | cleartext fragment 03 55 04 06 13 02 43 41 31 10 30 0e 06 03 55 04 | cleartext fragment 08 0c 07 4f 6e 74 61 72 69 6f 31 10 30 0e 06 03 | cleartext fragment 55 04 07 0c 07 54 6f 72 6f 6e 74 6f 31 12 30 10 | cleartext fragment 06 03 55 04 0a 0c 09 4c 69 62 72 65 73 77 61 6e | cleartext fragment 31 18 30 16 06 03 55 04 0b 0c 0f 54 65 73 74 20 | cleartext fragment 44 65 70 61 72 74 6d 65 6e 74 31 23 30 21 06 03 | cleartext fragment 55 04 03 0c 1a 72 6f 61 64 2e 74 65 73 74 69 6e | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 31 | cleartext fragment 2e 30 2c 06 09 2a 86 48 86 f7 0d 01 09 01 16 1f | cleartext fragment 75 73 65 72 2d 72 6f 61 64 40 74 65 73 74 69 6e | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 27 | cleartext fragment 00 04 cd 04 30 82 04 c4 30 82 04 2d a0 03 02 01 | cleartext fragment 02 02 01 05 30 0d 06 09 2a 86 48 86 f7 0d 01 01 | cleartext fragment 0b 05 00 30 81 ac 31 0b 30 09 06 03 55 04 06 13 | cleartext fragment 02 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e | cleartext fragment 74 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 | cleartext fragment 54 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a | cleartext fragment 0c 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 | cleartext fragment 03 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 | cleartext fragment 74 6d 65 6e 74 31 25 30 23 06 03 55 04 03 0c 1c | cleartext fragment 4c 69 62 72 65 73 77 61 6e 20 74 65 73 74 20 43 | cleartext fragment 41 20 66 6f 72 20 6d 61 69 6e 63 61 31 24 30 22 | cleartext fragment 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 74 65 73 | cleartext fragment 74 69 6e 67 40 6c 69 62 72 65 73 77 61 6e 2e 6f | cleartext fragment 72 67 30 22 18 0f 32 30 31 39 30 38 32 34 30 39 | cleartext fragment 30 37 35 33 5a 18 0f 32 30 32 32 30 38 32 33 30 | cleartext fragment 39 30 37 35 33 5a 30 81 b4 31 0b 30 09 06 03 55 | cleartext fragment 04 06 13 02 43 41 31 10 30 0e 06 03 55 04 08 0c | cleartext fragment 07 4f 6e 74 61 72 69 6f 31 10 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 2 (0x2) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 30 0e 06 03 55 04 07 0c 07 54 6f 72 6f 6e 74 6f | cleartext fragment 31 12 30 10 06 03 55 04 0a 0c 09 4c 69 62 72 65 | cleartext fragment 73 77 61 6e 31 18 30 16 06 03 55 04 0b 0c 0f 54 | cleartext fragment 65 73 74 20 44 65 70 61 72 74 6d 65 6e 74 31 23 | cleartext fragment 30 21 06 03 55 04 03 0c 1a 72 6f 61 64 2e 74 65 | cleartext fragment 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e | cleartext fragment 6f 72 67 31 2e 30 2c 06 09 2a 86 48 86 f7 0d 01 | cleartext fragment 09 01 16 1f 75 73 65 72 2d 72 6f 61 64 40 74 65 | cleartext fragment 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e | cleartext fragment 6f 72 67 30 82 01 a2 30 0d 06 09 2a 86 48 86 f7 | cleartext fragment 0d 01 01 01 05 00 03 82 01 8f 00 30 82 01 8a 02 | cleartext fragment 82 01 81 00 de eb 73 26 86 d7 2c 84 21 13 0e a4 | cleartext fragment 23 30 11 c6 d4 b1 e8 99 58 5b 54 fa 8c cb 90 bf | cleartext fragment aa 54 64 e2 ef 00 f9 df b2 5a 20 d0 1f fd fb 02 | cleartext fragment a8 d4 60 ac 44 ab c0 91 e1 eb 81 59 f7 6d 08 30 | cleartext fragment 04 c9 63 5f 07 58 6a d7 e6 ff 96 d3 79 c2 a1 6b | cleartext fragment d3 24 00 31 74 f3 8f b4 e9 17 af d1 3c 33 ee 8b | cleartext fragment a9 19 b2 03 f1 98 8a 60 f2 f6 14 4b 31 a3 8b cb | cleartext fragment cb ae 31 d9 70 5a 88 2d cc c8 77 e8 27 1f 75 07 | cleartext fragment 9a 9b cc 5a 53 bd 69 be 82 0e 9c b9 3b c8 4f fa | cleartext fragment 84 87 bb b6 0d 2d ff 11 a1 2d 51 d4 3f c2 93 09 | cleartext fragment 22 b4 2e 48 0e 77 81 b6 79 ee 31 37 3d 55 2f 3d | cleartext fragment 4f 0e 26 7e 73 34 4f 0d d1 90 84 c9 06 53 b6 31 | cleartext fragment 7f 6e 62 51 c6 35 3b a1 03 8a 8b 62 bb 4d 37 a5 | cleartext fragment 44 42 54 a2 10 80 5f 75 0e 17 a0 4e d8 46 e8 02 | cleartext fragment bf a1 f5 e5 2a 2e 5c dc b2 d7 93 d9 04 45 51 1d | cleartext fragment 5e 7d d8 fd 03 96 0c d5 02 5b 72 03 26 b7 d6 cd | cleartext fragment a0 18 86 a7 07 d0 74 c6 07 e8 5c 1f 7a af be d0 | cleartext fragment ae b8 e7 7a 3b cf 5c fa ca ea ae c3 6f 85 22 9b | cleartext fragment 46 81 be 7c 89 15 4f 06 47 30 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 3 (0x3) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 9f bb ee 24 55 e2 21 cd 8e 93 f5 0e 33 49 5d 50 | cleartext fragment 48 39 ac ab 37 59 f8 a2 61 be a0 81 d5 25 97 2f | cleartext fragment 8b 2f bd d9 47 a4 5c a5 3b c0 99 19 c5 fb 43 da | cleartext fragment 6f 6c 33 54 60 af 00 d5 41 12 60 e5 bb 07 b8 76 | cleartext fragment 8a 55 c4 c3 47 8b bd 12 bc e8 5e 94 62 7a 20 91 | cleartext fragment 11 fb 23 b7 2d f5 6f 73 b6 a9 02 03 01 00 01 a3 | cleartext fragment 81 e3 30 81 e0 30 09 06 03 55 1d 13 04 02 30 00 | cleartext fragment 30 25 06 03 55 1d 11 04 1e 30 1c 82 1a 72 6f 61 | cleartext fragment 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | cleartext fragment 77 61 6e 2e 6f 72 67 30 0b 06 03 55 1d 0f 04 04 | cleartext fragment 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 | cleartext fragment 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 | cleartext fragment 07 03 02 30 41 06 08 2b 06 01 05 05 07 01 01 04 | cleartext fragment 35 30 33 30 31 06 08 2b 06 01 05 05 07 30 01 86 | cleartext fragment 25 68 74 74 70 3a 2f 2f 6e 69 63 2e 74 65 73 74 | cleartext fragment 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 | cleartext fragment 67 3a 32 35 36 30 30 3d 06 03 55 1d 1f 04 36 30 | cleartext fragment 34 30 32 a0 30 a0 2e 86 2c 68 74 74 70 3a 2f 2f | cleartext fragment 6e 69 63 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | cleartext fragment 65 73 77 61 6e 2e 6f 72 67 2f 72 65 76 6f 6b 65 | cleartext fragment 64 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 | cleartext fragment 01 0b 05 00 03 81 81 00 79 c0 dc 4f ca 3c 5f 4e | cleartext fragment 21 3c 76 b0 44 66 c8 74 40 7b 34 5d 63 96 6e ee | cleartext fragment c5 df ef 0f fe c2 e4 25 18 39 25 d8 f8 6a b8 87 | cleartext fragment f9 17 94 73 7f 8d fb 7d 9d 24 5e c5 95 19 96 3e | cleartext fragment 04 dd 8a d0 ad 11 f4 97 32 43 d2 f3 1a d3 1c b1 | cleartext fragment e9 01 90 f2 72 36 cf d4 bd 14 e6 ad 8d d2 84 3b | cleartext fragment 92 94 99 40 21 16 68 aa e7 5e ac 95 88 11 40 55 | cleartext fragment 28 90 af 7f 98 b1 80 36 c5 18 f7 6e 43 40 bc 93 | cleartext fragment 86 b3 f1 aa b3 89 b4 15 2f 00 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 4 (0x4) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 01 88 01 00 00 00 d2 6f e9 d8 38 30 c6 66 af 55 | cleartext fragment bd bb 67 72 0d 97 76 ac 10 4c 37 c2 49 66 35 2f | cleartext fragment c0 56 c4 de 00 75 6f ad 3e 35 69 cc 64 f1 58 94 | cleartext fragment b5 36 55 69 05 66 cc 33 2b 41 2a 01 2c 82 8a 47 | cleartext fragment 8c 02 7c c8 68 70 ca db eb db 43 48 ff 08 2e 39 | cleartext fragment e9 a1 b6 5c f5 ab 59 f8 50 77 40 0d fc 1c 6a 8c | cleartext fragment c4 c7 a4 26 03 72 2a 6e f5 41 fa 8d 9a 6f 09 3a | cleartext fragment ca 6e d1 e5 3c df a6 f7 c8 1c b6 eb 24 0e d1 df | cleartext fragment ca b1 a8 4f c9 fb e5 17 a2 78 1b 6f a2 9b 0b a1 | cleartext fragment a2 ba cd 17 cc 36 ad ad 24 e8 d2 ca b3 32 66 26 | cleartext fragment 7f f9 1c 1b 31 72 3f b7 51 7f 7b fc 14 20 84 cc | cleartext fragment 9b 1e 4f fe 46 a8 53 ec c6 6c 2a eb 92 0c 90 50 | cleartext fragment c2 8d cd 67 a2 fc f1 cf d5 f2 43 8b 28 bf 42 ff | cleartext fragment b6 1f 4a dd 06 7b a3 df 6d de d1 04 0d c0 b1 e8 | cleartext fragment 04 9e fb 56 3e da 5f 25 ed ca f5 be c9 63 6a 63 | cleartext fragment 0c b2 18 08 0b 60 34 10 34 0a c0 7f 30 cf a4 97 | cleartext fragment 08 96 61 17 a5 a6 f6 50 63 e9 f4 fa 49 36 53 ae | cleartext fragment f3 af 39 39 3e 7b 0f 3c 76 8b d3 92 23 9a 58 24 | cleartext fragment 6e 64 c4 fc 4d 6f d9 31 6a bf e8 40 42 98 16 2f | cleartext fragment 38 d9 46 cb 60 77 a2 0b 95 25 7e 0b 28 82 6a 84 | cleartext fragment 59 67 b6 e1 b4 86 d0 ed df 6c 8b e3 f2 f0 fa 17 | cleartext fragment 3d be 87 e9 36 e0 2f bb 84 78 c9 94 ae 16 ff c4 | cleartext fragment 57 57 d8 b9 1e 69 a3 6a 08 e3 44 5d 48 23 2b 7a | cleartext fragment 04 aa 53 cb 09 53 22 41 7b 1e 85 c3 ad 70 24 51 | cleartext fragment d9 97 2b aa 58 66 21 00 00 1c 01 00 00 00 00 01 | cleartext fragment 00 00 00 03 00 00 00 08 00 00 00 0a 00 00 00 19 | cleartext fragment 00 00 2c 00 00 a4 02 00 00 20 01 03 04 02 36 7c | cleartext fragment 52 cb 03 00 00 0c 01 00 00 14 80 0e 01 00 00 00 | cleartext fragment 00 08 05 00 00 00 02 00 00 20 02 03 04 02 36 7c | cleartext fragment 52 cb 03 00 00 0c 01 00 00 14 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 5 (0x5) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 156 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 80 0e 00 80 00 00 00 08 05 00 00 00 02 00 00 30 | cleartext fragment 03 03 04 04 36 7c 52 cb 03 00 00 0c 01 00 00 0c | cleartext fragment 80 0e 01 00 03 00 00 08 03 00 00 0e 03 00 00 08 | cleartext fragment 03 00 00 0c 00 00 00 08 05 00 00 00 00 00 00 30 | cleartext fragment 04 03 04 04 36 7c 52 cb 03 00 00 0c 01 00 00 0c | cleartext fragment 80 0e 00 80 03 00 00 08 03 00 00 0e 03 00 00 08 | cleartext fragment 03 00 00 0c 00 00 00 08 05 00 00 00 2d 00 00 18 | cleartext fragment 01 00 00 00 07 00 00 10 00 00 ff ff c0 01 03 d1 | cleartext fragment c0 01 03 d1 00 00 00 18 01 00 00 00 07 00 00 10 | cleartext fragment 00 00 ff ff c0 01 02 17 c0 01 02 17 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 189 | emitting length of ISAKMP Message: 217 | suspend processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | start processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #2 complete_v2_state_transition() md.from_state=PARENT_I1 md.svm.state[from]=PARENT_I1 UNDEFINED->PARENT_I2 with status STF_OK | IKEv2: transition from state STATE_PARENT_I1 to state STATE_PARENT_I2 | child state #2: UNDEFINED(ignore) => PARENT_I2(open IKE SA) | Message ID: updating counters for #2 to 0 after switching state | Message ID: recv #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1->0 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=-1 | Message ID: sent #1.#2 request 1; ike: initiator.sent=0->1 initiator.recv=0 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->1 wip.responder=-1 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} | sending V2 reply packet to 192.1.2.23:4500 (from 192.1.3.209:4500) | sending fragments ... | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #1) | 00 00 00 00 6f dc 9b f3 fd b3 b0 92 61 0e b0 28 | e2 6e 0b a2 35 20 23 08 00 00 00 01 00 00 02 17 | 23 00 01 fb 00 01 00 05 ad 67 59 e4 68 04 7f 2e | 63 ef 99 1f a0 2c 54 91 ce b0 a1 b1 df 39 89 27 | 55 79 d3 f9 fc c3 df 38 89 8c 44 2e 9c 36 36 3d | 78 6b 3a 6c f9 eb 87 98 4a 98 14 73 a5 2a ca 76 | 0d 5f 68 af 2b 62 74 e4 9f 59 b6 53 c0 5a 05 93 | a9 71 a5 52 8e cf d4 be 5d 5e 51 e8 09 71 fe c5 | 94 55 37 d0 dc 7c f3 d5 a7 92 fc 80 b6 b9 4c e1 | 71 bd 56 a9 d4 49 b4 ad 88 f1 1e 2a 25 b3 2f 30 | e6 67 cc 45 03 62 44 4b 65 59 2b 61 f1 0b d1 55 | a5 8a 8b ca 66 fd 67 65 14 ac 35 87 7d fe a1 42 | e8 a2 e6 91 dd 4f 70 0b 3f 93 07 2b 9f 97 fa 48 | 4e 65 cc d5 a3 77 90 45 1e 14 20 1e c7 f4 5e a3 | 4d b6 f4 1d ff e5 cb 14 0c 1a d1 53 55 5d f8 62 | bd 38 52 ee d3 57 bc 11 1e 6a ad 3d b8 68 b2 0b | 76 7e d0 f1 d2 90 11 6f e1 7f 8c 7a 1b c6 2d 0a | 0c 5f 47 ec 42 43 48 5f 99 99 63 a0 cb aa de 95 | 83 b6 dc 70 fa d0 6d da ad 64 ce 20 e4 c6 53 c4 | a6 69 3f d9 39 ee 0d 4b 3a ab 54 7c 31 77 ec a8 | 76 10 33 71 89 ef e6 54 ca a0 65 6f 68 65 9f 0c | 2e 16 35 92 ad 1d dc c1 c2 8d ad 48 f8 c9 e5 df | 5d c3 5a 7d 9f c5 4f 36 01 65 bc 5e cf c0 00 70 | bf 51 ef ac ff 46 84 5f 13 a8 6d 73 46 cc 5f d5 | 2c ac 69 9c 6c cb 30 27 ad ee c4 c8 73 0b 6a aa | 73 bf f4 fd d2 8a fb 1a 47 80 95 ec ee 96 b2 41 | bc 05 d6 44 ec d3 e0 ff 4f 2a d9 3c 9a fa ff 23 | 87 06 e8 55 af 26 ff ed 98 47 42 d3 9e 8c 07 f7 | 09 14 91 f6 a4 d1 dd ec 2d 10 fc 26 24 eb 53 85 | 12 1e 4d a9 06 0f 0f 7d 89 77 53 6d e4 be 64 91 | db 5b c2 bf f6 d3 70 b9 c5 2d c9 02 65 62 46 be | fb 82 e0 04 c1 51 85 bf f8 5b 3b b5 2f d1 68 07 | bc d9 92 79 86 69 7c cc ed 99 c3 ad 0d b2 36 cf | 0d 22 01 13 b3 85 15 8e 25 3a 56 | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #1) | 00 00 00 00 6f dc 9b f3 fd b3 b0 92 61 0e b0 28 | e2 6e 0b a2 35 20 23 08 00 00 00 01 00 00 02 17 | 00 00 01 fb 00 02 00 05 96 f0 9a 79 c9 c4 c4 ad | 7e 42 2f 75 51 6a 80 cc 42 2a 12 ff 0a 59 37 af | d4 40 2e 5f 6e 88 4d 1d 14 3d c6 b7 91 e7 03 ac | 20 0c 4a 56 90 0a 93 f5 84 6b 77 1e 30 12 04 b4 | cb 82 01 fd fa b9 27 36 7e ad f9 9c 6c 80 40 08 | 39 12 97 7f 2c af 20 1e e8 2f 82 49 94 52 7e de | 98 a4 b2 74 bc ea f9 62 1d 15 a8 8c 0b 79 25 36 | 96 07 2d fb 0e 40 43 63 57 c4 ca 6d 58 69 3a da | 00 44 fa 7c 9d 9c 85 3a 97 e1 e8 d5 b0 64 61 5c | 8f 17 11 2c 38 fe c6 76 05 34 c0 cf 7a 9d e9 76 | 51 08 6b f1 06 b3 12 a0 b6 76 3b 8d bb 29 d4 85 | dd 14 a6 f3 45 6d 15 a3 ba 0b 48 77 1a 6c ef ce | 40 56 1f 15 5d ce f4 9d 2f b1 76 c8 79 8f 4e 71 | 0b e5 2e cd aa bf a9 d4 e7 2b 10 74 88 a4 18 e4 | 7c 40 4a 4c 80 b6 5a 56 72 e5 4a ef 20 83 77 5f | 57 e6 ab fa 3e df 4c ad eb ba 29 02 f0 d7 f8 12 | 75 06 50 2f 85 58 53 e2 9d ae 15 2f cc 00 06 0f | 61 a8 a2 61 16 77 1f 67 3a 25 a7 9d 03 19 ef a6 | 99 1e 7b ad 29 0a 25 a2 31 c0 48 6d af 65 f3 fe | 51 f2 b6 7d 80 48 c0 98 c2 39 c4 bd 57 b5 9f 55 | d9 85 11 f9 4b 9f f6 0b 4e 26 6f b9 cb ec 43 8c | 7b 50 6c 6f b1 b8 f5 40 a3 3b 9f 7d 7a 4f d7 94 | ec 6e 8f 8d 5b 9f 96 8f 99 50 a6 de ca 25 50 e1 | c0 44 b2 d7 41 b7 58 a8 99 ed 10 ee 50 2d a9 0f | da 0f 7f e5 5d e6 fc 01 b1 40 97 64 05 85 17 32 | 72 bb 3f b3 d1 34 0f f5 b5 1f 0a 88 ad 29 6a 71 | b7 5d 68 fa b6 e5 0a 9f e8 f2 80 27 6a 20 dd 8c | 92 bf 5c a6 f3 16 60 eb a0 41 78 56 a5 39 32 f8 | 75 52 57 0c f3 41 01 d0 3b 32 6d 05 33 c1 4d e3 | 66 62 72 12 23 a2 b8 5f 81 a8 62 42 04 df 95 07 | 3f b5 f8 83 7d fd 28 95 59 5c 66 04 cb 5a fe b3 | 75 64 7a 70 c2 62 86 95 b0 ab e9 | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #1) | 00 00 00 00 6f dc 9b f3 fd b3 b0 92 61 0e b0 28 | e2 6e 0b a2 35 20 23 08 00 00 00 01 00 00 02 17 | 00 00 01 fb 00 03 00 05 0c 64 c4 17 e1 ae e7 34 | 3f 8d 6f 85 7b 47 de f5 02 72 16 00 40 d0 29 49 | d7 d5 96 4b a8 a4 9d 11 c3 c5 ae fd 98 cb 37 72 | 1b cb 99 e9 4d c5 86 68 e4 18 84 9a 58 f5 82 50 | 6e 69 15 1b f7 b5 38 20 2d b0 6d e4 fc 54 aa 58 | ef d5 a9 6b 12 6e 7d 65 7b d3 32 40 5b 4b b1 15 | 8b be d7 c0 ba 01 94 eb ce 4b a8 dc 52 8f 5b bd | 43 6a ec a1 d3 74 38 50 7e 6e 63 a9 51 e2 fb 74 | 50 3a 5a 55 96 cb 0d 70 c6 92 23 a9 7d fc 52 22 | 7e 1d ea cf 17 52 d4 c8 f5 42 b6 05 f5 87 c7 b5 | 16 cf 35 57 32 f5 dd 97 9e b4 27 6c cf b2 14 8a | c7 a2 1b 9f f1 19 7e dd 45 f8 6c 5d e6 86 04 cd | e5 ab b2 5e 1f 12 57 88 62 f4 a0 2a 17 c8 d0 97 | 18 43 cc 60 5b dc 2e 0b 9a 4b 9d fd fa 70 b6 cc | 38 2e b6 27 55 3a c6 22 bf e5 a7 47 0a d3 d1 33 | 47 c3 8f 34 97 1c 6d fb 88 8b 75 ca 55 be ea 17 | 7a 5b 22 38 33 54 30 e8 db 6d 3b c0 32 00 af 44 | b1 3c ab 21 8b 48 a6 7c df d2 ec c0 36 ed e9 65 | c3 77 36 06 6e 59 81 74 cb 15 b0 50 36 34 54 50 | af ac 26 06 fa b8 c3 84 2a 64 54 a3 16 2c 73 20 | ee ba c5 9a 99 c4 d4 0b ed 7c 21 18 9c 28 f5 dc | 98 51 6d ae 77 5c e5 55 70 9b 05 e5 b9 41 85 4b | 8b 6b 03 61 e7 43 50 1f 72 46 2f e8 79 89 74 90 | bf f5 db f1 48 e3 db 5a 94 09 ee c6 06 a8 aa 8d | e3 21 eb e7 81 41 2b 08 b0 d4 79 2d e9 18 a2 35 | fe af c0 a3 5b bc b3 27 27 d3 7b e4 02 04 22 5e | 31 74 3b d9 47 78 71 0c ae 8f 20 e7 6c 3c 1b 9b | 23 e3 11 06 1c 83 b5 7c 6e 97 98 39 de bf a8 df | fb 90 74 95 9b b8 7a 1e a3 79 e0 8b 7b 65 60 71 | 76 68 dd be ff ec 26 90 7b 52 13 ad 45 ac 2c 19 | a3 0e d7 f3 5c 2b 36 62 8d f6 b1 eb 80 1e 48 10 | c7 9e 3c 22 c9 83 cf 8c 30 f2 c9 | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #1) | 00 00 00 00 6f dc 9b f3 fd b3 b0 92 61 0e b0 28 | e2 6e 0b a2 35 20 23 08 00 00 00 01 00 00 02 17 | 00 00 01 fb 00 04 00 05 44 48 ee c5 dd 90 cb fd | ce dd 0e 1a 75 2d 55 80 9b e8 0a 8d 52 3a e9 33 | b3 7a 7d 3f a1 15 ab 4f 95 ec de 1e 66 cc 82 32 | ce d6 c7 31 37 c2 9d 0c 92 d5 c4 a0 53 2c 80 48 | 68 00 3e b1 eb a3 76 20 d1 6b ef 12 50 83 85 a9 | e7 bb bf 76 c3 b1 6b ed 79 5b df 26 49 83 cb a7 | 4a c2 48 cb 0f 2d 4a 40 8c 4f ef 58 67 38 5c 71 | e4 16 a1 8c 09 15 7a 1e e8 df 3e 20 0c 27 56 e1 | c9 17 8f 3e 23 c8 53 0c ab 9d d0 12 68 86 81 2a | 01 67 d6 a7 47 2f 0d dd e3 00 dc 67 af 33 fb 04 | d6 0b 95 b7 67 91 4c a5 28 10 42 e8 06 ed 32 3d | bd c8 4e be d9 d8 be fd 1c f7 66 64 51 0b 87 e0 | de da ed 12 7f bc 52 e7 e6 be 3d 57 03 b0 b3 b4 | 77 13 0e a7 77 c1 da ea bd 4d 58 c3 62 a1 ad 50 | 7d 2c 7f 25 6b fb 0f bc c4 56 27 58 58 75 bb a1 | 6f 11 42 66 e0 1a 50 e0 c5 f5 17 19 cb d9 71 56 | 76 7f 88 c4 a7 36 49 a4 ef da cb 3b 42 c4 86 2c | bb 82 ac 07 08 49 27 2e c7 9e ce 32 ea 43 79 10 | 69 f9 a6 94 2b 65 b9 9d 7a 8e 38 db 75 a8 dd 96 | e9 c0 57 08 79 a8 3a db df a7 c8 27 d3 2b 86 ee | 53 7e 86 f2 f3 69 14 6c 29 6a df a5 44 e9 73 56 | a4 00 56 71 f3 c4 a9 78 07 83 e6 d3 c6 66 9e 3e | 5d 06 84 eb a3 bd 6f 80 e6 f3 9d ea 9b 35 76 42 | de d3 dc 57 da cf a1 a5 71 79 de 06 46 12 8e 02 | 68 ef 18 d1 0b 8c f5 84 12 08 e2 e5 b7 ac d6 5c | 26 fd 2f a0 57 2f 79 0f 01 93 26 ed f3 2b f8 b0 | c0 4a 1e 16 62 68 68 41 2c 4a 45 d4 41 ad 86 3a | 0b 8a 11 69 ce ba 9e 67 f3 47 93 f0 07 4c b1 29 | 63 75 e0 5d a8 1f 03 54 c3 94 52 9d 68 e9 77 dd | 7c 61 15 f0 c7 67 97 20 8d 66 d5 2e dd 93 3c fa | 56 c3 40 e8 e0 d3 c4 e5 e6 08 c3 df 78 bf 9d 7a | e9 f6 64 bc 49 ff 12 47 25 c1 0a | sending 221 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #1) | 00 00 00 00 6f dc 9b f3 fd b3 b0 92 61 0e b0 28 | e2 6e 0b a2 35 20 23 08 00 00 00 01 00 00 00 d9 | 00 00 00 bd 00 05 00 05 c7 bd f8 68 eb 59 3f 73 | 6d ec 48 a6 13 dc f6 2a 4b 91 2c 53 20 85 9d 26 | 83 13 1c e4 88 1c df 4b fa 8f 98 4a 7e 0f 48 e9 | 61 a6 12 68 b9 79 b1 6b ca 99 33 69 d8 d4 e5 4d | 32 83 60 70 53 3a db 6d b3 66 36 9a 60 69 2c a0 | 53 26 68 62 0f a3 e8 9a 84 33 83 d6 0a c6 05 4e | 6b c3 4d 42 b2 bf b2 e0 66 84 23 db 3a c8 3e e9 | ec 59 38 4f 16 c3 6f c5 f0 f6 20 34 4c 63 cd f4 | d1 9f 36 60 15 88 8f 58 68 fa 88 68 83 cb 14 6e | 91 46 f4 77 67 d2 07 1a 0b 97 d5 9f 2d 13 3a 29 | a4 fc 83 e5 c1 22 e8 d2 f7 2d 03 1b 3e 67 0a 81 | 26 d0 b0 77 d7 a0 4c dc 38 9b 98 2c 39 | sent 5 fragments | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x7f7bc4002b78 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x56091f34be88 size 128 | #2 STATE_PARENT_I2: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29396.570231 | resume sending helper answer for #1 suppresed complete_v2_state_transition() | #1 spent 1.37 milliseconds | #1 spent 11 milliseconds in resume sending helper answer | stop processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f7bbc000f48 | spent 0.00306 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 6f dc 9b f3 fd b3 b0 92 61 0e b0 28 e2 6e 0b a2 | 35 20 23 20 00 00 00 01 00 00 02 17 24 00 01 fb | 00 01 00 05 ba 76 06 87 71 9c 8f ee fa bb 68 cb | 0e 2a 28 af bc 19 38 1e e1 55 dc e9 63 0b 3a c0 | 05 c4 d3 86 67 1f cb 89 de 48 e1 01 d2 e9 68 bc | c7 69 47 20 78 42 c7 dc b7 f1 16 b5 ff 77 e4 59 | 9c 8f e6 27 95 a5 c2 dd da be 16 5f 59 8d 0e de | 68 39 77 03 54 c0 f9 20 a3 26 75 a1 c7 fe a2 20 | 3c 6c ed 43 6c 1f 08 1b 73 3a 4c 8f 71 8a 07 9a | 18 fe 0e b4 b4 a3 ce 78 bc c8 84 d5 4a d6 45 8f | a8 a0 71 23 fb 58 b6 08 9d 7d fc ef 23 f5 e2 44 | a9 47 6c 6c 8f 7a 54 11 db 94 87 29 72 8b 1a b1 | 5c 31 78 82 07 a6 e8 85 50 02 75 97 15 4b e6 bd | 02 a5 40 53 da 34 da 10 9e 5f 63 3d d3 cf d1 82 | 87 87 8e 48 57 bd c6 21 fe d2 7f 3c 29 6e 78 71 | 4a 5b b2 7a 8b b4 e2 3c 2d 10 c2 95 f4 1f 00 86 | 03 cf 5d ae de dc 4f dc f7 a9 a6 70 98 4b 7d ad | 83 b1 46 af fb f8 72 1a 87 7f 6a 02 7e 92 5b 06 | 6a 31 03 62 9e f5 e2 c0 c6 3e f4 91 f5 a9 c7 08 | e6 8e dd 00 73 3d e4 c6 47 64 31 a8 51 3b 7f f3 | bb aa c9 cd 38 f5 c5 72 0f f3 6f 8b 79 74 fc 76 | 69 7e be db 02 b9 fe 5d 2a 88 c8 b3 42 10 08 22 | 7c 63 a5 90 02 9f a3 28 20 70 69 c7 08 f9 72 b1 | 41 66 f7 2e dc 3f 7c 5e 5d f6 a3 79 1e 4c bc f2 | 41 f9 92 34 22 c3 51 3d 80 44 46 f6 b7 4c 0b f9 | ee b7 cb 52 bb ac 4e 95 a7 13 3a 71 8c 79 dc c2 | e6 ed fb c3 76 42 14 db d9 5c 37 e2 95 20 60 02 | 78 c9 00 59 34 9c 10 c6 cb 86 29 b7 2c 59 83 0a | 20 52 9a 5d ca f7 e5 54 1f 04 b9 1b 9d ab 20 96 | 93 00 f9 91 9c ee 18 44 02 e9 1a ef 13 c1 23 9d | 4f 87 ed e7 66 bc 32 35 95 b6 99 a2 57 39 66 c2 | 16 40 b4 66 5d 61 29 4d ab 11 ec 40 57 47 4c 28 | 19 28 16 35 e6 73 19 04 35 85 cc e8 7f 09 a9 94 | a4 dc 33 34 8b 18 c9 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) | start processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #2 is idle | #2 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2IDr (0x24) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 1 (0x1) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #2 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '1', total number '5', next payload '36' | updated IKE fragment state to respond using fragments without waiting for re-transmits | stop processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 0.161 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.174 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00177 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 6f dc 9b f3 fd b3 b0 92 61 0e b0 28 e2 6e 0b a2 | 35 20 23 20 00 00 00 01 00 00 02 17 00 00 01 fb | 00 02 00 05 0b 03 17 57 d2 20 b0 ac 15 3a e5 f0 | ed 7f e8 2f 35 f5 ce a6 76 d6 65 d4 f8 a0 df 25 | 83 dc 1b 16 9a 3a 12 ef 39 75 95 4f da d3 d5 88 | d2 4e ec 19 0f 58 21 40 74 f4 d8 f2 13 16 a4 f4 | b4 24 95 11 96 6f c7 ca da f9 af e8 be 49 41 38 | b5 9d 5f 72 a6 1a 72 1f 05 cd 3b 51 19 3f ae be | e1 be c8 88 ba 0f 2f b1 f6 42 ee 48 7d 87 93 0a | 5b 10 b5 28 8c 23 63 65 92 bf a6 00 08 44 8a 99 | 11 aa e3 0f 59 07 64 61 6d 92 55 4e 0d 28 13 1e | 12 91 55 e5 77 a8 f2 02 7a 66 f1 03 65 77 55 47 | b2 86 a1 20 56 b2 37 4b 0c 56 31 20 76 4f ff 3c | 64 75 ba a3 2d 19 e0 c4 35 79 49 4b 59 81 48 3f | b3 6b dc d8 28 8b e6 a6 7a a1 43 d5 3f f7 1d 35 | 85 e2 c7 f6 50 aa 5e f3 48 c5 19 fd 91 d3 e3 c0 | 48 25 a0 ec 33 06 d8 c4 df 77 d5 76 97 b4 5c c9 | b1 6e 12 bd ee b6 4e 54 0a 68 72 f0 f3 15 70 37 | 9a 79 8e cd 6b 26 c5 3d c6 e4 f0 c1 06 7a 62 cb | a0 81 de c1 d4 f4 1c 6d 30 f0 06 71 cd 8c 67 ac | 52 d4 0b 00 1b ef 15 99 b3 80 04 27 46 c3 8c 6c | 82 4c 2b e1 f2 15 3a e2 0c 9b 60 f4 f3 87 12 e0 | 76 bd 6f 4a 52 2c 7d d1 f4 20 51 ab c8 e0 53 a9 | 9a 7c fc 42 d3 68 9b 72 c2 d8 e1 ec a3 dd 81 19 | be 6d ce ce d8 2d 74 7c 7d dc 9a 14 69 81 20 bc | 9a 56 af 28 ee ef c2 a7 c8 81 e6 7f 95 ec eb f6 | 97 b5 de b0 87 14 b2 5a b7 d4 da 7e bd 69 49 b2 | 5d e7 5f 05 cf be 50 e7 ac 87 0b d5 8a bd 2b c8 | df a5 30 92 96 91 4a 9a df fa d1 a4 85 1a d1 cb | f7 00 0e 52 72 51 67 d6 d0 8d 1e 05 9b 91 ef e3 | 7a 8f 73 1b 3f ac 01 6d 53 52 17 ae c9 0f 68 d3 | 56 9c 67 43 87 ca 10 70 f5 87 ff ee f0 ec ce 50 | 3f 71 28 61 e0 36 6a c0 7d 6b 7f 13 f6 42 d4 ef | 3d cb ec ae c0 2b 96 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) | start processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #2 is idle | #2 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 2 (0x2) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #2 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '2', total number '5', next payload '0' | stop processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 0.151 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.163 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00144 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 6f dc 9b f3 fd b3 b0 92 61 0e b0 28 e2 6e 0b a2 | 35 20 23 20 00 00 00 01 00 00 02 17 00 00 01 fb | 00 03 00 05 b8 e9 f3 21 87 c8 12 a9 87 f4 2a 98 | cf 0d c2 2a df 1c 61 86 c8 d3 1d 96 3a 78 0b 72 | bd 6f 22 16 4c 60 b1 67 c6 8a a4 64 17 5b 54 e5 | ad b7 43 9e 8e 26 fe ea 5a 17 26 94 ac 9e c2 ea | 16 34 f2 9e be 2c 61 2d 0c b6 01 6a 4a cb a0 39 | c8 71 73 a6 36 f5 d5 ec 62 dd e6 7d e0 79 d4 41 | 82 5e 69 3b 83 49 7e ff af e2 af a3 ea a6 f4 29 | a8 03 4e f3 f9 35 2a a4 1d e7 6d ed 4d 1a e2 e8 | 5a 98 76 09 db c3 31 29 18 8c 0e 8b 17 a2 f8 35 | 26 f2 68 5f 66 02 2a d9 e9 e2 57 28 ce aa 47 ba | 6c 12 35 ad 1d 2c e6 ec e4 24 64 6e 2a 59 a5 6c | 66 40 6a 31 ab 7d 59 d8 d2 cc a3 7a 0d 38 88 13 | 99 7c ff 23 14 c4 a4 e3 44 2a 74 3c 11 c6 13 67 | bd 74 92 1e dd 9b 73 c7 de 1e 16 11 a9 fd 39 75 | c1 13 97 99 6d 21 a8 e2 5f 2b b5 cc 0f e7 4f 8d | e8 99 e1 97 ef fa cc 45 f0 e2 f5 71 8f 23 fe 75 | b5 15 fc a1 6b 46 ba bb ba 98 21 64 c5 73 f6 45 | be 18 61 4e c5 05 97 02 ae 1d ad 42 8f bb 32 a8 | 1d 5e e0 f8 b8 c6 3f 4f fe ea a2 10 6f 1f 80 53 | 07 a1 3b 05 84 c2 72 ae e0 39 2e 96 a7 74 46 49 | fc 5e 7e 0f b7 49 a4 be bd 3d 89 06 2f 2d fe 90 | 9b 7a bf 76 60 1d da 3f 17 3b 9c 28 ee b5 f7 98 | 8b 0c a5 e7 a9 9e 19 6e aa 73 04 54 7a 64 eb 14 | f3 16 0d 87 8a 9d ff 6a ca da 60 dc 97 af cb d9 | 8d 2a 31 24 13 8c d4 67 37 ea 9b a6 0c 5c b1 78 | 43 2e bb 5e 60 89 c7 c7 79 5c 5d 76 30 7c 15 92 | f7 2d 0b 0b 63 13 36 9b 09 31 57 ee 5f f1 81 c2 | b4 6e 13 b4 0a e1 fa d8 65 27 03 08 b9 3e 66 a0 | 2d 31 51 6b ee 9d ca b9 76 f6 79 bf e0 4f 4d 2b | 5e b3 9b ee 0c 17 18 f0 b6 6d 3c 75 dc 15 93 69 | 7a b4 b4 23 77 bf 84 63 e3 7f 25 7e a8 07 93 14 | 72 33 90 f0 a5 06 c7 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) | start processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #2 is idle | #2 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 3 (0x3) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #2 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '3', total number '5', next payload '0' | stop processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 0.156 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.168 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00155 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 6f dc 9b f3 fd b3 b0 92 61 0e b0 28 e2 6e 0b a2 | 35 20 23 20 00 00 00 01 00 00 02 17 00 00 01 fb | 00 04 00 05 c2 d9 84 e6 20 b9 40 4d aa cc 7b 08 | bc 77 94 62 80 fe c1 65 d2 16 b5 15 0e b7 d8 63 | 0b d4 80 b3 97 5e ca a8 34 6c 58 c9 f7 8e 18 3f | cd c7 38 e5 5a 40 1e 5f 72 4f 06 75 9b 7b 50 46 | 73 53 24 2a 30 69 fe c9 2d 0e 9b 5e 37 70 f8 da | 81 b3 a4 fb 9c ab fe 47 45 39 62 d4 4e ad 62 2c | 7c 4c 4e bd 4e 11 79 cd 71 f2 f3 61 86 1b af a0 | 46 76 58 bd 6b ca a5 91 97 01 f4 de ad 2f 9d c7 | 5c b7 67 45 13 3d 72 e4 b5 19 d7 da 53 ce 05 f1 | 31 e4 4d e3 37 35 7e 82 b7 c1 f1 d7 d8 17 f9 35 | 99 f1 ce 4f 6d 95 98 ae 1a 22 83 b7 0e bf 03 8e | 73 ba 6b 0a 23 ce bb df 29 16 00 d3 aa 8c 1a ea | 6d de 5d 20 d7 7e cc a6 1a de 51 c0 8d a5 f8 8a | a9 4f df 1d da a5 4c 13 d8 df de d6 0a c3 68 50 | a2 3d fa ad 27 53 93 13 06 cb 07 53 2b 8c dd b8 | 42 da 97 4f b6 22 bc f2 76 01 21 31 df 9e 9f 52 | de 3f 89 a7 3e a0 80 d6 77 e7 20 f4 b7 7b e3 ea | 13 f3 45 00 72 35 66 1c c8 ea 4c ac dc 47 b7 41 | ef a1 b0 9e c7 c7 7c 36 bb bd 02 10 0c 16 64 32 | d1 3b 65 28 84 80 4d 18 7c 73 41 60 75 9c 9b 96 | a7 2e f7 c1 e9 9b 09 59 5e a6 42 9c ac 44 2c 22 | 6a 67 13 4b 08 85 2d 16 7b e1 ae 47 84 4e c5 b4 | d3 21 40 6c a5 31 3d d5 6a 9b bb 56 3d 6e 48 12 | 28 e6 92 af e6 8f 92 af 2c 5e aa 62 51 ac 66 b4 | 53 cb 96 32 1a 37 8b e9 d1 61 a2 5f dd 86 f5 25 | 16 ad 34 37 e8 a0 b4 d5 b2 6d 33 4b 1f 4a 24 59 | a2 9e 88 a3 9f 61 10 c4 1a 19 13 9d 8e 3e ac a3 | 58 16 c3 5f 02 7a db 9a 53 20 c2 df 3c 70 2c 57 | 11 31 b1 62 86 9c 5a ce 8d 84 25 d8 e6 28 22 44 | 78 bc e2 db 93 f3 30 f4 66 7b 9c 57 8e 55 ad 9f | c6 cc b3 d7 a9 a6 8e 8d 62 bc 55 92 72 85 cd cf | 4f f1 b2 ac f5 65 7f | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) | start processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #2 is idle | #2 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 4 (0x4) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #2 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '4', total number '5', next payload '0' | stop processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 0.161 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.172 milliseconds in comm_handle_cb() reading and processing packet | spent 0.0016 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 129 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 6f dc 9b f3 fd b3 b0 92 61 0e b0 28 e2 6e 0b a2 | 35 20 23 20 00 00 00 01 00 00 00 81 00 00 00 65 | 00 05 00 05 3c 07 51 99 4a 6e c2 4d c0 86 34 db | d0 7e a9 6d 68 20 cf 50 0a b1 3b 45 50 06 21 67 | 24 36 aa 24 8a c5 46 59 07 fc 88 ad 01 31 c6 60 | a4 35 10 21 fe df c2 65 48 6f 0a b9 cc 8c 2f 37 | 8e 7f 8d 1c 77 da ef 3b 57 f9 9c 88 d2 a8 4c 77 | b4 8c b9 dd 05 d2 9f 63 98 2e df dc 22 57 bc d3 | f4 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 129 (0x81) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) | start processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #2 is idle | #2 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 101 (0x65) | fragment number: 5 (0x5) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=93) | #2 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '5', total number '5', next payload '0' | #2 ikev2 ISAKMP_v2_IKE_AUTH decrypt success | Now let's proceed with payload (ISAKMP_NEXT_v2IDr) | **parse IKEv2 Identification - Responder - Payload: | next payload type: ISAKMP_NEXT_v2CERT (0x25) | flags: none (0x0) | length: 191 (0xbf) | ID type: ID_DER_ASN1_DN (0x9) | processing payload: ISAKMP_NEXT_v2IDr (len=183) | Now let's proceed with payload (ISAKMP_NEXT_v2CERT) | **parse IKEv2 Certificate Payload: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) | flags: none (0x0) | length: 1265 (0x4f1) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | processing payload: ISAKMP_NEXT_v2CERT (len=1260) | Now let's proceed with payload (ISAKMP_NEXT_v2AUTH) | **parse IKEv2 Authentication Payload: | next payload type: ISAKMP_NEXT_v2CP (0x2f) | flags: none (0x0) | length: 392 (0x188) | auth method: IKEv2_AUTH_RSA (0x1) | processing payload: ISAKMP_NEXT_v2AUTH (len=384) | Now let's proceed with payload (ISAKMP_NEXT_v2CP) | **parse IKEv2 Configuration Payload: | next payload type: ISAKMP_NEXT_v2SA (0x21) | flags: none (0x0) | length: 32 (0x20) | ikev2_cfg_type: IKEv2_CP_CFG_REPLY (0x2) | processing payload: ISAKMP_NEXT_v2CP (len=24) | Now let's proceed with payload (ISAKMP_NEXT_v2SA) | **parse IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) | flags: none (0x0) | length: 36 (0x24) | processing payload: ISAKMP_NEXT_v2SA (len=32) | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) | **parse IKEv2 Traffic Selector - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) | flags: none (0x0) | length: 24 (0x18) | number of TS: 1 (0x1) | processing payload: ISAKMP_NEXT_v2TSi (len=16) | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) | **parse IKEv2 Traffic Selector - Responder - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 24 (0x18) | number of TS: 1 (0x1) | processing payload: ISAKMP_NEXT_v2TSr (len=16) | selected state microcode Initiator: process IKE_AUTH response | Now let's proceed with state specific processing | calling processor Initiator: process IKE_AUTH response | global one-shot timer EVENT_FREE_ROOT_CERTS scheduled in 300 seconds loading root certificate cache | spent 5.06 milliseconds in get_root_certs() calling PK11_ListCertsInSlot() | spent 0.0303 milliseconds in get_root_certs() filtering CAs | #1 spent 5.12 milliseconds in find_and_verify_certs() calling get_root_certs() | checking for known CERT payloads | saving certificate of type 'X509_SIGNATURE' | decoded cert: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | #1 spent 0.657 milliseconds in find_and_verify_certs() calling decode_cert_payloads() | cert_issuer_has_current_crl: looking for a CRL issued by E=testing@libreswan.org,CN=Libreswan test CA for mainca,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | #1 spent 0.0402 milliseconds in find_and_verify_certs() calling crl_update_check() | missing or expired CRL | crl_strict: 0, ocsp: 0, ocsp_strict: 0, ocsp_post: 0 | verify_end_cert trying profile IPsec | certificate is valid (profile IPsec) | #1 spent 0.137 milliseconds in find_and_verify_certs() calling verify_end_cert() "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: certificate verified OK: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f35a698 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f359cd8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f359b28 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f368108 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f367f58 | unreference key: 0x56091f36c1a8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | #1 spent 0.422 milliseconds in decode_certs() calling add_pubkey_from_nss_cert() | #1 spent 6.43 milliseconds in decode_certs() | DER ASN1 DN: 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 | DER ASN1 DN: 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | DER ASN1 DN: 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | DER ASN1 DN: 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | DER ASN1 DN: 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | DER ASN1 DN: 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | DER ASN1 DN: 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 61 73 | DER ASN1 DN: 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | DER ASN1 DN: 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 | DER ASN1 DN: 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 61 73 | DER ASN1 DN: 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | DER ASN1 DN: 77 61 6e 2e 6f 72 67 | ID_DER_ASN1_DN '%fromcert' does not need further ID verification | stomping on peer_id | X509: CERT and ID matches current connection | offered CA: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: IKEv2 mode peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' | verifying AUTH payload | required RSA CA is '%any' | checking RSA keyid 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' for match with 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | key issuer CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | an RSA Sig check passed with *AwEAAbEef [remote certificates] | #1 spent 0.175 milliseconds in try_all_RSA_keys() trying a pubkey "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: Authenticated using RSA | #1 spent 0.228 milliseconds in ikev2_verify_rsa_hash() | parent state #1: PARENT_I2(open IKE SA) => PARENT_I3(established IKE SA) | #1 will start re-keying in 2607 seconds with margin of 993 seconds (attempting re-key) | state #1 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x7f7bc4002888 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56091f3494a8 | event_schedule: new EVENT_SA_REKEY-pe@0x56091f3494a8 | inserting event EVENT_SA_REKEY, timeout in 2607 seconds for #1 | libevent_malloc: new ptr-libevent@0x56091f356c58 size 128 | pstats #1 ikev2.ike established | FOR_EACH_STATE_... in nat_traversal_ka_event (for_each_state) | [RE]START processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | stop processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | resume processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | suspend processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | start processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | NAT-T: keepalive packet not required as recent DPD event used the IKE SA on conn westnet-eastnet-ipv4-psk-ikev2 | stop processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | resume processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds | libevent_realloc: release ptr-libevent@0x56091f2db2e8 | libevent_realloc: new ptr-libevent@0x56091f3444f8 size 128 | #2 westnet-eastnet-ipv4-psk-ikev2[1] parsing ISAKMP_NEXT_v2CP payload | ***parse IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_ADDRESS (0x1) | length/value: 4 (0x4) | parsing 4 raw bytes of IKEv2 Configuration Payload Attribute into INTERNAL_IP_ADDRESS | INTERNAL_IP_ADDRESS c0 00 02 01 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: received INTERNAL_IP4_ADDRESS 192.0.2.1 | setting host source IP address to 192.0.2.1 | ***parse IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_DNS (0x3) | length/value: 4 (0x4) | parsing 4 raw bytes of IKEv2 Configuration Payload Attribute into INTERNAL_IP_DNS CP payload | INTERNAL_IP_DNS CP payload | 01 02 03 04 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: received INTERNAL_IP4_DNS 1.2.3.4 | ***parse IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_DNS (0x3) | length/value: 4 (0x4) | parsing 4 raw bytes of IKEv2 Configuration Payload Attribute into INTERNAL_IP_DNS CP payload | INTERNAL_IP_DNS CP payload | 08 08 08 08 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: received INTERNAL_IP4_DNS 8.8.8.8 | TSi: parsing 1 traffic selectors | ***parse IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | length: 16 (0x10) | start port: 0 (0x0) | end port: 65535 (0xffff) | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low | TS low c0 00 02 01 | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high | TS high c0 00 02 01 | TSi: parsed 1 traffic selectors | TSr: parsing 1 traffic selectors | ***parse IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | length: 16 (0x10) | start port: 0 (0x0) | end port: 65535 (0xffff) | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low | TS low c0 01 02 17 | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high | TS high c0 01 02 17 | TSr: parsed 1 traffic selectors | evaluating our conn="westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 I=192.0.2.1/32:0/0 R=192.1.2.23/32:0/0 to their: | TSi[0] .net=192.0.2.1-192.0.2.1 .iporotoid=0 .{start,end}port=0..65535 | match address end->client=192.0.2.1/32 >= TSi[0]net=192.0.2.1-192.0.2.1: YES fitness 32 | narrow port end=0..65535 >= TSi[0]=0..65535: 0 | TSi[0] port match: YES fitness 65536 | narrow protocol end=*0 >= TSi[0]=*0: 0 | match end->protocol=*0 >= TSi[0].ipprotoid=*0: YES fitness 255 | TSr[0] .net=192.1.2.23-192.1.2.23 .iporotoid=0 .{start,end}port=0..65535 | match address end->client=192.1.2.23/32 >= TSr[0]net=192.1.2.23-192.1.2.23: YES fitness 32 | narrow port end=0..65535 >= TSr[0]=0..65535: 0 | TSr[0] port match: YES fitness 65536 | narrow protocol end=*0 >= TSr[0]=*0: 0 | match end->protocol=*0 >= TSr[0].ipprotoid=*0: YES fitness 255 | best fit so far: TSi[0] TSr[0] | found an acceptable TSi/TSr Traffic Selector | printing contents struct traffic_selector | ts_type: IKEv2_TS_IPV6_ADDR_RANGE | ipprotoid: 0 | port range: 0-65535 | ip range: 192.0.2.1-192.0.2.1 | printing contents struct traffic_selector | ts_type: IKEv2_TS_IPV6_ADDR_RANGE | ipprotoid: 0 | port range: 0-65535 | ip range: 192.1.2.23-192.1.2.23 | using existing local ESP/AH proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE_AUTH initiator accepting remote ESP/AH proposal): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | Comparing remote proposals against IKE_AUTH initiator accepting remote ESP/AH proposal 4 local proposals | local proposal 1 type ENCR has 1 transforms | local proposal 1 type PRF has 0 transforms | local proposal 1 type INTEG has 1 transforms | local proposal 1 type DH has 1 transforms | local proposal 1 type ESN has 1 transforms | local proposal 1 transforms: required: ENCR+ESN; optional: INTEG+DH | local proposal 2 type ENCR has 1 transforms | local proposal 2 type PRF has 0 transforms | local proposal 2 type INTEG has 1 transforms | local proposal 2 type DH has 1 transforms | local proposal 2 type ESN has 1 transforms | local proposal 2 transforms: required: ENCR+ESN; optional: INTEG+DH | local proposal 3 type ENCR has 1 transforms | local proposal 3 type PRF has 0 transforms | local proposal 3 type INTEG has 2 transforms | local proposal 3 type DH has 1 transforms | local proposal 3 type ESN has 1 transforms | local proposal 3 transforms: required: ENCR+INTEG+ESN; optional: DH | local proposal 4 type ENCR has 1 transforms | local proposal 4 type PRF has 0 transforms | local proposal 4 type INTEG has 2 transforms | local proposal 4 type DH has 1 transforms | local proposal 4 type ESN has 1 transforms | local proposal 4 transforms: required: ENCR+INTEG+ESN; optional: DH | ***parse IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | length: 32 (0x20) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI | remote SPI 15 81 36 7a | Comparing remote proposal 1 containing 2 transforms against local proposal [1..1] of 4 local proposals | ****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 12 (0xc) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | *****parse IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 | ****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | remote proposal 1 transform 1 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 | remote proposal 1 proposed transforms: ENCR+ESN; matched: ENCR+ESN; unmatched: none | comparing remote proposal 1 containing ENCR+ESN transforms to local proposal 1; required: ENCR+ESN; optional: INTEG+DH; matched: ENCR+ESN | remote proposal 1 matches local proposal 1 | remote accepted the proposal 1:ESP:ENCR=AES_GCM_C_256;ESN=DISABLED[first-match] | IKE_AUTH initiator accepting remote ESP/AH proposal ikev2_proposal: 1:ESP:SPI=1581367a;ENCR=AES_GCM_C_256;ESN=DISABLED | converting proposal to internal trans attrs | integ=none: .key_size=0 encrypt=aes_gcm_16: .key_size=32 .salt_size=4 keymat_len=36 | install_ipsec_sa() for #2: inbound and outbound | could_route called for westnet-eastnet-ipv4-psk-ikev2 (kind=CK_INSTANCE) | FOR_EACH_CONNECTION_... in route_owner | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | route owner of "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 unrouted: NULL; eroute owner: NULL | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 | AES_GCM_16 requires 4 salt bytes | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnet-eastnet-ipv4-psk-ikev2' not available on interface eth0 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.1581367a@192.1.2.23 included non-error error | set up outgoing SA, ref=0/0 | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 | AES_GCM_16 requires 4 salt bytes | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnet-eastnet-ipv4-psk-ikev2' not available on interface eth0 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.367c52cb@192.1.3.209 included non-error error | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | add inbound eroute 192.1.2.23/32:0 --0-> 192.0.2.1/32:0 => tun.10000@192.1.3.209 (raw_eroute) | IPsec Sa SPD priority set to 1040351 | raw_eroute result=success | set up incoming SA, ref=0/0 | sr for #2: unrouted | route_and_eroute() for proto 0, and source port 0 dest port 0 | FOR_EACH_CONNECTION_... in route_owner | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | route owner of "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 unrouted: NULL; eroute owner: NULL | route_and_eroute with c: westnet-eastnet-ipv4-psk-ikev2 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2 | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | eroute_connection add eroute 192.0.2.1/32:0 --0-> 192.1.2.23/32:0 => tun.0@192.1.2.23 (raw_eroute) | IPsec Sa SPD priority set to 1040351 | raw_eroute result=success | running updown command "ipsec _updown" for verb up | command executing up-client | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CO | popen cmd is 1368 chars long | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv: | cmd( 80):4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1: | cmd( 160):.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Departmen: | cmd( 240):t, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CL: | cmd( 320):IENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.25: | cmd( 400):5.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_: | cmd( 480):SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto: | cmd( 560):, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@te: | cmd( 640):sting.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='19: | cmd( 720):2.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEE: | cmd( 800):R_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CON: | cmd( 880):N_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_T: | cmd( 960):RACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY=: | cmd(1040):'ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0' PLUT: | cmd(1120):O_PEER_DNS_INFO='1.2.3.4 8.8.8.8' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='': | cmd(1200): PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' : | cmd(1280):VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x1581367a SPI_OUT=0x367c52cb ipsec _upd: | cmd(1360):own 2>&1: "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: up-client output: updating resolvconf "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: up-client output: rm: cannot remove '/etc/resolv.conf': Device or resource busy | route_and_eroute: firewall_notified: true | running updown command "ipsec _updown" for verb prepare | command executing prepare-client | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | popen cmd is 1373 chars long | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastne: | cmd( 80):t-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME=': | cmd( 160):192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depa: | cmd( 240):rtment, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_: | cmd( 320):MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='2: | cmd( 400):55.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' P: | cmd( 480):LUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=To: | cmd( 560):ronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-ea: | cmd( 640):st@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NE: | cmd( 720):T='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUT: | cmd( 800):O_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUT: | cmd( 880):O_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SA: | cmd( 960):REF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFA: | cmd(1040):MILY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0': | cmd(1120): PLUTO_PEER_DNS_INFO='1.2.3.4 8.8.8.8' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANN: | cmd(1200):ER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFAC: | cmd(1280):E='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x1581367a SPI_OUT=0x367c52cb ipsec: | cmd(1360): _updown 2>&1: | running updown command "ipsec _updown" for verb route | command executing route-client | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PL | popen cmd is 1371 chars long | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-: | cmd( 80):ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='19: | cmd( 160):2.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depart: | cmd( 240):ment, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY: | cmd( 320):_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255: | cmd( 400):.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLU: | cmd( 480):TO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toro: | cmd( 560):nto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east: | cmd( 640):@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET=: | cmd( 720):'192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_: | cmd( 800):PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_: | cmd( 880):CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SARE: | cmd( 960):F_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMI: | cmd(1040):LY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0' P: | cmd(1120):LUTO_PEER_DNS_INFO='1.2.3.4 8.8.8.8' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER: | cmd(1200):='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE=: | cmd(1280):'' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x1581367a SPI_OUT=0x367c52cb ipsec _: | cmd(1360):updown 2>&1: "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: route-client output: Error: Peer netns reference is invalid. | route_and_eroute: instance "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23, setting eroute_owner {spd=0x56091f3485c8,sr=0x56091f3485c8} to #2 (was #0) (newest_ipsec_sa=#0) | #1 spent 2.55 milliseconds in install_ipsec_sa() | inR2: instance westnet-eastnet-ipv4-psk-ikev2[1], setting IKEv2 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1 | state #2 requesting EVENT_RETRANSMIT to be deleted | #2 STATE_PARENT_I2: retransmits: cleared | libevent_free: release ptr-libevent@0x56091f34be88 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f7bc4002b78 | #2 spent 10.1 milliseconds in processing: Initiator: process IKE_AUTH response in ikev2_process_state_packet() | [RE]START processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #2 complete_v2_state_transition() PARENT_I2->V2_IPSEC_I with status STF_OK | IKEv2: transition from state STATE_PARENT_I2 to state STATE_V2_IPSEC_I | child state #2: PARENT_I2(open IKE SA) => V2_IPSEC_I(established CHILD SA) | Message ID: updating counters for #2 to 1 after switching state | Message ID: recv #1.#2 response 1; ike: initiator.sent=1 initiator.recv=0->1 responder.sent=-1 responder.recv=-1; child: wip.initiator=1->-1 wip.responder=-1 | Message ID: #1.#2 skipping update_send as nothing to send; initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 | pstats #2 ikev2.child established "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: negotiated connection [192.0.2.1-192.0.2.1:0-65535 0] -> [192.1.2.23-192.1.2.23:0-65535 0] | NAT-T: NAT Traversal detected - their IKE port is '500' | NAT-T: encaps is 'auto' "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP/NAT=>0x1581367a <0x367c52cb xfrm=AES_GCM_16_256-NONE NATOA=none NATD=192.1.2.23:4500 DPD=passive} | releasing whack for #2 (sock=fd@23) | close_any(fd@23) (in release_whack() at state.c:654) | releasing whack and unpending for parent #1 | unpending state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 | delete from pending Child SA with 192.1.2.23 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 | removing pending policy for no connection {0x56091f23a898} | close_any(fd@22) (in release_whack() at state.c:654) | #2 will start re-keying in 28048 seconds with margin of 752 seconds (attempting re-key) | event_schedule: new EVENT_SA_REKEY-pe@0x7f7bc4002b78 | inserting event EVENT_SA_REKEY, timeout in 28048 seconds for #2 | libevent_malloc: new ptr-libevent@0x56091f366c28 size 128 | stop processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #1 spent 10.8 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 10.9 milliseconds in comm_handle_cb() reading and processing packet | kernel_process_msg_cb process netlink message | netlink_get: XFRM_MSG_DELPOLICY message | xfrm netlink address change RTM_NEWADDR msg len 76 | XFRM RTM_NEWADDR 192.0.2.1 IFA_LOCAL | FOR_EACH_STATE_... in record_newaddr (for_each_state) | start processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | stop processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | start processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | stop processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | IKEv2 received address RTM_NEWADDR type 3 | IKEv2 received address RTM_NEWADDR type 8 | IKEv2 received address RTM_NEWADDR type 6 | netlink_get: XFRM_MSG_EXPIRE message | netlink_get: XFRM_MSG_EXPIRE message | spent 0.411 milliseconds in kernel message | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00535 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00285 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00285 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_STATE_... in show_traffic_status (sort_states) | FOR_EACH_STATE_... in sort_states | get_sa_info esp.367c52cb@192.1.3.209 | get_sa_info esp.1581367a@192.1.2.23 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.083 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | old debugging base+cpu-usage + none | base debugging = base+cpu-usage | old impairing suppress-retransmits + send-no-delete | base impairing = suppress-retransmits+send-no-delete | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.065 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (in terminate_a_connection() at terminate.c:69) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: terminating SAs using this connection | connection 'westnet-eastnet-ipv4-psk-ikev2' -POLICY_UP | FOR_EACH_STATE_... in shared_phase1_connection | connection not shared - terminating IKE and IPsec SA | Deleting states for connection - not including other IPsec SA's | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #2 | suspend processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) | start processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) | pstats #2 ikev2.child deleted completed | #2 spent 10.1 milliseconds in total | [RE]START processing: state #2 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:879) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: deleting state (STATE_V2_IPSEC_I) aged 1.627s and NOT sending notification | child state #2: V2_IPSEC_I(established CHILD SA) => delete | get_sa_info esp.1581367a@192.1.2.23 | get_sa_info esp.367c52cb@192.1.3.209 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: ESP traffic information: in=168B out=168B | IMPAIR: impair-send-no-delete set - not sending Delete/Notify | state #2 requesting EVENT_SA_REKEY to be deleted | libevent_free: release ptr-libevent@0x56091f366c28 | free_event_entry: release EVENT_SA_REKEY-pe@0x7f7bc4002b78 | running updown command "ipsec _updown" for verb down | command executing down-client | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844110' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | popen cmd is 1378 chars long | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-i: | cmd( 80):pv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192: | cmd( 160):.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Departm: | cmd( 240):ent, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_: | cmd( 320):CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.: | cmd( 400):255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUT: | cmd( 480):O_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toron: | cmd( 560):to, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@: | cmd( 640):testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET=': | cmd( 720):192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_P: | cmd( 800):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844110: | cmd( 880):' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING: | cmd( 960):+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_A: | cmd(1040):DDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISC: | cmd(1120):O='0' PLUTO_PEER_DNS_INFO='1.2.3.4 8.8.8.8' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER: | cmd(1200):_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI: | cmd(1280):_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x1581367a SPI_OUT=0x367c52cb : | cmd(1360):ipsec _updown 2>&1: "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #2: down-client output: restoring resolvconf | shunt_eroute() called for connection 'westnet-eastnet-ipv4-psk-ikev2' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | IPsec Sa SPD priority set to 1040351 | delete esp.1581367a@192.1.2.23 | netlink response for Del SA esp.1581367a@192.1.2.23 included non-error error | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | delete inbound eroute 192.1.2.23/32:0 --0-> 192.0.2.1/32:0 => unk255.10000@192.1.3.209 (raw_eroute) | raw_eroute result=success | delete esp.367c52cb@192.1.3.209 | netlink response for Del SA esp.367c52cb@192.1.3.209 included non-error error | stop processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (BACKGROUND) (in update_state_connection() at connections.c:4076) | start processing: connection NULL (in update_state_connection() at connections.c:4077) | in connection_discard for connection westnet-eastnet-ipv4-psk-ikev2 | State DB: deleting IKEv2 state #2 in V2_IPSEC_I | child state #2: V2_IPSEC_I(established CHILD SA) => UNDEFINED(ignore) | stop processing: state #2 from 192.1.2.23 (in delete_state() at state.c:1143) | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) | state #1 | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #1 | start processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) | pstats #1 ikev2.ike deleted completed | #1 spent 27 milliseconds in total | [RE]START processing: state #1 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:879) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #1: deleting state (STATE_PARENT_I3) aged 1.665s and NOT sending notification | parent state #1: PARENT_I3(established IKE SA) => delete | IMPAIR: impair-send-no-delete set - not sending Delete/Notify | state #1 requesting EVENT_SA_REKEY to be deleted | libevent_free: release ptr-libevent@0x56091f356c58 | free_event_entry: release EVENT_SA_REKEY-pe@0x56091f3494a8 | State DB: IKEv2 state not found (flush_incomplete_children) | in connection_discard for connection westnet-eastnet-ipv4-psk-ikev2 | State DB: deleting IKEv2 state #1 in PARENT_I3 | parent state #1: PARENT_I3(established IKE SA) => UNDEFINED(ignore) | unreference key: 0x56091f34f528 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 2-- | stop processing: state #1 from 192.1.2.23 (in delete_state() at state.c:1143) | unreference key: 0x56091f34f528 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | unreference key: 0x56091f357df8 user-east@testing.libreswan.org cnt 1-- | unreference key: 0x56091f365da8 @east.testing.libreswan.org cnt 1-- | unreference key: 0x56091f366758 east@testing.libreswan.org cnt 1-- | unreference key: 0x56091f369458 192.1.2.23 cnt 1-- | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) | start processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (in delete_connection() at connections.c:189) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: deleting connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 instance with peer 192.1.2.23 {isakmp=#0/ipsec=#0} | Deleting states for connection - not including other IPsec SA's | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | shunt_eroute() called for connection 'westnet-eastnet-ipv4-psk-ikev2' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | FOR_EACH_CONNECTION_... in route_owner | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | route owner of "westnet-eastnet-ipv4-psk-ikev2" unrouted: NULL | running updown command "ipsec _updown" for verb unroute | command executing unroute-client | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' | popen cmd is 1344 chars long | cmd( 0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastne: | cmd( 80):t-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME=': | cmd( 160):192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depa: | cmd( 240):rtment, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_: | cmd( 320):MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='2: | cmd( 400):55.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' P: | cmd( 480):LUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=T: | cmd( 560):oronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-e: | cmd( 640):ast@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_N: | cmd( 720):ET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLU: | cmd( 800):TO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLU: | cmd( 880):TO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SARE: | cmd( 960):F_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFA: | cmd(1040):MILY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0': | cmd(1120): PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG: | cmd(1200):_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTIN: | cmd(1280):G='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1: "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. | flush revival: connection 'westnet-eastnet-ipv4-psk-ikev2' wasn't on the list | stop processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (in discard_connection() at connections.c:249) | processing: STOP connection NULL (in terminate_a_connection() at terminate.c:87) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in delete_connection() at connections.c:189) | Deleting states for connection - not including other IPsec SA's | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | free hp@0x56091f3493c8 | flush revival: connection 'westnet-eastnet-ipv4-psk-ikev2' wasn't on the list | stop processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in discard_connection() at connections.c:249) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection westnet-eastnet-ipv4-psk-ikev2 with policy ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | No AUTH policy was set - defaulting to RSASIG | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | setting ID to ID_DER_ASN1_DN: 'E=user-road@testing.libreswan.org,CN=road.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' | loading left certificate 'road' pubkey | unreference key: 0x56091f3491f8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f351718 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f3516c8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f351678 | unreference key: 0x56091f3480c8 @road.testing.libreswan.org cnt 1-- | unreference key: 0x56091f348c88 user-road@testing.libreswan.org cnt 1-- | unreference key: 0x56091f369458 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- | secrets entry for road already exists | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org is 0 | counting wild cards for %fromcert is 0 | based upon policy narrowing=yes, the connection is a template. | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x56091f35ed28 added connection description "westnet-eastnet-ipv4-psk-ikev2" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.209[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org,+MC+S=C]---192.1.3.254...192.1.2.23<192.1.2.23>[%fromcert] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 2.63 milliseconds in whack | kernel_process_msg_cb process netlink message | netlink_get: XFRM_MSG_UPDPOLICY message | netlink_get: XFRM_MSG_GETPOLICY message | xfrm netlink address change RTM_DELADDR msg len 76 | XFRM RTM_DELADDR 192.0.2.1 IFA_LOCAL | FOR_EACH_STATE_... in record_deladdr (for_each_state) | IKEv2 received address RTM_DELADDR type 3 | IKEv2 received address RTM_DELADDR type 8 | IKEv2 received address RTM_DELADDR type 6 | netlink_get: XFRM_MSG_UPDPOLICY message | spent 0.0206 milliseconds in kernel message | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00412 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00238 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | dup_any(fd@16) -> fd@21 (in whack_process() at rcv_whack.c:590) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in initiate_a_connection() at initiate.c:186) | find_host_pair: comparing 192.1.3.209:500 to 192.1.2.23:500 but ignoring ports | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@0x56091f35ed28: westnet-eastnet-ipv4-psk-ikev2 | connection 'westnet-eastnet-ipv4-psk-ikev2' +POLICY_UP | dup_any(fd@21) -> fd@22 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #3 at 0x56091f34e5f8 | State DB: adding IKEv2 state #3 in UNDEFINED | pstats #3 ikev2.ike started | Message ID: init #3: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #3: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #3; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@22) -> fd@23 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 IKE SA #3 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #3: initiating v2 parent SA | constructing local IKE proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator selecting KE) | converting ike_info AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: constructed local IKE proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | adding ikev2_outI1 KE work-order 3 for state #3 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f7bbc002fc8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x56091f366c28 size 128 | #3 spent 0.145 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 starting work-order 3 for state #3 | RESET processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 3 | RESET processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@21) (in initiate_connection() at initiate.c:372) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.217 milliseconds in whack | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 3 time elapsed 0.000707 seconds | (#3) spent 0.709 milliseconds in crypto helper computing work-order 3: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 3 for state #3 to event queue | scheduling resume sending helper answer for #3 | libevent_malloc: new ptr-libevent@0x7f7bc0002888 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #3 | start processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 3 | calling continuation function 0x56091de22b50 | ikev2_parent_outI1_continue for #3 | **emit ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | discarding INTEG=NONE | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 11 (0xb) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding INTEG=NONE | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 100 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding INTEG=NONE | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 2 (0x2) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 11 (0xb) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding INTEG=NONE | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 100 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 3 (0x3) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 13 (0xd) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 116 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 4 (0x4) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 13 (0xd) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 116 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 436 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e8 72 95 44 8a e6 59 31 95 d1 33 c0 d7 a3 37 4a | ikev2 g^x 55 96 5e fd 1a 18 2b 97 06 ca fb ac 67 0b 78 5d | ikev2 g^x 43 03 93 c4 3d a2 06 03 09 71 3b 55 b0 5f 3f 39 | ikev2 g^x fb 12 5b 92 89 96 69 0d 14 87 aa 53 c5 ab 58 2c | ikev2 g^x 47 d5 9b ea 05 5e 00 d7 92 e9 c6 a4 cd 1c a7 7e | ikev2 g^x 6e ba f0 b7 e6 0d e0 d6 a2 22 8d a2 c0 23 dd 66 | ikev2 g^x 34 60 e1 f3 f9 3c d1 e6 08 bd 03 11 63 c7 0e 65 | ikev2 g^x 53 e1 8c f5 5c 80 d0 f5 90 8c d6 e1 8b 64 82 95 | ikev2 g^x ef e2 66 8b 9b 2e 07 54 0e 12 c1 e6 31 82 02 07 | ikev2 g^x bf ce 41 5a c2 68 07 0b 86 f4 d2 bf 7f 41 98 b1 | ikev2 g^x 37 74 78 42 b7 97 66 e2 ab b1 f0 bf 76 6c a2 b7 | ikev2 g^x a5 c3 bd be 43 53 e2 7e cc 77 a2 a5 52 3b 93 4a | ikev2 g^x 17 d1 48 05 e3 6f a0 ef a2 80 dd 74 ed 7d 05 f1 | ikev2 g^x e3 c9 62 5a 16 ac 5d 0a c4 e2 3d c8 1c 97 f5 d1 | ikev2 g^x 06 cf 3f 6a d9 dd 12 63 a4 32 e4 fb 12 d6 04 d1 | ikev2 g^x 48 aa a6 1f 82 a3 b7 7b 9e 3f 5f 87 cc 79 94 a1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2a c4 ef df 02 cc ab d9 6c 77 78 e2 4b be 59 ea | IKEv2 nonce 9d 54 9b 9b 76 07 a1 e1 f1 41 02 4e 7e 26 ce dc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= d5 21 42 43 7a 44 94 22 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d1 | natd_hash: port=500 | natd_hash: hash= 52 73 ad 68 1a cd cd 53 be 5c 64 e3 9a a4 61 f1 | natd_hash: hash= 30 26 36 65 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 52 73 ad 68 1a cd cd 53 be 5c 64 e3 9a a4 61 f1 | Notify data 30 26 36 65 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= d5 21 42 43 7a 44 94 22 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 5e 61 9c c9 23 f1 0c 74 b5 28 d7 10 33 c5 d1 70 | natd_hash: hash= 79 27 c6 71 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5e 61 9c c9 23 f1 0c 74 b5 28 d7 10 33 c5 d1 70 | Notify data 79 27 c6 71 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 828 | stop processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #3 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #3: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #3 to 4294967295 after switching state | Message ID: IKE #3 skipping update_recv as MD is fake | Message ID: sent #3 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #3: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) | sending 828 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #3) | d5 21 42 43 7a 44 94 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f | 28 00 01 08 00 0e 00 00 e8 72 95 44 8a e6 59 31 | 95 d1 33 c0 d7 a3 37 4a 55 96 5e fd 1a 18 2b 97 | 06 ca fb ac 67 0b 78 5d 43 03 93 c4 3d a2 06 03 | 09 71 3b 55 b0 5f 3f 39 fb 12 5b 92 89 96 69 0d | 14 87 aa 53 c5 ab 58 2c 47 d5 9b ea 05 5e 00 d7 | 92 e9 c6 a4 cd 1c a7 7e 6e ba f0 b7 e6 0d e0 d6 | a2 22 8d a2 c0 23 dd 66 34 60 e1 f3 f9 3c d1 e6 | 08 bd 03 11 63 c7 0e 65 53 e1 8c f5 5c 80 d0 f5 | 90 8c d6 e1 8b 64 82 95 ef e2 66 8b 9b 2e 07 54 | 0e 12 c1 e6 31 82 02 07 bf ce 41 5a c2 68 07 0b | 86 f4 d2 bf 7f 41 98 b1 37 74 78 42 b7 97 66 e2 | ab b1 f0 bf 76 6c a2 b7 a5 c3 bd be 43 53 e2 7e | cc 77 a2 a5 52 3b 93 4a 17 d1 48 05 e3 6f a0 ef | a2 80 dd 74 ed 7d 05 f1 e3 c9 62 5a 16 ac 5d 0a | c4 e2 3d c8 1c 97 f5 d1 06 cf 3f 6a d9 dd 12 63 | a4 32 e4 fb 12 d6 04 d1 48 aa a6 1f 82 a3 b7 7b | 9e 3f 5f 87 cc 79 94 a1 29 00 00 24 2a c4 ef df | 02 cc ab d9 6c 77 78 e2 4b be 59 ea 9d 54 9b 9b | 76 07 a1 e1 f1 41 02 4e 7e 26 ce dc 29 00 00 08 | 00 00 40 2e 29 00 00 1c 00 00 40 04 52 73 ad 68 | 1a cd cd 53 be 5c 64 e3 9a a4 61 f1 30 26 36 65 | 00 00 00 1c 00 00 40 05 5e 61 9c c9 23 f1 0c 74 | b5 28 d7 10 33 c5 d1 70 79 27 c6 71 | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x56091f366c28 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f7bbc002fc8 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #3: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x7f7bbc002fc8 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x56091f367818 size 128 | #3 STATE_PARENT_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29398.29525 | resume sending helper answer for #3 suppresed complete_v2_state_transition() and stole MD | #3 spent 1.1 milliseconds in resume sending helper answer | stop processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f7bc0002888 | spent 0.00212 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 437 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | d5 21 42 43 7a 44 94 22 84 5a e9 e3 f2 f6 40 66 | 21 20 22 20 00 00 00 00 00 00 01 b5 22 00 00 28 | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 | 80 0e 01 00 03 00 00 08 02 00 00 07 00 00 00 08 | 04 00 00 0e 28 00 01 08 00 0e 00 00 82 bf 78 15 | 88 ce d6 32 ec 0d 07 d1 4d 8c 43 f0 93 91 da 26 | 5a 7d d8 f9 a0 0c cb 9d 99 13 d3 cf bf bb 5d ef | 6d c3 98 1b bf a4 b6 11 3a df 38 07 bc fe dd cb | 18 23 7b a1 ca e0 4f ed c3 11 10 ea 11 fe 1d 23 | 41 13 32 72 e8 e1 3a 88 a4 43 ce ca b7 ae 12 b6 | 42 07 e9 85 87 e8 c3 f5 62 c5 c5 79 5f 35 1a 9f | b8 66 e7 e7 53 8d 83 59 9e f7 37 0f 42 4c 20 51 | c3 75 49 ea b3 14 7e ff 7a 29 ff b8 e3 a7 97 e3 | 9e da fe 98 bc be 6c 05 c9 13 98 be ab 03 dc 9f | 33 e6 80 65 44 7f 79 c3 ca ea dc db a2 71 7d 36 | 0c f6 5c 9a 91 8e fb 2e 01 9d 48 9c b8 77 5f 90 | e0 37 2b 04 5b 4a b3 9d 22 4e cc 29 49 c1 01 5f | a7 25 50 06 c5 ed 6d 0b 97 53 65 4a 6f 16 6b 21 | 77 87 61 03 a0 74 ba 8a 08 64 4f 22 82 f8 56 69 | 24 2d b6 58 3b 78 8f 4b 42 e1 81 ba 42 f6 c7 2d | 48 1e aa 0a d5 a2 9c ac e2 c3 7a ac 29 00 00 24 | 97 4c ec 22 8b fe ac 23 72 f5 b3 d3 54 1e 33 6f | cc c7 26 b9 07 fc 37 e1 a9 93 9e 80 e8 63 28 32 | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 | f7 fa 27 a3 96 91 3a 8d b0 4e 88 86 29 37 90 83 | 25 59 97 90 26 00 00 1c 00 00 40 05 da da b0 a7 | a5 25 9f eb 64 cf 2d bd 82 c1 ea 13 96 03 e7 08 | 00 00 00 05 04 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_v2SA (0x21) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 0 (0x0) | length: 437 (0x1b5) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_SA_INIT response | State DB: found IKEv2 state #3 in PARENT_I1 (find_v2_ike_sa_by_initiator_spi) | start processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | [RE]START processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #3 is idle | #3 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SA) | ***parse IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2KE (0x22) | flags: none (0x0) | length: 40 (0x28) | processing payload: ISAKMP_NEXT_v2SA (len=36) | Now let's proceed with payload (ISAKMP_NEXT_v2KE) | ***parse IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2Ni (0x28) | flags: none (0x0) | length: 264 (0x108) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | processing payload: ISAKMP_NEXT_v2KE (len=256) | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) | ***parse IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 36 (0x24) | processing payload: ISAKMP_NEXT_v2Ni (len=32) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 8 (0x8) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | processing payload: ISAKMP_NEXT_v2N (len=0) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 28 (0x1c) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | processing payload: ISAKMP_NEXT_v2N (len=20) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26) | flags: none (0x0) | length: 28 (0x1c) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | processing payload: ISAKMP_NEXT_v2N (len=20) | Now let's proceed with payload (ISAKMP_NEXT_v2CERTREQ) | ***parse IKEv2 Certificate Request Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 5 (0x5) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | processing payload: ISAKMP_NEXT_v2CERTREQ (len=0) | State DB: re-hashing IKEv2 state #3 IKE SPIi and SPI[ir] | #3 in state PARENT_I1: sent v2I1, expected v2R1 | selected state microcode Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH | Now let's proceed with state specific processing | calling processor Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH | ikev2 parent inR1: calculating g^{xy} in order to send I2 | using existing local IKE proposals for connection westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator accepting remote proposal): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | Comparing remote proposals against IKE initiator (accepting) 4 local proposals | local proposal 1 type ENCR has 1 transforms | local proposal 1 type PRF has 2 transforms | local proposal 1 type INTEG has 1 transforms | local proposal 1 type DH has 8 transforms | local proposal 1 type ESN has 0 transforms | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG | local proposal 2 type ENCR has 1 transforms | local proposal 2 type PRF has 2 transforms | local proposal 2 type INTEG has 1 transforms | local proposal 2 type DH has 8 transforms | local proposal 2 type ESN has 0 transforms | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG | local proposal 3 type ENCR has 1 transforms | local proposal 3 type PRF has 2 transforms | local proposal 3 type INTEG has 2 transforms | local proposal 3 type DH has 8 transforms | local proposal 3 type ESN has 0 transforms | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none | local proposal 4 type ENCR has 1 transforms | local proposal 4 type PRF has 2 transforms | local proposal 4 type INTEG has 2 transforms | local proposal 4 type DH has 8 transforms | local proposal 4 type ESN has 0 transforms | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none | ****parse IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | length: 36 (0x24) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 3 (0x3) | Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 4 local proposals | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 12 (0xc) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | ******parse IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | remote proposal 1 transform 2 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none | comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH | remote proposal 1 matches local proposal 1 | remote accepted the proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048[first-match] | converting proposal to internal trans attrs | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= d5 21 42 43 7a 44 94 22 | natd_hash: rcookie= 84 5a e9 e3 f2 f6 40 66 | natd_hash: ip= c0 01 03 d1 | natd_hash: port=500 | natd_hash: hash= 9f 85 83 88 0a 75 71 37 c8 e8 bf 34 a1 5f 3d b7 | natd_hash: hash= c2 87 70 d5 | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= d5 21 42 43 7a 44 94 22 | natd_hash: rcookie= 84 5a e9 e3 f2 f6 40 66 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= f7 fa 27 a3 96 91 3a 8d b0 4e 88 86 29 37 90 83 | natd_hash: hash= 25 59 97 90 | NAT_TRAVERSAL encaps using auto-detect | NAT_TRAVERSAL this end is behind NAT | NAT_TRAVERSAL that end is NOT behind NAT | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 | NAT: #3 floating local endpoint from 192.1.3.209:500 to 192.1.3.209:4500 using pluto_nat_port (in ikev2_parent_inR1outI2() at ikev2_parent.c:1695) | NAT: #3 floating endpoint ended up on interface eth0 192.1.3.209:4500 | NAT-T: #3 floating remote port from 500 to 4500 using pluto_nat_port (in ikev2_parent_inR1outI2() at ikev2_parent.c:1695) | offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_512 integ=NONE cipherkey=AES_GCM_16 | adding ikev2_inR1outI2 KE work-order 4 for state #3 | state #3 requesting EVENT_RETRANSMIT to be deleted | #3 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x56091f367818 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f7bbc002fc8 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f7bc0002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f7bc0002888 size 128 | #3 spent 0.154 milliseconds in processing: Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH in ikev2_process_state_packet() | [RE]START processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #3 complete_v2_state_transition() PARENT_I1->PARENT_I2 with status STF_SUSPEND | suspending state #3 and saving MD | crypto helper 6 resuming | #3 is busy; has a suspended MD | crypto helper 6 starting work-order 4 for state #3 | [RE]START processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in log_stf_suspend() at ikev2.c:3269) | "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #3 complete v2 state STATE_PARENT_I1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 | crypto helper 6 doing compute dh (V2) (ikev2_inR1outI2 KE); request ID 4 | stop processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #3 spent 0.337 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.348 milliseconds in comm_handle_cb() reading and processing packet | calculating skeyseed using prf=sha2_512 integ=none cipherkey-size=32 salt-size=4 | crypto helper 6 finished compute dh (V2) (ikev2_inR1outI2 KE); request ID 4 time elapsed 0.000916 seconds | (#3) spent 0.915 milliseconds in crypto helper computing work-order 4: ikev2_inR1outI2 KE (pcr) | crypto helper 6 sending results from work-order 4 for state #3 to event queue | scheduling resume sending helper answer for #3 | libevent_malloc: new ptr-libevent@0x7f7bb4000f48 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #3 | start processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 4 | calling continuation function 0x56091de22b50 | ikev2_parent_inR1outI2_continue for #3: calculating g^{xy}, sending I2 | creating state object #4 at 0x56091f35acc8 | State DB: adding IKEv2 state #4 in UNDEFINED | pstats #4 ikev2.child started | duplicating state object #3 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 as #4 for IPSEC SA | #4 setting local endpoint to 192.1.3.209:4500 from #3.st_localport (in duplicate_state() at state.c:1484) | Message ID: init_child #3.#4; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1 | Message ID: switch-from #3 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=0->-1 wip.responder=-1 | Message ID: switch-to #3.#4 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->0 wip.responder=-1 | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f7bc0002888 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f7bc0002b78 | event_schedule: new EVENT_SA_REPLACE-pe@0x7f7bc0002b78 | inserting event EVENT_SA_REPLACE, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f7bc0002888 size 128 | parent state #3: PARENT_I1(half-open IKE SA) => PARENT_I2(open IKE SA) | **emit ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' | emitting 8 zero bytes of IV into IKEv2 Encryption Payload | IKEv2 CERT: send a certificate? | IKEv2 CERT: OK to send a certificate (always) | IDr payload will NOT be sent | ****emit IKEv2 Identification - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | ID type: ID_DER_ASN1_DN (0x9) | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Initiator - Payload (35:ISAKMP_NEXT_v2IDi) | next payload chain: saving location 'IKEv2 Identification - Initiator - Payload'.'next payload type' in 'reply packet' | emitting 183 raw bytes of my identity into IKEv2 Identification - Initiator - Payload | my identity 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 | my identity 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | my identity 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | my identity 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | my identity 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | my identity 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | my identity 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 72 6f 61 | my identity 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | my identity 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 | my identity 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 72 6f 61 | my identity 64 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | my identity 77 61 6e 2e 6f 72 67 | emitting length of IKEv2 Identification - Initiator - Payload: 191 | Sending [CERT] of certificate: E=user-road@testing.libreswan.org,CN=road.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | ****emit IKEv2 Certificate Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | next payload chain: setting previous 'IKEv2 Identification - Initiator - Payload'.'next payload type' to current IKEv2 Certificate Payload (37:ISAKMP_NEXT_v2CERT) | next payload chain: saving location 'IKEv2 Certificate Payload'.'next payload type' in 'reply packet' | emitting 1224 raw bytes of CERT into IKEv2 Certificate Payload | CERT 30 82 04 c4 30 82 04 2d a0 03 02 01 02 02 01 05 | CERT 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 | CERT 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 31 | CERT 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 69 | CERT 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 6f | CERT 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c 69 | CERT 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 0b | CERT 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 6e | CERT 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 72 | CERT 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 6f | CERT 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a 86 | CERT 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e 67 | CERT 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 30 22 | CERT 18 0f 32 30 31 39 30 38 32 34 30 39 30 37 35 33 | CERT 5a 18 0f 32 30 32 32 30 38 32 33 30 39 30 37 35 | CERT 33 5a 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 | CERT 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 | CERT 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 | CERT 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c | CERT 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 | CERT 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 | CERT 6d 65 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 72 | CERT 6f 61 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a | CERT 86 48 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 72 | CERT 6f 61 64 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 30 82 01 a2 30 0d 06 | CERT 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 8f | CERT 00 30 82 01 8a 02 82 01 81 00 de eb 73 26 86 d7 | CERT 2c 84 21 13 0e a4 23 30 11 c6 d4 b1 e8 99 58 5b | CERT 54 fa 8c cb 90 bf aa 54 64 e2 ef 00 f9 df b2 5a | CERT 20 d0 1f fd fb 02 a8 d4 60 ac 44 ab c0 91 e1 eb | CERT 81 59 f7 6d 08 30 04 c9 63 5f 07 58 6a d7 e6 ff | CERT 96 d3 79 c2 a1 6b d3 24 00 31 74 f3 8f b4 e9 17 | CERT af d1 3c 33 ee 8b a9 19 b2 03 f1 98 8a 60 f2 f6 | CERT 14 4b 31 a3 8b cb cb ae 31 d9 70 5a 88 2d cc c8 | CERT 77 e8 27 1f 75 07 9a 9b cc 5a 53 bd 69 be 82 0e | CERT 9c b9 3b c8 4f fa 84 87 bb b6 0d 2d ff 11 a1 2d | CERT 51 d4 3f c2 93 09 22 b4 2e 48 0e 77 81 b6 79 ee | CERT 31 37 3d 55 2f 3d 4f 0e 26 7e 73 34 4f 0d d1 90 | CERT 84 c9 06 53 b6 31 7f 6e 62 51 c6 35 3b a1 03 8a | CERT 8b 62 bb 4d 37 a5 44 42 54 a2 10 80 5f 75 0e 17 | CERT a0 4e d8 46 e8 02 bf a1 f5 e5 2a 2e 5c dc b2 d7 | CERT 93 d9 04 45 51 1d 5e 7d d8 fd 03 96 0c d5 02 5b | CERT 72 03 26 b7 d6 cd a0 18 86 a7 07 d0 74 c6 07 e8 | CERT 5c 1f 7a af be d0 ae b8 e7 7a 3b cf 5c fa ca ea | CERT ae c3 6f 85 22 9b 46 81 be 7c 89 15 4f 06 47 30 | CERT 9f bb ee 24 55 e2 21 cd 8e 93 f5 0e 33 49 5d 50 | CERT 48 39 ac ab 37 59 f8 a2 61 be a0 81 d5 25 97 2f | CERT 8b 2f bd d9 47 a4 5c a5 3b c0 99 19 c5 fb 43 da | CERT 6f 6c 33 54 60 af 00 d5 41 12 60 e5 bb 07 b8 76 | CERT 8a 55 c4 c3 47 8b bd 12 bc e8 5e 94 62 7a 20 91 | CERT 11 fb 23 b7 2d f5 6f 73 b6 a9 02 03 01 00 01 a3 | CERT 81 e3 30 81 e0 30 09 06 03 55 1d 13 04 02 30 00 | CERT 30 25 06 03 55 1d 11 04 1e 30 1c 82 1a 72 6f 61 | CERT 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | CERT 77 61 6e 2e 6f 72 67 30 0b 06 03 55 1d 0f 04 04 | CERT 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 | CERT 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 | CERT 07 03 02 30 41 06 08 2b 06 01 05 05 07 01 01 04 | CERT 35 30 33 30 31 06 08 2b 06 01 05 05 07 30 01 86 | CERT 25 68 74 74 70 3a 2f 2f 6e 69 63 2e 74 65 73 74 | CERT 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 | CERT 67 3a 32 35 36 30 30 3d 06 03 55 1d 1f 04 36 30 | CERT 34 30 32 a0 30 a0 2e 86 2c 68 74 74 70 3a 2f 2f | CERT 6e 69 63 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 2f 72 65 76 6f 6b 65 | CERT 64 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 | CERT 01 0b 05 00 03 81 81 00 79 c0 dc 4f ca 3c 5f 4e | CERT 21 3c 76 b0 44 66 c8 74 40 7b 34 5d 63 96 6e ee | CERT c5 df ef 0f fe c2 e4 25 18 39 25 d8 f8 6a b8 87 | CERT f9 17 94 73 7f 8d fb 7d 9d 24 5e c5 95 19 96 3e | CERT 04 dd 8a d0 ad 11 f4 97 32 43 d2 f3 1a d3 1c b1 | CERT e9 01 90 f2 72 36 cf d4 bd 14 e6 ad 8d d2 84 3b | CERT 92 94 99 40 21 16 68 aa e7 5e ac 95 88 11 40 55 | CERT 28 90 af 7f 98 b1 80 36 c5 18 f7 6e 43 40 bc 93 | CERT 86 b3 f1 aa b3 89 b4 15 | emitting length of IKEv2 Certificate Payload: 1229 | IKEv2 CERTREQ: send a cert request? | IKEv2 CERTREQ: no CA DN known to send | not sending INITIAL_CONTACT | ****emit IKEv2 Authentication Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | auth method: IKEv2_AUTH_RSA (0x1) | next payload chain: setting previous 'IKEv2 Certificate Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH) | next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet' | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org->%fromcert of kind PKK_RSA | searching for certificate PKK_RSA:AwEAAd7rc vs PKK_RSA:AwEAAd7rc | #3 spent 5.9 milliseconds in ikev2_calculate_rsa_hash() calling sign_hash_RSA() | emitting 384 raw bytes of rsa signature into IKEv2 Authentication Payload | rsa signature b4 a0 0e 56 5c 8e 51 05 a6 87 56 d7 06 61 64 95 | rsa signature 0d 29 12 eb 68 7b 48 0e a7 fb 5c 3a 7a a9 ba 17 | rsa signature b8 23 49 00 9b 21 a0 d6 84 e9 d8 fa c0 a4 5e ad | rsa signature 7b 6e 4e e9 86 ad b4 d0 b6 ad 71 6a e7 76 c4 90 | rsa signature b9 f5 d1 5e cf 81 31 3e c1 fe a9 26 2d 93 54 ac | rsa signature a2 1f 48 95 c4 50 2f db f7 60 a5 89 a6 99 9c 70 | rsa signature e8 5a 7d 29 39 9a 00 d9 1f 98 62 52 4a 9a 8c 27 | rsa signature 2b 9a 2a 81 dd 56 99 bc 77 a8 6e ee 85 b5 de c7 | rsa signature 3f 72 c3 5e 7d e0 5f 9e b4 95 45 65 31 ba 05 c5 | rsa signature ed 81 b8 05 94 18 ec 11 04 94 13 ff e4 cb 13 8e | rsa signature a8 f7 52 df 87 c8 af d1 33 7d 40 76 d7 11 de 1d | rsa signature 63 85 60 42 12 60 18 35 98 1f c8 81 75 cd 65 d0 | rsa signature d9 97 87 18 e7 75 e6 ea ec 90 ba 48 9d ba 9d da | rsa signature e3 66 72 06 d5 4b 96 39 b8 d9 74 b9 81 7e 56 b0 | rsa signature ac 26 0e f4 8b 2a 51 33 21 bf e6 00 c6 eb 00 7c | rsa signature 17 1f 44 67 43 a0 8e 45 bf 90 b7 fd dd d1 f4 74 | rsa signature eb 9f fe 77 0d 66 14 b2 5b 31 72 82 03 38 19 5d | rsa signature 75 05 50 1a f1 0b 00 7e 15 e4 34 fd 34 0f 8e 84 | rsa signature 03 69 c1 43 fd 99 65 c4 16 98 0b f3 5c 7d 0d 8b | rsa signature fe ef 82 66 f2 f3 70 62 55 a8 a3 93 a7 7c 48 ca | rsa signature 3c 12 43 0e b4 a0 89 2b 85 ad 87 cf 36 09 78 d4 | rsa signature ba bb 38 a5 66 43 ce 85 f0 78 18 18 5d df 2c c0 | rsa signature 15 67 c6 bb 7f 13 4a 35 f2 b3 24 57 8e 3e a2 81 | rsa signature a8 e4 c1 1f ef 3a 2f f4 92 8d 26 2e 77 b0 f9 ea | #3 spent 6.06 milliseconds in ikev2_calculate_rsa_hash() | emitting length of IKEv2 Authentication Payload: 392 | Send Configuration Payload request | ****emit IKEv2 Configuration Payload: | next payload type: ISAKMP_NEXT_v2SA (0x21) | flags: none (0x0) | ikev2_cfg_type: IKEv2_CP_CFG_REQUEST (0x1) | next payload chain: ignoring supplied 'IKEv2 Configuration Payload'.'next payload type' value 33:ISAKMP_NEXT_v2SA | next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Configuration Payload (47:ISAKMP_NEXT_v2CP) | next payload chain: saving location 'IKEv2 Configuration Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_ADDRESS (0x1) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_DNS (0x3) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP6_ADDRESS (0x8) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP6_DNS (0xa) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_DNS_DOMAIN (0x19) | emitting length of IKEv2 Configuration Payload Attribute: 0 | emitting length of IKEv2 Configuration Payload: 28 | getting first pending from state #3 | netlink_get_spi: allocated 0xce92feb7 for esp.0@192.1.3.209 | constructing ESP/AH proposals with all DH removed for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator emitting ESP/AH proposals) | converting proposal AES_GCM_16_256-NONE to ikev2 ... | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED | converting proposal AES_GCM_16_128-NONE to ikev2 ... | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: constructed local ESP/AH proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | Emitting ikev2_proposals ... | ****emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'IKEv2 Configuration Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | discarding INTEG=NONE | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi ce 92 fe b7 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 32 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding INTEG=NONE | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 2 (0x2) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi ce 92 fe b7 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 32 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 3 (0x3) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 4 (0x4) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi ce 92 fe b7 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 48 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 4 (0x4) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 4 (0x4) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi ce 92 fe b7 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 48 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 164 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ****emit IKEv2 Traffic Selector - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | number of TS: 1 (0x1) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | start port: 0 (0x0) | end port: 65535 (0xffff) | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector | ipv4 start c0 01 03 d1 | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector | ipv4 end c0 01 03 d1 | emitting length of IKEv2 Traffic Selector: 16 | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 | ****emit IKEv2 Traffic Selector - Responder - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | number of TS: 1 (0x1) | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | start port: 0 (0x0) | end port: 65535 (0xffff) | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector | ipv4 start c0 01 02 17 | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector | ipv4 end c0 01 02 17 | emitting length of IKEv2 Traffic Selector: 16 | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE | Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload | emitting length of IKEv2 Encryption Payload: 2081 | emitting length of ISAKMP Message: 2109 | **parse ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | length: 2109 (0x83d) | **parse IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2IDi (0x23) | flags: none (0x0) | length: 2081 (0x821) | **emit ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2IDi (0x23) | flags: none (0x0) | fragment number: 1 (0x1) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 35:ISAKMP_NEXT_v2IDi | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 25 00 00 bf 09 00 00 00 30 81 b4 31 0b 30 09 06 | cleartext fragment 03 55 04 06 13 02 43 41 31 10 30 0e 06 03 55 04 | cleartext fragment 08 0c 07 4f 6e 74 61 72 69 6f 31 10 30 0e 06 03 | cleartext fragment 55 04 07 0c 07 54 6f 72 6f 6e 74 6f 31 12 30 10 | cleartext fragment 06 03 55 04 0a 0c 09 4c 69 62 72 65 73 77 61 6e | cleartext fragment 31 18 30 16 06 03 55 04 0b 0c 0f 54 65 73 74 20 | cleartext fragment 44 65 70 61 72 74 6d 65 6e 74 31 23 30 21 06 03 | cleartext fragment 55 04 03 0c 1a 72 6f 61 64 2e 74 65 73 74 69 6e | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 31 | cleartext fragment 2e 30 2c 06 09 2a 86 48 86 f7 0d 01 09 01 16 1f | cleartext fragment 75 73 65 72 2d 72 6f 61 64 40 74 65 73 74 69 6e | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 27 | cleartext fragment 00 04 cd 04 30 82 04 c4 30 82 04 2d a0 03 02 01 | cleartext fragment 02 02 01 05 30 0d 06 09 2a 86 48 86 f7 0d 01 01 | cleartext fragment 0b 05 00 30 81 ac 31 0b 30 09 06 03 55 04 06 13 | cleartext fragment 02 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e | cleartext fragment 74 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 | cleartext fragment 54 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a | cleartext fragment 0c 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 | cleartext fragment 03 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 | cleartext fragment 74 6d 65 6e 74 31 25 30 23 06 03 55 04 03 0c 1c | cleartext fragment 4c 69 62 72 65 73 77 61 6e 20 74 65 73 74 20 43 | cleartext fragment 41 20 66 6f 72 20 6d 61 69 6e 63 61 31 24 30 22 | cleartext fragment 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 74 65 73 | cleartext fragment 74 69 6e 67 40 6c 69 62 72 65 73 77 61 6e 2e 6f | cleartext fragment 72 67 30 22 18 0f 32 30 31 39 30 38 32 34 30 39 | cleartext fragment 30 37 35 33 5a 18 0f 32 30 32 32 30 38 32 33 30 | cleartext fragment 39 30 37 35 33 5a 30 81 b4 31 0b 30 09 06 03 55 | cleartext fragment 04 06 13 02 43 41 31 10 30 0e 06 03 55 04 08 0c | cleartext fragment 07 4f 6e 74 61 72 69 6f 31 10 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 2 (0x2) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 30 0e 06 03 55 04 07 0c 07 54 6f 72 6f 6e 74 6f | cleartext fragment 31 12 30 10 06 03 55 04 0a 0c 09 4c 69 62 72 65 | cleartext fragment 73 77 61 6e 31 18 30 16 06 03 55 04 0b 0c 0f 54 | cleartext fragment 65 73 74 20 44 65 70 61 72 74 6d 65 6e 74 31 23 | cleartext fragment 30 21 06 03 55 04 03 0c 1a 72 6f 61 64 2e 74 65 | cleartext fragment 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e | cleartext fragment 6f 72 67 31 2e 30 2c 06 09 2a 86 48 86 f7 0d 01 | cleartext fragment 09 01 16 1f 75 73 65 72 2d 72 6f 61 64 40 74 65 | cleartext fragment 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e | cleartext fragment 6f 72 67 30 82 01 a2 30 0d 06 09 2a 86 48 86 f7 | cleartext fragment 0d 01 01 01 05 00 03 82 01 8f 00 30 82 01 8a 02 | cleartext fragment 82 01 81 00 de eb 73 26 86 d7 2c 84 21 13 0e a4 | cleartext fragment 23 30 11 c6 d4 b1 e8 99 58 5b 54 fa 8c cb 90 bf | cleartext fragment aa 54 64 e2 ef 00 f9 df b2 5a 20 d0 1f fd fb 02 | cleartext fragment a8 d4 60 ac 44 ab c0 91 e1 eb 81 59 f7 6d 08 30 | cleartext fragment 04 c9 63 5f 07 58 6a d7 e6 ff 96 d3 79 c2 a1 6b | cleartext fragment d3 24 00 31 74 f3 8f b4 e9 17 af d1 3c 33 ee 8b | cleartext fragment a9 19 b2 03 f1 98 8a 60 f2 f6 14 4b 31 a3 8b cb | cleartext fragment cb ae 31 d9 70 5a 88 2d cc c8 77 e8 27 1f 75 07 | cleartext fragment 9a 9b cc 5a 53 bd 69 be 82 0e 9c b9 3b c8 4f fa | cleartext fragment 84 87 bb b6 0d 2d ff 11 a1 2d 51 d4 3f c2 93 09 | cleartext fragment 22 b4 2e 48 0e 77 81 b6 79 ee 31 37 3d 55 2f 3d | cleartext fragment 4f 0e 26 7e 73 34 4f 0d d1 90 84 c9 06 53 b6 31 | cleartext fragment 7f 6e 62 51 c6 35 3b a1 03 8a 8b 62 bb 4d 37 a5 | cleartext fragment 44 42 54 a2 10 80 5f 75 0e 17 a0 4e d8 46 e8 02 | cleartext fragment bf a1 f5 e5 2a 2e 5c dc b2 d7 93 d9 04 45 51 1d | cleartext fragment 5e 7d d8 fd 03 96 0c d5 02 5b 72 03 26 b7 d6 cd | cleartext fragment a0 18 86 a7 07 d0 74 c6 07 e8 5c 1f 7a af be d0 | cleartext fragment ae b8 e7 7a 3b cf 5c fa ca ea ae c3 6f 85 22 9b | cleartext fragment 46 81 be 7c 89 15 4f 06 47 30 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 3 (0x3) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 9f bb ee 24 55 e2 21 cd 8e 93 f5 0e 33 49 5d 50 | cleartext fragment 48 39 ac ab 37 59 f8 a2 61 be a0 81 d5 25 97 2f | cleartext fragment 8b 2f bd d9 47 a4 5c a5 3b c0 99 19 c5 fb 43 da | cleartext fragment 6f 6c 33 54 60 af 00 d5 41 12 60 e5 bb 07 b8 76 | cleartext fragment 8a 55 c4 c3 47 8b bd 12 bc e8 5e 94 62 7a 20 91 | cleartext fragment 11 fb 23 b7 2d f5 6f 73 b6 a9 02 03 01 00 01 a3 | cleartext fragment 81 e3 30 81 e0 30 09 06 03 55 1d 13 04 02 30 00 | cleartext fragment 30 25 06 03 55 1d 11 04 1e 30 1c 82 1a 72 6f 61 | cleartext fragment 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | cleartext fragment 77 61 6e 2e 6f 72 67 30 0b 06 03 55 1d 0f 04 04 | cleartext fragment 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 | cleartext fragment 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 | cleartext fragment 07 03 02 30 41 06 08 2b 06 01 05 05 07 01 01 04 | cleartext fragment 35 30 33 30 31 06 08 2b 06 01 05 05 07 30 01 86 | cleartext fragment 25 68 74 74 70 3a 2f 2f 6e 69 63 2e 74 65 73 74 | cleartext fragment 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 | cleartext fragment 67 3a 32 35 36 30 30 3d 06 03 55 1d 1f 04 36 30 | cleartext fragment 34 30 32 a0 30 a0 2e 86 2c 68 74 74 70 3a 2f 2f | cleartext fragment 6e 69 63 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | cleartext fragment 65 73 77 61 6e 2e 6f 72 67 2f 72 65 76 6f 6b 65 | cleartext fragment 64 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 | cleartext fragment 01 0b 05 00 03 81 81 00 79 c0 dc 4f ca 3c 5f 4e | cleartext fragment 21 3c 76 b0 44 66 c8 74 40 7b 34 5d 63 96 6e ee | cleartext fragment c5 df ef 0f fe c2 e4 25 18 39 25 d8 f8 6a b8 87 | cleartext fragment f9 17 94 73 7f 8d fb 7d 9d 24 5e c5 95 19 96 3e | cleartext fragment 04 dd 8a d0 ad 11 f4 97 32 43 d2 f3 1a d3 1c b1 | cleartext fragment e9 01 90 f2 72 36 cf d4 bd 14 e6 ad 8d d2 84 3b | cleartext fragment 92 94 99 40 21 16 68 aa e7 5e ac 95 88 11 40 55 | cleartext fragment 28 90 af 7f 98 b1 80 36 c5 18 f7 6e 43 40 bc 93 | cleartext fragment 86 b3 f1 aa b3 89 b4 15 2f 00 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 4 (0x4) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 01 88 01 00 00 00 b4 a0 0e 56 5c 8e 51 05 a6 87 | cleartext fragment 56 d7 06 61 64 95 0d 29 12 eb 68 7b 48 0e a7 fb | cleartext fragment 5c 3a 7a a9 ba 17 b8 23 49 00 9b 21 a0 d6 84 e9 | cleartext fragment d8 fa c0 a4 5e ad 7b 6e 4e e9 86 ad b4 d0 b6 ad | cleartext fragment 71 6a e7 76 c4 90 b9 f5 d1 5e cf 81 31 3e c1 fe | cleartext fragment a9 26 2d 93 54 ac a2 1f 48 95 c4 50 2f db f7 60 | cleartext fragment a5 89 a6 99 9c 70 e8 5a 7d 29 39 9a 00 d9 1f 98 | cleartext fragment 62 52 4a 9a 8c 27 2b 9a 2a 81 dd 56 99 bc 77 a8 | cleartext fragment 6e ee 85 b5 de c7 3f 72 c3 5e 7d e0 5f 9e b4 95 | cleartext fragment 45 65 31 ba 05 c5 ed 81 b8 05 94 18 ec 11 04 94 | cleartext fragment 13 ff e4 cb 13 8e a8 f7 52 df 87 c8 af d1 33 7d | cleartext fragment 40 76 d7 11 de 1d 63 85 60 42 12 60 18 35 98 1f | cleartext fragment c8 81 75 cd 65 d0 d9 97 87 18 e7 75 e6 ea ec 90 | cleartext fragment ba 48 9d ba 9d da e3 66 72 06 d5 4b 96 39 b8 d9 | cleartext fragment 74 b9 81 7e 56 b0 ac 26 0e f4 8b 2a 51 33 21 bf | cleartext fragment e6 00 c6 eb 00 7c 17 1f 44 67 43 a0 8e 45 bf 90 | cleartext fragment b7 fd dd d1 f4 74 eb 9f fe 77 0d 66 14 b2 5b 31 | cleartext fragment 72 82 03 38 19 5d 75 05 50 1a f1 0b 00 7e 15 e4 | cleartext fragment 34 fd 34 0f 8e 84 03 69 c1 43 fd 99 65 c4 16 98 | cleartext fragment 0b f3 5c 7d 0d 8b fe ef 82 66 f2 f3 70 62 55 a8 | cleartext fragment a3 93 a7 7c 48 ca 3c 12 43 0e b4 a0 89 2b 85 ad | cleartext fragment 87 cf 36 09 78 d4 ba bb 38 a5 66 43 ce 85 f0 78 | cleartext fragment 18 18 5d df 2c c0 15 67 c6 bb 7f 13 4a 35 f2 b3 | cleartext fragment 24 57 8e 3e a2 81 a8 e4 c1 1f ef 3a 2f f4 92 8d | cleartext fragment 26 2e 77 b0 f9 ea 21 00 00 1c 01 00 00 00 00 01 | cleartext fragment 00 00 00 03 00 00 00 08 00 00 00 0a 00 00 00 19 | cleartext fragment 00 00 2c 00 00 a4 02 00 00 20 01 03 04 02 ce 92 | cleartext fragment fe b7 03 00 00 0c 01 00 00 14 80 0e 01 00 00 00 | cleartext fragment 00 08 05 00 00 00 02 00 00 20 02 03 04 02 ce 92 | cleartext fragment fe b7 03 00 00 0c 01 00 00 14 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 5 (0x5) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 156 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 80 0e 00 80 00 00 00 08 05 00 00 00 02 00 00 30 | cleartext fragment 03 03 04 04 ce 92 fe b7 03 00 00 0c 01 00 00 0c | cleartext fragment 80 0e 01 00 03 00 00 08 03 00 00 0e 03 00 00 08 | cleartext fragment 03 00 00 0c 00 00 00 08 05 00 00 00 00 00 00 30 | cleartext fragment 04 03 04 04 ce 92 fe b7 03 00 00 0c 01 00 00 0c | cleartext fragment 80 0e 00 80 03 00 00 08 03 00 00 0e 03 00 00 08 | cleartext fragment 03 00 00 0c 00 00 00 08 05 00 00 00 2d 00 00 18 | cleartext fragment 01 00 00 00 07 00 00 10 00 00 ff ff c0 01 03 d1 | cleartext fragment c0 01 03 d1 00 00 00 18 01 00 00 00 07 00 00 10 | cleartext fragment 00 00 ff ff c0 01 02 17 c0 01 02 17 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 189 | emitting length of ISAKMP Message: 217 | suspend processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | start processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #4 complete_v2_state_transition() md.from_state=PARENT_I1 md.svm.state[from]=PARENT_I1 UNDEFINED->PARENT_I2 with status STF_OK | IKEv2: transition from state STATE_PARENT_I1 to state STATE_PARENT_I2 | child state #4: UNDEFINED(ignore) => PARENT_I2(open IKE SA) | Message ID: updating counters for #4 to 0 after switching state | Message ID: recv #3.#4 response 0; ike: initiator.sent=0 initiator.recv=-1->0 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=-1 | Message ID: sent #3.#4 request 1; ike: initiator.sent=0->1 initiator.recv=0 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->1 wip.responder=-1 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} | sending V2 reply packet to 192.1.2.23:4500 (from 192.1.3.209:4500) | sending fragments ... | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #3) | 00 00 00 00 d5 21 42 43 7a 44 94 22 84 5a e9 e3 | f2 f6 40 66 35 20 23 08 00 00 00 01 00 00 02 17 | 23 00 01 fb 00 01 00 05 c0 f7 68 9a e8 26 55 aa | d4 b8 67 d2 7e 47 b3 f8 87 e7 4d 96 4c fb 6c 99 | da fb 52 b5 50 1f ca 83 aa db 54 7f 0b bb 3f 8d | 40 7c db 68 1a 52 a5 6a f3 c9 ed f9 f5 44 fe 9f | 54 70 6c 6b bd ec 5d 67 5a 7a 04 23 a1 86 2a 9f | 9e ab 55 be 22 b9 51 e8 b5 66 48 79 65 e6 9a 0d | 8f b4 e8 bb 17 c8 90 a2 ea d1 0d 38 5b 64 a4 c0 | e1 e8 94 a1 82 a3 7b a3 f5 ac 61 e0 7c 19 a6 bb | a3 72 14 cc 31 ad 14 bd 34 83 95 d3 5a 30 86 39 | 23 50 bb df 6c 04 97 bf 9a cb 6b 95 2a be 5f b1 | c8 0e e5 9d 4c 0e f7 dc 7a 79 8a 27 c3 61 0c 77 | 17 c0 dc 45 ef 6c aa 0d 48 d0 8f df 18 92 08 c9 | 0f ab 71 de 44 fd 22 85 46 f9 ae 42 e2 cf d7 c8 | a5 d3 b2 1a 1c 4c 47 90 c3 f4 fa 89 ab ae ba 25 | 69 4a a1 4c 6e 63 d1 a5 05 1f 16 8b 14 4b 89 81 | fc 6b 6f d3 b0 77 ba 05 b9 6e a0 2c e9 5f ed a5 | 85 5d 9a 03 13 35 eb 35 01 3a 4e e1 91 42 25 2e | 38 3e 6f b5 a9 d3 5f a1 a7 43 bc 67 47 29 bc f9 | c4 20 3d 93 05 e4 e3 53 70 37 3d 80 68 41 1d 38 | a4 5b 84 89 31 a1 76 3e 36 3a b3 2a 97 96 5b e5 | b4 80 b4 e6 46 e2 bf e3 a2 3f d9 55 68 b2 03 60 | 16 bf f4 5f fa 7b 75 4c ea 04 24 32 bc 93 52 fd | 9b 4e e9 66 e7 12 0b 8a db 03 45 e0 76 f5 97 0c | fb 13 3f 02 cb 4d c6 98 30 38 28 00 b2 6a ab 3e | 04 69 eb 9a dd 7e 5e bd 0b 2a 0d 8b 65 cc e2 28 | 0f 43 24 ed f8 54 9a 6a 3b a7 18 fb bf 05 1c 0e | f4 61 6d ca 5b 11 88 33 82 d2 2d cb 97 cf 17 5f | 3e ea 2c ec 2b 51 fd 40 6a 20 2f 9d 60 48 cf 15 | a9 dc 3c 17 a1 64 82 f4 c2 b7 1f 7e ca ac 88 64 | 6c 19 48 6b 2b 48 6b 41 6a 79 38 d6 d4 26 1c 7c | 29 e5 7c b5 11 79 07 59 1c 7d ff fc 53 7b 3b c0 | b8 2e 0a 3d 0f 24 d1 fe d9 a4 b4 | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #3) | 00 00 00 00 d5 21 42 43 7a 44 94 22 84 5a e9 e3 | f2 f6 40 66 35 20 23 08 00 00 00 01 00 00 02 17 | 00 00 01 fb 00 02 00 05 a4 22 fa 1b c3 12 d4 de | 20 2c 2f 7f 15 98 26 85 c2 e7 4d 8b 70 df af e8 | be 2f 5e 4e 82 6d 06 55 98 59 a0 c1 c1 52 6f ef | 3b 8d e8 ab 78 d4 3b 58 46 67 ae 14 89 5a 96 ec | 53 17 bc 14 24 ca 1c 0e a4 dd 69 8c 96 19 88 02 | c9 5c 8d b0 99 e2 e1 79 b4 47 34 42 03 f2 77 42 | 8e 99 f0 5e ec 80 e9 10 02 ff e1 97 ad 54 85 5d | e6 9d 13 c8 c7 38 ad f5 2b 0b 78 82 6c c8 85 dc | be 7c 39 b2 06 cc e1 31 1f b8 d9 d4 e9 f5 8a b3 | cb 27 29 a7 af 79 02 6a 41 30 22 dd 41 d8 84 22 | da 4b 29 8e 70 69 4b 94 b4 b8 88 46 09 bb a1 04 | 7b f0 6c e5 ac b9 b3 c6 5a ce 91 09 8a 65 e1 4e | cb 28 83 da d6 0d d8 10 16 7f 54 86 b4 b4 34 c8 | 99 43 d4 a4 0d 9d b4 95 a3 39 b6 01 2c d9 82 61 | 55 db a0 0a d9 54 27 67 13 cd bc 41 4d dd 6a 15 | da c8 06 6f c8 79 a5 02 06 79 ad bd a5 0a da 9c | c1 98 b8 0c 83 40 5b b8 51 6f 25 88 ee 48 24 07 | 9a 0e 76 73 b6 2c a2 9d 0c 1c ec 90 69 32 3d 07 | d8 e9 6f 9a 16 cb 4a b7 e6 3a 20 0b 25 8a ba 97 | 2a 70 ab 8b a3 d6 b2 2c 31 39 b7 1d 02 8f 30 06 | a7 ba 38 bb 84 b6 3f 9c 40 12 af 80 48 9b 85 bf | 13 ee a9 44 6e ab 41 c3 05 b2 2a e0 b2 e4 ad 13 | 3f 73 0d b2 57 cf 1e 11 b6 16 00 91 8e 04 03 e3 | 96 65 8d 81 ac 96 7a 4a d1 07 fd cd cf 4b 31 1f | 16 02 b4 9f e5 e4 d0 3f 2a fb 36 ed 5e f9 54 2b | 2d f3 4a ab aa 66 ee 89 14 f1 29 4d 06 15 93 3d | 8e 89 d6 69 c8 9b a2 55 86 59 45 2d 53 f2 f2 62 | cd 32 30 79 6a 09 23 d7 2d 4f fa cc 93 09 54 80 | a9 5a 03 76 01 3e c3 1e 2f 2f bd d0 0e e5 98 bb | ba 03 72 98 09 4d 10 97 59 84 c7 9f 4e 21 93 01 | e8 7d d5 ec d4 52 02 87 a9 8e 18 26 85 27 0e a6 | 1a f5 2a a5 b1 6b 0f 2a fc 40 57 | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #3) | 00 00 00 00 d5 21 42 43 7a 44 94 22 84 5a e9 e3 | f2 f6 40 66 35 20 23 08 00 00 00 01 00 00 02 17 | 00 00 01 fb 00 03 00 05 c7 eb 9f 7d 8b ac 28 4c | 01 ad 31 bd 82 91 6c a1 74 64 25 b9 57 6c f5 25 | 0a e6 b6 db 06 1f 67 eb 31 6f be 3b a5 32 92 89 | 37 22 12 ec bd e1 de 85 1b 4c 93 05 d0 ba 50 78 | 24 3b dc 8d d4 7e 90 74 12 08 07 ed 18 b0 0f ae | 95 79 f1 53 60 2c f4 3f b0 b1 77 87 d7 f7 fa 9e | 73 e8 35 4f cf 2e 34 e7 1e 58 e1 6e 94 68 73 ce | ea 03 ed bb 2c 0c fa f6 fc 97 6d c2 7e 64 58 ed | a9 bb 36 a5 ab c7 ea b2 ba b7 c7 b6 1f 93 5b e5 | ff bd f2 2a 19 40 92 02 b6 f7 9e 45 bc 64 44 38 | 19 ac 72 a7 a1 9e a8 f3 38 fa ad 7f 86 54 3b c3 | ec 3e 6f de b0 60 95 06 55 f2 1d 02 c6 54 90 11 | 2f ae 2e b2 70 b8 3a 97 c2 f6 55 08 62 20 54 ee | ec 7a d3 21 ab 97 6f 3a 7f 72 e2 f3 31 b3 2d e7 | 89 d9 a0 e6 55 b6 46 a7 4b 20 44 85 84 dc 80 b5 | 87 49 c6 79 15 3a 8b 79 b4 34 4e 69 8a f5 24 ef | 9f 2e 0a 94 40 ec 24 d1 bd 10 a4 11 53 64 2a d2 | c9 02 37 47 32 3f 8c f2 4f 60 2e 64 ca a5 af 68 | 4f b5 5d 6f 4c 7d 49 2b 3e f8 ce 9f ad e9 80 8c | 14 64 9f 82 91 2c 76 4f 88 42 90 59 43 4c 5c 90 | d8 dc 57 ef 01 d9 f4 22 95 eb 9a 3d 79 9a 31 5c | 91 95 ea e2 be 9a 73 b8 22 58 2a 29 8a 75 bb 7e | 4e a3 92 ba 69 67 62 0c 53 ed fc a6 b7 15 8b 11 | 5c 99 02 b4 03 78 71 fe 08 69 4d e1 54 86 2c f7 | 61 85 23 4c d2 1e 43 d3 2c 00 e5 13 54 d3 3a 50 | de 9a 63 0f ae 4b cb d9 6c 02 f6 06 6b 92 b4 1d | 12 e2 7a cb 6a ab 36 1d 05 40 34 91 d0 2c 9a 0e | 59 fc f4 f4 66 0e ef 90 0e 01 50 4e 87 e4 f1 96 | 96 a5 f0 b3 83 ff ea 38 73 be 12 f3 52 82 47 01 | 83 e9 57 16 02 0e ac 09 fa 63 76 2d 01 c5 4d 0c | d9 66 0d 05 fc 9b f7 76 f7 25 ed f5 b0 e9 ad 86 | ac 1e c7 76 34 a1 18 d2 74 22 72 | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #3) | 00 00 00 00 d5 21 42 43 7a 44 94 22 84 5a e9 e3 | f2 f6 40 66 35 20 23 08 00 00 00 01 00 00 02 17 | 00 00 01 fb 00 04 00 05 b4 2d cf 2d c2 ef 57 bd | cd c1 10 28 ea 79 c1 b6 7c fa 9c df 0e f4 aa 8b | 27 ed 80 62 e6 03 e0 13 32 4e 1f 73 f3 60 6a c5 | 98 49 b9 5a 39 ec c4 f7 d6 0e f0 72 fd e8 40 b4 | 8c 80 4d 84 20 1f 55 14 02 0f 7b 0f 77 7b a2 d8 | 9f 95 5b a1 18 92 70 d4 ea 30 ea 7b 92 2e 3b d4 | f1 61 5e df be 4b ab 34 51 1c 9b 5e 68 c5 36 28 | b1 cd be a0 0d c4 cf f4 ab bc 04 6f b4 86 5f 8b | 4e 8f 64 21 e1 ca 68 03 91 a8 c9 d4 cc 8f ae e5 | 91 a8 de 80 e5 b5 cf b4 3f 98 63 ef 94 92 9c 8c | a6 d8 03 90 29 3b 12 28 a4 a3 cf 8d f6 b0 d4 56 | 2a 29 6c 80 ed 2b 68 36 2c 76 42 bb 9c 02 f4 b1 | f4 51 5d 7e a9 25 26 43 f8 e8 5d e4 65 76 08 08 | 29 7f a5 a0 ba de e2 e1 26 78 f1 13 8c a2 b9 f0 | 77 63 03 fd 8e f9 3b 1e 6b af 25 30 85 c3 e7 51 | 20 83 2b b1 8b f0 a4 f2 ec 0e 0f c6 40 81 0c 5b | 12 69 36 19 90 c4 dd cd 00 9f 1f 12 75 72 5e 69 | 07 6a ef 4f 52 06 75 ed 5b 7c 70 a2 32 92 b3 39 | 17 b7 14 9a 34 c2 9e 56 e5 4b 9d e5 5d 4b 87 3a | 4c c3 42 b1 76 86 30 dc 29 b2 61 3c 15 1c 31 39 | ea 28 be 4d bd 83 4f de 16 f1 07 99 92 39 90 07 | e3 a9 33 51 87 a5 7a a8 d7 a4 7d 74 c9 b1 03 e8 | e2 56 7a 05 22 46 c2 56 67 ca a1 7d be 1f a9 5f | 70 49 5a 36 1d c8 9a a5 9e 8e b8 3b 52 fc 71 e8 | 2a 9d 87 f9 f3 80 f6 ef fd c8 a5 a3 f7 79 4d f1 | a6 a3 48 59 b0 cc 1f 75 f9 33 65 8e 91 97 7c 33 | 59 c8 b5 ff bd 96 0c 23 30 69 33 13 bd 39 04 2c | 86 76 d5 26 a7 0a b3 e5 22 bc f9 6a 18 a2 32 96 | 57 7d cf d0 15 19 76 90 aa 52 4b a9 84 4e 16 fb | 54 d7 ca db 94 1a ab a1 48 d3 9f bf aa f1 a7 91 | f0 52 90 04 0f be 0c bd c7 5e de b1 5a 07 06 5f | 2a 09 18 71 c4 6c c6 fb 07 ff 90 | sending 221 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #3) | 00 00 00 00 d5 21 42 43 7a 44 94 22 84 5a e9 e3 | f2 f6 40 66 35 20 23 08 00 00 00 01 00 00 00 d9 | 00 00 00 bd 00 05 00 05 cd 22 3b 3b f4 49 22 c1 | 9b 05 ad aa 48 f0 b4 9a 20 60 a4 94 7d 24 a9 1a | 16 63 bc e1 47 ff 08 2c 4d cf eb 18 83 2f 57 ab | ff 77 fb c7 0b 91 35 01 11 56 d3 bb e8 71 f6 bf | d6 eb c3 13 93 ff f8 d5 b0 74 41 1a 96 20 03 58 | 89 75 d7 4f c7 4f fd f7 89 f1 44 0f a7 5b a8 96 | d2 ce 17 43 db a4 76 c8 0b b8 d5 d9 44 4d f4 87 | 3c 28 0f 0a f9 7b b7 ad 4c bb 42 df c9 a8 b4 46 | 5a 5b 6e d5 01 b8 ae 6b 98 9f e9 4a 88 39 27 0b | 67 28 37 ac 82 5c ed db 9a 44 3c 89 cd 2d 25 8f | 6f c5 3c e6 83 75 60 54 83 31 2b d4 e1 da f4 0e | a2 61 59 7f 58 6e 23 e3 15 68 e5 86 9a | sent 5 fragments | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x56091f3494a8 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #4 | libevent_malloc: new ptr-libevent@0x56091f366c28 size 128 | #4 STATE_PARENT_I2: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29398.306388 | resume sending helper answer for #3 suppresed complete_v2_state_transition() | #3 spent 1.3 milliseconds | #3 spent 7.6 milliseconds in resume sending helper answer | stop processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f7bb4000f48 | spent 0.00273 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | d5 21 42 43 7a 44 94 22 84 5a e9 e3 f2 f6 40 66 | 35 20 23 20 00 00 00 01 00 00 02 17 24 00 01 fb | 00 01 00 05 08 c6 41 08 23 ca 5e 73 55 49 67 3a | 3c 8e 93 d3 7d 42 ff 42 e0 04 58 32 fe d6 e5 ce | 26 5f c3 04 ef 90 ce 0d 03 bb bb a3 f9 d5 a4 97 | 17 38 68 14 9f f4 33 f6 20 27 7c b1 a6 c5 b9 33 | d8 9f 51 c9 00 e7 9f 56 08 f6 5f c9 3f 57 1d 7f | a0 60 73 1d fb a7 b1 cc ad a2 40 c4 32 cc 11 f8 | f0 70 59 82 96 c4 0a a5 48 1c bc f5 d9 4e ed 7e | ec 7e a0 50 51 cd 86 20 2c 83 94 4d 34 34 09 43 | 2d 43 8f c4 f9 83 b0 08 76 2c 67 81 ed 0b 38 ea | be 27 9d 27 97 ce eb c0 3b b6 66 f2 e3 8f 73 f1 | 5c ea 88 69 02 51 32 65 cd 3a 50 ee a1 7f 03 1c | e3 90 7b 5a ca 10 44 46 d8 39 0f bb d4 9c 7c c0 | 92 45 31 85 ac a4 0d 1f fc 0f 71 03 d6 57 19 62 | 8e be b5 54 30 e9 0b 3b af 9b 82 48 b0 17 a4 8c | cd 7d 40 d4 8e 9e fb bb 48 cf 49 aa b9 18 cb f7 | e1 3d 82 af 60 d8 0b a3 18 11 9a c5 92 32 01 a9 | 7e 28 c4 61 01 75 78 f1 c6 28 56 c5 58 87 b7 30 | 3b 0e e2 86 06 73 07 0e 2d 42 a0 72 26 54 2a bb | c3 58 07 9b 84 1d 3c cb 09 7e ca 79 31 63 8b a9 | bd a7 f3 9d 5c b2 58 d7 97 eb 35 8a 32 e4 8a 26 | 0d f0 cf 1c e2 f4 e9 b5 66 01 dd 2d 56 38 a4 72 | fe 47 e4 5c 6f 0e 09 d9 15 35 8d b4 d6 7f 9d f6 | f0 e0 e8 db 7d 54 3a 03 85 8d 80 50 ba b8 29 02 | a6 7b 55 8e 2a ed bb b4 46 c2 50 d8 c0 54 ca 27 | d5 2e fe e5 95 cd 66 7a ec c1 8d 0e f2 7e b4 9d | 3c df 7e 17 4a cf 0f 37 c6 25 03 d6 40 85 ee 94 | 3b 3e 23 60 9e 49 a2 05 b0 dd 05 52 59 a6 ce 55 | 80 de 7a 17 0f 9f f8 92 49 36 21 1f 19 7a a7 12 | f8 7b 93 a3 50 f8 4f c3 24 d2 bd 0e 3c 82 b0 3a | 57 4d 8b 4c 11 9a 5b d8 50 e6 50 b5 1f c9 c5 04 | a3 70 d4 ee 96 c8 48 47 f0 4d 6f cd f9 e0 4c 85 | ea 32 fb 0a ee 56 d4 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #3 in PARENT_I2 (find_v2_ike_sa) | start processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #4 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #4 is idle | #4 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2IDr (0x24) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 1 (0x1) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #4 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '1', total number '5', next payload '36' | updated IKE fragment state to respond using fragments without waiting for re-transmits | stop processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #3 spent 0.11 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.118 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00111 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | d5 21 42 43 7a 44 94 22 84 5a e9 e3 f2 f6 40 66 | 35 20 23 20 00 00 00 01 00 00 02 17 00 00 01 fb | 00 02 00 05 2a 37 cf 7d d6 19 44 ed eb 35 02 e5 | 9b 84 e1 62 0c 03 9f cc 66 c5 dd 9d 0f 91 d6 b5 | 54 c8 be 49 94 51 c5 60 12 78 ac 78 70 51 e1 3c | 7e 54 3c df 7c 6c 74 bf 34 85 43 6d 64 c3 ba c0 | 4d 10 f7 16 76 80 69 87 53 a1 e5 79 f4 a6 c6 f0 | bd 61 db cc 5c 4a 6c cc fe 14 70 d7 c1 0d 62 23 | 87 16 f5 51 44 73 a1 76 36 73 79 da 19 ce 93 ee | 53 17 e0 2a 86 54 94 11 44 14 d3 12 ea 21 23 26 | 83 d7 03 5e 92 18 7d 24 fc f4 d1 6c 09 55 d0 d0 | 6a d5 77 a6 bd b4 6d af 06 38 b1 48 fa e0 b8 3a | b6 18 cb 90 af e9 ee 94 0f ae cd 3f fe 49 53 fc | 3c 60 37 6a 55 dc 4e 6a e2 d8 47 f7 ac 3d 8a c2 | c1 9b 47 96 00 e4 fa 8c 7e 5e de f3 e6 39 d5 a0 | dc 6b d9 98 f5 ff cf a2 89 44 57 60 09 fe 06 6a | a2 3d 0b 9a 34 5e 66 61 15 2e 89 28 37 7a b8 11 | db c5 84 ca 71 ec 95 56 9b ea 03 4d 58 db 53 7c | b4 56 64 0e 97 51 9c 40 4d 9f de c6 a8 78 02 9d | 73 f8 77 54 09 ac ad 19 7a ff a4 61 b7 50 ac 23 | 3f e2 93 de 08 c0 3d 91 dd 53 75 27 e6 e1 a3 99 | a2 69 d0 5c 1d 4d c2 d5 48 51 a9 04 a6 92 21 da | 5d ca c3 43 f2 20 9d 49 5e 74 b0 b7 88 eb d2 4d | 94 47 15 fa c3 74 39 b0 d3 be 33 d0 70 e4 f8 95 | 0f c1 b6 d7 4e 3b 0a 79 2d e1 41 5e be e1 07 40 | 7d 06 cc 62 21 03 90 7d 30 ca f7 9f 7b ec 88 83 | 45 ae f4 bc 53 64 e4 7b fe 3f da e0 e1 34 55 e2 | 99 b3 48 06 7e c8 f6 b2 b9 5a c1 49 87 f0 3f a5 | 0b 00 21 15 2c fb b3 2f 18 f5 bb ea f4 c5 72 3c | 54 5d 26 90 47 dd 93 e5 24 82 ff 13 69 d6 41 8b | 97 13 ef 62 cf 20 ee b0 90 b4 cf 82 0e 0f 22 39 | e3 df 65 31 9c 8e f6 3f 29 ab d9 fd 59 a4 d0 0f | ea ad 4a 66 f7 84 e3 9f 1b c9 8a 96 8c 7a 0b c8 | 21 71 74 10 38 e5 82 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #3 in PARENT_I2 (find_v2_ike_sa) | start processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #4 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #4 is idle | #4 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 2 (0x2) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #4 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '2', total number '5', next payload '0' | stop processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #3 spent 0.0925 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.0995 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00105 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | d5 21 42 43 7a 44 94 22 84 5a e9 e3 f2 f6 40 66 | 35 20 23 20 00 00 00 01 00 00 02 17 00 00 01 fb | 00 03 00 05 3f c8 9d f9 95 6a 8d 6a e3 7a 29 ea | 3b ea a5 2c ba cd 57 f9 4c aa 10 5b ad bf 52 02 | 2d 44 3f f6 9d 12 81 33 fd b8 2d 6b f6 b7 a9 03 | 12 51 b6 bb c1 00 2a b9 9f 62 32 eb 18 c0 3b 52 | 53 0a 46 e9 36 25 5a 32 62 69 1d f6 27 4e 82 b9 | 66 d0 3e 98 08 d7 66 2f 95 a3 d6 a7 bc 35 41 79 | 85 cd 5f c0 c5 ab 47 ef 22 e4 3d 19 b0 30 da e1 | 73 e0 20 50 02 5a 3d f8 7b 18 fa ec d5 3f 83 db | a2 ea fc 09 9c dd 45 63 bf ef fa cd 64 84 97 48 | 68 3d e9 17 49 45 cb 0d b4 9f a1 b5 bc 8d e9 3c | 2d ac fd 6f 84 67 d6 93 85 75 a8 47 b4 a9 27 6d | c3 ac 45 1d e7 8b c9 3a 2f c2 68 89 4a 1c e5 8f | d9 12 f5 35 f3 4f 36 92 fd 3b fb 95 72 26 aa a5 | f2 b5 b9 bc 55 68 d5 83 4f b5 88 9f c4 82 19 10 | 60 27 08 20 03 5e 10 66 8c bf 49 f2 cc e2 c5 97 | 36 de 56 9a ab 03 ee 60 d0 fd fa 68 cf f7 cd e6 | 23 5d 06 28 75 f8 46 f3 9c 8b 32 ff 06 a7 cc 5c | 7b 3c 4e a6 05 4b 42 01 4b 33 b8 8b 19 1c 83 a7 | 62 6d ac 0b 7d 82 50 3b 50 78 00 ca bc a6 95 bd | 2f 1b e7 82 af e5 8d 68 98 4f 7d b9 b1 d3 e5 11 | 4e 42 ab 21 41 d2 fc b3 bc 1d 0a 95 d4 41 75 51 | 85 5c cc aa 42 ef 96 d7 6c 7c 7b 97 e7 23 13 2f | 2d 9e f2 02 22 45 25 7e 6c 26 b3 a4 e5 6c 9f 38 | 86 a6 03 06 51 4d a9 f1 05 3e 6a 47 dd b8 d5 e9 | 9d a9 29 31 c6 2e ab f3 0b 17 5a 7b fd b7 a7 17 | 3b 0e 9b b0 ac 66 3f f7 f6 da 6b c0 09 00 38 ad | cf 26 ee 23 b0 f2 32 e6 72 9e e6 ca 92 45 eb 77 | 95 7c 07 07 27 ba f4 31 73 ad 9e e9 e6 00 7d d9 | 6e 0c bd 86 6e 5e bf 2a 73 47 6c 9d a0 b2 b8 a0 | 33 75 4c ee 9a 62 a5 cf 82 dd 1c 56 9f 9b 62 a7 | 23 9f 9c f0 33 57 bd ab 40 53 46 89 08 09 d8 c3 | c4 7b 35 58 a8 00 4f | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #3 in PARENT_I2 (find_v2_ike_sa) | start processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #4 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #4 is idle | #4 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 3 (0x3) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #4 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '3', total number '5', next payload '0' | stop processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #3 spent 0.0907 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.0975 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00102 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | d5 21 42 43 7a 44 94 22 84 5a e9 e3 f2 f6 40 66 | 35 20 23 20 00 00 00 01 00 00 02 17 00 00 01 fb | 00 04 00 05 22 67 67 e9 00 4f 70 53 97 1e 76 01 | 32 e2 0f 30 fe b4 f4 0e c4 3a 02 ce aa 5a 77 f6 | 33 93 48 d3 a9 76 5e fc 2f d0 03 9d 3d 5e df b4 | ca 2e 85 9d 5d bf 94 a2 7d e0 18 2d c6 97 9d 3e | ac c6 8d 8c a8 93 70 40 e9 43 e0 ac a1 b0 f3 37 | 34 a1 4c 3b 1a 26 d0 6f 8b db a7 83 4b 70 e9 12 | 4f a1 c2 f7 87 12 12 34 39 35 59 3e 22 e3 e3 14 | c8 34 d8 4a a0 a6 03 1a f8 f9 7e 37 4b 3a f0 b0 | 9a c8 25 ff 5e 6b 1b 2c de bd e1 83 7e 04 a5 38 | 0d a0 ab e5 48 fd b1 3b 48 d5 2b cc 7d d3 58 7d | 0d 83 fc e1 fc b0 b2 72 c5 5e 96 6b 1c 04 c1 ee | 76 81 a0 ee 38 6f 4f 8b 49 5e cd aa 67 e6 5b 78 | 55 5b 64 fa 4e 8c 95 14 b2 ad 17 7c bc 23 cb 0c | ce fd 55 7a 3a a1 ef 86 94 07 fa c3 1b 72 23 7a | 23 f9 46 14 d2 c8 ee d6 3e 6c 7b 28 e5 54 7a 2c | 79 2e 6e c4 80 97 37 9d 4b a0 b1 64 28 8d bf 23 | 4e 8e 63 59 70 50 88 03 47 58 0c 1e a6 1d b4 7a | 5b 4c 4d 18 5f 43 a1 37 a8 42 b4 3c a2 d2 9d 50 | eb 50 cc 27 bc c6 77 8a 8f e5 98 1f 4e 91 76 9e | 8c a4 39 b4 d3 ec 50 45 24 46 96 26 98 bf a7 f9 | 2f b0 78 12 aa 52 37 5a 72 7c b5 2a b5 4f d5 c1 | 37 79 62 cb bc 18 9e cc 55 af c2 88 d6 be 4e 4a | ab 8f 6d 20 fd 9c b8 b5 83 ed f5 96 38 32 8c e5 | 1d 46 5f ba d2 23 50 8e 05 17 3f 8d dd f3 1f 47 | 9f 9b db 5a 08 3a 84 20 33 7a 74 a3 6e af 7a d7 | 14 78 87 4f 25 37 cf e5 d7 8f 43 33 75 fc a2 97 | e5 37 b9 19 1f 16 a5 b9 96 bb e4 28 3f df ed 0f | d6 6c f7 4f 07 af 8a 7a 68 eb f3 c9 9d fe db ea | 8f 8a 03 7f 77 57 e5 5e b8 30 0c 3f 7e e9 00 aa | dd af 2f 37 57 40 3b d6 f8 9f 3e d9 98 c6 47 79 | b4 96 de 7b 43 c1 6e 9b cc 39 43 9e 6d ea 21 a3 | 2a da b4 fa 67 9f c4 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #3 in PARENT_I2 (find_v2_ike_sa) | start processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #4 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #4 is idle | #4 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 4 (0x4) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #4 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '4', total number '5', next payload '0' | stop processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #3 spent 0.0901 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.0968 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00101 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 121 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | d5 21 42 43 7a 44 94 22 84 5a e9 e3 f2 f6 40 66 | 35 20 23 20 00 00 00 01 00 00 00 79 00 00 00 5d | 00 05 00 05 39 df 12 fe 59 8e e6 b1 55 71 e4 85 | 9a 1e da 71 56 e4 da 96 ba cb e2 2c 3f 77 34 4d | d7 49 5d 10 d7 75 fa 18 b9 c1 3e a8 12 ca cf 39 | 5e 84 0d 28 39 3c e3 41 78 25 09 69 a7 80 47 e4 | 27 af 1b 19 4f ee 80 78 0c a4 0e d7 fc 72 85 fc | a4 b4 ee b0 6c 83 bf 82 7b | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 121 (0x79) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #3 in PARENT_I2 (find_v2_ike_sa) | start processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #4 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #4 is idle | #4 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 93 (0x5d) | fragment number: 5 (0x5) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=85) | #4 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '5', total number '5', next payload '0' | #4 ikev2 ISAKMP_v2_IKE_AUTH decrypt success | Now let's proceed with payload (ISAKMP_NEXT_v2IDr) | **parse IKEv2 Identification - Responder - Payload: | next payload type: ISAKMP_NEXT_v2CERT (0x25) | flags: none (0x0) | length: 191 (0xbf) | ID type: ID_DER_ASN1_DN (0x9) | processing payload: ISAKMP_NEXT_v2IDr (len=183) | Now let's proceed with payload (ISAKMP_NEXT_v2CERT) | **parse IKEv2 Certificate Payload: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) | flags: none (0x0) | length: 1265 (0x4f1) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | processing payload: ISAKMP_NEXT_v2CERT (len=1260) | Now let's proceed with payload (ISAKMP_NEXT_v2AUTH) | **parse IKEv2 Authentication Payload: | next payload type: ISAKMP_NEXT_v2CP (0x2f) | flags: none (0x0) | length: 392 (0x188) | auth method: IKEv2_AUTH_RSA (0x1) | processing payload: ISAKMP_NEXT_v2AUTH (len=384) | Now let's proceed with payload (ISAKMP_NEXT_v2CP) | **parse IKEv2 Configuration Payload: | next payload type: ISAKMP_NEXT_v2SA (0x21) | flags: none (0x0) | length: 24 (0x18) | ikev2_cfg_type: IKEv2_CP_CFG_REPLY (0x2) | processing payload: ISAKMP_NEXT_v2CP (len=16) | Now let's proceed with payload (ISAKMP_NEXT_v2SA) | **parse IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) | flags: none (0x0) | length: 36 (0x24) | processing payload: ISAKMP_NEXT_v2SA (len=32) | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) | **parse IKEv2 Traffic Selector - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) | flags: none (0x0) | length: 24 (0x18) | number of TS: 1 (0x1) | processing payload: ISAKMP_NEXT_v2TSi (len=16) | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) | **parse IKEv2 Traffic Selector - Responder - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 24 (0x18) | number of TS: 1 (0x1) | processing payload: ISAKMP_NEXT_v2TSr (len=16) | selected state microcode Initiator: process IKE_AUTH response | Now let's proceed with state specific processing | calling processor Initiator: process IKE_AUTH response | global one-shot timer EVENT_FREE_ROOT_CERTS scheduled in 300 seconds | #3 spent 0.00361 milliseconds in find_and_verify_certs() calling get_root_certs() | checking for known CERT payloads | saving certificate of type 'X509_SIGNATURE' | decoded cert: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | #3 spent 0.534 milliseconds in find_and_verify_certs() calling decode_cert_payloads() | cert_issuer_has_current_crl: looking for a CRL issued by E=testing@libreswan.org,CN=Libreswan test CA for mainca,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | #3 spent 0.0438 milliseconds in find_and_verify_certs() calling crl_update_check() | missing or expired CRL | crl_strict: 0, ocsp: 0, ocsp_strict: 0, ocsp_post: 0 | verify_end_cert trying profile IPsec | certificate is valid (profile IPsec) | #3 spent 0.126 milliseconds in find_and_verify_certs() calling verify_end_cert() "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: certificate verified OK: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f362458 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f361a98 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f3618e8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f360f28 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f3475a8 | unreference key: 0x56091f34b018 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | #3 spent 0.292 milliseconds in decode_certs() calling add_pubkey_from_nss_cert() | #3 spent 1.04 milliseconds in decode_certs() | DER ASN1 DN: 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 | DER ASN1 DN: 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | DER ASN1 DN: 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | DER ASN1 DN: 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | DER ASN1 DN: 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | DER ASN1 DN: 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | DER ASN1 DN: 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 61 73 | DER ASN1 DN: 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | DER ASN1 DN: 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 | DER ASN1 DN: 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 61 73 | DER ASN1 DN: 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | DER ASN1 DN: 77 61 6e 2e 6f 72 67 | ID_DER_ASN1_DN '%fromcert' does not need further ID verification | stomping on peer_id | X509: CERT and ID matches current connection | offered CA: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: IKEv2 mode peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' | verifying AUTH payload | required RSA CA is '%any' | checking RSA keyid 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' for match with 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | key issuer CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | an RSA Sig check passed with *AwEAAbEef [remote certificates] | #3 spent 0.122 milliseconds in try_all_RSA_keys() trying a pubkey "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: Authenticated using RSA | #3 spent 0.163 milliseconds in ikev2_verify_rsa_hash() | parent state #3: PARENT_I2(open IKE SA) => PARENT_I3(established IKE SA) | #3 will start re-keying in 2638 seconds with margin of 962 seconds (attempting re-key) | state #3 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x7f7bc0002888 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7f7bc0002b78 | event_schedule: new EVENT_SA_REKEY-pe@0x7f7bc0002b78 | inserting event EVENT_SA_REKEY, timeout in 2638 seconds for #3 | libevent_malloc: new ptr-libevent@0x56091f35bb08 size 128 | pstats #3 ikev2.ike established | FOR_EACH_STATE_... in nat_traversal_ka_event (for_each_state) | [RE]START processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | stop processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | resume processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | suspend processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | start processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | NAT-T: keepalive packet not required as recent DPD event used the IKE SA on conn westnet-eastnet-ipv4-psk-ikev2 | stop processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | resume processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds | #4 westnet-eastnet-ipv4-psk-ikev2[1] parsing ISAKMP_NEXT_v2CP payload | ***parse IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_ADDRESS (0x1) | length/value: 4 (0x4) | parsing 4 raw bytes of IKEv2 Configuration Payload Attribute into INTERNAL_IP_ADDRESS | INTERNAL_IP_ADDRESS c0 00 02 01 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: received INTERNAL_IP4_ADDRESS 192.0.2.1 | setting host source IP address to 192.0.2.1 | ***parse IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_DNS (0x3) | length/value: 4 (0x4) | parsing 4 raw bytes of IKEv2 Configuration Payload Attribute into INTERNAL_IP_DNS CP payload | INTERNAL_IP_DNS CP payload | 01 02 03 04 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: received INTERNAL_IP4_DNS 1.2.3.4 | TSi: parsing 1 traffic selectors | ***parse IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | length: 16 (0x10) | start port: 0 (0x0) | end port: 65535 (0xffff) | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low | TS low c0 00 02 01 | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high | TS high c0 00 02 01 | TSi: parsed 1 traffic selectors | TSr: parsing 1 traffic selectors | ***parse IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | length: 16 (0x10) | start port: 0 (0x0) | end port: 65535 (0xffff) | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low | TS low c0 01 02 17 | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high | TS high c0 01 02 17 | TSr: parsed 1 traffic selectors | evaluating our conn="westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 I=192.0.2.1/32:0/0 R=192.1.2.23/32:0/0 to their: | TSi[0] .net=192.0.2.1-192.0.2.1 .iporotoid=0 .{start,end}port=0..65535 | match address end->client=192.0.2.1/32 >= TSi[0]net=192.0.2.1-192.0.2.1: YES fitness 32 | narrow port end=0..65535 >= TSi[0]=0..65535: 0 | TSi[0] port match: YES fitness 65536 | narrow protocol end=*0 >= TSi[0]=*0: 0 | match end->protocol=*0 >= TSi[0].ipprotoid=*0: YES fitness 255 | TSr[0] .net=192.1.2.23-192.1.2.23 .iporotoid=0 .{start,end}port=0..65535 | match address end->client=192.1.2.23/32 >= TSr[0]net=192.1.2.23-192.1.2.23: YES fitness 32 | narrow port end=0..65535 >= TSr[0]=0..65535: 0 | TSr[0] port match: YES fitness 65536 | narrow protocol end=*0 >= TSr[0]=*0: 0 | match end->protocol=*0 >= TSr[0].ipprotoid=*0: YES fitness 255 | best fit so far: TSi[0] TSr[0] | found an acceptable TSi/TSr Traffic Selector | printing contents struct traffic_selector | ts_type: IKEv2_TS_IPV6_ADDR_RANGE | ipprotoid: 0 | port range: 0-65535 | ip range: 192.0.2.1-192.0.2.1 | printing contents struct traffic_selector | ts_type: IKEv2_TS_IPV6_ADDR_RANGE | ipprotoid: 0 | port range: 0-65535 | ip range: 192.1.2.23-192.1.2.23 | using existing local ESP/AH proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE_AUTH initiator accepting remote ESP/AH proposal): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | Comparing remote proposals against IKE_AUTH initiator accepting remote ESP/AH proposal 4 local proposals | local proposal 1 type ENCR has 1 transforms | local proposal 1 type PRF has 0 transforms | local proposal 1 type INTEG has 1 transforms | local proposal 1 type DH has 1 transforms | local proposal 1 type ESN has 1 transforms | local proposal 1 transforms: required: ENCR+ESN; optional: INTEG+DH | local proposal 2 type ENCR has 1 transforms | local proposal 2 type PRF has 0 transforms | local proposal 2 type INTEG has 1 transforms | local proposal 2 type DH has 1 transforms | local proposal 2 type ESN has 1 transforms | local proposal 2 transforms: required: ENCR+ESN; optional: INTEG+DH | local proposal 3 type ENCR has 1 transforms | local proposal 3 type PRF has 0 transforms | local proposal 3 type INTEG has 2 transforms | local proposal 3 type DH has 1 transforms | local proposal 3 type ESN has 1 transforms | local proposal 3 transforms: required: ENCR+INTEG+ESN; optional: DH | local proposal 4 type ENCR has 1 transforms | local proposal 4 type PRF has 0 transforms | local proposal 4 type INTEG has 2 transforms | local proposal 4 type DH has 1 transforms | local proposal 4 type ESN has 1 transforms | local proposal 4 transforms: required: ENCR+INTEG+ESN; optional: DH | ***parse IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | length: 32 (0x20) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI | remote SPI 01 10 7c b8 | Comparing remote proposal 1 containing 2 transforms against local proposal [1..1] of 4 local proposals | ****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 12 (0xc) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | *****parse IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 | ****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | remote proposal 1 transform 1 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 | remote proposal 1 proposed transforms: ENCR+ESN; matched: ENCR+ESN; unmatched: none | comparing remote proposal 1 containing ENCR+ESN transforms to local proposal 1; required: ENCR+ESN; optional: INTEG+DH; matched: ENCR+ESN | remote proposal 1 matches local proposal 1 | remote accepted the proposal 1:ESP:ENCR=AES_GCM_C_256;ESN=DISABLED[first-match] | IKE_AUTH initiator accepting remote ESP/AH proposal ikev2_proposal: 1:ESP:SPI=01107cb8;ENCR=AES_GCM_C_256;ESN=DISABLED | converting proposal to internal trans attrs | integ=none: .key_size=0 encrypt=aes_gcm_16: .key_size=32 .salt_size=4 keymat_len=36 | install_ipsec_sa() for #4: inbound and outbound | could_route called for westnet-eastnet-ipv4-psk-ikev2 (kind=CK_INSTANCE) | FOR_EACH_CONNECTION_... in route_owner | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | route owner of "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 unrouted: NULL; eroute owner: NULL | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 | AES_GCM_16 requires 4 salt bytes | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnet-eastnet-ipv4-psk-ikev2' not available on interface eth0 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.1107cb8@192.1.2.23 included non-error error | set up outgoing SA, ref=0/0 | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 | AES_GCM_16 requires 4 salt bytes | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnet-eastnet-ipv4-psk-ikev2' not available on interface eth0 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.ce92feb7@192.1.3.209 included non-error error | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | add inbound eroute 192.1.2.23/32:0 --0-> 192.0.2.1/32:0 => tun.10000@192.1.3.209 (raw_eroute) | IPsec Sa SPD priority set to 1040351 | raw_eroute result=success | set up incoming SA, ref=0/0 | sr for #4: unrouted | route_and_eroute() for proto 0, and source port 0 dest port 0 | FOR_EACH_CONNECTION_... in route_owner | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | route owner of "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 unrouted: NULL; eroute owner: NULL | route_and_eroute with c: westnet-eastnet-ipv4-psk-ikev2 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #4 | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | eroute_connection add eroute 192.0.2.1/32:0 --0-> 192.1.2.23/32:0 => tun.0@192.1.2.23 (raw_eroute) | IPsec Sa SPD priority set to 1040351 | raw_eroute result=success | running updown command "ipsec _updown" for verb up | command executing up-client | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16400' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CO | popen cmd is 1359 chars long | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv: | cmd( 80):4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1: | cmd( 160):.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Departmen: | cmd( 240):t, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CL: | cmd( 320):IENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.25: | cmd( 400):5.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16400' PLUTO_: | cmd( 480):SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto: | cmd( 560):, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@te: | cmd( 640):sting.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='19: | cmd( 720):2.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEE: | cmd( 800):R_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CON: | cmd( 880):N_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_T: | cmd( 960):RACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY=: | cmd(1040):'ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0' PLUT: | cmd(1120):O_PEER_DNS_INFO='1.2.3.4' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_C: | cmd(1200):FG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUT: | cmd(1280):ING='no' VTI_SHARED='no' SPI_IN=0x1107cb8 SPI_OUT=0xce92feb7 ipsec _updown 2>&1: "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: up-client output: updating resolvconf "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: up-client output: rm: cannot remove '/etc/resolv.conf': Device or resource busy | route_and_eroute: firewall_notified: true | running updown command "ipsec _updown" for verb prepare | command executing prepare-client | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16400' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | popen cmd is 1364 chars long | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastne: | cmd( 80):t-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME=': | cmd( 160):192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depa: | cmd( 240):rtment, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_: | cmd( 320):MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='2: | cmd( 400):55.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16400' P: | cmd( 480):LUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=To: | cmd( 560):ronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-ea: | cmd( 640):st@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NE: | cmd( 720):T='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUT: | cmd( 800):O_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUT: | cmd( 880):O_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SA: | cmd( 960):REF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFA: | cmd(1040):MILY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0': | cmd(1120): PLUTO_PEER_DNS_INFO='1.2.3.4' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PL: | cmd(1200):UTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI: | cmd(1280):_ROUTING='no' VTI_SHARED='no' SPI_IN=0x1107cb8 SPI_OUT=0xce92feb7 ipsec _updown : | cmd(1360):2>&1: | running updown command "ipsec _updown" for verb route | command executing route-client | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16400' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PL | popen cmd is 1362 chars long | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-: | cmd( 80):ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='19: | cmd( 160):2.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depart: | cmd( 240):ment, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY: | cmd( 320):_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255: | cmd( 400):.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16400' PLU: | cmd( 480):TO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toro: | cmd( 560):nto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east: | cmd( 640):@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET=: | cmd( 720):'192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_: | cmd( 800):PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_: | cmd( 880):CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SARE: | cmd( 960):F_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMI: | cmd(1040):LY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0' P: | cmd(1120):LUTO_PEER_DNS_INFO='1.2.3.4' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUT: | cmd(1200):O_CFG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_R: | cmd(1280):OUTING='no' VTI_SHARED='no' SPI_IN=0x1107cb8 SPI_OUT=0xce92feb7 ipsec _updown 2>: | cmd(1360):&1: "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: route-client output: Error: Peer netns reference is invalid. | route_and_eroute: instance "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23, setting eroute_owner {spd=0x56091f367068,sr=0x56091f367068} to #4 (was #0) (newest_ipsec_sa=#0) | #3 spent 1.98 milliseconds in install_ipsec_sa() | inR2: instance westnet-eastnet-ipv4-psk-ikev2[1], setting IKEv2 newest_ipsec_sa to #4 (was #0) (spd.eroute=#4) cloned from #3 | state #4 requesting EVENT_RETRANSMIT to be deleted | #4 STATE_PARENT_I2: retransmits: cleared | libevent_free: release ptr-libevent@0x56091f366c28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x56091f3494a8 | #4 spent 3.72 milliseconds in processing: Initiator: process IKE_AUTH response in ikev2_process_state_packet() | [RE]START processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #4 complete_v2_state_transition() PARENT_I2->V2_IPSEC_I with status STF_OK | IKEv2: transition from state STATE_PARENT_I2 to state STATE_V2_IPSEC_I | child state #4: PARENT_I2(open IKE SA) => V2_IPSEC_I(established CHILD SA) | Message ID: updating counters for #4 to 1 after switching state | Message ID: recv #3.#4 response 1; ike: initiator.sent=1 initiator.recv=0->1 responder.sent=-1 responder.recv=-1; child: wip.initiator=1->-1 wip.responder=-1 | Message ID: #3.#4 skipping update_send as nothing to send; initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 | pstats #4 ikev2.child established "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: negotiated connection [192.0.2.1-192.0.2.1:0-65535 0] -> [192.1.2.23-192.1.2.23:0-65535 0] | NAT-T: NAT Traversal detected - their IKE port is '500' | NAT-T: encaps is 'auto' "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP/NAT=>0x01107cb8 <0xce92feb7 xfrm=AES_GCM_16_256-NONE NATOA=none NATD=192.1.2.23:4500 DPD=passive} | releasing whack for #4 (sock=fd@23) | close_any(fd@23) (in release_whack() at state.c:654) | releasing whack and unpending for parent #3 | unpending state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 | delete from pending Child SA with 192.1.2.23 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 | removing pending policy for no connection {0x56091f31db98} | close_any(fd@22) (in release_whack() at state.c:654) | #4 will start re-keying in 27829 seconds with margin of 971 seconds (attempting re-key) | event_schedule: new EVENT_SA_REKEY-pe@0x56091f3494a8 | inserting event EVENT_SA_REKEY, timeout in 27829 seconds for #4 | libevent_malloc: new ptr-libevent@0x56091f34af68 size 128 | stop processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #3 spent 3.96 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 3.98 milliseconds in comm_handle_cb() reading and processing packet | kernel_process_msg_cb process netlink message | netlink_get: XFRM_MSG_DELPOLICY message | xfrm netlink address change RTM_NEWADDR msg len 76 | XFRM RTM_NEWADDR 192.0.2.1 IFA_LOCAL | FOR_EACH_STATE_... in record_newaddr (for_each_state) | start processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | stop processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | start processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | stop processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | IKEv2 received address RTM_NEWADDR type 3 | IKEv2 received address RTM_NEWADDR type 8 | IKEv2 received address RTM_NEWADDR type 6 | netlink_get: XFRM_MSG_EXPIRE message | netlink_get: XFRM_MSG_EXPIRE message | spent 0.0409 milliseconds in kernel message | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00298 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00197 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00192 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (in terminate_a_connection() at terminate.c:69) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: terminating SAs using this connection | connection 'westnet-eastnet-ipv4-psk-ikev2' -POLICY_UP | FOR_EACH_STATE_... in shared_phase1_connection | connection not shared - terminating IKE and IPsec SA | Deleting states for connection - not including other IPsec SA's | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #4 | suspend processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) | start processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) | pstats #4 ikev2.child deleted completed | #4 spent 3.72 milliseconds in total | [RE]START processing: state #4 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:879) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: deleting state (STATE_V2_IPSEC_I) aged 0.168s and NOT sending notification | child state #4: V2_IPSEC_I(established CHILD SA) => delete | get_sa_info esp.1107cb8@192.1.2.23 | get_sa_info esp.ce92feb7@192.1.3.209 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: ESP traffic information: in=0B out=0B | IMPAIR: impair-send-no-delete set - not sending Delete/Notify | state #4 requesting EVENT_SA_REKEY to be deleted | libevent_free: release ptr-libevent@0x56091f34af68 | free_event_entry: release EVENT_SA_REKEY-pe@0x56091f3494a8 | running updown command "ipsec _updown" for verb down | command executing down-client | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16400' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844112' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | popen cmd is 1369 chars long | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-i: | cmd( 80):pv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192: | cmd( 160):.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Departm: | cmd( 240):ent, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_: | cmd( 320):CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.: | cmd( 400):255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16400' PLUT: | cmd( 480):O_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toron: | cmd( 560):to, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@: | cmd( 640):testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET=': | cmd( 720):192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_P: | cmd( 800):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844112: | cmd( 880):' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING: | cmd( 960):+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_A: | cmd(1040):DDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISC: | cmd(1120):O='0' PLUTO_PEER_DNS_INFO='1.2.3.4' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER=: | cmd(1200):'' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE=': | cmd(1280):' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x1107cb8 SPI_OUT=0xce92feb7 ipsec _up: | cmd(1360):down 2>&1: "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #4: down-client output: restoring resolvconf | shunt_eroute() called for connection 'westnet-eastnet-ipv4-psk-ikev2' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | IPsec Sa SPD priority set to 1040351 | delete esp.1107cb8@192.1.2.23 | netlink response for Del SA esp.1107cb8@192.1.2.23 included non-error error | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | delete inbound eroute 192.1.2.23/32:0 --0-> 192.0.2.1/32:0 => unk255.10000@192.1.3.209 (raw_eroute) | raw_eroute result=success | delete esp.ce92feb7@192.1.3.209 | netlink response for Del SA esp.ce92feb7@192.1.3.209 included non-error error | stop processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (BACKGROUND) (in update_state_connection() at connections.c:4076) | start processing: connection NULL (in update_state_connection() at connections.c:4077) | in connection_discard for connection westnet-eastnet-ipv4-psk-ikev2 | State DB: deleting IKEv2 state #4 in V2_IPSEC_I | child state #4: V2_IPSEC_I(established CHILD SA) => UNDEFINED(ignore) | stop processing: state #4 from 192.1.2.23 (in delete_state() at state.c:1143) | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) | state #3 | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #3 | start processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) | pstats #3 ikev2.ike deleted completed | #3 spent 15.2 milliseconds in total | [RE]START processing: state #3 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:879) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #3: deleting state (STATE_PARENT_I3) aged 0.211s and NOT sending notification | parent state #3: PARENT_I3(established IKE SA) => delete | IMPAIR: impair-send-no-delete set - not sending Delete/Notify | state #3 requesting EVENT_SA_REKEY to be deleted | libevent_free: release ptr-libevent@0x56091f35bb08 | free_event_entry: release EVENT_SA_REKEY-pe@0x7f7bc0002b78 | State DB: IKEv2 state not found (flush_incomplete_children) | in connection_discard for connection westnet-eastnet-ipv4-psk-ikev2 | State DB: deleting IKEv2 state #3 in PARENT_I3 | parent state #3: PARENT_I3(established IKE SA) => UNDEFINED(ignore) | unreference key: 0x56091f347448 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 2-- | stop processing: state #3 from 192.1.2.23 (in delete_state() at state.c:1143) | unreference key: 0x56091f347448 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | unreference key: 0x56091f36c1a8 user-east@testing.libreswan.org cnt 1-- | unreference key: 0x56091f34f528 @east.testing.libreswan.org cnt 1-- | unreference key: 0x56091f357df8 east@testing.libreswan.org cnt 1-- | unreference key: 0x56091f365da8 192.1.2.23 cnt 1-- | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) | start processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (in delete_connection() at connections.c:189) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: deleting connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 instance with peer 192.1.2.23 {isakmp=#0/ipsec=#0} | Deleting states for connection - not including other IPsec SA's | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | shunt_eroute() called for connection 'westnet-eastnet-ipv4-psk-ikev2' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | FOR_EACH_CONNECTION_... in route_owner | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | route owner of "westnet-eastnet-ipv4-psk-ikev2" unrouted: NULL | running updown command "ipsec _updown" for verb unroute | command executing unroute-client | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16400' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' | popen cmd is 1344 chars long | cmd( 0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastne: | cmd( 80):t-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME=': | cmd( 160):192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depa: | cmd( 240):rtment, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_: | cmd( 320):MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='2: | cmd( 400):55.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16400' P: | cmd( 480):LUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=T: | cmd( 560):oronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-e: | cmd( 640):ast@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_N: | cmd( 720):ET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLU: | cmd( 800):TO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLU: | cmd( 880):TO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SARE: | cmd( 960):F_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFA: | cmd(1040):MILY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0': | cmd(1120): PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG: | cmd(1200):_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTIN: | cmd(1280):G='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1: "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. | flush revival: connection 'westnet-eastnet-ipv4-psk-ikev2' wasn't on the list | stop processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (in discard_connection() at connections.c:249) | processing: STOP connection NULL (in terminate_a_connection() at terminate.c:87) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in delete_connection() at connections.c:189) | Deleting states for connection - not including other IPsec SA's | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | free hp@0x56091f35ed28 | flush revival: connection 'westnet-eastnet-ipv4-psk-ikev2' wasn't on the list | stop processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in discard_connection() at connections.c:249) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection westnet-eastnet-ipv4-psk-ikev2 with policy ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | No AUTH policy was set - defaulting to RSASIG | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | setting ID to ID_DER_ASN1_DN: 'E=user-road@testing.libreswan.org,CN=road.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' | loading left certificate 'road' pubkey | unreference key: 0x56091f348c88 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f34b438 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f351fa8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f34be88 | unreference key: 0x56091f347a08 @road.testing.libreswan.org cnt 1-- | unreference key: 0x56091f3480c8 user-road@testing.libreswan.org cnt 1-- | unreference key: 0x56091f365da8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- | secrets entry for road already exists | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org is 0 | counting wild cards for %fromcert is 0 | based upon policy narrowing=yes, the connection is a template. | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x56091f367fa8 added connection description "westnet-eastnet-ipv4-psk-ikev2" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.209[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org,+MC+S=C]---192.1.3.254...192.1.2.23<192.1.2.23>[%fromcert] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 3.19 milliseconds in whack | kernel_process_msg_cb process netlink message | netlink_get: XFRM_MSG_UPDPOLICY message | netlink_get: XFRM_MSG_GETPOLICY message | xfrm netlink address change RTM_DELADDR msg len 76 | XFRM RTM_DELADDR 192.0.2.1 IFA_LOCAL | FOR_EACH_STATE_... in record_deladdr (for_each_state) | IKEv2 received address RTM_DELADDR type 3 | IKEv2 received address RTM_DELADDR type 8 | IKEv2 received address RTM_DELADDR type 6 | netlink_get: XFRM_MSG_UPDPOLICY message | spent 0.0324 milliseconds in kernel message | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00422 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00275 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | dup_any(fd@16) -> fd@21 (in whack_process() at rcv_whack.c:590) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in initiate_a_connection() at initiate.c:186) | find_host_pair: comparing 192.1.3.209:500 to 192.1.2.23:500 but ignoring ports | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@0x56091f367fa8: westnet-eastnet-ipv4-psk-ikev2 | connection 'westnet-eastnet-ipv4-psk-ikev2' +POLICY_UP | dup_any(fd@21) -> fd@22 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #5 at 0x56091f35acc8 | State DB: adding IKEv2 state #5 in UNDEFINED | pstats #5 ikev2.ike started | Message ID: init #5: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #5: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #5; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@22) -> fd@23 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 IKE SA #5 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #5: initiating v2 parent SA | constructing local IKE proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator selecting KE) | converting ike_info AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: constructed local IKE proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | adding ikev2_outI1 KE work-order 5 for state #5 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f7bc0002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #5 | libevent_malloc: new ptr-libevent@0x7f7bb4000f48 size 128 | #5 spent 0.19 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 3 resuming | crypto helper 3 starting work-order 5 for state #5 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 5 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 5 time elapsed 0.00072 seconds | (#5) spent 0.722 milliseconds in crypto helper computing work-order 5: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 5 for state #5 to event queue | scheduling resume sending helper answer for #5 | libevent_malloc: new ptr-libevent@0x7f7bb8002888 size 128 | crypto helper 3 waiting (nothing to do) | close_any(fd@21) (in initiate_connection() at initiate.c:372) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.272 milliseconds in whack | processing resume sending helper answer for #5 | start processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 5 | calling continuation function 0x56091de22b50 | ikev2_parent_outI1_continue for #5 | **emit ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | discarding INTEG=NONE | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 11 (0xb) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding INTEG=NONE | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 100 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding INTEG=NONE | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 2 (0x2) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 11 (0xb) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding INTEG=NONE | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 100 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 3 (0x3) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 13 (0xd) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 116 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 4 (0x4) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 13 (0xd) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 116 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 436 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 08 55 78 4f c7 b0 e9 02 b8 2f da 55 da 35 ad 2c | ikev2 g^x 87 cd ab e2 12 f0 6d b9 6a fd 88 af 63 c1 3e 6b | ikev2 g^x 52 17 87 5e a1 49 d9 73 dd 42 12 e7 03 7f 1d 32 | ikev2 g^x 71 c1 0f 1c 89 a8 38 ce 3c 09 1c 2d 11 96 9d e9 | ikev2 g^x 3e 09 7c 35 2a 0a bc 79 ee b6 2a 74 2f c9 8b 83 | ikev2 g^x 2b 02 50 c3 f6 ea 34 ac a9 44 53 6b 53 fb f4 95 | ikev2 g^x 10 a5 85 3e 66 c7 77 41 4d 4a 7f 40 7e 75 30 c2 | ikev2 g^x e6 04 9c d5 7a d0 d7 9a 6b 64 a2 84 6c f3 a8 2e | ikev2 g^x 55 4f 9d 9f a3 36 a5 e2 46 cf af 2c a4 e5 7b 61 | ikev2 g^x 79 76 78 76 46 ac 2c ef d8 6d d1 88 88 ec 85 e2 | ikev2 g^x 16 0f be c7 4c 05 f3 77 ea 45 04 a1 91 d8 6b 90 | ikev2 g^x ee 99 81 70 1d e1 b4 53 ea 41 7c 1a aa 8f 3a d2 | ikev2 g^x af 84 b9 96 ca 22 d6 92 75 14 7a 60 28 9d f0 70 | ikev2 g^x 8e db 77 5d ea a4 b5 a6 78 d4 49 ce da cb e4 a5 | ikev2 g^x a9 67 59 62 bd 20 f3 a7 bd 26 44 3d bc 29 e7 34 | ikev2 g^x d6 33 89 01 77 a0 ad c5 96 a9 38 78 56 c9 73 71 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2e d8 19 0d 92 2b 64 0b 8c 93 d3 78 93 67 1c da | IKEv2 nonce 8e 07 12 74 6c 70 d2 b8 15 bf 50 68 6b dc 79 43 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= 30 1c e5 fa 9d bd 82 51 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d1 | natd_hash: port=500 | natd_hash: hash= 16 4a 16 84 61 61 0a f1 4f eb f1 b8 e8 56 2d 73 | natd_hash: hash= f1 f5 ec c5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 16 4a 16 84 61 61 0a f1 4f eb f1 b8 e8 56 2d 73 | Notify data f1 f5 ec c5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= 30 1c e5 fa 9d bd 82 51 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 57 25 d2 94 ca 4b b2 3f ce 06 3e 88 78 5d a4 b8 | natd_hash: hash= 2a 8d 3f 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 57 25 d2 94 ca 4b b2 3f ce 06 3e 88 78 5d a4 b8 | Notify data 2a 8d 3f 02 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 828 | stop processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #5 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #5: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #5 to 4294967295 after switching state | Message ID: IKE #5 skipping update_recv as MD is fake | Message ID: sent #5 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #5: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) | sending 828 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #5) | 30 1c e5 fa 9d bd 82 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f | 28 00 01 08 00 0e 00 00 08 55 78 4f c7 b0 e9 02 | b8 2f da 55 da 35 ad 2c 87 cd ab e2 12 f0 6d b9 | 6a fd 88 af 63 c1 3e 6b 52 17 87 5e a1 49 d9 73 | dd 42 12 e7 03 7f 1d 32 71 c1 0f 1c 89 a8 38 ce | 3c 09 1c 2d 11 96 9d e9 3e 09 7c 35 2a 0a bc 79 | ee b6 2a 74 2f c9 8b 83 2b 02 50 c3 f6 ea 34 ac | a9 44 53 6b 53 fb f4 95 10 a5 85 3e 66 c7 77 41 | 4d 4a 7f 40 7e 75 30 c2 e6 04 9c d5 7a d0 d7 9a | 6b 64 a2 84 6c f3 a8 2e 55 4f 9d 9f a3 36 a5 e2 | 46 cf af 2c a4 e5 7b 61 79 76 78 76 46 ac 2c ef | d8 6d d1 88 88 ec 85 e2 16 0f be c7 4c 05 f3 77 | ea 45 04 a1 91 d8 6b 90 ee 99 81 70 1d e1 b4 53 | ea 41 7c 1a aa 8f 3a d2 af 84 b9 96 ca 22 d6 92 | 75 14 7a 60 28 9d f0 70 8e db 77 5d ea a4 b5 a6 | 78 d4 49 ce da cb e4 a5 a9 67 59 62 bd 20 f3 a7 | bd 26 44 3d bc 29 e7 34 d6 33 89 01 77 a0 ad c5 | 96 a9 38 78 56 c9 73 71 29 00 00 24 2e d8 19 0d | 92 2b 64 0b 8c 93 d3 78 93 67 1c da 8e 07 12 74 | 6c 70 d2 b8 15 bf 50 68 6b dc 79 43 29 00 00 08 | 00 00 40 2e 29 00 00 1c 00 00 40 04 16 4a 16 84 | 61 61 0a f1 4f eb f1 b8 e8 56 2d 73 f1 f5 ec c5 | 00 00 00 1c 00 00 40 05 57 25 d2 94 ca 4b b2 3f | ce 06 3e 88 78 5d a4 b8 2a 8d 3f 02 | state #5 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f7bb4000f48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f7bc0002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #5: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x7f7bc0002b78 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #5 | libevent_malloc: new ptr-libevent@0x56091f349398 size 128 | #5 STATE_PARENT_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29398.588867 | resume sending helper answer for #5 suppresed complete_v2_state_transition() and stole MD | #5 spent 0.839 milliseconds in resume sending helper answer | stop processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f7bb8002888 | spent 0.00292 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 437 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | 30 1c e5 fa 9d bd 82 51 02 e0 05 22 f9 3f 72 39 | 21 20 22 20 00 00 00 00 00 00 01 b5 22 00 00 28 | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 | 80 0e 01 00 03 00 00 08 02 00 00 07 00 00 00 08 | 04 00 00 0e 28 00 01 08 00 0e 00 00 2a 41 82 0e | 46 bc 44 58 bd a9 8b 48 d6 31 44 5d e7 27 31 08 | 4c e5 f6 20 f5 fc 14 56 41 a8 fd e2 04 e3 0d e2 | 3d f1 4d ef 5a 6e 78 5d 85 88 45 ac a8 4a bc 64 | eb 73 b6 c2 4c 44 18 a4 f2 97 f0 60 99 31 4b 7b | de 73 cd 45 ba 81 e2 bb 07 18 df f6 c0 3e 20 fb | 69 74 08 a5 10 15 c3 a4 58 87 ff 3f 3c 04 12 30 | de ad c1 8f 84 f8 3a f5 31 89 4d 9d e0 aa fd 01 | 92 7a bf 1e 41 1f 97 d1 14 16 a8 dd b3 d4 c9 d2 | 52 2a 5f 13 0a 0c 52 f4 40 ee b6 12 4d 99 c2 ac | d3 19 38 de 19 f3 c3 40 ed 2b 88 dc 99 08 83 8f | 14 5c 05 da 96 fa df 05 c3 dc 43 d6 f2 b3 9e 04 | 2c 2f b4 32 ed 24 10 6d f6 f2 f3 2d 88 d0 45 a8 | 34 3b 46 ba c7 89 be 72 b3 9f e2 12 7f f6 f0 c3 | 47 91 aa 46 60 32 45 c9 aa 5e 35 03 f2 92 8c 58 | d5 2f 94 19 ac a1 f6 f5 e0 ae 22 6e fe 5c d4 12 | c8 b6 b2 ad 23 3c e5 cc 69 8c 44 db 29 00 00 24 | e5 72 e0 62 5e 01 e8 cb 73 f1 66 21 d3 21 69 90 | be fc 68 0e 7d 00 59 78 01 bd 76 0d cd 59 97 ff | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 | 60 f5 d1 1f 27 fe d1 fd fa 52 05 a9 88 49 87 e9 | 92 6f 87 48 26 00 00 1c 00 00 40 05 67 8f 4f 65 | ac 23 62 49 7d fb 43 d1 b7 42 11 73 6f 06 53 86 | 00 00 00 05 04 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_v2SA (0x21) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 0 (0x0) | length: 437 (0x1b5) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_SA_INIT response | State DB: found IKEv2 state #5 in PARENT_I1 (find_v2_ike_sa_by_initiator_spi) | start processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | [RE]START processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #5 is idle | #5 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SA) | ***parse IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2KE (0x22) | flags: none (0x0) | length: 40 (0x28) | processing payload: ISAKMP_NEXT_v2SA (len=36) | Now let's proceed with payload (ISAKMP_NEXT_v2KE) | ***parse IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2Ni (0x28) | flags: none (0x0) | length: 264 (0x108) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | processing payload: ISAKMP_NEXT_v2KE (len=256) | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) | ***parse IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 36 (0x24) | processing payload: ISAKMP_NEXT_v2Ni (len=32) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 8 (0x8) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | processing payload: ISAKMP_NEXT_v2N (len=0) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 28 (0x1c) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | processing payload: ISAKMP_NEXT_v2N (len=20) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26) | flags: none (0x0) | length: 28 (0x1c) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | processing payload: ISAKMP_NEXT_v2N (len=20) | Now let's proceed with payload (ISAKMP_NEXT_v2CERTREQ) | ***parse IKEv2 Certificate Request Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 5 (0x5) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | processing payload: ISAKMP_NEXT_v2CERTREQ (len=0) | State DB: re-hashing IKEv2 state #5 IKE SPIi and SPI[ir] | #5 in state PARENT_I1: sent v2I1, expected v2R1 | selected state microcode Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH | Now let's proceed with state specific processing | calling processor Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH | ikev2 parent inR1: calculating g^{xy} in order to send I2 | using existing local IKE proposals for connection westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator accepting remote proposal): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | Comparing remote proposals against IKE initiator (accepting) 4 local proposals | local proposal 1 type ENCR has 1 transforms | local proposal 1 type PRF has 2 transforms | local proposal 1 type INTEG has 1 transforms | local proposal 1 type DH has 8 transforms | local proposal 1 type ESN has 0 transforms | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG | local proposal 2 type ENCR has 1 transforms | local proposal 2 type PRF has 2 transforms | local proposal 2 type INTEG has 1 transforms | local proposal 2 type DH has 8 transforms | local proposal 2 type ESN has 0 transforms | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG | local proposal 3 type ENCR has 1 transforms | local proposal 3 type PRF has 2 transforms | local proposal 3 type INTEG has 2 transforms | local proposal 3 type DH has 8 transforms | local proposal 3 type ESN has 0 transforms | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none | local proposal 4 type ENCR has 1 transforms | local proposal 4 type PRF has 2 transforms | local proposal 4 type INTEG has 2 transforms | local proposal 4 type DH has 8 transforms | local proposal 4 type ESN has 0 transforms | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none | ****parse IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | length: 36 (0x24) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 3 (0x3) | Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 4 local proposals | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 12 (0xc) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | ******parse IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | remote proposal 1 transform 2 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none | comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH | remote proposal 1 matches local proposal 1 | remote accepted the proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048[first-match] | converting proposal to internal trans attrs | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= 30 1c e5 fa 9d bd 82 51 | natd_hash: rcookie= 02 e0 05 22 f9 3f 72 39 | natd_hash: ip= c0 01 03 d1 | natd_hash: port=500 | natd_hash: hash= c4 e0 c7 36 fa ed 68 5c b4 e7 94 7f 39 7d a2 93 | natd_hash: hash= 6e 09 10 0a | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= 30 1c e5 fa 9d bd 82 51 | natd_hash: rcookie= 02 e0 05 22 f9 3f 72 39 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 60 f5 d1 1f 27 fe d1 fd fa 52 05 a9 88 49 87 e9 | natd_hash: hash= 92 6f 87 48 | NAT_TRAVERSAL encaps using auto-detect | NAT_TRAVERSAL this end is behind NAT | NAT_TRAVERSAL that end is NOT behind NAT | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 | NAT: #5 floating local endpoint from 192.1.3.209:500 to 192.1.3.209:4500 using pluto_nat_port (in ikev2_parent_inR1outI2() at ikev2_parent.c:1695) | NAT: #5 floating endpoint ended up on interface eth0 192.1.3.209:4500 | NAT-T: #5 floating remote port from 500 to 4500 using pluto_nat_port (in ikev2_parent_inR1outI2() at ikev2_parent.c:1695) | offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_512 integ=NONE cipherkey=AES_GCM_16 | adding ikev2_inR1outI2 KE work-order 6 for state #5 | state #5 requesting EVENT_RETRANSMIT to be deleted | #5 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x56091f349398 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f7bc0002b78 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f7bb8002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #5 | libevent_malloc: new ptr-libevent@0x7f7bb8002888 size 128 | #5 spent 0.254 milliseconds in processing: Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH in ikev2_process_state_packet() | crypto helper 0 resuming | [RE]START processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #5 complete_v2_state_transition() PARENT_I1->PARENT_I2 with status STF_SUSPEND | suspending state #5 and saving MD | crypto helper 0 starting work-order 6 for state #5 | #5 is busy; has a suspended MD | crypto helper 0 doing compute dh (V2) (ikev2_inR1outI2 KE); request ID 6 | [RE]START processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in log_stf_suspend() at ikev2.c:3269) | "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #5 complete v2 state STATE_PARENT_I1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 | stop processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #5 spent 0.604 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.615 milliseconds in comm_handle_cb() reading and processing packet | calculating skeyseed using prf=sha2_512 integ=none cipherkey-size=32 salt-size=4 | crypto helper 0 finished compute dh (V2) (ikev2_inR1outI2 KE); request ID 6 time elapsed 0.001105 seconds | (#5) spent 1.11 milliseconds in crypto helper computing work-order 6: ikev2_inR1outI2 KE (pcr) | crypto helper 0 sending results from work-order 6 for state #5 to event queue | scheduling resume sending helper answer for #5 | libevent_malloc: new ptr-libevent@0x7f7bac000f48 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #5 | start processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 6 | calling continuation function 0x56091de22b50 | ikev2_parent_inR1outI2_continue for #5: calculating g^{xy}, sending I2 | creating state object #6 at 0x56091f360f78 | State DB: adding IKEv2 state #6 in UNDEFINED | pstats #6 ikev2.child started | duplicating state object #5 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 as #6 for IPSEC SA | #6 setting local endpoint to 192.1.3.209:4500 from #5.st_localport (in duplicate_state() at state.c:1484) | Message ID: init_child #5.#6; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1 | Message ID: switch-from #5 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=0->-1 wip.responder=-1 | Message ID: switch-to #5.#6 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->0 wip.responder=-1 | state #5 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f7bb8002888 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f7bb8002b78 | event_schedule: new EVENT_SA_REPLACE-pe@0x7f7bb8002b78 | inserting event EVENT_SA_REPLACE, timeout in 60 seconds for #5 | libevent_malloc: new ptr-libevent@0x7f7bb8002888 size 128 | parent state #5: PARENT_I1(half-open IKE SA) => PARENT_I2(open IKE SA) | **emit ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' | emitting 8 zero bytes of IV into IKEv2 Encryption Payload | IKEv2 CERT: send a certificate? | IKEv2 CERT: OK to send a certificate (always) | IDr payload will NOT be sent | ****emit IKEv2 Identification - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | ID type: ID_DER_ASN1_DN (0x9) | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Initiator - Payload (35:ISAKMP_NEXT_v2IDi) | next payload chain: saving location 'IKEv2 Identification - Initiator - Payload'.'next payload type' in 'reply packet' | emitting 183 raw bytes of my identity into IKEv2 Identification - Initiator - Payload | my identity 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 | my identity 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | my identity 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | my identity 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | my identity 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | my identity 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | my identity 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 72 6f 61 | my identity 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | my identity 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 | my identity 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 72 6f 61 | my identity 64 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | my identity 77 61 6e 2e 6f 72 67 | emitting length of IKEv2 Identification - Initiator - Payload: 191 | Sending [CERT] of certificate: E=user-road@testing.libreswan.org,CN=road.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | ****emit IKEv2 Certificate Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | next payload chain: setting previous 'IKEv2 Identification - Initiator - Payload'.'next payload type' to current IKEv2 Certificate Payload (37:ISAKMP_NEXT_v2CERT) | next payload chain: saving location 'IKEv2 Certificate Payload'.'next payload type' in 'reply packet' | emitting 1224 raw bytes of CERT into IKEv2 Certificate Payload | CERT 30 82 04 c4 30 82 04 2d a0 03 02 01 02 02 01 05 | CERT 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 | CERT 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 31 | CERT 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 69 | CERT 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 6f | CERT 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c 69 | CERT 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 0b | CERT 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 6e | CERT 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 72 | CERT 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 6f | CERT 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a 86 | CERT 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e 67 | CERT 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 30 22 | CERT 18 0f 32 30 31 39 30 38 32 34 30 39 30 37 35 33 | CERT 5a 18 0f 32 30 32 32 30 38 32 33 30 39 30 37 35 | CERT 33 5a 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 | CERT 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 | CERT 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 | CERT 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c | CERT 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 | CERT 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 | CERT 6d 65 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 72 | CERT 6f 61 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a | CERT 86 48 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 72 | CERT 6f 61 64 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 30 82 01 a2 30 0d 06 | CERT 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 8f | CERT 00 30 82 01 8a 02 82 01 81 00 de eb 73 26 86 d7 | CERT 2c 84 21 13 0e a4 23 30 11 c6 d4 b1 e8 99 58 5b | CERT 54 fa 8c cb 90 bf aa 54 64 e2 ef 00 f9 df b2 5a | CERT 20 d0 1f fd fb 02 a8 d4 60 ac 44 ab c0 91 e1 eb | CERT 81 59 f7 6d 08 30 04 c9 63 5f 07 58 6a d7 e6 ff | CERT 96 d3 79 c2 a1 6b d3 24 00 31 74 f3 8f b4 e9 17 | CERT af d1 3c 33 ee 8b a9 19 b2 03 f1 98 8a 60 f2 f6 | CERT 14 4b 31 a3 8b cb cb ae 31 d9 70 5a 88 2d cc c8 | CERT 77 e8 27 1f 75 07 9a 9b cc 5a 53 bd 69 be 82 0e | CERT 9c b9 3b c8 4f fa 84 87 bb b6 0d 2d ff 11 a1 2d | CERT 51 d4 3f c2 93 09 22 b4 2e 48 0e 77 81 b6 79 ee | CERT 31 37 3d 55 2f 3d 4f 0e 26 7e 73 34 4f 0d d1 90 | CERT 84 c9 06 53 b6 31 7f 6e 62 51 c6 35 3b a1 03 8a | CERT 8b 62 bb 4d 37 a5 44 42 54 a2 10 80 5f 75 0e 17 | CERT a0 4e d8 46 e8 02 bf a1 f5 e5 2a 2e 5c dc b2 d7 | CERT 93 d9 04 45 51 1d 5e 7d d8 fd 03 96 0c d5 02 5b | CERT 72 03 26 b7 d6 cd a0 18 86 a7 07 d0 74 c6 07 e8 | CERT 5c 1f 7a af be d0 ae b8 e7 7a 3b cf 5c fa ca ea | CERT ae c3 6f 85 22 9b 46 81 be 7c 89 15 4f 06 47 30 | CERT 9f bb ee 24 55 e2 21 cd 8e 93 f5 0e 33 49 5d 50 | CERT 48 39 ac ab 37 59 f8 a2 61 be a0 81 d5 25 97 2f | CERT 8b 2f bd d9 47 a4 5c a5 3b c0 99 19 c5 fb 43 da | CERT 6f 6c 33 54 60 af 00 d5 41 12 60 e5 bb 07 b8 76 | CERT 8a 55 c4 c3 47 8b bd 12 bc e8 5e 94 62 7a 20 91 | CERT 11 fb 23 b7 2d f5 6f 73 b6 a9 02 03 01 00 01 a3 | CERT 81 e3 30 81 e0 30 09 06 03 55 1d 13 04 02 30 00 | CERT 30 25 06 03 55 1d 11 04 1e 30 1c 82 1a 72 6f 61 | CERT 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | CERT 77 61 6e 2e 6f 72 67 30 0b 06 03 55 1d 0f 04 04 | CERT 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 | CERT 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 | CERT 07 03 02 30 41 06 08 2b 06 01 05 05 07 01 01 04 | CERT 35 30 33 30 31 06 08 2b 06 01 05 05 07 30 01 86 | CERT 25 68 74 74 70 3a 2f 2f 6e 69 63 2e 74 65 73 74 | CERT 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 | CERT 67 3a 32 35 36 30 30 3d 06 03 55 1d 1f 04 36 30 | CERT 34 30 32 a0 30 a0 2e 86 2c 68 74 74 70 3a 2f 2f | CERT 6e 69 63 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 2f 72 65 76 6f 6b 65 | CERT 64 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 | CERT 01 0b 05 00 03 81 81 00 79 c0 dc 4f ca 3c 5f 4e | CERT 21 3c 76 b0 44 66 c8 74 40 7b 34 5d 63 96 6e ee | CERT c5 df ef 0f fe c2 e4 25 18 39 25 d8 f8 6a b8 87 | CERT f9 17 94 73 7f 8d fb 7d 9d 24 5e c5 95 19 96 3e | CERT 04 dd 8a d0 ad 11 f4 97 32 43 d2 f3 1a d3 1c b1 | CERT e9 01 90 f2 72 36 cf d4 bd 14 e6 ad 8d d2 84 3b | CERT 92 94 99 40 21 16 68 aa e7 5e ac 95 88 11 40 55 | CERT 28 90 af 7f 98 b1 80 36 c5 18 f7 6e 43 40 bc 93 | CERT 86 b3 f1 aa b3 89 b4 15 | emitting length of IKEv2 Certificate Payload: 1229 | IKEv2 CERTREQ: send a cert request? | IKEv2 CERTREQ: no CA DN known to send | not sending INITIAL_CONTACT | ****emit IKEv2 Authentication Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | auth method: IKEv2_AUTH_RSA (0x1) | next payload chain: setting previous 'IKEv2 Certificate Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH) | next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet' | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org->%fromcert of kind PKK_RSA | searching for certificate PKK_RSA:AwEAAd7rc vs PKK_RSA:AwEAAd7rc | #5 spent 8.25 milliseconds in ikev2_calculate_rsa_hash() calling sign_hash_RSA() | emitting 384 raw bytes of rsa signature into IKEv2 Authentication Payload | rsa signature 85 d1 08 00 e3 16 c0 ed 16 0c e5 63 e8 b9 28 6a | rsa signature af 49 47 23 3a e6 8e b7 08 a0 62 40 4b 70 bf 99 | rsa signature 14 51 74 c7 2e ea 05 b3 38 ef 9e 93 14 a6 37 18 | rsa signature 9b d8 44 f4 df 1f 44 cd 19 01 7e c7 f6 d2 34 57 | rsa signature 96 8a 62 38 63 13 ff 79 c2 0b 0c bc fa ea a4 1e | rsa signature e5 e8 28 07 ae 7c 0d 17 4f 34 3e 1a 52 2b d4 34 | rsa signature b2 22 e2 05 66 0e c2 23 6e c2 7d fd b2 4b 8d 93 | rsa signature 83 9e 80 c6 a8 37 88 88 74 be 64 23 81 b0 e8 26 | rsa signature 56 a0 cf 12 74 6f 66 32 a2 c7 e7 4c b1 f1 66 7e | rsa signature 7c 1c ca fd a5 58 58 39 3d 7c cb 69 75 45 92 98 | rsa signature bc ae 54 d6 ec 88 84 a0 0c 71 7e 1c 86 7f 09 63 | rsa signature cd 22 f5 61 83 55 48 1d 79 0f 65 70 b7 73 13 c1 | rsa signature cc 5e e7 1a 96 fc d8 e0 66 f6 a7 c5 f4 22 6f f2 | rsa signature 83 1a 1d aa 53 af 99 9b 6f f1 c2 6b a0 92 e1 07 | rsa signature b0 28 77 1a d5 cf 7e 4d 63 55 e0 36 09 b7 76 01 | rsa signature fe e9 dd 72 ad ae 49 ff 19 38 f7 24 64 9c 03 78 | rsa signature 76 5f c3 42 0b 39 36 b6 70 3d 6d ed 45 84 47 cd | rsa signature d0 57 bc fa a3 dc df 68 9e b8 87 ec 11 74 30 cb | rsa signature 25 51 5c 87 8d 33 01 f7 fa 35 17 79 ce 46 9c e2 | rsa signature 6c 24 54 e4 2b f0 f0 0f 35 8d 97 6c 62 e5 48 6d | rsa signature ec 29 ad c1 41 12 18 79 45 58 9c 88 10 07 1e 74 | rsa signature 10 ce 8d b7 63 b9 e6 88 82 c3 42 09 96 06 a4 04 | rsa signature c8 a8 e5 9c e2 51 88 e5 bb e5 06 c6 75 a4 ef 1a | rsa signature e6 15 5c f0 5b 68 be 00 fb fb af ee 22 47 49 2e | #5 spent 8.46 milliseconds in ikev2_calculate_rsa_hash() | emitting length of IKEv2 Authentication Payload: 392 | Send Configuration Payload request | ****emit IKEv2 Configuration Payload: | next payload type: ISAKMP_NEXT_v2SA (0x21) | flags: none (0x0) | ikev2_cfg_type: IKEv2_CP_CFG_REQUEST (0x1) | next payload chain: ignoring supplied 'IKEv2 Configuration Payload'.'next payload type' value 33:ISAKMP_NEXT_v2SA | next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Configuration Payload (47:ISAKMP_NEXT_v2CP) | next payload chain: saving location 'IKEv2 Configuration Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_ADDRESS (0x1) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_DNS (0x3) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP6_ADDRESS (0x8) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP6_DNS (0xa) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_DNS_DOMAIN (0x19) | emitting length of IKEv2 Configuration Payload Attribute: 0 | emitting length of IKEv2 Configuration Payload: 28 | getting first pending from state #5 | netlink_get_spi: allocated 0xe549094 for esp.0@192.1.3.209 | constructing ESP/AH proposals with all DH removed for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator emitting ESP/AH proposals) | converting proposal AES_GCM_16_256-NONE to ikev2 ... | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED | converting proposal AES_GCM_16_128-NONE to ikev2 ... | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: constructed local ESP/AH proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | Emitting ikev2_proposals ... | ****emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'IKEv2 Configuration Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | discarding INTEG=NONE | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 0e 54 90 94 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 32 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding INTEG=NONE | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 2 (0x2) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 0e 54 90 94 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 32 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 3 (0x3) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 4 (0x4) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 0e 54 90 94 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 48 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 4 (0x4) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 4 (0x4) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 0e 54 90 94 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 48 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 164 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ****emit IKEv2 Traffic Selector - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | number of TS: 1 (0x1) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | start port: 0 (0x0) | end port: 65535 (0xffff) | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector | ipv4 start c0 01 03 d1 | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector | ipv4 end c0 01 03 d1 | emitting length of IKEv2 Traffic Selector: 16 | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 | ****emit IKEv2 Traffic Selector - Responder - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | number of TS: 1 (0x1) | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | start port: 0 (0x0) | end port: 65535 (0xffff) | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector | ipv4 start c0 01 02 17 | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector | ipv4 end c0 01 02 17 | emitting length of IKEv2 Traffic Selector: 16 | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE | Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload | emitting length of IKEv2 Encryption Payload: 2081 | emitting length of ISAKMP Message: 2109 | **parse ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | length: 2109 (0x83d) | **parse IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2IDi (0x23) | flags: none (0x0) | length: 2081 (0x821) | **emit ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2IDi (0x23) | flags: none (0x0) | fragment number: 1 (0x1) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 35:ISAKMP_NEXT_v2IDi | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 25 00 00 bf 09 00 00 00 30 81 b4 31 0b 30 09 06 | cleartext fragment 03 55 04 06 13 02 43 41 31 10 30 0e 06 03 55 04 | cleartext fragment 08 0c 07 4f 6e 74 61 72 69 6f 31 10 30 0e 06 03 | cleartext fragment 55 04 07 0c 07 54 6f 72 6f 6e 74 6f 31 12 30 10 | cleartext fragment 06 03 55 04 0a 0c 09 4c 69 62 72 65 73 77 61 6e | cleartext fragment 31 18 30 16 06 03 55 04 0b 0c 0f 54 65 73 74 20 | cleartext fragment 44 65 70 61 72 74 6d 65 6e 74 31 23 30 21 06 03 | cleartext fragment 55 04 03 0c 1a 72 6f 61 64 2e 74 65 73 74 69 6e | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 31 | cleartext fragment 2e 30 2c 06 09 2a 86 48 86 f7 0d 01 09 01 16 1f | cleartext fragment 75 73 65 72 2d 72 6f 61 64 40 74 65 73 74 69 6e | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 27 | cleartext fragment 00 04 cd 04 30 82 04 c4 30 82 04 2d a0 03 02 01 | cleartext fragment 02 02 01 05 30 0d 06 09 2a 86 48 86 f7 0d 01 01 | cleartext fragment 0b 05 00 30 81 ac 31 0b 30 09 06 03 55 04 06 13 | cleartext fragment 02 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e | cleartext fragment 74 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 | cleartext fragment 54 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a | cleartext fragment 0c 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 | cleartext fragment 03 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 | cleartext fragment 74 6d 65 6e 74 31 25 30 23 06 03 55 04 03 0c 1c | cleartext fragment 4c 69 62 72 65 73 77 61 6e 20 74 65 73 74 20 43 | cleartext fragment 41 20 66 6f 72 20 6d 61 69 6e 63 61 31 24 30 22 | cleartext fragment 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 74 65 73 | cleartext fragment 74 69 6e 67 40 6c 69 62 72 65 73 77 61 6e 2e 6f | cleartext fragment 72 67 30 22 18 0f 32 30 31 39 30 38 32 34 30 39 | cleartext fragment 30 37 35 33 5a 18 0f 32 30 32 32 30 38 32 33 30 | cleartext fragment 39 30 37 35 33 5a 30 81 b4 31 0b 30 09 06 03 55 | cleartext fragment 04 06 13 02 43 41 31 10 30 0e 06 03 55 04 08 0c | cleartext fragment 07 4f 6e 74 61 72 69 6f 31 10 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 2 (0x2) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 30 0e 06 03 55 04 07 0c 07 54 6f 72 6f 6e 74 6f | cleartext fragment 31 12 30 10 06 03 55 04 0a 0c 09 4c 69 62 72 65 | cleartext fragment 73 77 61 6e 31 18 30 16 06 03 55 04 0b 0c 0f 54 | cleartext fragment 65 73 74 20 44 65 70 61 72 74 6d 65 6e 74 31 23 | cleartext fragment 30 21 06 03 55 04 03 0c 1a 72 6f 61 64 2e 74 65 | cleartext fragment 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e | cleartext fragment 6f 72 67 31 2e 30 2c 06 09 2a 86 48 86 f7 0d 01 | cleartext fragment 09 01 16 1f 75 73 65 72 2d 72 6f 61 64 40 74 65 | cleartext fragment 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e | cleartext fragment 6f 72 67 30 82 01 a2 30 0d 06 09 2a 86 48 86 f7 | cleartext fragment 0d 01 01 01 05 00 03 82 01 8f 00 30 82 01 8a 02 | cleartext fragment 82 01 81 00 de eb 73 26 86 d7 2c 84 21 13 0e a4 | cleartext fragment 23 30 11 c6 d4 b1 e8 99 58 5b 54 fa 8c cb 90 bf | cleartext fragment aa 54 64 e2 ef 00 f9 df b2 5a 20 d0 1f fd fb 02 | cleartext fragment a8 d4 60 ac 44 ab c0 91 e1 eb 81 59 f7 6d 08 30 | cleartext fragment 04 c9 63 5f 07 58 6a d7 e6 ff 96 d3 79 c2 a1 6b | cleartext fragment d3 24 00 31 74 f3 8f b4 e9 17 af d1 3c 33 ee 8b | cleartext fragment a9 19 b2 03 f1 98 8a 60 f2 f6 14 4b 31 a3 8b cb | cleartext fragment cb ae 31 d9 70 5a 88 2d cc c8 77 e8 27 1f 75 07 | cleartext fragment 9a 9b cc 5a 53 bd 69 be 82 0e 9c b9 3b c8 4f fa | cleartext fragment 84 87 bb b6 0d 2d ff 11 a1 2d 51 d4 3f c2 93 09 | cleartext fragment 22 b4 2e 48 0e 77 81 b6 79 ee 31 37 3d 55 2f 3d | cleartext fragment 4f 0e 26 7e 73 34 4f 0d d1 90 84 c9 06 53 b6 31 | cleartext fragment 7f 6e 62 51 c6 35 3b a1 03 8a 8b 62 bb 4d 37 a5 | cleartext fragment 44 42 54 a2 10 80 5f 75 0e 17 a0 4e d8 46 e8 02 | cleartext fragment bf a1 f5 e5 2a 2e 5c dc b2 d7 93 d9 04 45 51 1d | cleartext fragment 5e 7d d8 fd 03 96 0c d5 02 5b 72 03 26 b7 d6 cd | cleartext fragment a0 18 86 a7 07 d0 74 c6 07 e8 5c 1f 7a af be d0 | cleartext fragment ae b8 e7 7a 3b cf 5c fa ca ea ae c3 6f 85 22 9b | cleartext fragment 46 81 be 7c 89 15 4f 06 47 30 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 3 (0x3) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 9f bb ee 24 55 e2 21 cd 8e 93 f5 0e 33 49 5d 50 | cleartext fragment 48 39 ac ab 37 59 f8 a2 61 be a0 81 d5 25 97 2f | cleartext fragment 8b 2f bd d9 47 a4 5c a5 3b c0 99 19 c5 fb 43 da | cleartext fragment 6f 6c 33 54 60 af 00 d5 41 12 60 e5 bb 07 b8 76 | cleartext fragment 8a 55 c4 c3 47 8b bd 12 bc e8 5e 94 62 7a 20 91 | cleartext fragment 11 fb 23 b7 2d f5 6f 73 b6 a9 02 03 01 00 01 a3 | cleartext fragment 81 e3 30 81 e0 30 09 06 03 55 1d 13 04 02 30 00 | cleartext fragment 30 25 06 03 55 1d 11 04 1e 30 1c 82 1a 72 6f 61 | cleartext fragment 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | cleartext fragment 77 61 6e 2e 6f 72 67 30 0b 06 03 55 1d 0f 04 04 | cleartext fragment 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 | cleartext fragment 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 | cleartext fragment 07 03 02 30 41 06 08 2b 06 01 05 05 07 01 01 04 | cleartext fragment 35 30 33 30 31 06 08 2b 06 01 05 05 07 30 01 86 | cleartext fragment 25 68 74 74 70 3a 2f 2f 6e 69 63 2e 74 65 73 74 | cleartext fragment 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 | cleartext fragment 67 3a 32 35 36 30 30 3d 06 03 55 1d 1f 04 36 30 | cleartext fragment 34 30 32 a0 30 a0 2e 86 2c 68 74 74 70 3a 2f 2f | cleartext fragment 6e 69 63 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | cleartext fragment 65 73 77 61 6e 2e 6f 72 67 2f 72 65 76 6f 6b 65 | cleartext fragment 64 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 | cleartext fragment 01 0b 05 00 03 81 81 00 79 c0 dc 4f ca 3c 5f 4e | cleartext fragment 21 3c 76 b0 44 66 c8 74 40 7b 34 5d 63 96 6e ee | cleartext fragment c5 df ef 0f fe c2 e4 25 18 39 25 d8 f8 6a b8 87 | cleartext fragment f9 17 94 73 7f 8d fb 7d 9d 24 5e c5 95 19 96 3e | cleartext fragment 04 dd 8a d0 ad 11 f4 97 32 43 d2 f3 1a d3 1c b1 | cleartext fragment e9 01 90 f2 72 36 cf d4 bd 14 e6 ad 8d d2 84 3b | cleartext fragment 92 94 99 40 21 16 68 aa e7 5e ac 95 88 11 40 55 | cleartext fragment 28 90 af 7f 98 b1 80 36 c5 18 f7 6e 43 40 bc 93 | cleartext fragment 86 b3 f1 aa b3 89 b4 15 2f 00 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 4 (0x4) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 01 88 01 00 00 00 85 d1 08 00 e3 16 c0 ed 16 0c | cleartext fragment e5 63 e8 b9 28 6a af 49 47 23 3a e6 8e b7 08 a0 | cleartext fragment 62 40 4b 70 bf 99 14 51 74 c7 2e ea 05 b3 38 ef | cleartext fragment 9e 93 14 a6 37 18 9b d8 44 f4 df 1f 44 cd 19 01 | cleartext fragment 7e c7 f6 d2 34 57 96 8a 62 38 63 13 ff 79 c2 0b | cleartext fragment 0c bc fa ea a4 1e e5 e8 28 07 ae 7c 0d 17 4f 34 | cleartext fragment 3e 1a 52 2b d4 34 b2 22 e2 05 66 0e c2 23 6e c2 | cleartext fragment 7d fd b2 4b 8d 93 83 9e 80 c6 a8 37 88 88 74 be | cleartext fragment 64 23 81 b0 e8 26 56 a0 cf 12 74 6f 66 32 a2 c7 | cleartext fragment e7 4c b1 f1 66 7e 7c 1c ca fd a5 58 58 39 3d 7c | cleartext fragment cb 69 75 45 92 98 bc ae 54 d6 ec 88 84 a0 0c 71 | cleartext fragment 7e 1c 86 7f 09 63 cd 22 f5 61 83 55 48 1d 79 0f | cleartext fragment 65 70 b7 73 13 c1 cc 5e e7 1a 96 fc d8 e0 66 f6 | cleartext fragment a7 c5 f4 22 6f f2 83 1a 1d aa 53 af 99 9b 6f f1 | cleartext fragment c2 6b a0 92 e1 07 b0 28 77 1a d5 cf 7e 4d 63 55 | cleartext fragment e0 36 09 b7 76 01 fe e9 dd 72 ad ae 49 ff 19 38 | cleartext fragment f7 24 64 9c 03 78 76 5f c3 42 0b 39 36 b6 70 3d | cleartext fragment 6d ed 45 84 47 cd d0 57 bc fa a3 dc df 68 9e b8 | cleartext fragment 87 ec 11 74 30 cb 25 51 5c 87 8d 33 01 f7 fa 35 | cleartext fragment 17 79 ce 46 9c e2 6c 24 54 e4 2b f0 f0 0f 35 8d | cleartext fragment 97 6c 62 e5 48 6d ec 29 ad c1 41 12 18 79 45 58 | cleartext fragment 9c 88 10 07 1e 74 10 ce 8d b7 63 b9 e6 88 82 c3 | cleartext fragment 42 09 96 06 a4 04 c8 a8 e5 9c e2 51 88 e5 bb e5 | cleartext fragment 06 c6 75 a4 ef 1a e6 15 5c f0 5b 68 be 00 fb fb | cleartext fragment af ee 22 47 49 2e 21 00 00 1c 01 00 00 00 00 01 | cleartext fragment 00 00 00 03 00 00 00 08 00 00 00 0a 00 00 00 19 | cleartext fragment 00 00 2c 00 00 a4 02 00 00 20 01 03 04 02 0e 54 | cleartext fragment 90 94 03 00 00 0c 01 00 00 14 80 0e 01 00 00 00 | cleartext fragment 00 08 05 00 00 00 02 00 00 20 02 03 04 02 0e 54 | cleartext fragment 90 94 03 00 00 0c 01 00 00 14 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 5 (0x5) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 156 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 80 0e 00 80 00 00 00 08 05 00 00 00 02 00 00 30 | cleartext fragment 03 03 04 04 0e 54 90 94 03 00 00 0c 01 00 00 0c | cleartext fragment 80 0e 01 00 03 00 00 08 03 00 00 0e 03 00 00 08 | cleartext fragment 03 00 00 0c 00 00 00 08 05 00 00 00 00 00 00 30 | cleartext fragment 04 03 04 04 0e 54 90 94 03 00 00 0c 01 00 00 0c | cleartext fragment 80 0e 00 80 03 00 00 08 03 00 00 0e 03 00 00 08 | cleartext fragment 03 00 00 0c 00 00 00 08 05 00 00 00 2d 00 00 18 | cleartext fragment 01 00 00 00 07 00 00 10 00 00 ff ff c0 01 03 d1 | cleartext fragment c0 01 03 d1 00 00 00 18 01 00 00 00 07 00 00 10 | cleartext fragment 00 00 ff ff c0 01 02 17 c0 01 02 17 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 189 | emitting length of ISAKMP Message: 217 | suspend processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | start processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #6 complete_v2_state_transition() md.from_state=PARENT_I1 md.svm.state[from]=PARENT_I1 UNDEFINED->PARENT_I2 with status STF_OK | IKEv2: transition from state STATE_PARENT_I1 to state STATE_PARENT_I2 | child state #6: UNDEFINED(ignore) => PARENT_I2(open IKE SA) | Message ID: updating counters for #6 to 0 after switching state | Message ID: recv #5.#6 response 0; ike: initiator.sent=0 initiator.recv=-1->0 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=-1 | Message ID: sent #5.#6 request 1; ike: initiator.sent=0->1 initiator.recv=0 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->1 wip.responder=-1 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} | sending V2 reply packet to 192.1.2.23:4500 (from 192.1.3.209:4500) | sending fragments ... | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #5) | 00 00 00 00 30 1c e5 fa 9d bd 82 51 02 e0 05 22 | f9 3f 72 39 35 20 23 08 00 00 00 01 00 00 02 17 | 23 00 01 fb 00 01 00 05 38 9f 24 cd 5a 14 ba 51 | f3 f0 fd e0 98 5b 9b 2e f6 5e 56 10 98 2c 13 b6 | 98 5f ba e5 58 b6 db a0 c2 e9 84 5a 98 7b fd c1 | 60 09 65 cd 52 4a 61 45 6c e8 b4 b7 c7 f3 d0 62 | 67 4f 9b 0f 25 fc e5 21 da b3 6e 79 20 f9 8e d6 | 7c 4e 5c 0a c2 9e ec 05 c0 34 f7 29 ce 8a b3 0f | 06 be e9 b4 3f 29 a1 0b 3c 5e e9 cb 35 48 cc 18 | 5c 88 b8 c7 04 26 fc 0e 7f 45 2c 5a 0a 42 65 16 | 4a c1 e9 43 8f de ce 4d d5 ae 22 fb 51 b3 22 12 | fc d8 ac 0c a6 53 2b 6a 70 3b 77 98 cc 17 e1 55 | 7c 33 91 06 ad 37 02 f4 2c eb 4a bb 4e 09 98 3a | 0c b7 79 81 90 ba fb a2 0f 15 08 12 2b c9 34 de | f4 64 30 44 2a 4f 9a 4d a3 61 81 8d 26 90 0f f0 | 87 b8 24 45 11 03 06 df 00 ce f0 41 ff d6 e2 e3 | dd 4c 8c 9d 78 d1 f6 68 00 33 17 5c d2 58 52 9d | 38 4d b5 b5 c2 1b a3 23 f8 6a d5 21 5e a5 3e 44 | 9d 83 b6 e6 ca 3c eb e3 89 ef bf 88 85 56 a3 59 | c2 99 c4 a0 73 a8 81 d0 77 c9 91 7e 49 06 7b 75 | 46 81 40 38 f9 93 b7 4e 92 95 37 c2 4a bd 2f 3c | e3 5b b9 53 11 ff 96 3c 45 08 d0 a4 87 86 d0 47 | 99 d4 c7 33 e7 81 89 78 f6 8e 0a 68 fa 6b 0d 41 | 91 46 af 44 58 e3 ee ba cb 7d 6e cb bb d0 71 80 | c0 bd 5e 8e 4e 70 51 83 18 42 bf 44 dd b3 9a ab | 9f 6c ee 17 e5 f6 9b 72 91 70 1f ad 12 76 72 50 | 33 70 69 33 40 bb 6b 55 8c 52 f0 84 1a ed 47 29 | 81 d8 38 db 8a 66 e6 91 b8 6b 02 1e d0 a2 1d 51 | 07 b8 f8 a0 d6 4f 6c 5c 0d b3 78 aa 88 d6 ad 28 | a7 1f 55 82 36 56 31 a8 11 ac 95 53 64 04 1c 87 | c1 38 e3 6e 59 c1 b7 e4 96 49 19 66 f4 0d 11 14 | 9b c5 42 c8 d2 f7 42 7e 49 d3 92 43 23 cf 1e 86 | 2e 3f 29 52 1e 5c 0a 64 cf 1c 74 49 3b e2 d2 6e | c2 3c c5 53 4d c5 d8 3b 4c e9 ad | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #5) | 00 00 00 00 30 1c e5 fa 9d bd 82 51 02 e0 05 22 | f9 3f 72 39 35 20 23 08 00 00 00 01 00 00 02 17 | 00 00 01 fb 00 02 00 05 34 fe 9a ba 79 a5 8d 34 | 9d bf d2 db dd 23 01 83 96 21 e6 ea fc 72 65 0d | 30 e8 43 3e c3 e9 bc c9 78 2a a2 34 81 c1 bd ff | 61 70 f6 f3 d8 36 ea b4 24 4f 67 79 8a 27 52 22 | e4 ff f7 6b dd 64 b8 05 17 a2 4a 4e 12 dd 3a 65 | d4 6e 4b 77 cd ff 35 ca e5 59 47 36 69 30 2e f8 | c4 6b 69 2a 3e 80 b2 ab 00 9d de 8b 5d bd cd 28 | c1 85 7e 49 63 62 58 e2 64 de 50 59 fe 73 ca 52 | 4d 80 62 af 6a 1d 89 da 25 63 13 dc 78 7c 12 c9 | 84 00 64 8c 9a 41 6a da 11 cd 44 19 6d 49 4a dc | 48 01 62 21 a9 d3 23 30 11 3e 13 f6 c4 8d c6 69 | 51 39 78 74 f2 0b a2 f1 73 58 91 8e fb c3 30 34 | cf 94 7f 18 b9 de de e5 db c7 51 c5 63 cc df 14 | 47 28 73 bf 24 eb 27 4f e8 1f 3d 24 f6 40 a0 cd | 41 84 5e ca 0b 94 2a bc 9a 24 c0 57 b3 29 60 2f | a4 7c d1 05 09 56 76 0b c6 b8 2b d8 b3 28 5c 95 | 04 a1 9c bf 62 8d b0 78 c6 ef aa aa 8f 4a f8 85 | b7 a7 99 9a 58 2a 25 62 e4 0f c8 1a 08 5d 0d 50 | 8e 63 e9 63 52 53 c1 75 81 32 71 17 20 12 41 71 | 36 2e b5 ed a5 b8 18 77 a0 dc d6 cb a6 df b0 95 | b5 f8 6b f6 ca 13 fd 71 7a 55 3c c9 4c 46 f6 e0 | ef 99 5e 98 ab 37 a5 83 be d1 64 3b e4 ca 64 93 | c4 43 b6 8b 8a 8b 44 ee 9e 58 1e 91 5c cd ac 98 | 70 1f 4d 03 6e 66 37 3e 98 8b 26 b0 6e a8 89 63 | 28 7d a9 2f 0a 96 ef c3 a0 1f e8 e5 80 2b 12 bd | 0e bf 2b b0 54 86 f0 47 54 1c 6f 01 37 c8 d6 d1 | b3 98 b4 14 b1 32 d4 31 d4 15 41 b6 6b 10 a3 41 | 39 5d 25 b2 a5 c6 12 03 4d ea 16 f4 1d 1b 4f ca | 4b 85 ee 9e 9b 74 4e e2 89 85 86 32 ad 9a 31 de | 54 92 27 a8 3e 70 c5 0e f9 6d f5 9e 35 98 62 e6 | 4b 4e 09 d2 61 7b e3 61 6e 00 9b 15 2c be 9e bd | ab 89 4b c7 3b 61 8f cc d1 b0 72 | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #5) | 00 00 00 00 30 1c e5 fa 9d bd 82 51 02 e0 05 22 | f9 3f 72 39 35 20 23 08 00 00 00 01 00 00 02 17 | 00 00 01 fb 00 03 00 05 33 55 e1 2c f8 e0 75 aa | cb c4 61 81 15 b5 a2 f2 31 f3 18 00 9a 33 89 98 | fa 21 b6 a3 01 65 b1 c9 e7 3f 20 c0 a1 57 e4 40 | 99 3f 6d 22 8e 39 3e fb 89 7d 64 f5 98 af 65 14 | 73 ad 97 fa 97 24 7a 67 31 cf 11 69 ef 81 76 09 | a0 d7 4c 95 31 68 14 e4 6f a9 d3 70 ce d1 00 ee | be 09 7f 83 f6 e0 19 e0 ff a2 aa 09 c5 ed 11 74 | cd 30 3c ba 23 3e ec a7 93 3c 3f e4 b7 aa b4 b7 | 8a f9 e9 24 b6 79 a5 87 63 c6 47 21 63 66 2b ab | 91 69 23 25 12 02 89 4e 85 7c ff b1 eb c3 f3 eb | 18 33 5b 7f 3f 7b 62 07 42 48 04 f2 56 95 60 0d | 4a cc f6 7f 76 90 1b af 02 36 08 90 f9 5b bf 7a | 28 b0 cb 7f 2e a1 9e 54 d3 74 cf c2 46 59 b0 58 | 71 b4 73 63 37 66 a1 a2 bd 09 48 4b ac 19 6e a6 | 4a 8d f3 de b0 c4 47 88 83 b1 3a c7 5d 51 81 48 | d4 0c 54 ab bc a7 78 5d 57 1b 13 3f a2 c0 2a 5c | 41 a0 38 e2 36 83 12 37 6a 8b 6b ca 96 94 6f be | ec 29 54 a5 62 8f de cc 70 12 55 c8 9c bf 3b 42 | be de a7 fc 30 d5 ac 8f ab 38 dc 14 a4 47 e7 7f | 5b a6 f2 43 6e 5b 0f 8f 6f f6 18 7d 0d 90 24 49 | 5b 7b 8e 05 b1 0a a2 cb 68 2d 3a 9f e4 e0 27 1c | ce 29 88 68 c7 3c 2b f3 b3 02 13 8f 8d 25 3d 14 | 43 20 18 f4 01 35 b2 ec 03 82 8b 83 ce 61 d8 aa | 4e 5f 90 01 d8 ed ec f4 54 32 1d db 06 17 64 e7 | 3a 5f 36 41 88 e1 a2 7f 65 3f 36 98 84 ae 9f c2 | d5 af 94 42 ff 32 7d 91 77 aa bf 25 44 64 d3 d4 | 90 35 82 46 77 28 8f 9b e5 3c a2 cf 8e d7 95 d8 | 26 66 c0 cf 62 c5 57 19 b7 9f 36 ba e0 08 fe 1e | 64 7c 1e 89 81 39 e8 65 11 a0 2b 60 12 d4 2a e8 | 2e 53 8a d0 92 80 4b 19 e2 60 0f f4 7b 5b f9 b9 | cd bc af fb 24 4a 2c 2d e7 e8 88 e3 8e 63 1b fa | 1f 1c 38 dc 30 cd 25 73 4f b3 9f | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #5) | 00 00 00 00 30 1c e5 fa 9d bd 82 51 02 e0 05 22 | f9 3f 72 39 35 20 23 08 00 00 00 01 00 00 02 17 | 00 00 01 fb 00 04 00 05 68 1b df a6 fc a3 96 71 | 17 80 ae 45 28 1c 7b 25 ae 01 68 96 7f 7b 5f 98 | 57 41 4f a5 0f e2 de dd 0b 4c eb 90 c5 5d 80 f0 | 74 bc b8 e7 a9 7b 1f 0b e0 a4 ef 69 0c 1e ec f3 | de 8f 14 5b 81 63 44 70 d1 4b 7a 0a 12 1e 6a 70 | 3f 13 3c a2 06 d7 3c a4 1b 31 a9 ba 35 5d d1 29 | 1a 98 74 38 51 5a 25 84 01 5b 3f 15 5e 25 0c 15 | db 4b 65 68 b9 9a d7 a2 28 34 0f 0d f4 34 bd 3e | d6 c1 b2 62 6d b8 42 7b a8 c3 3e e0 d8 c9 5d c4 | ec 41 92 c0 89 87 1f 31 33 0b 14 c3 0a db 0e 9a | 8b b2 b8 51 e1 e7 88 71 6a cc a2 c3 cc 71 e2 9b | 8b 2c a2 2f ce 86 bd 9e ef e4 5b 35 17 81 b8 5c | fc 07 42 c5 ee f1 a2 02 2a 00 0c 86 c0 74 a0 85 | b2 47 86 e4 64 89 e8 cf 03 a4 54 dd a3 ab 86 27 | 6b 9e c6 5d 0d 67 6d 87 ce 67 8a e1 f5 84 17 7c | 38 ed 71 36 91 31 55 3e 5f 87 fb 4c 7f d6 54 6c | ab c2 53 c3 9a 39 b6 b9 4e c5 0e e0 69 10 a9 15 | 3f d1 1b 9d 48 36 2e 91 2f 8c 93 60 8f f0 01 1b | 2e 60 f8 f1 03 04 a1 61 42 5d 9f 7f 5f 81 67 ef | 7a 5e d2 c3 38 c8 11 a1 d4 88 55 27 f8 db 9f c2 | b4 09 6b d4 50 b1 0e 2a e9 7d 13 82 f5 d1 f1 83 | df f7 d3 5a 44 1e b5 b7 81 40 9c 2d 49 31 09 85 | fe 74 21 53 0b eb 50 61 c6 48 77 56 6f 34 8e 72 | cc 61 13 3b 56 4a 17 4c 5f d7 ca cb e0 40 bf 85 | 06 78 d7 d5 d2 07 20 53 b4 7d 7d 1d 6a 97 b6 5e | c8 60 85 1c 39 25 99 71 61 7f 36 b6 da 03 99 e3 | 70 08 45 ea 53 26 9f ae 43 69 68 e1 da 99 a4 2b | 45 d9 a8 4b f5 e5 af 55 2e ec 33 0a ec 9f d0 ed | 5e 18 bc 2c 53 df 81 e0 7e 0f b7 cb b4 bf bc 60 | 0d 84 91 90 d4 c3 96 7c 76 ac bb 63 a3 9d f4 5d | 5f dd 39 a0 1a 82 7d e6 29 42 89 04 94 91 1e 08 | 61 9a 19 ff 52 2c 7a b7 b3 e7 dd | sending 221 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #5) | 00 00 00 00 30 1c e5 fa 9d bd 82 51 02 e0 05 22 | f9 3f 72 39 35 20 23 08 00 00 00 01 00 00 00 d9 | 00 00 00 bd 00 05 00 05 17 6d 03 0f c1 28 91 46 | 82 b7 d3 5f d5 9d 39 1d db 16 6c cb bd 9a 64 2e | 2e 5f 39 5c 7d f6 b4 75 d6 1a 90 a9 af f1 05 d3 | 75 55 64 9b cc 04 9a b7 96 26 aa 8d b8 ff 43 59 | f9 a9 16 c5 bf f7 74 ee 93 9c a4 c2 ae 05 d1 e9 | ec 10 d0 65 03 86 66 cb f7 72 0c 34 30 52 63 48 | 92 35 c2 7d 96 ab da 60 9f 9f 1d a7 4b d5 b9 cf | 30 38 b9 a8 3f f8 2c a0 a7 98 fc a0 20 dd 33 84 | 93 78 c3 72 b3 7a 57 50 a9 ae 8f 2c 37 16 cd 32 | 0b 8d 88 57 3c 8b be 03 c9 52 f0 77 9a d5 15 f6 | 25 72 c6 ef 1d 42 60 11 b4 7d 9d cf b5 66 7f 6d | 74 69 f9 7b 17 d1 37 cb 94 df ba a3 ab | sent 5 fragments | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x56091f3494a8 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #6 | libevent_malloc: new ptr-libevent@0x56091f349398 size 128 | #6 STATE_PARENT_I2: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29398.603557 | resume sending helper answer for #5 suppresed complete_v2_state_transition() | #5 spent 1.57 milliseconds | #5 spent 10.4 milliseconds in resume sending helper answer | stop processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f7bac000f48 | spent 0.00273 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 30 1c e5 fa 9d bd 82 51 02 e0 05 22 f9 3f 72 39 | 35 20 23 20 00 00 00 01 00 00 02 17 24 00 01 fb | 00 01 00 05 1d 9a fe 93 17 59 5a 29 42 5e b3 fa | 7c ec 36 f0 5d 59 1b b0 dd db b2 a4 fc 8f 3d 8f | 7c 06 50 10 d6 c5 9e ab a3 ea 18 cf 0a 6b c1 f5 | 7b 01 ea b6 c1 b2 24 88 30 c2 6f 99 dd 9b a9 4a | 61 56 3d ff 3e 77 b2 af 4a e2 5d 78 24 e4 28 47 | af 9e 32 b8 01 a0 ac c1 a2 fc d4 5e e9 01 f4 0c | 8b 32 69 c6 f2 1d d0 86 6d 0c ce b3 b9 09 c4 9c | 09 7b fb 3d 97 af bd 8d 1a 07 c8 81 a2 34 43 12 | f6 42 a7 6f 4f 8e 7e 3f 9b 43 46 88 3b fb 41 ae | 10 75 7f fc 0f 3d eb 88 6c 4c 24 1c ba c2 6f 50 | 78 17 51 ad c2 ad 86 8d 27 8c 4d f9 0f 04 2b 7c | 00 c7 b9 b9 9b df 6e ba 73 5c a2 14 c0 cc 6e 33 | c1 fe 49 33 cf 0a 6b 9a 3f 2d da 22 b6 0a 93 1f | 0a eb 68 14 90 89 a4 af 8c c9 36 4d 1d be a5 c3 | f6 7a b5 16 29 b4 38 32 5e 26 7a 0a 0f ef d0 77 | d2 3f f0 af b8 ed a2 a9 c8 30 71 3a 45 c6 00 4d | 25 00 0c 73 3b 7b be be 9b a7 33 1c 31 cd 84 97 | f6 8b a9 5b a5 b7 dd 8a 74 8d 3b 56 eb e4 1c 67 | 68 d6 a9 cf 3e 31 7c 11 fc a9 8e d3 b5 ac 30 1f | fa 98 7e 32 83 18 0c 9b cc c7 81 fb 4f 90 90 75 | f9 18 27 33 d7 a4 ef bb 3a 23 28 e7 03 3e 28 df | 25 08 59 44 89 b6 c9 89 1a 59 06 c7 2f 02 51 cb | 88 d2 63 64 b5 3e 24 ec 8f b5 e3 24 d5 f2 8f 8d | 25 ea 0a e1 3e 92 50 fd c7 8b aa 81 46 06 dc 9e | 73 c5 4c fd 19 a2 5f e3 ff c2 33 fc 97 e3 0f 55 | 67 17 3a ec 7b 76 44 5b ba 29 97 66 03 93 ab df | 8f 66 06 97 8a fd 44 83 0d 85 69 17 6e ac ef 10 | ab d5 7f 9d d1 59 49 ff 58 c1 71 41 05 3d 8b 04 | 2d 7e cc 37 23 f4 08 99 7c a6 76 8a e3 70 f3 5b | 9b 5b 02 ff 43 86 ca 72 4b 13 ae 34 2b d6 17 52 | e8 fc d7 fb 42 37 db 1d f0 c7 2e 01 22 b1 90 eb | 0a 4c 31 84 58 99 80 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #5 in PARENT_I2 (find_v2_ike_sa) | start processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #6 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #6 is idle | #6 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2IDr (0x24) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 1 (0x1) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #6 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '1', total number '5', next payload '36' | updated IKE fragment state to respond using fragments without waiting for re-transmits | stop processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #5 spent 0.158 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.17 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00138 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 30 1c e5 fa 9d bd 82 51 02 e0 05 22 f9 3f 72 39 | 35 20 23 20 00 00 00 01 00 00 02 17 00 00 01 fb | 00 02 00 05 04 3b a0 8b b7 79 e7 a0 b5 73 60 88 | 39 ac 04 4b 11 96 25 a4 e4 38 f4 77 a8 c9 7b 1b | 61 e3 a1 38 bb c4 1c ca 4b 40 6d 5a b1 6c 32 c1 | c2 7e 77 ec c4 8a d2 18 ee e3 0d 1a 6b 14 fd 90 | 68 9b 90 75 99 3e ca e2 75 79 46 64 52 16 28 f8 | 35 d8 ba a4 d3 22 e1 31 db 0f 3c d3 ca 02 f2 e1 | b9 b5 df 06 5c 95 cd 60 ee 0d 98 66 a0 b8 57 b9 | 6d 6a 5c 10 20 f9 20 1e 4e d4 6b 74 6b 89 15 7b | 35 dd d5 82 73 fd 88 1f 43 83 16 0e f5 65 cf 7a | 58 a7 05 76 d6 01 1a 10 dc e0 9f 66 82 4f 22 22 | e8 f9 53 3f 14 df 96 49 84 4a a5 a4 78 38 96 47 | 59 d6 2f c2 ac b3 b8 41 52 9b 97 8c 3e 59 00 fd | f5 a8 57 dd 4a cb 6c a0 f5 18 7a 74 08 a1 ca 48 | 16 13 cd 1b c9 2a 4d f9 ea 55 82 70 30 f6 ae 89 | 41 ff b4 25 40 74 cb db 65 76 81 9b 59 b9 f6 32 | 12 7d b5 a9 ca 1d 08 5f 6b 2b e6 6a 7e c8 60 0c | 0a 6f 15 df 89 a3 1a 38 81 e7 bf 3a e6 1b 4d 15 | 50 71 5c 41 af 46 2d 1d a5 21 27 de 59 52 84 06 | dc 7b 40 39 18 48 6c 7a 3e ab 08 31 46 b7 4d c3 | c9 6e 90 c0 b7 38 7a 4f d1 b5 5f f1 13 2b 9d da | 38 07 7a b8 6a 90 c5 e3 6d 09 6c 8c c2 9a 9b b9 | f3 6e 2b b5 b9 e6 09 cf a0 a5 02 3a ec b9 18 8c | 69 f8 fd cc 88 46 14 8e 34 f3 42 ed 7b 4d 73 39 | 11 b8 19 37 1f e7 55 c3 3c 6d a9 e3 db f0 7b 09 | f9 e9 7b b1 20 ec ef c9 3f 77 09 87 44 20 a2 c2 | 09 35 f4 91 45 ce 5c d5 c9 13 01 e5 88 31 62 94 | 72 58 48 aa e0 a8 cd ba 37 49 6b 75 c3 7b 23 38 | 7f f2 f6 52 0f d9 e3 9e ad dd 5e a6 7b 4c 2e 74 | d1 31 88 88 fb dc 4c 73 c6 fa 40 24 70 45 44 9e | aa 30 2c 26 7e b0 6d 69 2a 31 3c 27 1e 39 a1 13 | 72 ea 8d c4 47 b7 b2 01 01 72 a4 6a 9a 0d 8c 1a | c1 7c ca 93 0a 7a d3 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #5 in PARENT_I2 (find_v2_ike_sa) | start processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #6 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #6 is idle | #6 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 2 (0x2) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #6 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '2', total number '5', next payload '0' | stop processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #5 spent 0.155 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.165 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00129 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 30 1c e5 fa 9d bd 82 51 02 e0 05 22 f9 3f 72 39 | 35 20 23 20 00 00 00 01 00 00 02 17 00 00 01 fb | 00 03 00 05 a5 b2 13 17 f3 66 f3 c1 85 15 cb df | 69 cd 8f 0c c3 1d 24 75 ad 8e d6 36 d2 9c 9d 30 | cf 34 d5 ab fc 9a 6e 97 e1 70 e9 dc 4e c0 c3 3a | 84 c6 58 6b 91 73 d2 b2 51 eb 54 8f ee b8 7a c7 | 9c 81 be a7 dd 5d d4 01 34 2a b2 18 7f c6 8e 68 | a0 e2 04 3e f6 d5 4e a3 97 61 2b 60 e3 3e 88 ea | 0a 5d 9b 64 0d 9c 2b 4e 17 9f 2b 75 52 ca 09 8d | cc b0 d8 81 3b f0 74 6f 0b bd 24 1a 2f 3a 7e 04 | 6d ea 2c 51 9e 00 6f 7d d5 90 b0 86 a1 3e 07 2d | ef 01 a7 b5 da 54 ed 76 b8 f9 34 59 8b fa 53 91 | 42 9e 1b f4 5c 7b 73 16 69 37 87 90 4d ce 67 32 | 9f 83 8c fb d0 21 9a 86 5e f0 e4 4a 73 2e e4 49 | 0d bd 98 85 19 bc a2 2f d0 d5 83 89 9b c0 04 65 | bd 04 29 bd 2e 11 34 5d f2 9a 74 c4 e9 5f 82 36 | bc a9 7d b4 57 80 5b 7e 8a 43 55 8d c7 df b8 53 | 27 30 6b 73 8d 9f 5a b8 37 16 3d a2 ac 65 7c 24 | 28 bb 20 8c 9f 32 65 85 f2 57 1e 5d 94 56 a6 7f | 23 0e e8 57 fb 5e ce aa a7 57 4d 8e 90 fd 2d a9 | 3b 5b 95 58 5b e2 c9 1e a1 21 1c 31 d7 a0 ac 0a | 28 bb 4b 5d f2 1e 7b cd fb a5 c8 85 66 ad c2 06 | 49 35 ee 7a 7e 6b a8 34 53 f8 5a ae 91 56 c3 52 | f4 12 27 19 77 d1 60 73 bc 8a 86 5d e5 91 cb d0 | 72 7c d0 66 da 05 75 63 a6 f0 e0 6a cd ee 2c 04 | c6 75 7f 59 53 dd 88 85 20 17 d8 c6 aa 8c 3b 5a | f9 27 6f b5 64 4c 59 9f ec 82 b4 3d 20 1a 66 e0 | 6f 6b 7c 55 5b db c2 31 ef 37 9c 10 2c db fa 4b | e8 6d b0 37 93 11 ce c0 f1 46 cd 66 be 6e ea a4 | 06 87 c7 aa c6 5d 20 73 d4 5e bd 90 30 30 9f 97 | 7f 20 29 ce e6 ba 32 2e 8c ff 5b 40 77 81 cb c0 | 2a 0f 9f a1 4a 52 3d 47 59 52 9f c8 92 13 9c 9a | 2b dc be 72 d0 05 7a b4 aa a1 11 36 e1 e7 30 8b | a3 46 e2 59 32 c8 1c | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #5 in PARENT_I2 (find_v2_ike_sa) | start processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #6 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #6 is idle | #6 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 3 (0x3) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #6 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '3', total number '5', next payload '0' | stop processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #5 spent 0.153 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.163 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00125 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 30 1c e5 fa 9d bd 82 51 02 e0 05 22 f9 3f 72 39 | 35 20 23 20 00 00 00 01 00 00 02 17 00 00 01 fb | 00 04 00 05 d9 05 2e 61 c3 88 9e 85 6f 8d d7 44 | b9 c5 1b 22 1f 47 f5 bd f3 11 ee 89 81 42 27 73 | ab 3f 6c 69 47 ba 70 76 02 77 bc 11 c5 35 cb 4e | 00 00 a1 7c 6c 07 b4 84 d2 db 19 69 af f5 40 c6 | 13 a4 29 68 74 5b ce 6b a1 80 21 13 89 40 08 3b | 78 23 44 3b ef 91 6c d8 f4 4a 4c e5 f9 b0 fc 02 | 28 29 eb 56 73 c2 da e4 38 a3 f5 ba d3 a2 af a1 | 47 94 2a 85 7b 0c 48 84 03 4b 48 9c 69 c0 78 a2 | db 74 34 3e b1 d1 e6 35 db 86 0c aa 36 3c d3 7f | 4b e2 6c 3c a4 4c 26 0c 30 7f 16 83 7b 29 79 c5 | 9b 49 29 85 56 34 9f d6 6e 1e cb b4 c2 f5 67 e4 | 8f 44 43 56 53 8c 2b fd b2 20 38 a1 b5 45 4f cf | 51 1e 6a 73 3f 1e 66 38 4e d8 d1 d3 58 03 5b 51 | b8 33 db 6f a3 27 a1 a8 00 1a d1 fb 69 4d d8 d6 | 63 69 21 70 dc 7e 13 7a b9 b6 b5 94 9d 81 2d d4 | 92 ef 79 7e 1c 45 eb 50 45 56 94 c9 63 8b f7 61 | ad 91 d5 4e 6f 80 70 be 07 9e c0 c2 4e e9 0e 9b | 2a 92 e5 1b 34 5b 8e 81 04 70 8f 49 a3 12 5f 30 | 18 4c ee 29 29 88 ff f0 ea 89 6c 37 16 6e 4b 8f | 12 05 5a 53 ef 34 11 c1 8a b4 99 68 3f c6 ac b0 | 60 f1 3b 8b d4 f0 47 76 f6 d3 8d 86 58 bd c8 77 | a1 c5 ae 54 0c 4e 89 10 9b b2 33 88 07 d4 b1 c1 | 77 aa db d2 22 26 5a a7 3a d7 17 7f 57 78 4e 8a | 26 b5 c2 55 07 eb 1b c2 c9 4f e8 58 c8 1d 84 25 | b1 49 21 2a 51 26 48 6d 23 54 7b 9b bd 7f 49 e1 | ce c4 59 6e 80 3e f7 93 fb f5 b4 85 1a d5 d3 9c | 71 65 58 da 3b db f1 6a 3e 00 73 8a bf 25 f1 27 | 19 21 4b 17 66 b1 f9 1a 95 ac 9e 60 bb 8d 3c 3c | 3e a8 df e6 84 03 d0 6f c4 29 21 74 70 1c c2 f4 | 9d 23 79 8d b2 23 dc d4 52 7e 39 b8 85 a6 47 a7 | 94 59 44 a2 91 2a e0 88 82 1c 80 43 4f a6 17 3f | 83 29 62 18 7e db 7b | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #5 in PARENT_I2 (find_v2_ike_sa) | start processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #6 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #6 is idle | #6 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 4 (0x4) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #6 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '4', total number '5', next payload '0' | stop processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #5 spent 0.139 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.15 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00124 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 121 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 30 1c e5 fa 9d bd 82 51 02 e0 05 22 f9 3f 72 39 | 35 20 23 20 00 00 00 01 00 00 00 79 00 00 00 5d | 00 05 00 05 3f ad c4 cb 9a b4 8b 6e cc 2e ae 36 | a3 5f 9a c0 46 b8 95 15 db 9a 1e 92 97 85 94 2f | d3 22 22 4b 30 a5 00 fd eb 4e 55 b5 f9 b9 85 f8 | 98 a0 2b a6 bf 33 1e 3d 5c 5d d1 ec 3d 5a aa 77 | 0c ec b1 02 9a 3f 7a 23 32 42 e8 78 ae ca 8e 76 | 98 d6 62 66 fa c7 c2 f9 c1 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 121 (0x79) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #5 in PARENT_I2 (find_v2_ike_sa) | start processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #6 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #6 is idle | #6 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 93 (0x5d) | fragment number: 5 (0x5) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=85) | #6 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '5', total number '5', next payload '0' | #6 ikev2 ISAKMP_v2_IKE_AUTH decrypt success | Now let's proceed with payload (ISAKMP_NEXT_v2IDr) | **parse IKEv2 Identification - Responder - Payload: | next payload type: ISAKMP_NEXT_v2CERT (0x25) | flags: none (0x0) | length: 191 (0xbf) | ID type: ID_DER_ASN1_DN (0x9) | processing payload: ISAKMP_NEXT_v2IDr (len=183) | Now let's proceed with payload (ISAKMP_NEXT_v2CERT) | **parse IKEv2 Certificate Payload: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) | flags: none (0x0) | length: 1265 (0x4f1) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | processing payload: ISAKMP_NEXT_v2CERT (len=1260) | Now let's proceed with payload (ISAKMP_NEXT_v2AUTH) | **parse IKEv2 Authentication Payload: | next payload type: ISAKMP_NEXT_v2CP (0x2f) | flags: none (0x0) | length: 392 (0x188) | auth method: IKEv2_AUTH_RSA (0x1) | processing payload: ISAKMP_NEXT_v2AUTH (len=384) | Now let's proceed with payload (ISAKMP_NEXT_v2CP) | **parse IKEv2 Configuration Payload: | next payload type: ISAKMP_NEXT_v2SA (0x21) | flags: none (0x0) | length: 24 (0x18) | ikev2_cfg_type: IKEv2_CP_CFG_REPLY (0x2) | processing payload: ISAKMP_NEXT_v2CP (len=16) | Now let's proceed with payload (ISAKMP_NEXT_v2SA) | **parse IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) | flags: none (0x0) | length: 36 (0x24) | processing payload: ISAKMP_NEXT_v2SA (len=32) | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) | **parse IKEv2 Traffic Selector - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) | flags: none (0x0) | length: 24 (0x18) | number of TS: 1 (0x1) | processing payload: ISAKMP_NEXT_v2TSi (len=16) | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) | **parse IKEv2 Traffic Selector - Responder - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 24 (0x18) | number of TS: 1 (0x1) | processing payload: ISAKMP_NEXT_v2TSr (len=16) | selected state microcode Initiator: process IKE_AUTH response | Now let's proceed with state specific processing | calling processor Initiator: process IKE_AUTH response | global one-shot timer EVENT_FREE_ROOT_CERTS scheduled in 300 seconds | #5 spent 0.00459 milliseconds in find_and_verify_certs() calling get_root_certs() | checking for known CERT payloads | saving certificate of type 'X509_SIGNATURE' | decoded cert: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | #5 spent 0.723 milliseconds in find_and_verify_certs() calling decode_cert_payloads() | cert_issuer_has_current_crl: looking for a CRL issued by E=testing@libreswan.org,CN=Libreswan test CA for mainca,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | #5 spent 0.0387 milliseconds in find_and_verify_certs() calling crl_update_check() | missing or expired CRL | crl_strict: 0, ocsp: 0, ocsp_strict: 0, ocsp_post: 0 | verify_end_cert trying profile IPsec | certificate is valid (profile IPsec) | #5 spent 0.12 milliseconds in find_and_verify_certs() calling verify_end_cert() "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: certificate verified OK: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f342958 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f360ed8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f360e88 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f360cd8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f360bd8 | unreference key: 0x56091f3634c8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | #5 spent 0.323 milliseconds in decode_certs() calling add_pubkey_from_nss_cert() | #5 spent 1.25 milliseconds in decode_certs() | DER ASN1 DN: 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 | DER ASN1 DN: 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | DER ASN1 DN: 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | DER ASN1 DN: 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | DER ASN1 DN: 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | DER ASN1 DN: 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | DER ASN1 DN: 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 61 73 | DER ASN1 DN: 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | DER ASN1 DN: 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 | DER ASN1 DN: 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 61 73 | DER ASN1 DN: 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | DER ASN1 DN: 77 61 6e 2e 6f 72 67 | ID_DER_ASN1_DN '%fromcert' does not need further ID verification | stomping on peer_id | X509: CERT and ID matches current connection | offered CA: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: IKEv2 mode peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' | verifying AUTH payload | required RSA CA is '%any' | checking RSA keyid 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' for match with 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | key issuer CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | an RSA Sig check passed with *AwEAAbEef [remote certificates] | #5 spent 0.162 milliseconds in try_all_RSA_keys() trying a pubkey "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: Authenticated using RSA | #5 spent 0.217 milliseconds in ikev2_verify_rsa_hash() | parent state #5: PARENT_I2(open IKE SA) => PARENT_I3(established IKE SA) | #5 will start re-keying in 2568 seconds with margin of 1032 seconds (attempting re-key) | state #5 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x7f7bb8002888 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7f7bb8002b78 | event_schedule: new EVENT_SA_REKEY-pe@0x7f7bb8002b78 | inserting event EVENT_SA_REKEY, timeout in 2568 seconds for #5 | libevent_malloc: new ptr-libevent@0x56091f3636b8 size 128 | pstats #5 ikev2.ike established | FOR_EACH_STATE_... in nat_traversal_ka_event (for_each_state) | [RE]START processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | stop processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | resume processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | suspend processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | start processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | NAT-T: keepalive packet not required as recent DPD event used the IKE SA on conn westnet-eastnet-ipv4-psk-ikev2 | stop processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | resume processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds | #6 westnet-eastnet-ipv4-psk-ikev2[1] parsing ISAKMP_NEXT_v2CP payload | ***parse IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_ADDRESS (0x1) | length/value: 4 (0x4) | parsing 4 raw bytes of IKEv2 Configuration Payload Attribute into INTERNAL_IP_ADDRESS | INTERNAL_IP_ADDRESS c0 00 02 01 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: received INTERNAL_IP4_ADDRESS 192.0.2.1 | setting host source IP address to 192.0.2.1 | ***parse IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_DNS (0x3) | length/value: 4 (0x4) | parsing 4 raw bytes of IKEv2 Configuration Payload Attribute into INTERNAL_IP_DNS CP payload | INTERNAL_IP_DNS CP payload | 01 02 03 04 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: received INTERNAL_IP4_DNS 1.2.3.4 | TSi: parsing 1 traffic selectors | ***parse IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | length: 16 (0x10) | start port: 0 (0x0) | end port: 65535 (0xffff) | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low | TS low c0 00 02 01 | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high | TS high c0 00 02 01 | TSi: parsed 1 traffic selectors | TSr: parsing 1 traffic selectors | ***parse IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | length: 16 (0x10) | start port: 0 (0x0) | end port: 65535 (0xffff) | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low | TS low c0 01 02 17 | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high | TS high c0 01 02 17 | TSr: parsed 1 traffic selectors | evaluating our conn="westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 I=192.0.2.1/32:0/0 R=192.1.2.23/32:0/0 to their: | TSi[0] .net=192.0.2.1-192.0.2.1 .iporotoid=0 .{start,end}port=0..65535 | match address end->client=192.0.2.1/32 >= TSi[0]net=192.0.2.1-192.0.2.1: YES fitness 32 | narrow port end=0..65535 >= TSi[0]=0..65535: 0 | TSi[0] port match: YES fitness 65536 | narrow protocol end=*0 >= TSi[0]=*0: 0 | match end->protocol=*0 >= TSi[0].ipprotoid=*0: YES fitness 255 | TSr[0] .net=192.1.2.23-192.1.2.23 .iporotoid=0 .{start,end}port=0..65535 | match address end->client=192.1.2.23/32 >= TSr[0]net=192.1.2.23-192.1.2.23: YES fitness 32 | narrow port end=0..65535 >= TSr[0]=0..65535: 0 | TSr[0] port match: YES fitness 65536 | narrow protocol end=*0 >= TSr[0]=*0: 0 | match end->protocol=*0 >= TSr[0].ipprotoid=*0: YES fitness 255 | best fit so far: TSi[0] TSr[0] | found an acceptable TSi/TSr Traffic Selector | printing contents struct traffic_selector | ts_type: IKEv2_TS_IPV6_ADDR_RANGE | ipprotoid: 0 | port range: 0-65535 | ip range: 192.0.2.1-192.0.2.1 | printing contents struct traffic_selector | ts_type: IKEv2_TS_IPV6_ADDR_RANGE | ipprotoid: 0 | port range: 0-65535 | ip range: 192.1.2.23-192.1.2.23 | using existing local ESP/AH proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE_AUTH initiator accepting remote ESP/AH proposal): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | Comparing remote proposals against IKE_AUTH initiator accepting remote ESP/AH proposal 4 local proposals | local proposal 1 type ENCR has 1 transforms | local proposal 1 type PRF has 0 transforms | local proposal 1 type INTEG has 1 transforms | local proposal 1 type DH has 1 transforms | local proposal 1 type ESN has 1 transforms | local proposal 1 transforms: required: ENCR+ESN; optional: INTEG+DH | local proposal 2 type ENCR has 1 transforms | local proposal 2 type PRF has 0 transforms | local proposal 2 type INTEG has 1 transforms | local proposal 2 type DH has 1 transforms | local proposal 2 type ESN has 1 transforms | local proposal 2 transforms: required: ENCR+ESN; optional: INTEG+DH | local proposal 3 type ENCR has 1 transforms | local proposal 3 type PRF has 0 transforms | local proposal 3 type INTEG has 2 transforms | local proposal 3 type DH has 1 transforms | local proposal 3 type ESN has 1 transforms | local proposal 3 transforms: required: ENCR+INTEG+ESN; optional: DH | local proposal 4 type ENCR has 1 transforms | local proposal 4 type PRF has 0 transforms | local proposal 4 type INTEG has 2 transforms | local proposal 4 type DH has 1 transforms | local proposal 4 type ESN has 1 transforms | local proposal 4 transforms: required: ENCR+INTEG+ESN; optional: DH | ***parse IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | length: 32 (0x20) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI | remote SPI 82 3a d4 dd | Comparing remote proposal 1 containing 2 transforms against local proposal [1..1] of 4 local proposals | ****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 12 (0xc) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | *****parse IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 | ****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | remote proposal 1 transform 1 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 | remote proposal 1 proposed transforms: ENCR+ESN; matched: ENCR+ESN; unmatched: none | comparing remote proposal 1 containing ENCR+ESN transforms to local proposal 1; required: ENCR+ESN; optional: INTEG+DH; matched: ENCR+ESN | remote proposal 1 matches local proposal 1 | remote accepted the proposal 1:ESP:ENCR=AES_GCM_C_256;ESN=DISABLED[first-match] | IKE_AUTH initiator accepting remote ESP/AH proposal ikev2_proposal: 1:ESP:SPI=823ad4dd;ENCR=AES_GCM_C_256;ESN=DISABLED | converting proposal to internal trans attrs | integ=none: .key_size=0 encrypt=aes_gcm_16: .key_size=32 .salt_size=4 keymat_len=36 | install_ipsec_sa() for #6: inbound and outbound | could_route called for westnet-eastnet-ipv4-psk-ikev2 (kind=CK_INSTANCE) | FOR_EACH_CONNECTION_... in route_owner | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | route owner of "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 unrouted: NULL; eroute owner: NULL | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 | AES_GCM_16 requires 4 salt bytes | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnet-eastnet-ipv4-psk-ikev2' not available on interface eth0 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.823ad4dd@192.1.2.23 included non-error error | set up outgoing SA, ref=0/0 | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 | AES_GCM_16 requires 4 salt bytes | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnet-eastnet-ipv4-psk-ikev2' not available on interface eth0 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.e549094@192.1.3.209 included non-error error | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | add inbound eroute 192.1.2.23/32:0 --0-> 192.0.2.1/32:0 => tun.10000@192.1.3.209 (raw_eroute) | IPsec Sa SPD priority set to 1040351 | raw_eroute result=success | set up incoming SA, ref=0/0 | sr for #6: unrouted | route_and_eroute() for proto 0, and source port 0 dest port 0 | FOR_EACH_CONNECTION_... in route_owner | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | route owner of "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 unrouted: NULL; eroute owner: NULL | route_and_eroute with c: westnet-eastnet-ipv4-psk-ikev2 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #6 | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | eroute_connection add eroute 192.0.2.1/32:0 --0-> 192.1.2.23/32:0 => tun.0@192.1.2.23 (raw_eroute) | IPsec Sa SPD priority set to 1040351 | raw_eroute result=success | running updown command "ipsec _updown" for verb up | command executing up-client | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CO | popen cmd is 1359 chars long | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv: | cmd( 80):4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1: | cmd( 160):.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Departmen: | cmd( 240):t, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CL: | cmd( 320):IENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.25: | cmd( 400):5.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_: | cmd( 480):SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto: | cmd( 560):, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@te: | cmd( 640):sting.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='19: | cmd( 720):2.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEE: | cmd( 800):R_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CON: | cmd( 880):N_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_T: | cmd( 960):RACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY=: | cmd(1040):'ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0' PLUT: | cmd(1120):O_PEER_DNS_INFO='1.2.3.4' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_C: | cmd(1200):FG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUT: | cmd(1280):ING='no' VTI_SHARED='no' SPI_IN=0x823ad4dd SPI_OUT=0xe549094 ipsec _updown 2>&1: "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: up-client output: updating resolvconf "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: up-client output: rm: cannot remove '/etc/resolv.conf': Device or resource busy | route_and_eroute: firewall_notified: true | running updown command "ipsec _updown" for verb prepare | command executing prepare-client | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | popen cmd is 1364 chars long | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastne: | cmd( 80):t-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME=': | cmd( 160):192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depa: | cmd( 240):rtment, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_: | cmd( 320):MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='2: | cmd( 400):55.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' P: | cmd( 480):LUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=To: | cmd( 560):ronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-ea: | cmd( 640):st@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NE: | cmd( 720):T='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUT: | cmd( 800):O_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUT: | cmd( 880):O_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SA: | cmd( 960):REF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFA: | cmd(1040):MILY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0': | cmd(1120): PLUTO_PEER_DNS_INFO='1.2.3.4' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PL: | cmd(1200):UTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI: | cmd(1280):_ROUTING='no' VTI_SHARED='no' SPI_IN=0x823ad4dd SPI_OUT=0xe549094 ipsec _updown : | cmd(1360):2>&1: | running updown command "ipsec _updown" for verb route | command executing route-client | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PL | popen cmd is 1362 chars long | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-: | cmd( 80):ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='19: | cmd( 160):2.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depart: | cmd( 240):ment, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY: | cmd( 320):_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255: | cmd( 400):.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLU: | cmd( 480):TO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toro: | cmd( 560):nto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east: | cmd( 640):@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET=: | cmd( 720):'192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_: | cmd( 800):PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_: | cmd( 880):CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SARE: | cmd( 960):F_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMI: | cmd(1040):LY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0' P: | cmd(1120):LUTO_PEER_DNS_INFO='1.2.3.4' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUT: | cmd(1200):O_CFG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_R: | cmd(1280):OUTING='no' VTI_SHARED='no' SPI_IN=0x823ad4dd SPI_OUT=0xe549094 ipsec _updown 2>: | cmd(1360):&1: "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: route-client output: Error: Peer netns reference is invalid. | route_and_eroute: instance "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23, setting eroute_owner {spd=0x56091f366e68,sr=0x56091f366e68} to #6 (was #0) (newest_ipsec_sa=#0) | #5 spent 2.36 milliseconds in install_ipsec_sa() | inR2: instance westnet-eastnet-ipv4-psk-ikev2[1], setting IKEv2 newest_ipsec_sa to #6 (was #0) (spd.eroute=#6) cloned from #5 | state #6 requesting EVENT_RETRANSMIT to be deleted | #6 STATE_PARENT_I2: retransmits: cleared | libevent_free: release ptr-libevent@0x56091f349398 | free_event_entry: release EVENT_RETRANSMIT-pe@0x56091f3494a8 | #6 spent 4.62 milliseconds in processing: Initiator: process IKE_AUTH response in ikev2_process_state_packet() | [RE]START processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #6 complete_v2_state_transition() PARENT_I2->V2_IPSEC_I with status STF_OK | IKEv2: transition from state STATE_PARENT_I2 to state STATE_V2_IPSEC_I | child state #6: PARENT_I2(open IKE SA) => V2_IPSEC_I(established CHILD SA) | Message ID: updating counters for #6 to 1 after switching state | Message ID: recv #5.#6 response 1; ike: initiator.sent=1 initiator.recv=0->1 responder.sent=-1 responder.recv=-1; child: wip.initiator=1->-1 wip.responder=-1 | Message ID: #5.#6 skipping update_send as nothing to send; initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 | pstats #6 ikev2.child established "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: negotiated connection [192.0.2.1-192.0.2.1:0-65535 0] -> [192.1.2.23-192.1.2.23:0-65535 0] | NAT-T: NAT Traversal detected - their IKE port is '500' | NAT-T: encaps is 'auto' "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP/NAT=>0x823ad4dd <0x0e549094 xfrm=AES_GCM_16_256-NONE NATOA=none NATD=192.1.2.23:4500 DPD=passive} | releasing whack for #6 (sock=fd@23) | close_any(fd@23) (in release_whack() at state.c:654) | releasing whack and unpending for parent #5 | unpending state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 | delete from pending Child SA with 192.1.2.23 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 | removing pending policy for no connection {0x56091f31db98} | close_any(fd@22) (in release_whack() at state.c:654) | #6 will start re-keying in 28154 seconds with margin of 646 seconds (attempting re-key) | event_schedule: new EVENT_SA_REKEY-pe@0x56091f3494a8 | inserting event EVENT_SA_REKEY, timeout in 28154 seconds for #6 | libevent_malloc: new ptr-libevent@0x56091f360c28 size 128 | stop processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #5 spent 4.98 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 5 milliseconds in comm_handle_cb() reading and processing packet | kernel_process_msg_cb process netlink message | netlink_get: XFRM_MSG_DELPOLICY message | xfrm netlink address change RTM_NEWADDR msg len 76 | XFRM RTM_NEWADDR 192.0.2.1 IFA_LOCAL | FOR_EACH_STATE_... in record_newaddr (for_each_state) | start processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | stop processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | start processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | stop processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | IKEv2 received address RTM_NEWADDR type 3 | IKEv2 received address RTM_NEWADDR type 8 | IKEv2 received address RTM_NEWADDR type 6 | netlink_get: XFRM_MSG_EXPIRE message | netlink_get: XFRM_MSG_EXPIRE message | spent 0.0472 milliseconds in kernel message | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00446 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00311 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00325 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (in terminate_a_connection() at terminate.c:69) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: terminating SAs using this connection | connection 'westnet-eastnet-ipv4-psk-ikev2' -POLICY_UP | FOR_EACH_STATE_... in shared_phase1_connection | connection not shared - terminating IKE and IPsec SA | Deleting states for connection - not including other IPsec SA's | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #6 | suspend processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) | start processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) | pstats #6 ikev2.child deleted completed | #6 spent 4.62 milliseconds in total | [RE]START processing: state #6 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:879) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: deleting state (STATE_V2_IPSEC_I) aged 0.183s and NOT sending notification | child state #6: V2_IPSEC_I(established CHILD SA) => delete | get_sa_info esp.823ad4dd@192.1.2.23 | get_sa_info esp.e549094@192.1.3.209 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: ESP traffic information: in=0B out=0B | IMPAIR: impair-send-no-delete set - not sending Delete/Notify | state #6 requesting EVENT_SA_REKEY to be deleted | libevent_free: release ptr-libevent@0x56091f360c28 | free_event_entry: release EVENT_SA_REKEY-pe@0x56091f3494a8 | running updown command "ipsec _updown" for verb down | command executing down-client | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844112' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | popen cmd is 1369 chars long | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-i: | cmd( 80):pv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192: | cmd( 160):.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Departm: | cmd( 240):ent, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_: | cmd( 320):CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.: | cmd( 400):255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUT: | cmd( 480):O_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toron: | cmd( 560):to, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@: | cmd( 640):testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET=': | cmd( 720):192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_P: | cmd( 800):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844112: | cmd( 880):' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING: | cmd( 960):+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_A: | cmd(1040):DDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISC: | cmd(1120):O='0' PLUTO_PEER_DNS_INFO='1.2.3.4' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER=: | cmd(1200):'' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE=': | cmd(1280):' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x823ad4dd SPI_OUT=0xe549094 ipsec _up: | cmd(1360):down 2>&1: "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #6: down-client output: restoring resolvconf | shunt_eroute() called for connection 'westnet-eastnet-ipv4-psk-ikev2' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | IPsec Sa SPD priority set to 1040351 | delete esp.823ad4dd@192.1.2.23 | netlink response for Del SA esp.823ad4dd@192.1.2.23 included non-error error | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | delete inbound eroute 192.1.2.23/32:0 --0-> 192.0.2.1/32:0 => unk255.10000@192.1.3.209 (raw_eroute) | raw_eroute result=success | delete esp.e549094@192.1.3.209 | netlink response for Del SA esp.e549094@192.1.3.209 included non-error error | stop processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (BACKGROUND) (in update_state_connection() at connections.c:4076) | start processing: connection NULL (in update_state_connection() at connections.c:4077) | in connection_discard for connection westnet-eastnet-ipv4-psk-ikev2 | State DB: deleting IKEv2 state #6 in V2_IPSEC_I | child state #6: V2_IPSEC_I(established CHILD SA) => UNDEFINED(ignore) | stop processing: state #6 from 192.1.2.23 (in delete_state() at state.c:1143) | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) | state #5 | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #5 | start processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) | pstats #5 ikev2.ike deleted completed | #5 spent 19.4 milliseconds in total | [RE]START processing: state #5 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:879) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #5: deleting state (STATE_PARENT_I3) aged 0.227s and NOT sending notification | parent state #5: PARENT_I3(established IKE SA) => delete | IMPAIR: impair-send-no-delete set - not sending Delete/Notify | state #5 requesting EVENT_SA_REKEY to be deleted | libevent_free: release ptr-libevent@0x56091f3636b8 | free_event_entry: release EVENT_SA_REKEY-pe@0x7f7bb8002b78 | State DB: IKEv2 state not found (flush_incomplete_children) | in connection_discard for connection westnet-eastnet-ipv4-psk-ikev2 | State DB: deleting IKEv2 state #5 in PARENT_I3 | parent state #5: PARENT_I3(established IKE SA) => UNDEFINED(ignore) | unreference key: 0x56091f360d28 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 2-- | stop processing: state #5 from 192.1.2.23 (in delete_state() at state.c:1143) | unreference key: 0x56091f360d28 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | unreference key: 0x56091f34b018 user-east@testing.libreswan.org cnt 1-- | unreference key: 0x56091f347448 @east.testing.libreswan.org cnt 1-- | unreference key: 0x56091f36c1a8 east@testing.libreswan.org cnt 1-- | unreference key: 0x56091f34f528 192.1.2.23 cnt 1-- | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) | start processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (in delete_connection() at connections.c:189) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: deleting connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 instance with peer 192.1.2.23 {isakmp=#0/ipsec=#0} | Deleting states for connection - not including other IPsec SA's | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | shunt_eroute() called for connection 'westnet-eastnet-ipv4-psk-ikev2' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | FOR_EACH_CONNECTION_... in route_owner | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | route owner of "westnet-eastnet-ipv4-psk-ikev2" unrouted: NULL | running updown command "ipsec _updown" for verb unroute | command executing unroute-client | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' | popen cmd is 1344 chars long | cmd( 0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastne: | cmd( 80):t-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME=': | cmd( 160):192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depa: | cmd( 240):rtment, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_: | cmd( 320):MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='2: | cmd( 400):55.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' P: | cmd( 480):LUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=T: | cmd( 560):oronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-e: | cmd( 640):ast@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_N: | cmd( 720):ET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLU: | cmd( 800):TO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLU: | cmd( 880):TO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SARE: | cmd( 960):F_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFA: | cmd(1040):MILY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0': | cmd(1120): PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG: | cmd(1200):_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTIN: | cmd(1280):G='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1: "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: unroute-client output: Error: Peer netns reference is invalid. | flush revival: connection 'westnet-eastnet-ipv4-psk-ikev2' wasn't on the list | stop processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (in discard_connection() at connections.c:249) | processing: STOP connection NULL (in terminate_a_connection() at terminate.c:87) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in delete_connection() at connections.c:189) | Deleting states for connection - not including other IPsec SA's | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | free hp@0x56091f367fa8 | flush revival: connection 'westnet-eastnet-ipv4-psk-ikev2' wasn't on the list | stop processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in discard_connection() at connections.c:249) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection westnet-eastnet-ipv4-psk-ikev2 with policy ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | No AUTH policy was set - defaulting to RSASIG | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | setting ID to ID_DER_ASN1_DN: 'E=user-road@testing.libreswan.org,CN=road.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' | loading left certificate 'road' pubkey | unreference key: 0x56091f3480c8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f3666f8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f3666a8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f367298 | unreference key: 0x56091f369458 @road.testing.libreswan.org cnt 1-- | unreference key: 0x56091f347a08 user-road@testing.libreswan.org cnt 1-- | unreference key: 0x56091f34f528 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- | secrets entry for road already exists | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org is 0 | counting wild cards for %fromcert is 0 | based upon policy narrowing=yes, the connection is a template. | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x56091f347298 added connection description "westnet-eastnet-ipv4-psk-ikev2" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.209[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org,+MC+S=C]---192.1.3.254...192.1.2.23<192.1.2.23>[%fromcert] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 2.95 milliseconds in whack | kernel_process_msg_cb process netlink message | netlink_get: XFRM_MSG_UPDPOLICY message | netlink_get: XFRM_MSG_GETPOLICY message | xfrm netlink address change RTM_DELADDR msg len 76 | XFRM RTM_DELADDR 192.0.2.1 IFA_LOCAL | FOR_EACH_STATE_... in record_deladdr (for_each_state) | IKEv2 received address RTM_DELADDR type 3 | IKEv2 received address RTM_DELADDR type 8 | IKEv2 received address RTM_DELADDR type 6 | netlink_get: XFRM_MSG_UPDPOLICY message | spent 0.478 milliseconds in kernel message | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00431 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00269 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | dup_any(fd@16) -> fd@21 (in whack_process() at rcv_whack.c:590) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in initiate_a_connection() at initiate.c:186) | find_host_pair: comparing 192.1.3.209:500 to 192.1.2.23:500 but ignoring ports | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@0x56091f347298: westnet-eastnet-ipv4-psk-ikev2 | connection 'westnet-eastnet-ipv4-psk-ikev2' +POLICY_UP | dup_any(fd@21) -> fd@22 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #7 at 0x56091f3559f8 | State DB: adding IKEv2 state #7 in UNDEFINED | pstats #7 ikev2.ike started | Message ID: init #7: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #7: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #7; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@22) -> fd@23 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 IKE SA #7 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #7: initiating v2 parent SA | constructing local IKE proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator selecting KE) | converting ike_info AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | converting ike_info AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... | ... ikev2_proposal: 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: constructed local IKE proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | adding ikev2_outI1 KE work-order 7 for state #7 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f7bb8002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #7 | libevent_malloc: new ptr-libevent@0x7f7bac000f48 size 128 | #7 spent 0.21 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | RESET processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 starting work-order 7 for state #7 | RESET processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 7 | close_any(fd@21) (in initiate_connection() at initiate.c:372) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.316 milliseconds in whack | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 7 time elapsed 0.000655 seconds | (#7) spent 0.656 milliseconds in crypto helper computing work-order 7: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 7 for state #7 to event queue | scheduling resume sending helper answer for #7 | libevent_malloc: new ptr-libevent@0x7f7bb0002888 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #7 | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 7 | calling continuation function 0x56091de22b50 | ikev2_parent_outI1_continue for #7 | **emit ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | discarding INTEG=NONE | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 11 (0xb) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding INTEG=NONE | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 100 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding INTEG=NONE | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 2 (0x2) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 11 (0xb) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding INTEG=NONE | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 100 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 3 (0x3) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 13 (0xd) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 116 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 4 (0x4) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 13 (0xd) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 116 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 436 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 12 2f a0 be 57 47 0a bd f8 84 b8 7a 96 86 e3 94 | ikev2 g^x 3f d5 ef 95 e5 47 9c 2f fa 5b e1 8e 57 dc 3b 58 | ikev2 g^x 19 8d 45 39 aa 7c 2f db de c7 8a cb d7 b3 8f 24 | ikev2 g^x 44 41 8a 60 c0 1c 77 77 31 e7 a7 c7 a8 44 f3 90 | ikev2 g^x 55 46 3f bf 78 35 dd 29 8e 7a fe fb 0e 81 a0 92 | ikev2 g^x 6f b9 52 c3 b3 8d c8 0d ac d8 bf 69 8f 99 02 18 | ikev2 g^x e9 d7 2e c6 e2 21 42 92 0e e1 f8 97 a1 13 04 3f | ikev2 g^x f7 63 01 ea 2b c7 2e 8b b9 c0 20 f6 c6 08 09 d0 | ikev2 g^x 12 24 c1 f5 89 dc 42 8d 5d 59 80 7b 94 70 1e 13 | ikev2 g^x 2e b9 5b 4c 75 e0 1d 7a be b2 af 5e 97 35 f5 7b | ikev2 g^x b1 e2 fe 58 0b df b8 02 15 74 d9 9d ef 2d e4 05 | ikev2 g^x c7 76 e1 dd c1 5f d3 00 56 8a 46 33 41 6c 61 62 | ikev2 g^x f0 27 7d 33 2a fc 8e 27 dc 9f 14 71 0b 28 65 1b | ikev2 g^x 87 ed a2 5c 74 46 ef 20 be f2 5b 96 b0 8c f9 c2 | ikev2 g^x b2 f6 71 69 c2 dd a4 e0 8e fe 3a 97 4a dd 29 9b | ikev2 g^x 6d 42 ff a2 ab e3 32 41 2b dd b1 03 8f 92 4b dd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f9 47 a1 42 d7 15 97 de aa 7c 4a 93 50 4a 9d 62 | IKEv2 nonce 7f f0 47 5d af f9 80 68 7b ff 95 d4 7e 3d f2 21 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= 2f 3e 44 24 7e 05 db 1a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d1 | natd_hash: port=500 | natd_hash: hash= ba 88 64 50 fd 59 f7 27 30 86 a9 bf f9 31 60 1a | natd_hash: hash= fa 18 d9 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ba 88 64 50 fd 59 f7 27 30 86 a9 bf f9 31 60 1a | Notify data fa 18 d9 9d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= 2f 3e 44 24 7e 05 db 1a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 59 f2 b9 f7 cc 55 57 80 3c 3b d4 ba c7 fa cd 01 | natd_hash: hash= 44 60 9d 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 59 f2 b9 f7 cc 55 57 80 3c 3b d4 ba c7 fa cd 01 | Notify data 44 60 9d 77 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 828 | stop processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #7 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #7: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #7 to 4294967295 after switching state | Message ID: IKE #7 skipping update_recv as MD is fake | Message ID: sent #7 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #7: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) | sending 828 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #7) | 2f 3e 44 24 7e 05 db 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f | 28 00 01 08 00 0e 00 00 12 2f a0 be 57 47 0a bd | f8 84 b8 7a 96 86 e3 94 3f d5 ef 95 e5 47 9c 2f | fa 5b e1 8e 57 dc 3b 58 19 8d 45 39 aa 7c 2f db | de c7 8a cb d7 b3 8f 24 44 41 8a 60 c0 1c 77 77 | 31 e7 a7 c7 a8 44 f3 90 55 46 3f bf 78 35 dd 29 | 8e 7a fe fb 0e 81 a0 92 6f b9 52 c3 b3 8d c8 0d | ac d8 bf 69 8f 99 02 18 e9 d7 2e c6 e2 21 42 92 | 0e e1 f8 97 a1 13 04 3f f7 63 01 ea 2b c7 2e 8b | b9 c0 20 f6 c6 08 09 d0 12 24 c1 f5 89 dc 42 8d | 5d 59 80 7b 94 70 1e 13 2e b9 5b 4c 75 e0 1d 7a | be b2 af 5e 97 35 f5 7b b1 e2 fe 58 0b df b8 02 | 15 74 d9 9d ef 2d e4 05 c7 76 e1 dd c1 5f d3 00 | 56 8a 46 33 41 6c 61 62 f0 27 7d 33 2a fc 8e 27 | dc 9f 14 71 0b 28 65 1b 87 ed a2 5c 74 46 ef 20 | be f2 5b 96 b0 8c f9 c2 b2 f6 71 69 c2 dd a4 e0 | 8e fe 3a 97 4a dd 29 9b 6d 42 ff a2 ab e3 32 41 | 2b dd b1 03 8f 92 4b dd 29 00 00 24 f9 47 a1 42 | d7 15 97 de aa 7c 4a 93 50 4a 9d 62 7f f0 47 5d | af f9 80 68 7b ff 95 d4 7e 3d f2 21 29 00 00 08 | 00 00 40 2e 29 00 00 1c 00 00 40 04 ba 88 64 50 | fd 59 f7 27 30 86 a9 bf f9 31 60 1a fa 18 d9 9d | 00 00 00 1c 00 00 40 05 59 f2 b9 f7 cc 55 57 80 | 3c 3b d4 ba c7 fa cd 01 44 60 9d 77 | state #7 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f7bac000f48 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f7bb8002b78 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #7: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x7f7bb8002b78 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #7 | libevent_malloc: new ptr-libevent@0x56091f347cd8 size 128 | #7 STATE_PARENT_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29398.895477 | resume sending helper answer for #7 suppresed complete_v2_state_transition() and stole MD | #7 spent 1.06 milliseconds in resume sending helper answer | stop processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f7bb0002888 | spent 0.0021 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 437 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) | 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 0a c6 17 32 | 21 20 22 20 00 00 00 00 00 00 01 b5 22 00 00 28 | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 | 80 0e 01 00 03 00 00 08 02 00 00 07 00 00 00 08 | 04 00 00 0e 28 00 01 08 00 0e 00 00 75 24 d3 fe | 45 a1 dd 1e e6 c4 70 22 06 d2 a8 d0 53 fd dd 82 | f5 ef f0 70 a5 39 f0 98 bf 41 24 c1 3a a0 3e 32 | 5f c1 88 e6 92 26 e6 fc f3 e4 54 24 1e 59 cf 58 | 45 72 2b 3c 15 79 32 f6 c5 f6 27 da 86 2a f2 ec | 4f e1 af c5 1d c2 29 cb bb cd c1 da 1a 35 eb de | 6a cd 6c 35 07 19 35 fe 02 5b 71 57 2d b5 77 4b | 31 83 76 e5 00 73 7f e2 e1 90 44 22 c0 ce 6c 7e | 12 e2 71 61 3f b3 3e 58 10 2b 81 40 36 ed 12 b8 | d1 c2 52 e8 26 3f ad 9d d6 b1 5a 1a 26 f4 11 7b | b7 26 06 1d 65 51 c3 09 5a 41 cd b1 e2 f8 79 d2 | 0e e8 f0 cb 9b 1c 5e 49 57 f2 fc aa 0c 4a 02 03 | 86 da 11 0a ee 73 86 00 53 ae 7d ec e7 0f ed 97 | 7a 78 cb 49 77 8c 6e d6 96 d7 6e 8e c7 d1 16 ac | be 84 91 4e 72 b0 f5 a9 0a 5f d4 72 b7 49 96 72 | 8e b5 87 ef a5 c0 85 25 78 5f af f5 f3 0e 33 a8 | d6 de 2a e4 c7 a2 e8 c7 54 cf 20 a1 29 00 00 24 | 38 0b d1 13 e7 4e b5 58 63 78 cc 78 c1 84 68 39 | 78 8e 98 7b af b1 36 d3 2a 53 7b d6 f2 10 e6 cc | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 | 05 31 9c 88 a9 50 75 ff ac 0f 58 67 70 b4 58 f4 | 35 1b c4 b6 26 00 00 1c 00 00 40 05 11 4f a3 af | 92 f5 d0 42 ea 60 73 9e cf d5 0e bf 5e e1 82 09 | 00 00 00 05 04 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_v2SA (0x21) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 0 (0x0) | length: 437 (0x1b5) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_SA_INIT response | State DB: found IKEv2 state #7 in PARENT_I1 (find_v2_ike_sa_by_initiator_spi) | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | [RE]START processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #7 is idle | #7 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SA) | ***parse IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2KE (0x22) | flags: none (0x0) | length: 40 (0x28) | processing payload: ISAKMP_NEXT_v2SA (len=36) | Now let's proceed with payload (ISAKMP_NEXT_v2KE) | ***parse IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2Ni (0x28) | flags: none (0x0) | length: 264 (0x108) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | processing payload: ISAKMP_NEXT_v2KE (len=256) | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) | ***parse IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 36 (0x24) | processing payload: ISAKMP_NEXT_v2Ni (len=32) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 8 (0x8) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | processing payload: ISAKMP_NEXT_v2N (len=0) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | length: 28 (0x1c) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | processing payload: ISAKMP_NEXT_v2N (len=20) | Now let's proceed with payload (ISAKMP_NEXT_v2N) | ***parse IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26) | flags: none (0x0) | length: 28 (0x1c) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | processing payload: ISAKMP_NEXT_v2N (len=20) | Now let's proceed with payload (ISAKMP_NEXT_v2CERTREQ) | ***parse IKEv2 Certificate Request Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 5 (0x5) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | processing payload: ISAKMP_NEXT_v2CERTREQ (len=0) | State DB: re-hashing IKEv2 state #7 IKE SPIi and SPI[ir] | #7 in state PARENT_I1: sent v2I1, expected v2R1 | selected state microcode Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH | Now let's proceed with state specific processing | calling processor Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH | ikev2 parent inR1: calculating g^{xy} in order to send I2 | using existing local IKE proposals for connection westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator accepting remote proposal): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 | Comparing remote proposals against IKE initiator (accepting) 4 local proposals | local proposal 1 type ENCR has 1 transforms | local proposal 1 type PRF has 2 transforms | local proposal 1 type INTEG has 1 transforms | local proposal 1 type DH has 8 transforms | local proposal 1 type ESN has 0 transforms | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG | local proposal 2 type ENCR has 1 transforms | local proposal 2 type PRF has 2 transforms | local proposal 2 type INTEG has 1 transforms | local proposal 2 type DH has 8 transforms | local proposal 2 type ESN has 0 transforms | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG | local proposal 3 type ENCR has 1 transforms | local proposal 3 type PRF has 2 transforms | local proposal 3 type INTEG has 2 transforms | local proposal 3 type DH has 8 transforms | local proposal 3 type ESN has 0 transforms | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none | local proposal 4 type ENCR has 1 transforms | local proposal 4 type PRF has 2 transforms | local proposal 4 type INTEG has 2 transforms | local proposal 4 type DH has 8 transforms | local proposal 4 type ESN has 0 transforms | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none | ****parse IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | length: 36 (0x24) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 3 (0x3) | Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 4 local proposals | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 12 (0xc) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | ******parse IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 | *****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | remote proposal 1 transform 2 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none | comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH | remote proposal 1 matches local proposal 1 | remote accepted the proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048[first-match] | converting proposal to internal trans attrs | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= 2f 3e 44 24 7e 05 db 1a | natd_hash: rcookie= cd 75 4e 34 0a c6 17 32 | natd_hash: ip= c0 01 03 d1 | natd_hash: port=500 | natd_hash: hash= 06 a2 80 a1 30 4a 63 0b ee fd 9d 47 1a 05 1a 82 | natd_hash: hash= 7e bd 73 7e | natd_hash: hasher=0x56091def7800(20) | natd_hash: icookie= 2f 3e 44 24 7e 05 db 1a | natd_hash: rcookie= cd 75 4e 34 0a c6 17 32 | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 05 31 9c 88 a9 50 75 ff ac 0f 58 67 70 b4 58 f4 | natd_hash: hash= 35 1b c4 b6 | NAT_TRAVERSAL encaps using auto-detect | NAT_TRAVERSAL this end is behind NAT | NAT_TRAVERSAL that end is NOT behind NAT | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 | NAT: #7 floating local endpoint from 192.1.3.209:500 to 192.1.3.209:4500 using pluto_nat_port (in ikev2_parent_inR1outI2() at ikev2_parent.c:1695) | NAT: #7 floating endpoint ended up on interface eth0 192.1.3.209:4500 | NAT-T: #7 floating remote port from 500 to 4500 using pluto_nat_port (in ikev2_parent_inR1outI2() at ikev2_parent.c:1695) | offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_512 integ=NONE cipherkey=AES_GCM_16 | adding ikev2_inR1outI2 KE work-order 8 for state #7 | state #7 requesting EVENT_RETRANSMIT to be deleted | #7 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x56091f347cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f7bb8002b78 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f7bb0002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #7 | libevent_malloc: new ptr-libevent@0x7f7bb0002888 size 128 | #7 spent 0.148 milliseconds in processing: Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH in ikev2_process_state_packet() | [RE]START processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #7 complete_v2_state_transition() PARENT_I1->PARENT_I2 with status STF_SUSPEND | suspending state #7 and saving MD | #7 is busy; has a suspended MD | [RE]START processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in log_stf_suspend() at ikev2.c:3269) | "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #7 complete v2 state STATE_PARENT_I1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 | stop processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #7 spent 0.31 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.318 milliseconds in comm_handle_cb() reading and processing packet | crypto helper 1 resuming | crypto helper 1 starting work-order 8 for state #7 | crypto helper 1 doing compute dh (V2) (ikev2_inR1outI2 KE); request ID 8 | calculating skeyseed using prf=sha2_512 integ=none cipherkey-size=32 salt-size=4 | crypto helper 1 finished compute dh (V2) (ikev2_inR1outI2 KE); request ID 8 time elapsed 0.000805 seconds | (#7) spent 0.806 milliseconds in crypto helper computing work-order 8: ikev2_inR1outI2 KE (pcr) | crypto helper 1 sending results from work-order 8 for state #7 to event queue | scheduling resume sending helper answer for #7 | libevent_malloc: new ptr-libevent@0x7f7bc4001978 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #7 | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 8 | calling continuation function 0x56091de22b50 | ikev2_parent_inR1outI2_continue for #7: calculating g^{xy}, sending I2 | creating state object #8 at 0x56091f3623a8 | State DB: adding IKEv2 state #8 in UNDEFINED | pstats #8 ikev2.child started | duplicating state object #7 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 as #8 for IPSEC SA | #8 setting local endpoint to 192.1.3.209:4500 from #7.st_localport (in duplicate_state() at state.c:1484) | Message ID: init_child #7.#8; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1 | Message ID: switch-from #7 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=0->-1 wip.responder=-1 | Message ID: switch-to #7.#8 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->0 wip.responder=-1 | state #7 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f7bb0002888 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f7bb0002b78 | event_schedule: new EVENT_SA_REPLACE-pe@0x7f7bb0002b78 | inserting event EVENT_SA_REPLACE, timeout in 60 seconds for #7 | libevent_malloc: new ptr-libevent@0x7f7bb0002888 size 128 | parent state #7: PARENT_I1(half-open IKE SA) => PARENT_I2(open IKE SA) | **emit ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' | emitting 8 zero bytes of IV into IKEv2 Encryption Payload | IKEv2 CERT: send a certificate? | IKEv2 CERT: OK to send a certificate (always) | IDr payload will NOT be sent | ****emit IKEv2 Identification - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | ID type: ID_DER_ASN1_DN (0x9) | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Initiator - Payload (35:ISAKMP_NEXT_v2IDi) | next payload chain: saving location 'IKEv2 Identification - Initiator - Payload'.'next payload type' in 'reply packet' | emitting 183 raw bytes of my identity into IKEv2 Identification - Initiator - Payload | my identity 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 | my identity 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | my identity 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | my identity 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | my identity 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | my identity 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | my identity 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 72 6f 61 | my identity 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | my identity 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 | my identity 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 72 6f 61 | my identity 64 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | my identity 77 61 6e 2e 6f 72 67 | emitting length of IKEv2 Identification - Initiator - Payload: 191 | Sending [CERT] of certificate: E=user-road@testing.libreswan.org,CN=road.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | ****emit IKEv2 Certificate Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | next payload chain: setting previous 'IKEv2 Identification - Initiator - Payload'.'next payload type' to current IKEv2 Certificate Payload (37:ISAKMP_NEXT_v2CERT) | next payload chain: saving location 'IKEv2 Certificate Payload'.'next payload type' in 'reply packet' | emitting 1224 raw bytes of CERT into IKEv2 Certificate Payload | CERT 30 82 04 c4 30 82 04 2d a0 03 02 01 02 02 01 05 | CERT 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 | CERT 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 31 | CERT 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 69 | CERT 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 6f | CERT 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c 69 | CERT 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 0b | CERT 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 6e | CERT 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 72 | CERT 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 6f | CERT 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a 86 | CERT 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e 67 | CERT 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 30 22 | CERT 18 0f 32 30 31 39 30 38 32 34 30 39 30 37 35 33 | CERT 5a 18 0f 32 30 32 32 30 38 32 33 30 39 30 37 35 | CERT 33 5a 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 | CERT 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 | CERT 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 | CERT 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c | CERT 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 | CERT 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 | CERT 6d 65 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 72 | CERT 6f 61 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a | CERT 86 48 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 72 | CERT 6f 61 64 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 30 82 01 a2 30 0d 06 | CERT 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 8f | CERT 00 30 82 01 8a 02 82 01 81 00 de eb 73 26 86 d7 | CERT 2c 84 21 13 0e a4 23 30 11 c6 d4 b1 e8 99 58 5b | CERT 54 fa 8c cb 90 bf aa 54 64 e2 ef 00 f9 df b2 5a | CERT 20 d0 1f fd fb 02 a8 d4 60 ac 44 ab c0 91 e1 eb | CERT 81 59 f7 6d 08 30 04 c9 63 5f 07 58 6a d7 e6 ff | CERT 96 d3 79 c2 a1 6b d3 24 00 31 74 f3 8f b4 e9 17 | CERT af d1 3c 33 ee 8b a9 19 b2 03 f1 98 8a 60 f2 f6 | CERT 14 4b 31 a3 8b cb cb ae 31 d9 70 5a 88 2d cc c8 | CERT 77 e8 27 1f 75 07 9a 9b cc 5a 53 bd 69 be 82 0e | CERT 9c b9 3b c8 4f fa 84 87 bb b6 0d 2d ff 11 a1 2d | CERT 51 d4 3f c2 93 09 22 b4 2e 48 0e 77 81 b6 79 ee | CERT 31 37 3d 55 2f 3d 4f 0e 26 7e 73 34 4f 0d d1 90 | CERT 84 c9 06 53 b6 31 7f 6e 62 51 c6 35 3b a1 03 8a | CERT 8b 62 bb 4d 37 a5 44 42 54 a2 10 80 5f 75 0e 17 | CERT a0 4e d8 46 e8 02 bf a1 f5 e5 2a 2e 5c dc b2 d7 | CERT 93 d9 04 45 51 1d 5e 7d d8 fd 03 96 0c d5 02 5b | CERT 72 03 26 b7 d6 cd a0 18 86 a7 07 d0 74 c6 07 e8 | CERT 5c 1f 7a af be d0 ae b8 e7 7a 3b cf 5c fa ca ea | CERT ae c3 6f 85 22 9b 46 81 be 7c 89 15 4f 06 47 30 | CERT 9f bb ee 24 55 e2 21 cd 8e 93 f5 0e 33 49 5d 50 | CERT 48 39 ac ab 37 59 f8 a2 61 be a0 81 d5 25 97 2f | CERT 8b 2f bd d9 47 a4 5c a5 3b c0 99 19 c5 fb 43 da | CERT 6f 6c 33 54 60 af 00 d5 41 12 60 e5 bb 07 b8 76 | CERT 8a 55 c4 c3 47 8b bd 12 bc e8 5e 94 62 7a 20 91 | CERT 11 fb 23 b7 2d f5 6f 73 b6 a9 02 03 01 00 01 a3 | CERT 81 e3 30 81 e0 30 09 06 03 55 1d 13 04 02 30 00 | CERT 30 25 06 03 55 1d 11 04 1e 30 1c 82 1a 72 6f 61 | CERT 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | CERT 77 61 6e 2e 6f 72 67 30 0b 06 03 55 1d 0f 04 04 | CERT 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 | CERT 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 | CERT 07 03 02 30 41 06 08 2b 06 01 05 05 07 01 01 04 | CERT 35 30 33 30 31 06 08 2b 06 01 05 05 07 30 01 86 | CERT 25 68 74 74 70 3a 2f 2f 6e 69 63 2e 74 65 73 74 | CERT 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 | CERT 67 3a 32 35 36 30 30 3d 06 03 55 1d 1f 04 36 30 | CERT 34 30 32 a0 30 a0 2e 86 2c 68 74 74 70 3a 2f 2f | CERT 6e 69 63 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 2f 72 65 76 6f 6b 65 | CERT 64 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 | CERT 01 0b 05 00 03 81 81 00 79 c0 dc 4f ca 3c 5f 4e | CERT 21 3c 76 b0 44 66 c8 74 40 7b 34 5d 63 96 6e ee | CERT c5 df ef 0f fe c2 e4 25 18 39 25 d8 f8 6a b8 87 | CERT f9 17 94 73 7f 8d fb 7d 9d 24 5e c5 95 19 96 3e | CERT 04 dd 8a d0 ad 11 f4 97 32 43 d2 f3 1a d3 1c b1 | CERT e9 01 90 f2 72 36 cf d4 bd 14 e6 ad 8d d2 84 3b | CERT 92 94 99 40 21 16 68 aa e7 5e ac 95 88 11 40 55 | CERT 28 90 af 7f 98 b1 80 36 c5 18 f7 6e 43 40 bc 93 | CERT 86 b3 f1 aa b3 89 b4 15 | emitting length of IKEv2 Certificate Payload: 1229 | IKEv2 CERTREQ: send a cert request? | IKEv2 CERTREQ: no CA DN known to send | not sending INITIAL_CONTACT | ****emit IKEv2 Authentication Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | auth method: IKEv2_AUTH_RSA (0x1) | next payload chain: setting previous 'IKEv2 Certificate Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH) | next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet' | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org->%fromcert of kind PKK_RSA | searching for certificate PKK_RSA:AwEAAd7rc vs PKK_RSA:AwEAAd7rc | #7 spent 5.04 milliseconds in ikev2_calculate_rsa_hash() calling sign_hash_RSA() | emitting 384 raw bytes of rsa signature into IKEv2 Authentication Payload | rsa signature 00 2b 3a 8a 31 2f 64 68 b0 cf fd a2 7c 69 62 41 | rsa signature 81 a0 28 2a a3 fd 8a 5b a6 fd 72 bf e1 0b 7b 45 | rsa signature fd 7e 6d c9 11 cb 82 22 83 ea 31 9b 9c 84 3e 15 | rsa signature a9 a0 df 39 28 af c2 c0 9d 25 b0 66 e7 45 90 36 | rsa signature 66 0e 3c 34 1f 9d 7d b7 b0 68 5f d4 af 07 95 10 | rsa signature 19 62 a9 bd 8f 36 f4 9b 39 ca 15 e8 7e ae f8 b1 | rsa signature 8f e5 68 d8 26 c8 17 46 b5 34 06 23 6b 31 26 50 | rsa signature eb 7a 96 10 50 93 e6 29 26 ed b1 f9 de 68 3e b1 | rsa signature ad e6 63 30 a6 e6 09 8b 74 5e 27 0e 34 2b 20 ae | rsa signature ae 1e d3 5f 53 6d c3 ec 28 92 32 f4 2a c0 06 b9 | rsa signature d6 8f f5 33 a6 cd f8 34 af 67 fa c7 b4 cf 71 c1 | rsa signature e2 3c 11 5d 2d 85 57 f7 26 b9 69 84 12 d2 0e ee | rsa signature f7 4d a7 85 0f 67 b0 7d cd ec b8 ab 93 4a 3c 1f | rsa signature de dd 0a c2 ef ad af 88 10 97 e4 5c 43 74 a0 ff | rsa signature dc 69 4f ad 06 b7 c7 24 45 93 be 8c 32 8c 11 e9 | rsa signature c3 a5 57 64 28 04 b3 10 fd ba 7a e3 1f 80 56 48 | rsa signature ee 91 f7 41 ae 09 44 7f 65 f2 52 e5 30 39 30 0d | rsa signature 27 22 3b 34 2d dd c0 24 f7 d0 e2 3a c2 49 71 aa | rsa signature bb c7 1d ab 59 7e a0 69 ac e4 12 a1 97 24 42 a3 | rsa signature 86 7c a2 8d b1 95 c8 ba 28 bd de c0 e5 30 f9 34 | rsa signature ee 9f e3 f4 8e 22 62 4b 77 fd c9 53 a9 6c dd e1 | rsa signature d8 30 cd 5f 59 17 f0 b0 be 43 fd 82 ef ce 24 99 | rsa signature d3 bb e7 2d c7 0a a4 c2 16 97 33 4a 95 7b da 25 | rsa signature 2a 51 b6 e1 41 5a a1 ed 69 04 da a2 5d e4 78 83 | #7 spent 5.18 milliseconds in ikev2_calculate_rsa_hash() | emitting length of IKEv2 Authentication Payload: 392 | Send Configuration Payload request | ****emit IKEv2 Configuration Payload: | next payload type: ISAKMP_NEXT_v2SA (0x21) | flags: none (0x0) | ikev2_cfg_type: IKEv2_CP_CFG_REQUEST (0x1) | next payload chain: ignoring supplied 'IKEv2 Configuration Payload'.'next payload type' value 33:ISAKMP_NEXT_v2SA | next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Configuration Payload (47:ISAKMP_NEXT_v2CP) | next payload chain: saving location 'IKEv2 Configuration Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_ADDRESS (0x1) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_DNS (0x3) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP6_ADDRESS (0x8) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP6_DNS (0xa) | emitting length of IKEv2 Configuration Payload Attribute: 0 | *****emit IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_DNS_DOMAIN (0x19) | emitting length of IKEv2 Configuration Payload Attribute: 0 | emitting length of IKEv2 Configuration Payload: 28 | getting first pending from state #7 | netlink_get_spi: allocated 0x3155ba3a for esp.0@192.1.3.209 | constructing ESP/AH proposals with all DH removed for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator emitting ESP/AH proposals) | converting proposal AES_GCM_16_256-NONE to ikev2 ... | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED | converting proposal AES_GCM_16_128-NONE to ikev2 ... | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: constructed local ESP/AH proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | Emitting ikev2_proposals ... | ****emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'IKEv2 Configuration Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | discarding INTEG=NONE | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 31 55 ba 3a | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 32 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding INTEG=NONE | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 2 (0x2) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 31 55 ba 3a | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 32 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 3 (0x3) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 4 (0x4) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 31 55 ba 3a | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 48 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding DH=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 4 (0x4) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 4 (0x4) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 31 55 ba 3a | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | discarding DH=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 48 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 164 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ****emit IKEv2 Traffic Selector - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | number of TS: 1 (0x1) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | start port: 0 (0x0) | end port: 65535 (0xffff) | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector | ipv4 start c0 01 03 d1 | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector | ipv4 end c0 01 03 d1 | emitting length of IKEv2 Traffic Selector: 16 | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 | ****emit IKEv2 Traffic Selector - Responder - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | number of TS: 1 (0x1) | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' | *****emit IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | start port: 0 (0x0) | end port: 65535 (0xffff) | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector | ipv4 start c0 01 02 17 | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector | ipv4 end c0 01 02 17 | emitting length of IKEv2 Traffic Selector: 16 | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE | Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload | emitting length of IKEv2 Encryption Payload: 2081 | emitting length of ISAKMP Message: 2109 | **parse ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | length: 2109 (0x83d) | **parse IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2IDi (0x23) | flags: none (0x0) | length: 2081 (0x821) | **emit ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2IDi (0x23) | flags: none (0x0) | fragment number: 1 (0x1) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 35:ISAKMP_NEXT_v2IDi | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 25 00 00 bf 09 00 00 00 30 81 b4 31 0b 30 09 06 | cleartext fragment 03 55 04 06 13 02 43 41 31 10 30 0e 06 03 55 04 | cleartext fragment 08 0c 07 4f 6e 74 61 72 69 6f 31 10 30 0e 06 03 | cleartext fragment 55 04 07 0c 07 54 6f 72 6f 6e 74 6f 31 12 30 10 | cleartext fragment 06 03 55 04 0a 0c 09 4c 69 62 72 65 73 77 61 6e | cleartext fragment 31 18 30 16 06 03 55 04 0b 0c 0f 54 65 73 74 20 | cleartext fragment 44 65 70 61 72 74 6d 65 6e 74 31 23 30 21 06 03 | cleartext fragment 55 04 03 0c 1a 72 6f 61 64 2e 74 65 73 74 69 6e | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 31 | cleartext fragment 2e 30 2c 06 09 2a 86 48 86 f7 0d 01 09 01 16 1f | cleartext fragment 75 73 65 72 2d 72 6f 61 64 40 74 65 73 74 69 6e | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 27 | cleartext fragment 00 04 cd 04 30 82 04 c4 30 82 04 2d a0 03 02 01 | cleartext fragment 02 02 01 05 30 0d 06 09 2a 86 48 86 f7 0d 01 01 | cleartext fragment 0b 05 00 30 81 ac 31 0b 30 09 06 03 55 04 06 13 | cleartext fragment 02 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e | cleartext fragment 74 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 | cleartext fragment 54 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a | cleartext fragment 0c 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 | cleartext fragment 03 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 | cleartext fragment 74 6d 65 6e 74 31 25 30 23 06 03 55 04 03 0c 1c | cleartext fragment 4c 69 62 72 65 73 77 61 6e 20 74 65 73 74 20 43 | cleartext fragment 41 20 66 6f 72 20 6d 61 69 6e 63 61 31 24 30 22 | cleartext fragment 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 74 65 73 | cleartext fragment 74 69 6e 67 40 6c 69 62 72 65 73 77 61 6e 2e 6f | cleartext fragment 72 67 30 22 18 0f 32 30 31 39 30 38 32 34 30 39 | cleartext fragment 30 37 35 33 5a 18 0f 32 30 32 32 30 38 32 33 30 | cleartext fragment 39 30 37 35 33 5a 30 81 b4 31 0b 30 09 06 03 55 | cleartext fragment 04 06 13 02 43 41 31 10 30 0e 06 03 55 04 08 0c | cleartext fragment 07 4f 6e 74 61 72 69 6f 31 10 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 2 (0x2) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 30 0e 06 03 55 04 07 0c 07 54 6f 72 6f 6e 74 6f | cleartext fragment 31 12 30 10 06 03 55 04 0a 0c 09 4c 69 62 72 65 | cleartext fragment 73 77 61 6e 31 18 30 16 06 03 55 04 0b 0c 0f 54 | cleartext fragment 65 73 74 20 44 65 70 61 72 74 6d 65 6e 74 31 23 | cleartext fragment 30 21 06 03 55 04 03 0c 1a 72 6f 61 64 2e 74 65 | cleartext fragment 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e | cleartext fragment 6f 72 67 31 2e 30 2c 06 09 2a 86 48 86 f7 0d 01 | cleartext fragment 09 01 16 1f 75 73 65 72 2d 72 6f 61 64 40 74 65 | cleartext fragment 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e | cleartext fragment 6f 72 67 30 82 01 a2 30 0d 06 09 2a 86 48 86 f7 | cleartext fragment 0d 01 01 01 05 00 03 82 01 8f 00 30 82 01 8a 02 | cleartext fragment 82 01 81 00 de eb 73 26 86 d7 2c 84 21 13 0e a4 | cleartext fragment 23 30 11 c6 d4 b1 e8 99 58 5b 54 fa 8c cb 90 bf | cleartext fragment aa 54 64 e2 ef 00 f9 df b2 5a 20 d0 1f fd fb 02 | cleartext fragment a8 d4 60 ac 44 ab c0 91 e1 eb 81 59 f7 6d 08 30 | cleartext fragment 04 c9 63 5f 07 58 6a d7 e6 ff 96 d3 79 c2 a1 6b | cleartext fragment d3 24 00 31 74 f3 8f b4 e9 17 af d1 3c 33 ee 8b | cleartext fragment a9 19 b2 03 f1 98 8a 60 f2 f6 14 4b 31 a3 8b cb | cleartext fragment cb ae 31 d9 70 5a 88 2d cc c8 77 e8 27 1f 75 07 | cleartext fragment 9a 9b cc 5a 53 bd 69 be 82 0e 9c b9 3b c8 4f fa | cleartext fragment 84 87 bb b6 0d 2d ff 11 a1 2d 51 d4 3f c2 93 09 | cleartext fragment 22 b4 2e 48 0e 77 81 b6 79 ee 31 37 3d 55 2f 3d | cleartext fragment 4f 0e 26 7e 73 34 4f 0d d1 90 84 c9 06 53 b6 31 | cleartext fragment 7f 6e 62 51 c6 35 3b a1 03 8a 8b 62 bb 4d 37 a5 | cleartext fragment 44 42 54 a2 10 80 5f 75 0e 17 a0 4e d8 46 e8 02 | cleartext fragment bf a1 f5 e5 2a 2e 5c dc b2 d7 93 d9 04 45 51 1d | cleartext fragment 5e 7d d8 fd 03 96 0c d5 02 5b 72 03 26 b7 d6 cd | cleartext fragment a0 18 86 a7 07 d0 74 c6 07 e8 5c 1f 7a af be d0 | cleartext fragment ae b8 e7 7a 3b cf 5c fa ca ea ae c3 6f 85 22 9b | cleartext fragment 46 81 be 7c 89 15 4f 06 47 30 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 3 (0x3) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 9f bb ee 24 55 e2 21 cd 8e 93 f5 0e 33 49 5d 50 | cleartext fragment 48 39 ac ab 37 59 f8 a2 61 be a0 81 d5 25 97 2f | cleartext fragment 8b 2f bd d9 47 a4 5c a5 3b c0 99 19 c5 fb 43 da | cleartext fragment 6f 6c 33 54 60 af 00 d5 41 12 60 e5 bb 07 b8 76 | cleartext fragment 8a 55 c4 c3 47 8b bd 12 bc e8 5e 94 62 7a 20 91 | cleartext fragment 11 fb 23 b7 2d f5 6f 73 b6 a9 02 03 01 00 01 a3 | cleartext fragment 81 e3 30 81 e0 30 09 06 03 55 1d 13 04 02 30 00 | cleartext fragment 30 25 06 03 55 1d 11 04 1e 30 1c 82 1a 72 6f 61 | cleartext fragment 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | cleartext fragment 77 61 6e 2e 6f 72 67 30 0b 06 03 55 1d 0f 04 04 | cleartext fragment 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 | cleartext fragment 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 | cleartext fragment 07 03 02 30 41 06 08 2b 06 01 05 05 07 01 01 04 | cleartext fragment 35 30 33 30 31 06 08 2b 06 01 05 05 07 30 01 86 | cleartext fragment 25 68 74 74 70 3a 2f 2f 6e 69 63 2e 74 65 73 74 | cleartext fragment 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 | cleartext fragment 67 3a 32 35 36 30 30 3d 06 03 55 1d 1f 04 36 30 | cleartext fragment 34 30 32 a0 30 a0 2e 86 2c 68 74 74 70 3a 2f 2f | cleartext fragment 6e 69 63 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | cleartext fragment 65 73 77 61 6e 2e 6f 72 67 2f 72 65 76 6f 6b 65 | cleartext fragment 64 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 | cleartext fragment 01 0b 05 00 03 81 81 00 79 c0 dc 4f ca 3c 5f 4e | cleartext fragment 21 3c 76 b0 44 66 c8 74 40 7b 34 5d 63 96 6e ee | cleartext fragment c5 df ef 0f fe c2 e4 25 18 39 25 d8 f8 6a b8 87 | cleartext fragment f9 17 94 73 7f 8d fb 7d 9d 24 5e c5 95 19 96 3e | cleartext fragment 04 dd 8a d0 ad 11 f4 97 32 43 d2 f3 1a d3 1c b1 | cleartext fragment e9 01 90 f2 72 36 cf d4 bd 14 e6 ad 8d d2 84 3b | cleartext fragment 92 94 99 40 21 16 68 aa e7 5e ac 95 88 11 40 55 | cleartext fragment 28 90 af 7f 98 b1 80 36 c5 18 f7 6e 43 40 bc 93 | cleartext fragment 86 b3 f1 aa b3 89 b4 15 2f 00 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 4 (0x4) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 01 88 01 00 00 00 00 2b 3a 8a 31 2f 64 68 b0 cf | cleartext fragment fd a2 7c 69 62 41 81 a0 28 2a a3 fd 8a 5b a6 fd | cleartext fragment 72 bf e1 0b 7b 45 fd 7e 6d c9 11 cb 82 22 83 ea | cleartext fragment 31 9b 9c 84 3e 15 a9 a0 df 39 28 af c2 c0 9d 25 | cleartext fragment b0 66 e7 45 90 36 66 0e 3c 34 1f 9d 7d b7 b0 68 | cleartext fragment 5f d4 af 07 95 10 19 62 a9 bd 8f 36 f4 9b 39 ca | cleartext fragment 15 e8 7e ae f8 b1 8f e5 68 d8 26 c8 17 46 b5 34 | cleartext fragment 06 23 6b 31 26 50 eb 7a 96 10 50 93 e6 29 26 ed | cleartext fragment b1 f9 de 68 3e b1 ad e6 63 30 a6 e6 09 8b 74 5e | cleartext fragment 27 0e 34 2b 20 ae ae 1e d3 5f 53 6d c3 ec 28 92 | cleartext fragment 32 f4 2a c0 06 b9 d6 8f f5 33 a6 cd f8 34 af 67 | cleartext fragment fa c7 b4 cf 71 c1 e2 3c 11 5d 2d 85 57 f7 26 b9 | cleartext fragment 69 84 12 d2 0e ee f7 4d a7 85 0f 67 b0 7d cd ec | cleartext fragment b8 ab 93 4a 3c 1f de dd 0a c2 ef ad af 88 10 97 | cleartext fragment e4 5c 43 74 a0 ff dc 69 4f ad 06 b7 c7 24 45 93 | cleartext fragment be 8c 32 8c 11 e9 c3 a5 57 64 28 04 b3 10 fd ba | cleartext fragment 7a e3 1f 80 56 48 ee 91 f7 41 ae 09 44 7f 65 f2 | cleartext fragment 52 e5 30 39 30 0d 27 22 3b 34 2d dd c0 24 f7 d0 | cleartext fragment e2 3a c2 49 71 aa bb c7 1d ab 59 7e a0 69 ac e4 | cleartext fragment 12 a1 97 24 42 a3 86 7c a2 8d b1 95 c8 ba 28 bd | cleartext fragment de c0 e5 30 f9 34 ee 9f e3 f4 8e 22 62 4b 77 fd | cleartext fragment c9 53 a9 6c dd e1 d8 30 cd 5f 59 17 f0 b0 be 43 | cleartext fragment fd 82 ef ce 24 99 d3 bb e7 2d c7 0a a4 c2 16 97 | cleartext fragment 33 4a 95 7b da 25 2a 51 b6 e1 41 5a a1 ed 69 04 | cleartext fragment da a2 5d e4 78 83 21 00 00 1c 01 00 00 00 00 01 | cleartext fragment 00 00 00 03 00 00 00 08 00 00 00 0a 00 00 00 19 | cleartext fragment 00 00 2c 00 00 a4 02 00 00 20 01 03 04 02 31 55 | cleartext fragment ba 3a 03 00 00 0c 01 00 00 14 80 0e 01 00 00 00 | cleartext fragment 00 08 05 00 00 00 02 00 00 20 02 03 04 02 31 55 | cleartext fragment ba 3a 03 00 00 0c 01 00 00 14 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 507 | emitting length of ISAKMP Message: 535 | **emit ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | fragment number: 5 (0x5) | total fragments: 5 (0x5) | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment | emitting 156 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment | cleartext fragment 80 0e 00 80 00 00 00 08 05 00 00 00 02 00 00 30 | cleartext fragment 03 03 04 04 31 55 ba 3a 03 00 00 0c 01 00 00 0c | cleartext fragment 80 0e 01 00 03 00 00 08 03 00 00 0e 03 00 00 08 | cleartext fragment 03 00 00 0c 00 00 00 08 05 00 00 00 00 00 00 30 | cleartext fragment 04 03 04 04 31 55 ba 3a 03 00 00 0c 01 00 00 0c | cleartext fragment 80 0e 00 80 03 00 00 08 03 00 00 0e 03 00 00 08 | cleartext fragment 03 00 00 0c 00 00 00 08 05 00 00 00 2d 00 00 18 | cleartext fragment 01 00 00 00 07 00 00 10 00 00 ff ff c0 01 03 d1 | cleartext fragment c0 01 03 d1 00 00 00 18 01 00 00 00 07 00 00 10 | cleartext fragment 00 00 ff ff c0 01 02 17 c0 01 02 17 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment | emitting length of IKEv2 Encrypted Fragment: 189 | emitting length of ISAKMP Message: 217 | suspend processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | start processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #8 complete_v2_state_transition() md.from_state=PARENT_I1 md.svm.state[from]=PARENT_I1 UNDEFINED->PARENT_I2 with status STF_OK | IKEv2: transition from state STATE_PARENT_I1 to state STATE_PARENT_I2 | child state #8: UNDEFINED(ignore) => PARENT_I2(open IKE SA) | Message ID: updating counters for #8 to 0 after switching state | Message ID: recv #7.#8 response 0; ike: initiator.sent=0 initiator.recv=-1->0 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=-1 | Message ID: sent #7.#8 request 1; ike: initiator.sent=0->1 initiator.recv=0 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->1 wip.responder=-1 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} | sending V2 reply packet to 192.1.2.23:4500 (from 192.1.3.209:4500) | sending fragments ... | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #7) | 00 00 00 00 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 | 0a c6 17 32 35 20 23 08 00 00 00 01 00 00 02 17 | 23 00 01 fb 00 01 00 05 2a ad 53 3d 64 69 92 8d | 44 7e 33 26 6f bf 4a 99 5e 50 bc e0 12 75 87 c9 | 9e f1 4e ea c0 2e e9 7a 21 98 1a af dc f5 d9 c4 | db c5 91 6b c6 84 63 bc 55 be c4 ba 47 b4 7c 09 | 63 b9 ac 5f 15 03 5e de 33 6c be bc fc 80 0a f4 | 28 7d f8 de a2 5f 01 68 06 87 08 f5 89 24 ce ca | 30 ee 78 7c 6c 38 b8 da fa 7e de 88 fe 88 2b 9f | f1 b8 06 43 48 24 22 0e 55 7c e2 2b 2a 8a 93 10 | 07 cf e2 b8 87 37 f3 4d c5 7a d1 a9 3c b5 ec 79 | d4 f7 2a 08 cc ed d3 15 c5 78 d3 9c e9 62 da 0a | c9 80 a4 20 eb 08 ca d5 5b 3a fc ce 68 8f 4a 87 | e7 42 22 5f c5 75 02 47 ee 44 de ef 57 07 40 f3 | f2 55 f2 ac 8f 6d f6 1b 08 ac 37 27 d1 eb df d6 | 99 58 c9 3d 4c 50 58 a7 c8 a8 bb 20 2b 5e 0f f3 | 7c 6b a2 e8 da fd 1d 71 cf 57 3d c0 77 3b cc 23 | 2e 49 d9 e9 7c 3e ae d4 91 d5 9a 7d 55 c2 d9 0b | 50 5b ff de 00 f7 36 f3 ea 28 51 25 53 a9 44 60 | 5e 5c d6 4a 3a 55 a7 ef dd af 9a 48 0a 25 b9 16 | ec 72 12 a0 55 4a 24 9f 9e 97 ef 9d 59 71 cf 57 | 8e 28 ee 16 da b2 1e 38 a4 a5 1d de a4 e0 7a 75 | 4a 2d 30 1a 74 c7 9f 9d ed ca 14 20 c2 bc 3f 3a | e2 f6 00 f8 75 d0 b0 a8 59 f6 ae bb 06 00 bc d5 | ca e6 08 04 f3 ac 0d 45 97 bb bf 97 fa 95 f4 62 | 04 c3 8d 71 c9 87 d4 65 e0 5f 74 19 89 58 53 7e | 61 26 30 49 a9 a7 02 f3 7c 19 49 a3 84 40 61 8d | 47 41 fc c0 99 7e f3 11 c9 7f df 8f 9b 05 8c 9d | 0b f8 ba 8c 67 9b 3c e4 3b 70 48 57 99 64 ec 6e | a7 4d 3c 2b 26 ea 9c c5 ad 3d f7 ad e4 c1 f8 89 | e7 5e e3 b7 01 65 34 94 90 35 82 82 e4 84 1e 3a | f6 7a 44 81 cf 0b cb 94 53 84 f1 b3 87 c5 70 c5 | 6e 35 0f cb 39 da 49 e3 0c c5 ba c2 aa ef cb f1 | c9 ab 09 5f 4b 16 c4 33 32 73 cf | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #7) | 00 00 00 00 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 | 0a c6 17 32 35 20 23 08 00 00 00 01 00 00 02 17 | 00 00 01 fb 00 02 00 05 b0 7e 2d 97 94 70 96 61 | c2 fc 3a 58 99 71 0b 36 93 d7 f4 ee 8c 9b f5 53 | 1f 8b 5a 43 65 a0 38 9f c9 3f 21 32 0e 80 59 8a | 8e b8 4b 5f 3e ff ee 6b dd 76 bc 44 99 86 65 ea | a8 f9 88 c5 60 71 e2 a4 a2 bc f5 68 56 19 eb 00 | 7e 43 ba 4a cb 85 18 0f a3 5f 6b fa 4e a9 16 14 | d4 11 3c c0 a8 55 93 33 b2 f6 c2 24 94 2b 7b da | 7f 63 cd f3 eb af 6a ee d4 5b 78 5b 4b 1c 7b 42 | ab 63 58 e6 f7 0b 21 47 b6 ce fa e1 d2 ae 70 55 | 23 09 c2 73 51 ff 54 1f 1c c6 26 ca 12 09 72 a0 | 4d a1 b7 9b b6 80 71 bd f4 c6 1c 69 3d 2f b4 d2 | 7b a8 3a e3 60 19 03 3a 7b b3 72 5a ec 14 a5 a3 | e8 94 ca e1 89 a3 01 67 b5 71 3e 1a 5a 50 b1 b3 | 98 e4 b1 db 1b fc c0 95 e8 f6 45 78 6d d4 14 d8 | 8b 7f b1 ac c4 89 82 8b f7 5e 3b 00 ae 1a a5 f6 | 15 72 b0 cf 8d a9 5b bb 1c 41 80 d7 3d 10 1d fa | 97 31 57 cd ae 39 ee a2 7b 4e bd 31 70 6e d2 92 | 77 53 92 de ea 9a 44 63 2c bc 13 d5 99 2f b0 12 | 71 65 05 81 4c 2e 09 d9 1e 80 24 34 bb db 01 e7 | 67 03 d2 44 01 9b a5 22 1c 3a f8 99 22 47 9b 9b | 72 0a 01 24 5f 72 ed ff 22 76 87 b6 d0 23 6f b6 | d5 04 5a 6f 67 9e 6d 9f df f0 c7 97 b1 be 3d d2 | c6 61 be ff 82 ee 34 48 f8 72 ce b4 45 db 9b c9 | 15 52 7c ef ae 28 9b 10 05 49 cc 85 37 12 e0 88 | f0 da b1 f5 bb 84 c5 56 ee 7a 86 27 d5 5d d9 ba | d4 98 d2 ca 7c 5f a2 05 ec 0e 0f 35 ca 85 fa 73 | 96 ad a8 2b 3e 80 d4 18 72 c7 e9 70 f0 28 bd b0 | a7 bf 25 8e 77 a8 74 2e e3 b1 6e b5 cb 19 27 29 | 94 1b 75 d3 3e 7a 42 8d 05 d4 07 07 2d c9 13 39 | b5 06 e3 cc d6 0a c9 9b 5c 4b f2 a1 4d cc a0 c2 | 94 35 c7 e2 9e 1b 68 e8 fc f8 a8 51 c3 2b 1e 62 | 88 a0 01 b7 65 fd 5c 24 2e a7 7f | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #7) | 00 00 00 00 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 | 0a c6 17 32 35 20 23 08 00 00 00 01 00 00 02 17 | 00 00 01 fb 00 03 00 05 ae 93 31 37 83 8e 0f b3 | 96 1c 1c 89 71 df 40 2d f4 1f e2 7b ec f4 3e 28 | 56 78 38 84 c3 33 2b fb f7 f9 34 61 b0 b0 36 11 | ad af 02 cf 06 26 25 0b 63 7b 5b eb 58 f0 b8 61 | 99 e4 48 93 18 c3 44 be 47 6f 2c 61 98 dc bd 3b | e2 e4 5c 49 63 4e 0c 6e ca e7 db 7e 32 62 50 31 | 7f 3b 0c 37 27 b2 5d cb 69 5e 21 4d cb 16 5f ba | 64 64 12 dd 7b 7c 48 8f e9 89 6c 5d 92 23 b1 b3 | cc 8e 11 78 42 1c 8b 0e 37 27 25 f4 c5 3f 76 43 | 4b 34 d7 b5 6e 54 e1 61 27 4c e7 ff 86 68 ef ef | 0e 82 8a 47 6d b2 0c c5 39 48 fd b8 51 ab c2 54 | 94 90 aa 3e ff 09 93 34 10 33 a7 c8 de 05 f5 38 | 19 75 0f 57 3d 36 35 62 45 03 76 1f f2 5d fe b0 | d3 10 f8 7d c1 2d 20 6a 12 97 e3 24 dd 94 3b d4 | 3d 4d 7e 0a f9 e6 bd 9b aa a4 0d c7 64 22 71 d8 | 7f dd a0 b2 98 73 30 40 f1 b3 ee 33 4a f4 cc 78 | 21 cb 7b 84 3a 1e 7a fb b9 84 8f df ff 08 58 3c | e1 20 9b 4d 72 35 5b 9c e5 d8 4f 12 a2 12 e6 49 | 8e a5 b0 b1 fb ce 22 b1 63 60 79 39 f5 65 20 f7 | 5e aa 23 3b 8f bc 34 1e df 37 30 cf ae 37 06 99 | 06 25 75 0b f5 13 00 b3 7f ba 01 27 2d c7 96 78 | 5e 1f 09 51 d4 62 26 21 aa 57 ee ba 4c 9d 67 e6 | 70 e9 ab ec 6c ed c3 9a ff 3f de bd 92 a7 87 de | 74 7d 47 6c 3b e1 46 1d fe a4 e7 ab de 2e 6a ba | 50 a1 fc 7d 57 f5 1a ba 1c f5 a5 f8 6e 8a bc 91 | d1 72 88 60 52 5b 57 76 a7 f5 d0 9d 05 95 52 1a | 71 08 aa 5e 43 b9 8d a2 0e f4 d8 7f 65 88 2d fd | ce ba ac a4 d4 86 58 88 b4 47 54 6b 27 ff 22 d3 | 18 05 c5 af 7b aa 68 14 41 95 33 59 a1 63 5b 11 | 5f 70 56 2e b1 d5 6f bb b8 ee 82 60 58 41 a5 dd | e4 da 41 d7 e2 a0 83 6c fb d2 6e b4 7a 2c 33 1e | 3c e1 41 f2 4b be 2c f0 b5 f8 57 | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #7) | 00 00 00 00 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 | 0a c6 17 32 35 20 23 08 00 00 00 01 00 00 02 17 | 00 00 01 fb 00 04 00 05 f9 d7 1c 10 18 d7 f8 d6 | 1a 40 06 aa 56 d4 f1 d3 f6 89 c7 28 e5 b2 00 37 | 64 e4 24 3f 6c 9b ad 51 cb 90 d6 00 79 6c 46 96 | 80 9c 1d d1 24 42 7a df a0 ea ad 33 66 84 dc f7 | 30 9f 57 10 fc b7 84 14 e6 88 e0 44 39 3c fd e5 | 64 26 75 59 13 6d e7 3a 9a 44 3e e8 5a cf c4 56 | e7 71 59 d4 26 76 d2 7f 2d e7 63 3b ad 30 99 b6 | 30 dd 37 aa f7 7f 2a c5 64 86 df 9a c4 52 11 fa | ce 30 55 da d0 3a f4 1b ae e1 45 b0 0f 65 26 e0 | 96 e2 41 5f fd 5a 19 82 95 96 9b 7a d9 63 9a fb | 7b 51 d9 2d 3a b0 3a 68 b8 2c 54 33 c8 cd 92 f1 | 66 11 b8 ae 70 c6 82 b0 4e 64 e2 f2 2d 1f 14 61 | dc 6e e3 0e d6 d7 16 c6 92 14 6a fd 95 8f 40 d2 | 73 fa ad da d2 92 1f d4 58 1c a0 0a 56 b5 c7 e4 | 3a 36 59 54 79 b9 37 64 47 f2 31 48 e6 a4 8a 0a | 31 89 ef 1c cf 93 61 58 88 bd fe 95 6f 88 e4 e8 | 06 e3 b6 45 6f f7 a0 7f 56 d6 84 eb a9 05 08 f5 | d0 43 c6 6a bc d2 73 a6 6d b7 4a 12 e2 6c 1a 61 | 05 44 aa 85 5e 39 cd a1 b8 01 f5 bb 79 9e 48 11 | 2a dd 6f a9 11 ad 9c 9b 73 2d ca f7 c8 2e 38 74 | 4a d1 b8 de 2e 09 75 18 de c9 8a e8 fd 26 7a 10 | 9e a9 17 d8 95 ba d0 d8 f3 b2 e3 75 57 04 88 b9 | 22 71 bc 53 1f 5e 7c 1c 98 ee df 43 11 11 e0 0a | 3d fa 81 ae 11 5f d2 f6 7d 24 e4 1c fb c0 ab 7c | 76 73 5b 9d 18 c0 74 66 5c fa 58 07 8c 7d 39 2a | 49 28 60 87 a4 7e 8c 27 55 85 dd a5 e0 32 e9 ec | c5 5b 11 b9 46 cf f3 14 16 f7 d1 d5 cd ed 08 61 | 00 13 95 8a ee 0c 29 3e b9 8e 8e 50 85 8c 6c cf | dc 06 46 fe b9 2a 44 3a 83 c1 d5 c9 56 79 47 8e | ec 09 c1 97 5e eb 86 cd cb a4 09 e5 59 b3 d6 2f | b7 43 e0 56 28 7f e0 c3 25 59 33 f0 90 eb bf 22 | 67 93 bb f9 83 d5 97 67 2d f6 de | sending 221 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #7) | 00 00 00 00 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 | 0a c6 17 32 35 20 23 08 00 00 00 01 00 00 00 d9 | 00 00 00 bd 00 05 00 05 51 f8 e0 f3 11 12 88 d3 | 0a 46 e5 9b aa ef 53 d5 0d 1b 36 45 06 a4 6c 67 | d0 b9 a6 b4 63 e0 c6 4e b7 8b 7a 25 e3 61 22 7d | 35 a6 67 a5 d7 da 96 d5 d8 0e 8e 87 c6 1b de 90 | 83 5d 13 35 7f 81 3e be 79 82 8c 15 e2 4f cf 13 | 77 90 7c f9 3b 64 3b 48 1c b5 c1 e0 fd 35 7c 3f | 21 77 dc 17 15 95 4e 4c e6 57 d3 36 c3 4d a0 c1 | b6 95 67 ce 54 94 6f 96 f7 5d f1 56 1f 87 c8 c9 | cc a6 3e db 5c a4 c1 c3 4c cd 35 e7 08 f4 34 e5 | 10 f6 0c fb b2 2a 9f bf 18 47 77 81 02 da 9c 75 | e5 af 33 8d 5c c0 97 be a5 20 8d d2 6a 59 07 c6 | 82 5e 3d ae cc 2c 4a 2b c3 eb 9a da 80 | sent 5 fragments | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x56091f3494a8 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #8 | libevent_malloc: new ptr-libevent@0x56091f347cd8 size 128 | #8 STATE_PARENT_I2: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29398.905099 | resume sending helper answer for #7 suppresed complete_v2_state_transition() | #7 spent 1.18 milliseconds | #7 spent 6.58 milliseconds in resume sending helper answer | stop processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f7bc4001978 | spent 0.0025 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 0a c6 17 32 | 35 20 23 20 00 00 00 01 00 00 02 17 24 00 01 fb | 00 01 00 05 04 93 1c c1 19 96 bd 1b 14 9f 66 70 | cc ce 97 e0 08 3a 92 d7 02 d6 15 31 fc 8f 0e 06 | b4 b1 59 f6 87 4d 85 45 6e 4b 8f c2 e8 b9 a2 dd | 28 56 b9 57 b8 98 e6 f9 9d 7d e4 54 b4 94 09 ed | 11 9b e9 95 01 c9 13 a1 cc 11 80 50 f5 d6 ab 29 | a4 ab 83 94 80 01 21 dc 38 aa 43 3c a3 9d f7 fd | 7f d3 c4 fb a1 2e f5 39 14 14 6d 28 24 bb f6 ca | 4d 13 ec 74 40 f7 11 0d 10 54 02 64 91 5a 4d 8a | 4d 2f 0b fa 6b 48 17 44 39 f3 49 1f 93 8a aa ac | c5 21 b1 09 2c 9a 8d ee fc c3 ec 14 a2 14 7c 24 | b1 02 81 48 6f ec c8 c5 63 7e c8 bc 8e 95 d1 b4 | ad 99 25 24 a5 59 d5 fc 2d 80 94 2a 20 9c 96 95 | 18 92 ed b1 db 04 48 c2 2d bc 2b c4 c0 1e 93 10 | 6b 45 b8 39 45 6c 62 98 d9 bd 1a ac 75 1e 20 da | 5a de 31 69 ba 12 8a 4b 28 f4 22 91 dc 16 0f e4 | dd 73 cc 42 77 58 0d d1 d1 58 da 01 3f c6 9e 9b | 59 95 e8 8b 31 90 e7 78 d0 a1 26 b8 ad c4 69 1b | 66 30 b8 3a c3 1b 19 08 2a 78 33 39 cd 36 2c 3f | dc 2a 28 a8 1f cd 5d 85 9d 08 bc c2 88 92 02 c5 | 91 3d 7f 68 4d 78 f1 ad 8c 45 2c 73 8c e4 17 ef | 07 1a 0a bf 2a ab c8 27 f4 27 81 cb 7b 27 78 e9 | bc 85 f7 a4 e8 7f 03 6a d4 41 81 43 35 41 13 61 | e7 74 9f 5d f5 50 e8 4c 16 d9 66 ed e2 3b a0 37 | 64 88 90 13 74 32 c3 e5 53 61 26 fe ad 57 17 5d | f6 4d dc dd 65 b3 f2 30 82 f8 ae 3e a2 21 52 18 | f9 88 8c f9 6f 3f f6 dd 5c 7b 21 54 d7 e8 37 5e | 9c 7b be 17 25 1e ec 10 99 98 e0 69 00 9c 23 d9 | b2 ff 4a a2 dc d7 e0 b9 3e f0 ff 91 7a c2 aa ef | 44 fa a7 b6 71 25 63 b4 c2 19 98 61 d3 3b cc dc | 48 7c 56 15 b9 de f4 ae 08 f4 fe f5 b5 85 4f 47 | 50 ee 09 cc 48 65 55 b4 0b e1 02 b8 2c 57 9a 1e | 4d 07 7f e3 e5 57 4d | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #7 in PARENT_I2 (find_v2_ike_sa) | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #8 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #8 is idle | #8 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2IDr (0x24) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 1 (0x1) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #8 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '1', total number '5', next payload '36' | updated IKE fragment state to respond using fragments without waiting for re-transmits | stop processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #7 spent 0.111 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.119 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00116 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 0a c6 17 32 | 35 20 23 20 00 00 00 01 00 00 02 17 00 00 01 fb | 00 02 00 05 26 e7 d5 8f 49 0e 1c d1 92 79 ba 20 | 9d 00 0e ab e9 1d 4b 2d d7 6a 17 3d 6e aa f2 12 | 0a 58 ab f1 f0 9c af e5 19 e3 f7 2f 1e 86 e6 fc | 77 af 43 d9 b6 5c eb 71 51 9d d8 b0 b7 b8 17 c2 | fb 27 9e f6 5b 48 f5 d9 eb 68 8c c6 84 8f b7 fb | 61 37 61 4f bd ec 7c 4b 4f b0 48 dc 23 e1 97 98 | 33 65 84 26 fc f7 a3 52 2d 1b c0 85 e4 66 f2 01 | a4 7e 93 b9 18 8f d9 0f bd 69 f3 da 72 c9 49 63 | 5a 8f f4 4c dc 13 e7 42 51 e8 40 c4 ed 4d 90 cb | f6 eb 8f a9 8e 7b 43 e5 5d 9c 2f b9 4b cc f6 e8 | f9 62 dd 4a fd f4 63 6e 09 cf dc 71 2e c0 3e 73 | 6f 78 a2 11 fa 23 2b 50 1b 2b 8b 75 8b 8e 07 0e | e4 87 7f a9 bf e1 6f 66 62 07 57 49 64 4f 65 71 | c8 5f 67 be b9 4f 7a 36 05 f7 c0 59 65 42 4c 50 | 08 b2 f1 e2 02 a8 25 42 52 56 58 bb f0 a7 40 a8 | dc 7b 8a 10 ff 50 92 62 dc 08 81 28 65 be 7f 0b | 94 0c d8 3a 0b 8b fa 6d ae 31 30 74 1c b2 92 e1 | 0c d5 ec 82 86 91 15 4e 4a be 07 4c 65 72 4c 64 | 69 77 52 1f 47 68 52 4e 4f 2b 0e 39 0e ef ba b2 | 47 1d 3e 87 ad d0 56 13 57 1f 6d 51 b1 a8 c2 d5 | fd 62 80 8b 8c c0 c1 07 29 48 2a 47 01 83 54 2f | 70 5f e7 f5 84 4d f8 8b 11 ab a8 fe f4 c8 ec 7e | d3 3c 72 16 0b 51 2a e0 1f 91 5a 25 a6 05 29 86 | 55 c8 74 01 4f 75 e0 ea 42 97 e6 4c 91 6d ed 37 | db 6b 3b e1 32 4d 7b 3f 6b 44 82 40 20 06 6a 34 | f9 25 96 cc 61 d6 e1 9c 4c 36 fc 6c 33 91 c1 5a | 08 1b b9 dc c1 f8 64 dc ca 93 a9 2c 04 17 ce 0a | 65 3a d6 02 fd 47 1e 1a 57 36 8a c2 aa 82 31 66 | 48 60 95 40 97 f8 c6 ea 52 7d 1f fd e2 ae 0e e2 | 45 1d 99 7d 10 ed cc a5 31 01 f3 08 67 65 7e 4c | e8 af c3 a2 dc d1 f0 80 7b ee c9 06 e9 b9 37 e1 | d3 cb fb 4a ea 34 34 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #7 in PARENT_I2 (find_v2_ike_sa) | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #8 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #8 is idle | #8 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 2 (0x2) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #8 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '2', total number '5', next payload '0' | stop processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #7 spent 0.0925 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.0996 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00102 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 0a c6 17 32 | 35 20 23 20 00 00 00 01 00 00 02 17 00 00 01 fb | 00 03 00 05 28 9a da 95 fe 38 b1 e4 c0 3f 4f 13 | 54 78 f8 cc d6 42 82 d5 b9 df 37 42 e7 e9 a7 28 | 05 56 b1 f1 d3 30 3c e0 38 3b 7b 57 6d 65 31 37 | df 50 51 6b b2 d2 16 b4 af 5a 9b d0 3c ae 48 bf | 12 47 32 e7 48 26 9d bc 83 bd ed 00 2c 48 eb c9 | 65 45 6d de 38 bf a4 a6 01 0e c2 72 4e a6 19 f5 | 8a 89 05 04 c9 e6 7c 08 d9 c2 73 03 b2 68 f8 5a | 2d c6 18 6d 3c 8d c6 fb 05 55 80 9a 8e 28 0b 65 | d2 26 eb 8d 79 20 dd 8f cf df b6 19 98 82 59 83 | fe b2 d2 3f 03 bc 50 93 c8 02 86 f1 70 55 61 fb | 43 23 cc eb 95 11 69 db 3a 53 33 29 eb cb 4b ba | c0 5f d3 66 8e a3 ec 45 38 75 ad b1 81 c0 c4 be | c4 de ad 1a 37 cf a3 58 6a c6 8a 1f 67 ca 4c 53 | fe c9 1d d0 ab cd 95 6b 9f a6 12 4b f9 cc 29 2c | 8a d8 fe 41 05 98 de 8c 1c f2 ea 3b bf ea cd f0 | ba 5b ef 75 8b c4 93 de 12 78 dc 13 c7 ad f7 61 | 97 cc 20 99 77 82 b0 87 b1 cd 89 57 0c 08 89 6e | 1c 67 a8 4c 36 c5 4c 4b bb 84 61 97 3a 2b 1a 56 | 75 ca 49 8c 44 76 6e 82 77 bf 21 29 aa 9a 10 f6 | 9e fe 3b 10 1e e8 49 fa a8 07 26 4d f4 d0 13 ac | d0 5f 5a db 8b b8 aa 7b 0c 46 50 4f 4f a3 1d fd | d3 17 24 7a b0 5f 19 3f fd 61 31 39 0d 8e d7 e0 | bd a4 25 24 3a 40 84 92 80 ff 47 82 d2 59 37 60 | ee a7 05 fe 0b c8 b5 bd f0 88 37 7c e1 86 18 43 | 87 54 80 5d 3f 84 8c 47 85 f2 3a 42 db 72 4c 67 | d3 71 54 ab e3 d4 22 50 35 bd e8 19 0e 64 b0 3b | 60 1e cd 76 ed 27 44 31 6b e0 67 3e 7c 79 bc e5 | 81 ad 97 b7 4b bd e8 82 4b 7d 3e f0 5b 12 63 7e | 43 56 8c 9b e4 13 ce 50 8c 63 b7 d6 c3 11 86 f0 | 10 43 bb 52 3b 67 89 4e f2 2f cb c8 22 22 27 5c | 27 71 b6 0e 49 71 97 61 63 c1 70 0c a6 e7 e7 ac | cb 5a ca ab 95 d4 97 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #7 in PARENT_I2 (find_v2_ike_sa) | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #8 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #8 is idle | #8 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 3 (0x3) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #8 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '3', total number '5', next payload '0' | stop processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #7 spent 0.091 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.0979 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00101 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 535 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 0a c6 17 32 | 35 20 23 20 00 00 00 01 00 00 02 17 00 00 01 fb | 00 04 00 05 06 a5 e2 e8 2a eb 9a 21 d1 66 2d dc | d2 77 71 30 ef 67 3d 7f ff 71 2c 12 0a f5 8d b8 | b5 47 44 a4 b8 87 64 f0 d2 90 43 d8 3d 5c 94 28 | f3 e0 11 b7 78 7d f6 e2 c6 c1 2d 20 61 16 62 27 | 16 5f ef cc 11 dc f3 53 cf 68 1e 11 72 ea 2c 42 | 86 6e 05 90 cf 6d d5 2d 4b 10 58 52 0b ea 8a df | c5 b7 bc d1 9c 69 06 a7 c4 d6 8b c6 aa 11 79 34 | 1d c9 0d a3 77 26 21 f1 67 b8 bf d8 23 b5 21 ae | a1 82 ab 6d 07 f2 60 9d 59 a6 09 89 65 75 81 b7 | f4 5e ce 5c 2f ae 9f 0e ca 92 71 68 d3 85 01 20 | 8b 18 1f 05 a6 30 bd 48 22 dd c3 df cb 10 12 19 | f2 ae 9e bc a1 f5 17 25 e1 65 f9 31 2f f0 44 4b | 80 e6 a4 fe de f3 89 6f 44 b6 d0 ee 27 db 81 7c | 36 eb 3c 42 1d 0d 20 54 11 d1 35 02 d2 01 6a 9c | 17 1c 0d 66 b2 d8 20 5e 3b 90 48 5c 62 1e e3 58 | fb a3 8e 87 4e c3 dd b8 03 33 8f 33 15 2c 45 8d | 79 18 9e 7e c7 a0 c4 e6 56 9b 4c d1 e0 15 40 b1 | 6a a9 f0 3d fe ce 58 c2 a3 84 20 b2 72 cc 75 a2 | 86 1c b5 74 a6 3b dd 53 bd 66 7e eb 63 12 4f 0c | 37 be 47 26 b4 d9 66 51 5f aa a0 a4 8c b0 cf e1 | 7c 20 a9 1c 61 40 37 1f 68 16 ad bd 6d a9 e3 90 | c4 54 40 d4 63 64 fd 73 ca 98 b8 c4 53 30 c4 af | 48 ec be 35 da ff 0b 91 7f 82 f4 f8 0a c2 11 1d | 97 b7 3f 70 4f ea 4a ec e1 c1 69 d6 63 38 35 07 | d7 01 69 f2 63 3a 1d 4b 60 79 7a 34 c4 62 82 2c | a5 1d 03 87 fb 44 61 4c 3d e3 43 82 f1 89 96 5b | 36 4d 0b a0 0e 0c 96 d0 cd 9e 00 13 15 05 6f 39 | cc f5 2e d1 7b d0 6d eb 49 d6 0f 9c ae 88 09 ae | 1b ed ad 0f 29 bc f4 78 16 07 38 a9 19 a8 47 5f | 8d 20 a6 12 71 62 dd 7d 48 f6 e2 16 54 52 07 a4 | f9 d1 38 b7 31 de d1 af 6d e6 b1 c3 1a c1 29 d2 | 91 0b ce d5 6d c5 0c | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 535 (0x217) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #7 in PARENT_I2 (find_v2_ike_sa) | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #8 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #8 is idle | #8 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 507 (0x1fb) | fragment number: 4 (0x4) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=499) | #8 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '4', total number '5', next payload '0' | stop processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #7 spent 0.0958 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.103 milliseconds in comm_handle_cb() reading and processing packet | spent 0.0011 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 121 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 0a c6 17 32 | 35 20 23 20 00 00 00 01 00 00 00 79 00 00 00 5d | 00 05 00 05 51 c4 e7 f2 87 3f cb b8 61 dc 07 73 | e9 ff cd 47 75 65 7b fe 7d 4f 14 a4 bc 27 ff 3b | 77 60 ff 33 6a 37 21 c3 b6 ee bf 74 70 b3 ee e9 | df 65 3d 71 9e 79 6e 10 78 64 b8 7c 87 fd 62 d1 | 33 4d 81 95 a0 04 61 2f f9 d0 03 00 54 14 77 5d | 80 0e 92 40 15 be b1 90 8f | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_v2SKF (0x35) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_AUTH (0x23) | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | Message ID: 1 (0x1) | length: 121 (0x79) | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response | State DB: found IKEv2 state #7 in PARENT_I2 (find_v2_ike_sa) | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: found IKEv2 state #8 in PARENT_I2 (find_v2_sa_by_initiator_wip) | suspend processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | start processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) | #8 is idle | #8 idle | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | ***parse IKEv2 Encrypted Fragment: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 93 (0x5d) | fragment number: 5 (0x5) | total fragments: 5 (0x5) | processing payload: ISAKMP_NEXT_v2SKF (len=85) | #8 in state PARENT_I2: sent v2I2, expected v2R2 | received IKE encrypted fragment number '5', total number '5', next payload '0' | #8 ikev2 ISAKMP_v2_IKE_AUTH decrypt success | Now let's proceed with payload (ISAKMP_NEXT_v2IDr) | **parse IKEv2 Identification - Responder - Payload: | next payload type: ISAKMP_NEXT_v2CERT (0x25) | flags: none (0x0) | length: 191 (0xbf) | ID type: ID_DER_ASN1_DN (0x9) | processing payload: ISAKMP_NEXT_v2IDr (len=183) | Now let's proceed with payload (ISAKMP_NEXT_v2CERT) | **parse IKEv2 Certificate Payload: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) | flags: none (0x0) | length: 1265 (0x4f1) | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | processing payload: ISAKMP_NEXT_v2CERT (len=1260) | Now let's proceed with payload (ISAKMP_NEXT_v2AUTH) | **parse IKEv2 Authentication Payload: | next payload type: ISAKMP_NEXT_v2CP (0x2f) | flags: none (0x0) | length: 392 (0x188) | auth method: IKEv2_AUTH_RSA (0x1) | processing payload: ISAKMP_NEXT_v2AUTH (len=384) | Now let's proceed with payload (ISAKMP_NEXT_v2CP) | **parse IKEv2 Configuration Payload: | next payload type: ISAKMP_NEXT_v2SA (0x21) | flags: none (0x0) | length: 24 (0x18) | ikev2_cfg_type: IKEv2_CP_CFG_REPLY (0x2) | processing payload: ISAKMP_NEXT_v2CP (len=16) | Now let's proceed with payload (ISAKMP_NEXT_v2SA) | **parse IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) | flags: none (0x0) | length: 36 (0x24) | processing payload: ISAKMP_NEXT_v2SA (len=32) | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) | **parse IKEv2 Traffic Selector - Initiator - Payload: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) | flags: none (0x0) | length: 24 (0x18) | number of TS: 1 (0x1) | processing payload: ISAKMP_NEXT_v2TSi (len=16) | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) | **parse IKEv2 Traffic Selector - Responder - Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 24 (0x18) | number of TS: 1 (0x1) | processing payload: ISAKMP_NEXT_v2TSr (len=16) | selected state microcode Initiator: process IKE_AUTH response | Now let's proceed with state specific processing | calling processor Initiator: process IKE_AUTH response | global one-shot timer EVENT_FREE_ROOT_CERTS scheduled in 300 seconds | #7 spent 0.00364 milliseconds in find_and_verify_certs() calling get_root_certs() | checking for known CERT payloads | saving certificate of type 'X509_SIGNATURE' | decoded cert: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | #7 spent 0.551 milliseconds in find_and_verify_certs() calling decode_cert_payloads() | cert_issuer_has_current_crl: looking for a CRL issued by E=testing@libreswan.org,CN=Libreswan test CA for mainca,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | #7 spent 0.0295 milliseconds in find_and_verify_certs() calling crl_update_check() | missing or expired CRL | crl_strict: 0, ocsp: 0, ocsp_strict: 0, ocsp_post: 0 | verify_end_cert trying profile IPsec | certificate is valid (profile IPsec) | #7 spent 0.126 milliseconds in find_and_verify_certs() calling verify_end_cert() "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: certificate verified OK: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f34eff8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f34ee48 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f34ec98 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f35bff8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x56091f34af68 | unreference key: 0x56091f345d08 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | #7 spent 0.284 milliseconds in decode_certs() calling add_pubkey_from_nss_cert() | #7 spent 1.03 milliseconds in decode_certs() | DER ASN1 DN: 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 | DER ASN1 DN: 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | DER ASN1 DN: 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | DER ASN1 DN: 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | DER ASN1 DN: 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | DER ASN1 DN: 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | DER ASN1 DN: 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 61 73 | DER ASN1 DN: 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | DER ASN1 DN: 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 | DER ASN1 DN: 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 61 73 | DER ASN1 DN: 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | DER ASN1 DN: 77 61 6e 2e 6f 72 67 | ID_DER_ASN1_DN '%fromcert' does not need further ID verification | stomping on peer_id | X509: CERT and ID matches current connection | offered CA: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: IKEv2 mode peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' | verifying AUTH payload | required RSA CA is '%any' | checking RSA keyid 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' for match with 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | key issuer CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | an RSA Sig check passed with *AwEAAbEef [remote certificates] | #7 spent 0.159 milliseconds in try_all_RSA_keys() trying a pubkey "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: Authenticated using RSA | #7 spent 0.201 milliseconds in ikev2_verify_rsa_hash() | parent state #7: PARENT_I2(open IKE SA) => PARENT_I3(established IKE SA) | #7 will start re-keying in 2879 seconds with margin of 721 seconds (attempting re-key) | state #7 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x7f7bb0002888 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7f7bb0002b78 | event_schedule: new EVENT_SA_REKEY-pe@0x7f7bb0002b78 | inserting event EVENT_SA_REKEY, timeout in 2879 seconds for #7 | libevent_malloc: new ptr-libevent@0x56091f362048 size 128 | pstats #7 ikev2.ike established | FOR_EACH_STATE_... in nat_traversal_ka_event (for_each_state) | [RE]START processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | stop processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | resume processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | suspend processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | NAT-T: keepalive packet not required as recent DPD event used the IKE SA on conn westnet-eastnet-ipv4-psk-ikev2 | stop processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | resume processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds | #8 westnet-eastnet-ipv4-psk-ikev2[1] parsing ISAKMP_NEXT_v2CP payload | ***parse IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_ADDRESS (0x1) | length/value: 4 (0x4) | parsing 4 raw bytes of IKEv2 Configuration Payload Attribute into INTERNAL_IP_ADDRESS | INTERNAL_IP_ADDRESS c0 00 02 01 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: received INTERNAL_IP4_ADDRESS 192.0.2.1 | setting host source IP address to 192.0.2.1 | ***parse IKEv2 Configuration Payload Attribute: | Attribute Type: IKEv2_INTERNAL_IP4_DNS (0x3) | length/value: 4 (0x4) | parsing 4 raw bytes of IKEv2 Configuration Payload Attribute into INTERNAL_IP_DNS CP payload | INTERNAL_IP_DNS CP payload | 01 02 03 04 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: received INTERNAL_IP4_DNS 1.2.3.4 | TSi: parsing 1 traffic selectors | ***parse IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | length: 16 (0x10) | start port: 0 (0x0) | end port: 65535 (0xffff) | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low | TS low c0 00 02 01 | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high | TS high c0 00 02 01 | TSi: parsed 1 traffic selectors | TSr: parsing 1 traffic selectors | ***parse IKEv2 Traffic Selector: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) | IP Protocol ID: 0 (0x0) | length: 16 (0x10) | start port: 0 (0x0) | end port: 65535 (0xffff) | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low | TS low c0 01 02 17 | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high | TS high c0 01 02 17 | TSr: parsed 1 traffic selectors | evaluating our conn="westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 I=192.0.2.1/32:0/0 R=192.1.2.23/32:0/0 to their: | TSi[0] .net=192.0.2.1-192.0.2.1 .iporotoid=0 .{start,end}port=0..65535 | match address end->client=192.0.2.1/32 >= TSi[0]net=192.0.2.1-192.0.2.1: YES fitness 32 | narrow port end=0..65535 >= TSi[0]=0..65535: 0 | TSi[0] port match: YES fitness 65536 | narrow protocol end=*0 >= TSi[0]=*0: 0 | match end->protocol=*0 >= TSi[0].ipprotoid=*0: YES fitness 255 | TSr[0] .net=192.1.2.23-192.1.2.23 .iporotoid=0 .{start,end}port=0..65535 | match address end->client=192.1.2.23/32 >= TSr[0]net=192.1.2.23-192.1.2.23: YES fitness 32 | narrow port end=0..65535 >= TSr[0]=0..65535: 0 | TSr[0] port match: YES fitness 65536 | narrow protocol end=*0 >= TSr[0]=*0: 0 | match end->protocol=*0 >= TSr[0].ipprotoid=*0: YES fitness 255 | best fit so far: TSi[0] TSr[0] | found an acceptable TSi/TSr Traffic Selector | printing contents struct traffic_selector | ts_type: IKEv2_TS_IPV6_ADDR_RANGE | ipprotoid: 0 | port range: 0-65535 | ip range: 192.0.2.1-192.0.2.1 | printing contents struct traffic_selector | ts_type: IKEv2_TS_IPV6_ADDR_RANGE | ipprotoid: 0 | port range: 0-65535 | ip range: 192.1.2.23-192.1.2.23 | using existing local ESP/AH proposals for westnet-eastnet-ipv4-psk-ikev2 (IKE_AUTH initiator accepting remote ESP/AH proposal): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED | Comparing remote proposals against IKE_AUTH initiator accepting remote ESP/AH proposal 4 local proposals | local proposal 1 type ENCR has 1 transforms | local proposal 1 type PRF has 0 transforms | local proposal 1 type INTEG has 1 transforms | local proposal 1 type DH has 1 transforms | local proposal 1 type ESN has 1 transforms | local proposal 1 transforms: required: ENCR+ESN; optional: INTEG+DH | local proposal 2 type ENCR has 1 transforms | local proposal 2 type PRF has 0 transforms | local proposal 2 type INTEG has 1 transforms | local proposal 2 type DH has 1 transforms | local proposal 2 type ESN has 1 transforms | local proposal 2 transforms: required: ENCR+ESN; optional: INTEG+DH | local proposal 3 type ENCR has 1 transforms | local proposal 3 type PRF has 0 transforms | local proposal 3 type INTEG has 2 transforms | local proposal 3 type DH has 1 transforms | local proposal 3 type ESN has 1 transforms | local proposal 3 transforms: required: ENCR+INTEG+ESN; optional: DH | local proposal 4 type ENCR has 1 transforms | local proposal 4 type PRF has 0 transforms | local proposal 4 type INTEG has 2 transforms | local proposal 4 type DH has 1 transforms | local proposal 4 type ESN has 1 transforms | local proposal 4 transforms: required: ENCR+INTEG+ESN; optional: DH | ***parse IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | length: 32 (0x20) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 2 (0x2) | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI | remote SPI 28 6e 52 3c | Comparing remote proposal 1 containing 2 transforms against local proposal [1..1] of 4 local proposals | ****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | length: 12 (0xc) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | *****parse IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 | ****parse IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | length: 8 (0x8) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | remote proposal 1 transform 1 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 | remote proposal 1 proposed transforms: ENCR+ESN; matched: ENCR+ESN; unmatched: none | comparing remote proposal 1 containing ENCR+ESN transforms to local proposal 1; required: ENCR+ESN; optional: INTEG+DH; matched: ENCR+ESN | remote proposal 1 matches local proposal 1 | remote accepted the proposal 1:ESP:ENCR=AES_GCM_C_256;ESN=DISABLED[first-match] | IKE_AUTH initiator accepting remote ESP/AH proposal ikev2_proposal: 1:ESP:SPI=286e523c;ENCR=AES_GCM_C_256;ESN=DISABLED | converting proposal to internal trans attrs | integ=none: .key_size=0 encrypt=aes_gcm_16: .key_size=32 .salt_size=4 keymat_len=36 | install_ipsec_sa() for #8: inbound and outbound | could_route called for westnet-eastnet-ipv4-psk-ikev2 (kind=CK_INSTANCE) | FOR_EACH_CONNECTION_... in route_owner | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | route owner of "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 unrouted: NULL; eroute owner: NULL | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 | AES_GCM_16 requires 4 salt bytes | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnet-eastnet-ipv4-psk-ikev2' not available on interface eth0 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.286e523c@192.1.2.23 included non-error error | set up outgoing SA, ref=0/0 | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 | AES_GCM_16 requires 4 salt bytes | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnet-eastnet-ipv4-psk-ikev2' not available on interface eth0 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.3155ba3a@192.1.3.209 included non-error error | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | add inbound eroute 192.1.2.23/32:0 --0-> 192.0.2.1/32:0 => tun.10000@192.1.3.209 (raw_eroute) | IPsec Sa SPD priority set to 1040351 | raw_eroute result=success | set up incoming SA, ref=0/0 | sr for #8: unrouted | route_and_eroute() for proto 0, and source port 0 dest port 0 | FOR_EACH_CONNECTION_... in route_owner | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | route owner of "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 unrouted: NULL; eroute owner: NULL | route_and_eroute with c: westnet-eastnet-ipv4-psk-ikev2 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #8 | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | eroute_connection add eroute 192.0.2.1/32:0 --0-> 192.1.2.23/32:0 => tun.0@192.1.2.23 (raw_eroute) | IPsec Sa SPD priority set to 1040351 | raw_eroute result=success | running updown command "ipsec _updown" for verb up | command executing up-client | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16416' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CO | popen cmd is 1360 chars long | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv: | cmd( 80):4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1: | cmd( 160):.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Departmen: | cmd( 240):t, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CL: | cmd( 320):IENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.25: | cmd( 400):5.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16416' PLUTO_: | cmd( 480):SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto: | cmd( 560):, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@te: | cmd( 640):sting.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='19: | cmd( 720):2.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEE: | cmd( 800):R_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CON: | cmd( 880):N_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_T: | cmd( 960):RACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY=: | cmd(1040):'ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0' PLUT: | cmd(1120):O_PEER_DNS_INFO='1.2.3.4' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_C: | cmd(1200):FG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUT: | cmd(1280):ING='no' VTI_SHARED='no' SPI_IN=0x286e523c SPI_OUT=0x3155ba3a ipsec _updown 2>&1: "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: up-client output: updating resolvconf "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: up-client output: rm: cannot remove '/etc/resolv.conf': Device or resource busy | route_and_eroute: firewall_notified: true | running updown command "ipsec _updown" for verb prepare | command executing prepare-client | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16416' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | popen cmd is 1365 chars long | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastne: | cmd( 80):t-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME=': | cmd( 160):192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depa: | cmd( 240):rtment, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_: | cmd( 320):MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='2: | cmd( 400):55.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16416' P: | cmd( 480):LUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=To: | cmd( 560):ronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-ea: | cmd( 640):st@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NE: | cmd( 720):T='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUT: | cmd( 800):O_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUT: | cmd( 880):O_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SA: | cmd( 960):REF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFA: | cmd(1040):MILY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0': | cmd(1120): PLUTO_PEER_DNS_INFO='1.2.3.4' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PL: | cmd(1200):UTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI: | cmd(1280):_ROUTING='no' VTI_SHARED='no' SPI_IN=0x286e523c SPI_OUT=0x3155ba3a ipsec _updown: | cmd(1360): 2>&1: | running updown command "ipsec _updown" for verb route | command executing route-client | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16416' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PL | popen cmd is 1363 chars long | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-: | cmd( 80):ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='19: | cmd( 160):2.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depart: | cmd( 240):ment, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY: | cmd( 320):_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255: | cmd( 400):.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16416' PLU: | cmd( 480):TO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toro: | cmd( 560):nto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east: | cmd( 640):@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET=: | cmd( 720):'192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_: | cmd( 800):PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_: | cmd( 880):CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SARE: | cmd( 960):F_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMI: | cmd(1040):LY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO='0' P: | cmd(1120):LUTO_PEER_DNS_INFO='1.2.3.4' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUT: | cmd(1200):O_CFG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_R: | cmd(1280):OUTING='no' VTI_SHARED='no' SPI_IN=0x286e523c SPI_OUT=0x3155ba3a ipsec _updown 2: | cmd(1360):>&1: "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: route-client output: Error: Peer netns reference is invalid. | route_and_eroute: instance "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23, setting eroute_owner {spd=0x56091f34e748,sr=0x56091f34e748} to #8 (was #0) (newest_ipsec_sa=#0) | #7 spent 2.41 milliseconds in install_ipsec_sa() | inR2: instance westnet-eastnet-ipv4-psk-ikev2[1], setting IKEv2 newest_ipsec_sa to #8 (was #0) (spd.eroute=#8) cloned from #7 | state #8 requesting EVENT_RETRANSMIT to be deleted | #8 STATE_PARENT_I2: retransmits: cleared | libevent_free: release ptr-libevent@0x56091f347cd8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x56091f3494a8 | #8 spent 4.41 milliseconds in processing: Initiator: process IKE_AUTH response in ikev2_process_state_packet() | [RE]START processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #8 complete_v2_state_transition() PARENT_I2->V2_IPSEC_I with status STF_OK | IKEv2: transition from state STATE_PARENT_I2 to state STATE_V2_IPSEC_I | child state #8: PARENT_I2(open IKE SA) => V2_IPSEC_I(established CHILD SA) | Message ID: updating counters for #8 to 1 after switching state | Message ID: recv #7.#8 response 1; ike: initiator.sent=1 initiator.recv=0->1 responder.sent=-1 responder.recv=-1; child: wip.initiator=1->-1 wip.responder=-1 | Message ID: #7.#8 skipping update_send as nothing to send; initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 | pstats #8 ikev2.child established "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: negotiated connection [192.0.2.1-192.0.2.1:0-65535 0] -> [192.1.2.23-192.1.2.23:0-65535 0] | NAT-T: NAT Traversal detected - their IKE port is '500' | NAT-T: encaps is 'auto' "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP/NAT=>0x286e523c <0x3155ba3a xfrm=AES_GCM_16_256-NONE NATOA=none NATD=192.1.2.23:4500 DPD=passive} | releasing whack for #8 (sock=fd@23) | close_any(fd@23) (in release_whack() at state.c:654) | releasing whack and unpending for parent #7 | unpending state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 | delete from pending Child SA with 192.1.2.23 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 | removing pending policy for no connection {0x56091f31db98} | close_any(fd@22) (in release_whack() at state.c:654) | #8 will start re-keying in 27846 seconds with margin of 954 seconds (attempting re-key) | event_schedule: new EVENT_SA_REKEY-pe@0x56091f3494a8 | inserting event EVENT_SA_REKEY, timeout in 27846 seconds for #8 | libevent_malloc: new ptr-libevent@0x56091f356898 size 128 | stop processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #7 spent 4.71 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 4.73 milliseconds in comm_handle_cb() reading and processing packet | kernel_process_msg_cb process netlink message | netlink_get: XFRM_MSG_DELPOLICY message | xfrm netlink address change RTM_NEWADDR msg len 76 | XFRM RTM_NEWADDR 192.0.2.1 IFA_LOCAL | FOR_EACH_STATE_... in record_newaddr (for_each_state) | start processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | stop processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1575) | stop processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in for_each_state() at state.c:1577) | IKEv2 received address RTM_NEWADDR type 3 | IKEv2 received address RTM_NEWADDR type 8 | IKEv2 received address RTM_NEWADDR type 6 | netlink_get: XFRM_MSG_EXPIRE message | netlink_get: XFRM_MSG_EXPIRE message | spent 0.0463 milliseconds in kernel message | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00464 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00288 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00281 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_STATE_... in show_traffic_status (sort_states) | FOR_EACH_STATE_... in sort_states | get_sa_info esp.3155ba3a@192.1.3.209 | get_sa_info esp.286e523c@192.1.2.23 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.164 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in show_connections_status | FOR_EACH_CONNECTION_... in show_connections_status | FOR_EACH_STATE_... in show_states_status (sort_states) | FOR_EACH_STATE_... in sort_states | get_sa_info esp.3155ba3a@192.1.3.209 | get_sa_info esp.286e523c@192.1.2.23 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.418 milliseconds in whack | spent 0.00319 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 69 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 0a c6 17 32 | 2e 20 25 00 00 00 00 00 00 00 00 45 2a 00 00 29 | 58 a2 3d df de 9f af d2 11 26 01 3a 8b c7 fc c2 | 28 b3 43 aa 87 28 8f 23 2e c7 98 33 f7 d5 8f eb | 3e 81 7e f2 fc | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: none (0x0) | Message ID: 0 (0x0) | length: 69 (0x45) | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) | I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request | State DB: found IKEv2 state #7 in PARENT_I3 (find_v2_ike_sa) | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: IKEv2 state not found (find_v2_sa_by_responder_wip) | [RE]START processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2064) | #7 st.st_msgid_lastrecv -1 md.hdr.isa_msgid 00000000 | Message ID: #7 not a duplicate - message is new; initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SK) | ***parse IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2D (0x2a) | flags: none (0x0) | length: 41 (0x29) | processing payload: ISAKMP_NEXT_v2SK (len=37) | Message ID: start-responder #7 request 0; ike: initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1->0 | #7 in state PARENT_I3: PARENT SA established | #7 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success | Now let's proceed with payload (ISAKMP_NEXT_v2D) | **parse IKEv2 Delete Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 12 (0xc) | protocol ID: PROTO_v2_ESP (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | processing payload: ISAKMP_NEXT_v2D (len=4) | selected state microcode I3: INFORMATIONAL Request | Now let's proceed with state specific processing | calling processor I3: INFORMATIONAL Request | an informational request should send a response | Received an INFORMATIONAL response, updating st_last_liveness, no pending_liveness | **emit ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: ISAKMP_FLAG_v2_IKE_INIT+ISAKMP_FLAG_v2_MSG_RESPONSE (0x28) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'information exchange reply packet' | emitting 8 zero bytes of IV into IKEv2 Encryption Payload | parsing 4 raw bytes of IKEv2 Delete Payload into SPI | SPI 28 6e 52 3c | delete PROTO_v2_ESP SA(0x286e523c) | v2 CHILD SA #8 found using their inbound (our outbound) SPI, in STATE_V2_IPSEC_I | State DB: found IKEv2 state #8 in V2_IPSEC_I (find_v2_child_sa_by_outbound_spi) | our side SPI that needs to be deleted: PROTO_v2_ESP SA(0x286e523c) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #7: received Delete SA payload: replace IPsec State #8 now | state #8 requesting EVENT_SA_REKEY to be deleted | libevent_free: release ptr-libevent@0x56091f356898 | free_event_entry: release EVENT_SA_REKEY-pe@0x56091f3494a8 | event_schedule: new EVENT_SA_REPLACE-pe@0x56091f3494a8 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #8 | libevent_malloc: new ptr-libevent@0x7f7bc4001978 size 128 | ****emit IKEv2 Delete Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | protocol ID: PROTO_v2_ESP (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Delete Payload (42:ISAKMP_NEXT_v2D) | next payload chain: saving location 'IKEv2 Delete Payload'.'next payload type' in 'information exchange reply packet' | emitting 4 raw bytes of local SPIs into IKEv2 Delete Payload | local SPIs 31 55 ba 3a | emitting length of IKEv2 Delete Payload: 12 | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload | emitting length of IKEv2 Encryption Payload: 41 | emitting length of ISAKMP Message: 69 | sending 73 bytes for reply packet for process_encrypted_informational_ikev2 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #7) | 00 00 00 00 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 | 0a c6 17 32 2e 20 25 28 00 00 00 00 00 00 00 45 | 2a 00 00 29 60 47 a5 52 c9 32 49 33 92 85 ed 22 | 5f b6 e9 ef 79 d0 95 39 bf 33 98 14 e9 33 17 6d | c9 97 57 a0 b6 47 8a 5e f8 | Message ID: #7 XXX: in process_encrypted_informational_ikev2() hacking around record'n'send bypassing send queue hacking around delete_my_family(); initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=0 | Message ID: sent #7 response 0; ike: initiator.sent=1 initiator.recv=1 responder.sent=-1->0 responder.recv=-1 wip.initiator=-1 wip.responder=0 | #7 spent 0.335 milliseconds in processing: I3: INFORMATIONAL Request in ikev2_process_state_packet() | [RE]START processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #7 complete_v2_state_transition() PARENT_I3->PARENT_I3 with status STF_OK | Message ID: updating counters for #7 to 0 after switching state | Message ID: recv #7 request 0; ike: initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=-1->0 wip.initiator=-1 wip.responder=0->-1 | Message ID: #7 skipping update_send as nothing to send; initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=-1 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #7: STATE_PARENT_I3: PARENT SA established | stop processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) | #7 spent 0.511 milliseconds in ikev2_process_packet() | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.522 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x56091f3494a8 | handling event EVENT_SA_REPLACE for child state #8 | start processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #8 for #8 | replacing stale CHILD SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) | FOR_EACH_STATE_... in find_phase1_state | FOR_EACH_STATE_... in find_pending_phase2 | creating state object #9 at 0x56091f349738 | State DB: adding IKEv2 state #9 in UNDEFINED | pstats #9 ikev2.child started | duplicating state object #7 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 as #9 for IPSEC SA | #9 setting local endpoint to 192.1.3.209:4500 from #7.st_localport (in duplicate_state() at state.c:1484) | Message ID: init_child #7.#9; ike: initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0; child: wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_initiate_child_sa() at ikev2_parent.c:5637) | start processing: state #9 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_initiate_child_sa() at ikev2_parent.c:5637) | child state #9: UNDEFINED(ignore) => V2_REKEY_CHILD_I0(established IKE SA) | create child proposal's DH changed from no-PFS to MODP2048, flushing | constructing ESP/AH proposals with default DH MODP2048 for westnet-eastnet-ipv4-psk-ikev2 (ESP/AH initiator emitting proposals) | converting proposal AES_GCM_16_256-NONE to ikev2 ... | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=MODP2048;ESN=DISABLED | converting proposal AES_GCM_16_128-NONE to ikev2 ... | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=MODP2048;ESN=DISABLED | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048;ESN=DISABLED | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048;ESN=DISABLED "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23: constructed local ESP/AH proposals for westnet-eastnet-ipv4-psk-ikev2 (ESP/AH initiator emitting proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=MODP2048;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=MODP2048;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048;ESN=DISABLED | #9 schedule rekey initiate IPsec SA RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO to replace #8 using IKE# 7 pfs=MODP2048 | event_schedule: new EVENT_v2_INITIATE_CHILD-pe@0x7f7bc4002b78 | inserting event EVENT_v2_INITIATE_CHILD, timeout in 0 seconds for #9 | libevent_malloc: new ptr-libevent@0x56091f347cd8 size 128 | RESET processing: state #9 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_initiate_child_sa() at ikev2_parent.c:5737) | event_schedule: new EVENT_SA_EXPIRE-pe@0x56091f3532b8 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #8 | libevent_malloc: new ptr-libevent@0x56091f344678 size 128 | libevent_free: release ptr-libevent@0x7f7bc4001978 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56091f3494a8 | #8 spent 0.135 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f7bc4002b78 | handling event EVENT_v2_INITIATE_CHILD for child state #9 | start processing: state #9 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in timer_event_cb() at timer.c:250) | adding Child Rekey Initiator KE and nonce ni work-order 9 for state #9 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56091f3494a8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #9 | libevent_malloc: new ptr-libevent@0x7f7bc4001978 size 128 | libevent_free: release ptr-libevent@0x56091f347cd8 | free_event_entry: release EVENT_v2_INITIATE_CHILD-pe@0x7f7bc4002b78 | #9 spent 0.0297 milliseconds in timer_event_cb() EVENT_v2_INITIATE_CHILD | stop processing: state #9 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x56091f3532b8 | handling event EVENT_SA_EXPIRE for child state #8 | start processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #8 for #8 | un-established partial CHILD SA timeout (SA expired) | pstats #8 ikev2.child re-failed exchange-timeout | pstats #8 ikev2.child deleted completed | #8 spent 4.55 milliseconds in total | [RE]START processing: state #8 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:879) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: deleting state (STATE_V2_IPSEC_I) aged 4.608s and NOT sending notification | child state #8: V2_IPSEC_I(established CHILD SA) => delete | get_sa_info esp.286e523c@192.1.2.23 | get_sa_info esp.3155ba3a@192.1.3.209 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: ESP traffic information: in=336B out=336B | child state #8: V2_IPSEC_I(established CHILD SA) => CHILDSA_DEL(informational) | crypto helper 2 resuming | crypto helper 2 starting work-order 9 for state #9 | crypto helper 2 doing build KE and nonce (Child Rekey Initiator KE and nonce ni); request ID 9 | running updown command "ipsec _updown" for verb down | command executing down-client | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16416' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844113' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN | popen cmd is 1371 chars long | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-i: | cmd( 80):pv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192: | cmd( 160):.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Departm: | cmd( 240):ent, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_: | cmd( 320):CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.: | cmd( 400):255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16416' PLUT: | cmd( 480):O_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toron: | cmd( 560):to, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@: | cmd( 640):testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET=': | cmd( 720):192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_P: | cmd( 800):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844113: | cmd( 880):' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROW: | cmd( 960):ING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_: | cmd(1040):ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CIS: | cmd(1120):CO='0' PLUTO_PEER_DNS_INFO='1.2.3.4' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER: | cmd(1200):='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE=: | cmd(1280):'' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x286e523c SPI_OUT=0x3155ba3a ipsec _: | cmd(1360):updown 2>&1: | crypto helper 2 finished build KE and nonce (Child Rekey Initiator KE and nonce ni); request ID 9 time elapsed 0.000891 seconds | (#9) spent 0.896 milliseconds in crypto helper computing work-order 9: Child Rekey Initiator KE and nonce ni (pcr) | crypto helper 2 sending results from work-order 9 for state #9 to event queue | scheduling resume sending helper answer for #9 | libevent_malloc: new ptr-libevent@0x7f7bbc000f48 size 128 | crypto helper 2 waiting (nothing to do) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #8: down-client output: restoring resolvconf | shunt_eroute() called for connection 'westnet-eastnet-ipv4-psk-ikev2' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | IPsec Sa SPD priority set to 1040351 | delete esp.286e523c@192.1.2.23 | netlink response for Del SA esp.286e523c@192.1.2.23 included non-error error | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | delete inbound eroute 192.1.2.23/32:0 --0-> 192.0.2.1/32:0 => unk255.10000@192.1.3.209 (raw_eroute) | raw_eroute result=success | delete esp.3155ba3a@192.1.3.209 | netlink response for Del SA esp.3155ba3a@192.1.3.209 included non-error error | in connection_discard for connection westnet-eastnet-ipv4-psk-ikev2 | connection is instance | not in pending use | State DB: found state #9 in V2_REKEY_CHILD_I0 (connection_discard) | states still using this connection instance, retaining | State DB: deleting IKEv2 state #8 in CHILDSA_DEL | child state #8: CHILDSA_DEL(informational) => UNDEFINED(ignore) | stop processing: state #8 from 192.1.2.23 (in delete_state() at state.c:1143) | State DB: found IKEv2 state #9 in V2_REKEY_CHILD_I0 (v2_expire_unused_ike_sa) | can't expire unused IKE SA #7; it has the child #9 | libevent_free: release ptr-libevent@0x56091f344678 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x56091f3532b8 | in statetime_stop() and could not find #8 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | spent 0.00218 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 69 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 30 1c e5 fa 9d bd 82 51 02 e0 05 22 f9 3f 72 39 | 2e 20 25 00 00 00 00 00 00 00 00 45 2a 00 00 29 | 95 fb 38 26 25 70 bc 5a b0 ca bb c2 4a 40 3f 1e | 5e 20 51 35 2c e0 f4 94 b7 79 71 b8 e7 d3 ed c5 | a0 58 b3 2a cf | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: none (0x0) | Message ID: 0 (0x0) | length: 69 (0x45) | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) | I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request | State DB: IKEv2 state not found (find_v2_ike_sa) packet from 192.1.2.23:4500: INFORMATIONAL message request has no corresponding IKE SA | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.0514 milliseconds in comm_handle_cb() reading and processing packet | processing resume sending helper answer for #9 | start processing: state #9 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 9 | calling continuation function 0x56091de22b50 | ikev2_child_outI_continue for #9 STATE_V2_REKEY_CHILD_I0 | state #9 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f7bc4001978 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56091f3494a8 | event_schedule: new EVENT_SA_REPLACE-pe@0x56091f3494a8 | inserting event EVENT_SA_REPLACE, timeout in 200 seconds for #9 | libevent_malloc: new ptr-libevent@0x56091f344678 size 128 | Message ID: #7 wakeing IKE SA (unack 0); initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=-1 | scheduling callback v2_msgid_schedule_next_initiator (#7) | libevent_malloc: new ptr-libevent@0x56091f347cd8 size 128 | [RE]START processing: state #9 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #9 complete_v2_state_transition() V2_REKEY_CHILD_I0->V2_REKEY_CHILD_I with status STF_SUSPEND | suspending state #9 and saving MD | #9 is busy; has a suspended MD | [RE]START processing: state #9 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in log_stf_suspend() at ikev2.c:3269) | "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #9 complete v2 state STATE_V2_REKEY_CHILD_I0 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 | resume sending helper answer for #9 suppresed complete_v2_state_transition() | #9 spent 0.045 milliseconds in resume sending helper answer | stop processing: state #9 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f7bbc000f48 | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00329 milliseconds in signal handler PLUTO_SIGCHLD | spent 0.00114 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 69 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | d5 21 42 43 7a 44 94 22 84 5a e9 e3 f2 f6 40 66 | 2e 20 25 00 00 00 00 00 00 00 00 45 2a 00 00 29 | 5b 60 ee 2b 1c b9 d4 b0 d5 a8 56 28 54 04 1b 94 | 9a 44 38 61 59 65 d8 f0 65 bd ba 8c 67 c7 a7 9d | 8a be 90 be 6d | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: none (0x0) | Message ID: 0 (0x0) | length: 69 (0x45) | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) | I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request | State DB: IKEv2 state not found (find_v2_ike_sa) packet from 192.1.2.23:4500: INFORMATIONAL message request has no corresponding IKE SA | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.0412 milliseconds in comm_handle_cb() reading and processing packet | processing callback v2_msgid_schedule_next_initiator for #7 | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in callback_handler() at server.c:904) | Message ID: #7.#9 resuming SA using IKE SA (unack 0); initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=-1 | suspend processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in initiate_next() at ikev2_msgid.c:553) | start processing: state #9 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in initiate_next() at ikev2_msgid.c:553) | **emit ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 2 (0x2) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' | emitting 8 zero bytes of IV into IKEv2 Encryption Payload | netlink_get_spi: allocated 0x7f41f3fe for esp.0@192.1.3.209 | Emitting ikev2_proposals ... | ****emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | discarding INTEG=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 3 (0x3) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 7f 41 f3 fe | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 40 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | discarding INTEG=NONE | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 2 (0x2) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 3 (0x3) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 7f 41 f3 fe | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_GCM_C (0x14) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | discarding INTEG=NONE | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 40 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_NON_LAST (0x2) | prop #: 3 (0x3) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 5 (0x5) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 7f 41 f3 fe | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | *****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 4 (0x4) | proto ID: IKEv2_SEC_PROTO_ESP (0x3) | spi size: 4 (0x4) | # transforms: 5 (0x5) | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload | our spi 7f 41 f3 fe | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | *******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | ******emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_ESN (0x5) | IKEv2 transform ID: ESN_DISABLED (0x0) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 196 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #9: CHILD SA to rekey #8 vanished abort this exchange | ikev2_child_sa_respond returned STF_INTERNAL_ERROR | [RE]START processing: state #9 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) | #9 complete_v2_state_transition() V2_REKEY_CHILD_I0->V2_REKEY_CHILD_I with status STF_INTERNAL_ERROR | state transition function for STATE_V2_REKEY_CHILD_I0 had internal error | stop processing: state #9 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in initiate_next() at ikev2_msgid.c:557) | resume processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in initiate_next() at ikev2_msgid.c:557) | #7 spent 0.362 milliseconds in callback v2_msgid_schedule_next_initiator | stop processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in callback_handler() at server.c:908) | libevent_free: release ptr-libevent@0x56091f347cd8 | spent 0.0012 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 69 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 6f dc 9b f3 fd b3 b0 92 61 0e b0 28 e2 6e 0b a2 | 2e 20 25 00 00 00 00 00 00 00 00 45 2a 00 00 29 | e2 15 6f 2f d3 7d ab 45 95 f4 97 09 3d be 7c fc | 10 c8 94 b7 19 9c 1e ac ad 40 ea 3f 5e 41 52 3a | d8 45 d4 6e 69 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: none (0x0) | Message ID: 0 (0x0) | length: 69 (0x45) | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) | I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request | State DB: IKEv2 state not found (find_v2_ike_sa) packet from 192.1.2.23:4500: INFORMATIONAL message request has no corresponding IKE SA | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.0407 milliseconds in comm_handle_cb() reading and processing packet | spent 0.001 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 65 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 0a c6 17 32 | 2e 20 25 00 00 00 00 01 00 00 00 41 2a 00 00 25 | 0c ba 9a 34 9b f6 43 fe 86 95 46 bd 04 11 98 85 | bc 98 ce b9 26 7a cd 96 22 44 4f eb 78 43 ae d0 | f5 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: none (0x0) | Message ID: 1 (0x1) | length: 65 (0x41) | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) | I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request | State DB: found IKEv2 state #7 in PARENT_I3 (find_v2_ike_sa) | start processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) | State DB: IKEv2 state not found (find_v2_sa_by_responder_wip) | [RE]START processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2064) | #7 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001 | Message ID: #7 not a duplicate - message is new; initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0 | unpacking clear payload | Now let's proceed with payload (ISAKMP_NEXT_v2SK) | ***parse IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2D (0x2a) | flags: none (0x0) | length: 37 (0x25) | processing payload: ISAKMP_NEXT_v2SK (len=33) | Message ID: start-responder #7 request 1; ike: initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=-1->1 | #7 in state PARENT_I3: PARENT SA established | #7 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success | Now let's proceed with payload (ISAKMP_NEXT_v2D) | **parse IKEv2 Delete Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | length: 8 (0x8) | protocol ID: PROTO_v2_IKE (0x1) | SPI size: 0 (0x0) | number of SPIs: 0 (0x0) | processing payload: ISAKMP_NEXT_v2D (len=0) | selected state microcode I3: INFORMATIONAL Request | Now let's proceed with state specific processing | calling processor I3: INFORMATIONAL Request | an informational request should send a response | Received an INFORMATIONAL response, updating st_last_liveness, no pending_liveness | **emit ISAKMP Message: | initiator cookie: | 2f 3e 44 24 7e 05 db 1a | responder cookie: | cd 75 4e 34 0a c6 17 32 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: ISAKMP_FLAG_v2_IKE_INIT+ISAKMP_FLAG_v2_MSG_RESPONSE (0x28) | Message ID: 1 (0x1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit IKEv2 Encryption Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'information exchange reply packet' | emitting 8 zero bytes of IV into IKEv2 Encryption Payload | adding 1 bytes of padding (including 1 byte padding-length) | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload | emitting length of IKEv2 Encryption Payload: 29 | emitting length of ISAKMP Message: 57 | sending 61 bytes for reply packet for process_encrypted_informational_ikev2 through eth0 from 192.1.3.209:4500 to 192.1.2.23:4500 (using #7) | 00 00 00 00 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 | 0a c6 17 32 2e 20 25 28 00 00 00 01 00 00 00 39 | 00 00 00 1d 78 aa 10 b8 2c 86 a9 38 e6 7c 71 5e | 4d bd d2 42 1b 7a 0e fd a5 07 17 eb 18 | Message ID: #7 XXX: in process_encrypted_informational_ikev2() hacking around record'n'send bypassing send queue hacking around delete_my_family(); initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=1 | Message ID: sent #7 response 1; ike: initiator.sent=1 initiator.recv=1 responder.sent=0->1 responder.recv=0 wip.initiator=-1 wip.responder=1 | child state #9: V2_REKEY_CHILD_I0(established IKE SA) => CHILDSA_DEL(informational) | pstats #9 ikev2.child deleted other | #9 spent 0.97 milliseconds in total | suspend processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:879) | start processing: state #9 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:879) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #9: deleting other state #9 (STATE_CHILDSA_DEL) aged 0.046s and NOT sending notification | child state #9: CHILDSA_DEL(informational) => delete | state #9 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x56091f344678 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56091f3494a8 | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | delete inbound eroute 192.1.2.23/32:0 --0-> 192.0.2.1/32:0 => unk255.10000@192.1.3.209 (raw_eroute) | raw_eroute result=success | in connection_discard for connection westnet-eastnet-ipv4-psk-ikev2 | connection is instance | not in pending use | State DB: found state #7 in PARENT_I3 (connection_discard) | states still using this connection instance, retaining | State DB: deleting IKEv2 state #9 in CHILDSA_DEL | child state #9: CHILDSA_DEL(informational) => UNDEFINED(ignore) | stop processing: state #9 from 192.1.2.23 (in delete_state() at state.c:1143) | resume processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:1143) | State DB: IKEv2 state not found (delete_my_family) | parent state #7: PARENT_I3(established IKE SA) => IKESA_DEL(established IKE SA) | pstats #7 ikev2.ike deleted completed | #7 spent 15.6 milliseconds in total | [RE]START processing: state #7 connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:879) "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #7: deleting state (STATE_IKESA_DEL) aged 4.659s and NOT sending notification | parent state #7: IKESA_DEL(established IKE SA) => delete | state #7 requesting EVENT_SA_REKEY to be deleted | libevent_free: release ptr-libevent@0x56091f362048 | free_event_entry: release EVENT_SA_REKEY-pe@0x7f7bb0002b78 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #7 "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 #7: deleting IKE SA for connection 'westnet-eastnet-ipv4-psk-ikev2' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'westnet-eastnet-ipv4-psk-ikev2' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection westnet-eastnet-ipv4-psk-ikev2 | connection is instance | not in pending use | State DB: state not found (connection_discard) | no states use this connection instance, deleting | start processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (BACKGROUND) (in delete_connection() at connections.c:189) packet from 192.1.2.23:4500: deleting connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 instance with peer 192.1.2.23 {isakmp=#0/ipsec=#0} | Deleting states for connection - not including other IPsec SA's | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #7 | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #7 | shunt_eroute() called for connection 'westnet-eastnet-ipv4-psk-ikev2' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | priority calculation of connection "westnet-eastnet-ipv4-psk-ikev2" is 0xfdfdf | FOR_EACH_CONNECTION_... in route_owner | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 vs | conn westnet-eastnet-ipv4-psk-ikev2 mark 0/00000000, 0/00000000 | route owner of "westnet-eastnet-ipv4-psk-ikev2" unrouted: NULL | running updown command "ipsec _updown" for verb unroute | command executing unroute-client | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastnet-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16416' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_N | popen cmd is 1347 chars long | cmd( 0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnet-eastne: | cmd( 80):t-ipv4-psk-ikev2' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME=': | cmd( 160):192.1.3.209' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Depa: | cmd( 240):rtment, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_: | cmd( 320):MY_CLIENT='192.0.2.1/32' PLUTO_MY_CLIENT_NET='192.0.2.1' PLUTO_MY_CLIENT_MASK='2: | cmd( 400):55.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16416' P: | cmd( 480):LUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=T: | cmd( 560):oronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-e: | cmd( 640):ast@testing.libreswan.org' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_N: | cmd( 720):ET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLU: | cmd( 800):TO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLU: | cmd( 880):TO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+IKEV2_ALLOW_NARROWING+S: | cmd( 960):AREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADD: | cmd(1040):RFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_MY_SOURCEIP='192.0.2.1' PLUTO_IS_PEER_CISCO=: | cmd(1120):'0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_: | cmd(1200):CFG_SERVER='0' PLUTO_CFG_CLIENT='1' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROU: | cmd(1280):TING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1: packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. packet from 192.1.2.23:4500: unroute-client output: Error: Peer netns reference is invalid. | flush revival: connection 'westnet-eastnet-ipv4-psk-ikev2' revival flushed | stop processing: connection "westnet-eastnet-ipv4-psk-ikev2"[1] 192.1.2.23 (BACKGROUND) (in discard_connection() at connections.c:249) | State DB: deleting IKEv2 state #7 in IKESA_DEL | parent state #7: IKESA_DEL(established IKE SA) => UNDEFINED(ignore) | unreference key: 0x56091f34ece8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 2-- | stop processing: state #7 from 192.1.2.23 (in delete_state() at state.c:1143) | unreference key: 0x56091f34ece8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | unreference key: 0x56091f3634c8 user-east@testing.libreswan.org cnt 1-- | unreference key: 0x56091f360d28 @east.testing.libreswan.org cnt 1-- | unreference key: 0x56091f34b018 east@testing.libreswan.org cnt 1-- | unreference key: 0x56091f347448 192.1.2.23 cnt 1-- | in statetime_stop() and could not find #7 | skip start processing: state #0 (in complete_v2_state_transition() at ikev2.c:3379) | #0 complete_v2_state_transition() md.from_state=PARENT_I3 md.svm.state[from]=PARENT_I3 UNDEFINED->PARENT_I3 with status STF_OK | STF_OK but no state object remains | processing: STOP state #0 (in ikev2_process_packet() at ikev2.c:2018) | in statetime_stop() and could not find #7 | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 1.13 milliseconds in comm_handle_cb() reading and processing packet recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 00 00 00 2f 3e 44 24 | responder cookie: | 7e 05 db 1a cd 75 4e 34 | next payload type: 10 (0xa) | ISAKMP version: 198 (0xc6) | exchange type: 23 (0x17) | flags: 50 (0x32) | Message ID: 773858600 (0x2e202528) | length: 1 (0x1) | MSG_ERRQUEUE packet IKE header version unknown | rejected packet: | 00 00 00 00 2f 3e 44 24 7e 05 db 1a cd 75 4e 34 | 0a c6 17 32 2e 20 25 28 00 00 00 01 00 00 00 39 | 00 00 00 1d 78 aa 10 b8 2c 86 a9 38 e6 7c 71 5e | 4d bd d2 42 1b 7a 0e fd | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | 7d 61 00 00 00 00 00 00 c0 01 03 d1 09 56 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 11 94 c0 01 02 17 00 00 00 00 00 00 00 00 | ERROR: asynchronous network error report on eth0 (192.1.3.209:4500) for message to 192.1.2.23 port 4500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 65 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 30 1c e5 fa 9d bd 82 51 02 e0 05 22 f9 3f 72 39 | 2e 20 25 00 00 00 00 01 00 00 00 41 2a 00 00 25 | 36 b4 c5 ce f7 ec 5c 3b 8b bc 4b 1c 29 aa 45 db | eb 3d 89 11 ef 3b da 3e 59 01 a9 b0 d6 b9 9e aa | c5 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 30 1c e5 fa 9d bd 82 51 | responder cookie: | 02 e0 05 22 f9 3f 72 39 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: none (0x0) | Message ID: 1 (0x1) | length: 65 (0x41) | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) | I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request | State DB: IKEv2 state not found (find_v2_ike_sa) packet from 192.1.2.23:4500: INFORMATIONAL message request has no corresponding IKE SA | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.046 milliseconds in comm_handle_cb() reading and processing packet | kernel_process_msg_cb process netlink message | netlink_get: XFRM_MSG_UPDPOLICY message | netlink_get: XFRM_MSG_GETPOLICY message | xfrm netlink address change RTM_DELADDR msg len 76 | XFRM RTM_DELADDR 192.0.2.1 IFA_LOCAL | FOR_EACH_STATE_... in record_deladdr (for_each_state) | IKEv2 received address RTM_DELADDR type 3 | IKEv2 received address RTM_DELADDR type 8 | IKEv2 received address RTM_DELADDR type 6 | netlink_get: XFRM_MSG_UPDPOLICY message | spent 0.35 milliseconds in kernel message | processing global timer EVENT_REVIVE_CONNS | spent 0.000768 milliseconds in global timer EVENT_REVIVE_CONNS | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00439 milliseconds in signal handler PLUTO_SIGCHLD | spent 0.0016 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 65 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | d5 21 42 43 7a 44 94 22 84 5a e9 e3 f2 f6 40 66 | 2e 20 25 00 00 00 00 01 00 00 00 41 2a 00 00 25 | 03 96 8a af 1a 0b 22 6a 0b 46 7c 96 cb 34 9f 0c | f3 65 97 62 91 e0 9c d7 cf 3c 1d b2 6c fd 3e f0 | 08 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | d5 21 42 43 7a 44 94 22 | responder cookie: | 84 5a e9 e3 f2 f6 40 66 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: none (0x0) | Message ID: 1 (0x1) | length: 65 (0x41) | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) | I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request | State DB: IKEv2 state not found (find_v2_ike_sa) packet from 192.1.2.23:4500: INFORMATIONAL message request has no corresponding IKE SA | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.0654 milliseconds in comm_handle_cb() reading and processing packet | spent 0.0015 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 65 bytes from 192.1.2.23:4500 on eth0 (192.1.3.209:4500) | 6f dc 9b f3 fd b3 b0 92 61 0e b0 28 e2 6e 0b a2 | 2e 20 25 00 00 00 00 01 00 00 00 41 2a 00 00 25 | 3c e7 7c f6 54 fb 05 0f c6 c8 0d 4f 87 05 0e d0 | e9 9b 6b d8 c6 ba 32 0b b8 02 7f 52 9f 3a 7e 1e | 94 | start processing: from 192.1.2.23:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 6f dc 9b f3 fd b3 b0 92 | responder cookie: | 61 0e b0 28 e2 6e 0b a2 | next payload type: ISAKMP_NEXT_v2SK (0x2e) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) | flags: none (0x0) | Message ID: 1 (0x1) | length: 65 (0x41) | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) | I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request | State DB: IKEv2 state not found (find_v2_ike_sa) packet from 192.1.2.23:4500: INFORMATIONAL message request has no corresponding IKE SA | stop processing: from 192.1.2.23:4500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.0566 milliseconds in comm_handle_cb() reading and processing packet | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) shutting down | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825) destroying root certificate cache | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' | unreference key: 0x56091f347a08 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- | unreference key: 0x56091f369458 user-road@testing.libreswan.org cnt 1-- | unreference key: 0x56091f365da8 @road.testing.libreswan.org cnt 1-- | start processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in delete_connection() at connections.c:189) | Deleting states for connection - including all other IPsec SA's of this IKE SA | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | free hp@0x56091f347298 | flush revival: connection 'westnet-eastnet-ipv4-psk-ikev2' wasn't on the list | stop processing: connection "westnet-eastnet-ipv4-psk-ikev2" (in discard_connection() at connections.c:249) | crl fetch request list locked by 'free_crl_fetch' | crl fetch request list unlocked by 'free_crl_fetch' shutting down interface lo/lo 127.0.0.1:4500 shutting down interface lo/lo 127.0.0.1:500 shutting down interface eth0/eth0 192.1.3.209:4500 shutting down interface eth0/eth0 192.1.3.209:500 | FOR_EACH_STATE_... in delete_states_dead_interfaces | libevent_free: release ptr-libevent@0x56091f335788 | free_event_entry: release EVENT_NULL-pe@0x56091f341418 | libevent_free: release ptr-libevent@0x56091f2dbfa8 | free_event_entry: release EVENT_NULL-pe@0x56091f3414c8 | libevent_free: release ptr-libevent@0x56091f2db8c8 | free_event_entry: release EVENT_NULL-pe@0x56091f341578 | libevent_free: release ptr-libevent@0x56091f2e3228 | free_event_entry: release EVENT_NULL-pe@0x56091f341628 | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | libevent_free: release ptr-libevent@0x56091f335838 | free_event_entry: release EVENT_NULL-pe@0x56091f3299d8 | libevent_free: release ptr-libevent@0x56091f2dbef8 | free_event_entry: release EVENT_NULL-pe@0x56091f329538 | libevent_free: release ptr-libevent@0x56091f322568 | free_event_entry: release EVENT_NULL-pe@0x56091f2e34d8 | global timer EVENT_REINIT_SECRET uninitialized | global timer EVENT_SHUNT_SCAN uninitialized | global timer EVENT_PENDING_DDNS uninitialized | global timer EVENT_PENDING_PHASE2 uninitialized | global timer EVENT_CHECK_CRLS uninitialized | global timer EVENT_REVIVE_CONNS uninitialized | global timer EVENT_FREE_ROOT_CERTS uninitialized | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized | global timer EVENT_NAT_T_KEEPALIVE uninitialized | libevent_free: release ptr-libevent@0x56091f2e7aa8 | signal event handler PLUTO_SIGCHLD uninstalled | libevent_free: release ptr-libevent@0x56091f2657f8 | signal event handler PLUTO_SIGTERM uninstalled | libevent_free: release ptr-libevent@0x56091f340dd8 | signal event handler PLUTO_SIGHUP uninstalled | libevent_free: release ptr-libevent@0x56091f341018 | signal event handler PLUTO_SIGSYS uninstalled | releasing event base | libevent_free: release ptr-libevent@0x56091f340ee8 | libevent_free: release ptr-libevent@0x56091f323df8 | libevent_free: release ptr-libevent@0x56091f323da8 | libevent_free: release ptr-libevent@0x56091f3444f8 | libevent_free: release ptr-libevent@0x56091f323d68 | libevent_free: release ptr-libevent@0x56091f340aa8 | libevent_free: release ptr-libevent@0x56091f340d18 | libevent_free: release ptr-libevent@0x56091f323fa8 | libevent_free: release ptr-libevent@0x56091f3295a8 | libevent_free: release ptr-libevent@0x56091f329208 | libevent_free: release ptr-libevent@0x56091f341698 | libevent_free: release ptr-libevent@0x56091f3415e8 | libevent_free: release ptr-libevent@0x56091f341538 | libevent_free: release ptr-libevent@0x56091f341488 | libevent_free: release ptr-libevent@0x56091f264b18 | libevent_free: release ptr-libevent@0x56091f340d98 | libevent_free: release ptr-libevent@0x56091f340d58 | libevent_free: release ptr-libevent@0x56091f340c18 | libevent_free: release ptr-libevent@0x56091f340ea8 | libevent_free: release ptr-libevent@0x56091f340ae8 | libevent_free: release ptr-libevent@0x56091f2e9638 | libevent_free: release ptr-libevent@0x56091f2e95b8 | libevent_free: release ptr-libevent@0x56091f264e88 | releasing global libevent data | libevent_free: release ptr-libevent@0x56091f2e97b8 | libevent_free: release ptr-libevent@0x56091f2e9738 | libevent_free: release ptr-libevent@0x56091f2e96b8 leak detective found no leaks