Aug 26 18:34:00.356580: FIPS Product: YES Aug 26 18:34:00.356703: FIPS Kernel: NO Aug 26 18:34:00.356706: FIPS Mode: NO Aug 26 18:34:00.356709: NSS DB directory: sql:/etc/ipsec.d Aug 26 18:34:00.356864: Initializing NSS Aug 26 18:34:00.356872: Opening NSS database "sql:/etc/ipsec.d" read-only Aug 26 18:34:00.383720: NSS initialized Aug 26 18:34:00.383735: NSS crypto library initialized Aug 26 18:34:00.383739: FIPS HMAC integrity support [enabled] Aug 26 18:34:00.383741: FIPS mode disabled for pluto daemon Aug 26 18:34:00.416036: FIPS HMAC integrity verification self-test FAILED Aug 26 18:34:00.416536: libcap-ng support [enabled] Aug 26 18:34:00.416549: Linux audit support [enabled] Aug 26 18:34:00.416582: Linux audit activated Aug 26 18:34:00.416587: Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:1809 Aug 26 18:34:00.416590: core dump dir: /tmp Aug 26 18:34:00.416592: secrets file: /etc/ipsec.secrets Aug 26 18:34:00.416594: leak-detective enabled Aug 26 18:34:00.416597: NSS crypto [enabled] Aug 26 18:34:00.416599: XAUTH PAM support [enabled] Aug 26 18:34:00.416669: | libevent is using pluto's memory allocator Aug 26 18:34:00.416676: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Aug 26 18:34:00.416693: | libevent_malloc: new ptr-libevent@0x55f2f380e998 size 40 Aug 26 18:34:00.416698: | libevent_malloc: new ptr-libevent@0x55f2f37e2cd8 size 40 Aug 26 18:34:00.416701: | libevent_malloc: new ptr-libevent@0x55f2f37e2dd8 size 40 Aug 26 18:34:00.416703: | creating event base Aug 26 18:34:00.416707: | libevent_malloc: new ptr-libevent@0x55f2f3867788 size 56 Aug 26 18:34:00.416711: | libevent_malloc: new ptr-libevent@0x55f2f380b5f8 size 664 Aug 26 18:34:00.416722: | libevent_malloc: new ptr-libevent@0x55f2f38677f8 size 24 Aug 26 18:34:00.416725: | libevent_malloc: new ptr-libevent@0x55f2f3867848 size 384 Aug 26 18:34:00.416735: | libevent_malloc: new ptr-libevent@0x55f2f3867748 size 16 Aug 26 18:34:00.416737: | libevent_malloc: new ptr-libevent@0x55f2f37e2908 size 40 Aug 26 18:34:00.416740: | libevent_malloc: new ptr-libevent@0x55f2f37e2d38 size 48 Aug 26 18:34:00.416745: | libevent_realloc: new ptr-libevent@0x55f2f380e7b8 size 256 Aug 26 18:34:00.416751: | libevent_malloc: new ptr-libevent@0x55f2f38679f8 size 16 Aug 26 18:34:00.416757: | libevent_free: release ptr-libevent@0x55f2f3867788 Aug 26 18:34:00.416761: | libevent initialized Aug 26 18:34:00.416764: | libevent_realloc: new ptr-libevent@0x55f2f3867788 size 64 Aug 26 18:34:00.416768: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Aug 26 18:34:00.416782: | init_nat_traversal() initialized with keep_alive=0s Aug 26 18:34:00.416784: NAT-Traversal support [enabled] Aug 26 18:34:00.416787: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Aug 26 18:34:00.416793: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Aug 26 18:34:00.416800: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Aug 26 18:34:00.416836: | global one-shot timer EVENT_REVIVE_CONNS initialized Aug 26 18:34:00.416840: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Aug 26 18:34:00.416843: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Aug 26 18:34:00.416892: Encryption algorithms: Aug 26 18:34:00.416900: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Aug 26 18:34:00.416904: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Aug 26 18:34:00.416909: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Aug 26 18:34:00.416913: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Aug 26 18:34:00.416916: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Aug 26 18:34:00.416924: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Aug 26 18:34:00.416928: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Aug 26 18:34:00.416932: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Aug 26 18:34:00.416936: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Aug 26 18:34:00.416940: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Aug 26 18:34:00.416944: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Aug 26 18:34:00.416948: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Aug 26 18:34:00.416951: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Aug 26 18:34:00.416955: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Aug 26 18:34:00.416959: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Aug 26 18:34:00.416962: NULL IKEv1: ESP IKEv2: ESP [] Aug 26 18:34:00.416966: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Aug 26 18:34:00.416973: Hash algorithms: Aug 26 18:34:00.416976: MD5 IKEv1: IKE IKEv2: Aug 26 18:34:00.416980: SHA1 IKEv1: IKE IKEv2: FIPS sha Aug 26 18:34:00.416983: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Aug 26 18:34:00.416986: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Aug 26 18:34:00.416989: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Aug 26 18:34:00.417002: PRF algorithms: Aug 26 18:34:00.417006: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Aug 26 18:34:00.417009: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Aug 26 18:34:00.417013: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Aug 26 18:34:00.417016: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Aug 26 18:34:00.417020: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Aug 26 18:34:00.417023: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Aug 26 18:34:00.417049: Integrity algorithms: Aug 26 18:34:00.417053: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Aug 26 18:34:00.417057: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Aug 26 18:34:00.417061: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Aug 26 18:34:00.417066: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Aug 26 18:34:00.417070: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Aug 26 18:34:00.417073: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Aug 26 18:34:00.417077: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Aug 26 18:34:00.417080: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Aug 26 18:34:00.417083: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Aug 26 18:34:00.417096: DH algorithms: Aug 26 18:34:00.417099: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Aug 26 18:34:00.417102: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Aug 26 18:34:00.417106: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Aug 26 18:34:00.417111: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Aug 26 18:34:00.417114: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Aug 26 18:34:00.417117: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Aug 26 18:34:00.417120: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Aug 26 18:34:00.417124: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Aug 26 18:34:00.417127: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Aug 26 18:34:00.417131: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Aug 26 18:34:00.417134: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Aug 26 18:34:00.417136: testing CAMELLIA_CBC: Aug 26 18:34:00.417139: Camellia: 16 bytes with 128-bit key Aug 26 18:34:00.417255: Camellia: 16 bytes with 128-bit key Aug 26 18:34:00.417285: Camellia: 16 bytes with 256-bit key Aug 26 18:34:00.417335: Camellia: 16 bytes with 256-bit key Aug 26 18:34:00.417368: testing AES_GCM_16: Aug 26 18:34:00.417371: empty string Aug 26 18:34:00.417402: one block Aug 26 18:34:00.417428: two blocks Aug 26 18:34:00.417454: two blocks with associated data Aug 26 18:34:00.417480: testing AES_CTR: Aug 26 18:34:00.417483: Encrypting 16 octets using AES-CTR with 128-bit key Aug 26 18:34:00.417510: Encrypting 32 octets using AES-CTR with 128-bit key Aug 26 18:34:00.417538: Encrypting 36 octets using AES-CTR with 128-bit key Aug 26 18:34:00.417566: Encrypting 16 octets using AES-CTR with 192-bit key Aug 26 18:34:00.417592: Encrypting 32 octets using AES-CTR with 192-bit key Aug 26 18:34:00.417620: Encrypting 36 octets using AES-CTR with 192-bit key Aug 26 18:34:00.417649: Encrypting 16 octets using AES-CTR with 256-bit key Aug 26 18:34:00.417676: Encrypting 32 octets using AES-CTR with 256-bit key Aug 26 18:34:00.417703: Encrypting 36 octets using AES-CTR with 256-bit key Aug 26 18:34:00.417732: testing AES_CBC: Aug 26 18:34:00.417734: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Aug 26 18:34:00.417761: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Aug 26 18:34:00.417790: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Aug 26 18:34:00.417817: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Aug 26 18:34:00.417848: testing AES_XCBC: Aug 26 18:34:00.417851: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Aug 26 18:34:00.417962: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Aug 26 18:34:00.418095: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Aug 26 18:34:00.418196: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Aug 26 18:34:00.418287: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Aug 26 18:34:00.418381: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Aug 26 18:34:00.418512: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Aug 26 18:34:00.418807: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Aug 26 18:34:00.418926: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Aug 26 18:34:00.419070: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Aug 26 18:34:00.419329: testing HMAC_MD5: Aug 26 18:34:00.419337: RFC 2104: MD5_HMAC test 1 Aug 26 18:34:00.419514: RFC 2104: MD5_HMAC test 2 Aug 26 18:34:00.419676: RFC 2104: MD5_HMAC test 3 Aug 26 18:34:00.419905: 8 CPU cores online Aug 26 18:34:00.419911: starting up 7 crypto helpers Aug 26 18:34:00.419942: started thread for crypto helper 0 Aug 26 18:34:00.419948: | starting up helper thread 0 Aug 26 18:34:00.419972: | status value returned by setting the priority of this thread (crypto helper 0) 22 Aug 26 18:34:00.419976: | crypto helper 0 waiting (nothing to do) Aug 26 18:34:00.419977: started thread for crypto helper 1 Aug 26 18:34:00.420009: started thread for crypto helper 2 Aug 26 18:34:00.420013: | starting up helper thread 2 Aug 26 18:34:00.420032: | status value returned by setting the priority of this thread (crypto helper 2) 22 Aug 26 18:34:00.420034: started thread for crypto helper 3 Aug 26 18:34:00.420035: | crypto helper 2 waiting (nothing to do) Aug 26 18:34:00.420038: | starting up helper thread 3 Aug 26 18:34:00.420056: started thread for crypto helper 4 Aug 26 18:34:00.420058: | starting up helper thread 4 Aug 26 18:34:00.420059: | status value returned by setting the priority of this thread (crypto helper 3) 22 Aug 26 18:34:00.420069: | status value returned by setting the priority of this thread (crypto helper 4) 22 Aug 26 18:34:00.420071: | crypto helper 3 waiting (nothing to do) Aug 26 18:34:00.420075: started thread for crypto helper 5 Aug 26 18:34:00.420078: | starting up helper thread 5 Aug 26 18:34:00.420090: | status value returned by setting the priority of this thread (crypto helper 5) 22 Aug 26 18:34:00.420094: started thread for crypto helper 6 Aug 26 18:34:00.420081: | crypto helper 4 waiting (nothing to do) Aug 26 18:34:00.420099: | checking IKEv1 state table Aug 26 18:34:00.420104: | crypto helper 5 waiting (nothing to do) Aug 26 18:34:00.420104: | starting up helper thread 6 Aug 26 18:34:00.420109: | MAIN_R0: category: half-open IKE SA flags: 0: Aug 26 18:34:00.420117: | status value returned by setting the priority of this thread (crypto helper 6) 22 Aug 26 18:34:00.420118: | -> MAIN_R1 EVENT_SO_DISCARD Aug 26 18:34:00.420121: | crypto helper 6 waiting (nothing to do) Aug 26 18:34:00.420125: | MAIN_I1: category: half-open IKE SA flags: 0: Aug 26 18:34:00.420131: | -> MAIN_I2 EVENT_RETRANSMIT Aug 26 18:34:00.420133: | MAIN_R1: category: open IKE SA flags: 200: Aug 26 18:34:00.420135: | -> MAIN_R2 EVENT_RETRANSMIT Aug 26 18:34:00.420136: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:34:00.420138: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:34:00.420140: | MAIN_I2: category: open IKE SA flags: 0: Aug 26 18:34:00.420141: | -> MAIN_I3 EVENT_RETRANSMIT Aug 26 18:34:00.420143: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:34:00.420144: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:34:00.420146: | MAIN_R2: category: open IKE SA flags: 0: Aug 26 18:34:00.420148: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:34:00.420149: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:34:00.420151: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 18:34:00.420152: | MAIN_I3: category: open IKE SA flags: 0: Aug 26 18:34:00.420154: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:34:00.420156: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:34:00.420157: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 18:34:00.420159: | MAIN_R3: category: established IKE SA flags: 200: Aug 26 18:34:00.420160: | -> UNDEFINED EVENT_NULL Aug 26 18:34:00.420162: | MAIN_I4: category: established IKE SA flags: 0: Aug 26 18:34:00.420164: | -> UNDEFINED EVENT_NULL Aug 26 18:34:00.420166: | AGGR_R0: category: half-open IKE SA flags: 0: Aug 26 18:34:00.420167: | -> AGGR_R1 EVENT_SO_DISCARD Aug 26 18:34:00.420169: | AGGR_I1: category: half-open IKE SA flags: 0: Aug 26 18:34:00.420170: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 18:34:00.420172: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 18:34:00.420174: | AGGR_R1: category: open IKE SA flags: 200: Aug 26 18:34:00.420175: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 18:34:00.420177: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 18:34:00.420179: | AGGR_I2: category: established IKE SA flags: 200: Aug 26 18:34:00.420180: | -> UNDEFINED EVENT_NULL Aug 26 18:34:00.420182: | AGGR_R2: category: established IKE SA flags: 0: Aug 26 18:34:00.420183: | -> UNDEFINED EVENT_NULL Aug 26 18:34:00.420185: | QUICK_R0: category: established CHILD SA flags: 0: Aug 26 18:34:00.420187: | -> QUICK_R1 EVENT_RETRANSMIT Aug 26 18:34:00.420189: | QUICK_I1: category: established CHILD SA flags: 0: Aug 26 18:34:00.420190: | -> QUICK_I2 EVENT_SA_REPLACE Aug 26 18:34:00.420192: | QUICK_R1: category: established CHILD SA flags: 0: Aug 26 18:34:00.420196: | -> QUICK_R2 EVENT_SA_REPLACE Aug 26 18:34:00.420198: | QUICK_I2: category: established CHILD SA flags: 200: Aug 26 18:34:00.420199: | -> UNDEFINED EVENT_NULL Aug 26 18:34:00.420201: | QUICK_R2: category: established CHILD SA flags: 0: Aug 26 18:34:00.420202: | -> UNDEFINED EVENT_NULL Aug 26 18:34:00.420204: | INFO: category: informational flags: 0: Aug 26 18:34:00.420206: | -> UNDEFINED EVENT_NULL Aug 26 18:34:00.420208: | INFO_PROTECTED: category: informational flags: 0: Aug 26 18:34:00.420209: | -> UNDEFINED EVENT_NULL Aug 26 18:34:00.420211: | XAUTH_R0: category: established IKE SA flags: 0: Aug 26 18:34:00.420212: | -> XAUTH_R1 EVENT_NULL Aug 26 18:34:00.420214: | XAUTH_R1: category: established IKE SA flags: 0: Aug 26 18:34:00.420216: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:34:00.420217: | MODE_CFG_R0: category: informational flags: 0: Aug 26 18:34:00.420219: | -> MODE_CFG_R1 EVENT_SA_REPLACE Aug 26 18:34:00.420221: | MODE_CFG_R1: category: established IKE SA flags: 0: Aug 26 18:34:00.420222: | -> MODE_CFG_R2 EVENT_SA_REPLACE Aug 26 18:34:00.420224: | MODE_CFG_R2: category: established IKE SA flags: 0: Aug 26 18:34:00.420226: | -> UNDEFINED EVENT_NULL Aug 26 18:34:00.420228: | MODE_CFG_I1: category: established IKE SA flags: 0: Aug 26 18:34:00.420229: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:34:00.420231: | XAUTH_I0: category: established IKE SA flags: 0: Aug 26 18:34:00.420233: | -> XAUTH_I1 EVENT_RETRANSMIT Aug 26 18:34:00.420236: | XAUTH_I1: category: established IKE SA flags: 0: Aug 26 18:34:00.420238: | -> MAIN_I4 EVENT_RETRANSMIT Aug 26 18:34:00.420245: | checking IKEv2 state table Aug 26 18:34:00.420083: | starting up helper thread 1 Aug 26 18:34:00.420253: | PARENT_I0: category: ignore flags: 0: Aug 26 18:34:00.420260: | status value returned by setting the priority of this thread (crypto helper 1) 22 Aug 26 18:34:00.420262: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Aug 26 18:34:00.420266: | crypto helper 1 waiting (nothing to do) Aug 26 18:34:00.420270: | PARENT_I1: category: half-open IKE SA flags: 0: Aug 26 18:34:00.420277: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Aug 26 18:34:00.420279: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Aug 26 18:34:00.420281: | PARENT_I2: category: open IKE SA flags: 0: Aug 26 18:34:00.420283: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Aug 26 18:34:00.420285: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Aug 26 18:34:00.420286: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Aug 26 18:34:00.420305: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Aug 26 18:34:00.420310: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Aug 26 18:34:00.420312: | PARENT_I3: category: established IKE SA flags: 0: Aug 26 18:34:00.420314: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Aug 26 18:34:00.420315: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Aug 26 18:34:00.420317: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Aug 26 18:34:00.420319: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Aug 26 18:34:00.420320: | PARENT_R0: category: half-open IKE SA flags: 0: Aug 26 18:34:00.420322: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Aug 26 18:34:00.420324: | PARENT_R1: category: half-open IKE SA flags: 0: Aug 26 18:34:00.420326: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Aug 26 18:34:00.420328: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Aug 26 18:34:00.420330: | PARENT_R2: category: established IKE SA flags: 0: Aug 26 18:34:00.420331: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Aug 26 18:34:00.420335: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Aug 26 18:34:00.420337: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Aug 26 18:34:00.420339: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Aug 26 18:34:00.420341: | V2_CREATE_I0: category: established IKE SA flags: 0: Aug 26 18:34:00.420343: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Aug 26 18:34:00.420344: | V2_CREATE_I: category: established IKE SA flags: 0: Aug 26 18:34:00.420346: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Aug 26 18:34:00.420348: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Aug 26 18:34:00.420350: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Aug 26 18:34:00.420352: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Aug 26 18:34:00.420354: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Aug 26 18:34:00.420355: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Aug 26 18:34:00.420357: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Aug 26 18:34:00.420359: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Aug 26 18:34:00.420361: | V2_CREATE_R: category: established IKE SA flags: 0: Aug 26 18:34:00.420363: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Aug 26 18:34:00.420365: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Aug 26 18:34:00.420366: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Aug 26 18:34:00.420368: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Aug 26 18:34:00.420370: | V2_IPSEC_I: category: established CHILD SA flags: 0: Aug 26 18:34:00.420372: | V2_IPSEC_R: category: established CHILD SA flags: 0: Aug 26 18:34:00.420374: | IKESA_DEL: category: established IKE SA flags: 0: Aug 26 18:34:00.420376: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Aug 26 18:34:00.420378: | CHILDSA_DEL: category: informational flags: 0: Aug 26 18:34:00.420387: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 Aug 26 18:34:00.420780: | Hard-wiring algorithms Aug 26 18:34:00.420787: | adding AES_CCM_16 to kernel algorithm db Aug 26 18:34:00.420791: | adding AES_CCM_12 to kernel algorithm db Aug 26 18:34:00.420794: | adding AES_CCM_8 to kernel algorithm db Aug 26 18:34:00.420797: | adding 3DES_CBC to kernel algorithm db Aug 26 18:34:00.420800: | adding CAMELLIA_CBC to kernel algorithm db Aug 26 18:34:00.420803: | adding AES_GCM_16 to kernel algorithm db Aug 26 18:34:00.420805: | adding AES_GCM_12 to kernel algorithm db Aug 26 18:34:00.420808: | adding AES_GCM_8 to kernel algorithm db Aug 26 18:34:00.420811: | adding AES_CTR to kernel algorithm db Aug 26 18:34:00.420813: | adding AES_CBC to kernel algorithm db Aug 26 18:34:00.420816: | adding SERPENT_CBC to kernel algorithm db Aug 26 18:34:00.420818: | adding TWOFISH_CBC to kernel algorithm db Aug 26 18:34:00.420821: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Aug 26 18:34:00.420824: | adding NULL to kernel algorithm db Aug 26 18:34:00.420826: | adding CHACHA20_POLY1305 to kernel algorithm db Aug 26 18:34:00.420829: | adding HMAC_MD5_96 to kernel algorithm db Aug 26 18:34:00.420832: | adding HMAC_SHA1_96 to kernel algorithm db Aug 26 18:34:00.420834: | adding HMAC_SHA2_512_256 to kernel algorithm db Aug 26 18:34:00.420837: | adding HMAC_SHA2_384_192 to kernel algorithm db Aug 26 18:34:00.420840: | adding HMAC_SHA2_256_128 to kernel algorithm db Aug 26 18:34:00.420842: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Aug 26 18:34:00.420845: | adding AES_XCBC_96 to kernel algorithm db Aug 26 18:34:00.420847: | adding AES_CMAC_96 to kernel algorithm db Aug 26 18:34:00.420850: | adding NONE to kernel algorithm db Aug 26 18:34:00.420874: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Aug 26 18:34:00.420882: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Aug 26 18:34:00.420885: | setup kernel fd callback Aug 26 18:34:00.420889: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x55f2f386c3c8 Aug 26 18:34:00.420895: | libevent_malloc: new ptr-libevent@0x55f2f38507d8 size 128 Aug 26 18:34:00.420899: | libevent_malloc: new ptr-libevent@0x55f2f386c4d8 size 16 Aug 26 18:34:00.420906: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x55f2f386cf08 Aug 26 18:34:00.420909: | libevent_malloc: new ptr-libevent@0x55f2f380e8e8 size 128 Aug 26 18:34:00.420912: | libevent_malloc: new ptr-libevent@0x55f2f386cec8 size 16 Aug 26 18:34:00.421164: | global one-shot timer EVENT_CHECK_CRLS initialized Aug 26 18:34:00.421174: selinux support is enabled. Aug 26 18:34:00.421836: | unbound context created - setting debug level to 5 Aug 26 18:34:00.421868: | /etc/hosts lookups activated Aug 26 18:34:00.421886: | /etc/resolv.conf usage activated Aug 26 18:34:00.421953: | outgoing-port-avoid set 0-65535 Aug 26 18:34:00.421984: | outgoing-port-permit set 32768-60999 Aug 26 18:34:00.421988: | Loading dnssec root key from:/var/lib/unbound/root.key Aug 26 18:34:00.421992: | No additional dnssec trust anchors defined via dnssec-trusted= option Aug 26 18:34:00.421995: | Setting up events, loop start Aug 26 18:34:00.421999: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x55f2f386cf78 Aug 26 18:34:00.422002: | libevent_malloc: new ptr-libevent@0x55f2f3879188 size 128 Aug 26 18:34:00.422006: | libevent_malloc: new ptr-libevent@0x55f2f3884458 size 16 Aug 26 18:34:00.422012: | libevent_realloc: new ptr-libevent@0x55f2f380b288 size 256 Aug 26 18:34:00.422016: | libevent_malloc: new ptr-libevent@0x55f2f3884498 size 8 Aug 26 18:34:00.422019: | libevent_realloc: new ptr-libevent@0x55f2f3818228 size 144 Aug 26 18:34:00.422022: | libevent_malloc: new ptr-libevent@0x55f2f380fe98 size 152 Aug 26 18:34:00.422026: | libevent_malloc: new ptr-libevent@0x55f2f38844d8 size 16 Aug 26 18:34:00.422031: | signal event handler PLUTO_SIGCHLD installed Aug 26 18:34:00.422034: | libevent_malloc: new ptr-libevent@0x55f2f3884518 size 8 Aug 26 18:34:00.422037: | libevent_malloc: new ptr-libevent@0x55f2f3884558 size 152 Aug 26 18:34:00.422040: | signal event handler PLUTO_SIGTERM installed Aug 26 18:34:00.422043: | libevent_malloc: new ptr-libevent@0x55f2f3884628 size 8 Aug 26 18:34:00.422046: | libevent_malloc: new ptr-libevent@0x55f2f3884668 size 152 Aug 26 18:34:00.422049: | signal event handler PLUTO_SIGHUP installed Aug 26 18:34:00.422052: | libevent_malloc: new ptr-libevent@0x55f2f3884738 size 8 Aug 26 18:34:00.422055: | libevent_realloc: release ptr-libevent@0x55f2f3818228 Aug 26 18:34:00.422058: | libevent_realloc: new ptr-libevent@0x55f2f3884778 size 256 Aug 26 18:34:00.422061: | libevent_malloc: new ptr-libevent@0x55f2f38848a8 size 152 Aug 26 18:34:00.422064: | signal event handler PLUTO_SIGSYS installed Aug 26 18:34:00.422444: | created addconn helper (pid:1893) using fork+execve Aug 26 18:34:00.422463: | forked child 1893 Aug 26 18:34:00.422511: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:34:00.422862: listening for IKE messages Aug 26 18:34:00.426191: | Inspecting interface lo Aug 26 18:34:00.426210: | found lo with address 127.0.0.1 Aug 26 18:34:00.426216: | Inspecting interface eth0 Aug 26 18:34:00.426220: | found eth0 with address 192.0.1.254 Aug 26 18:34:00.426224: | Inspecting interface eth1 Aug 26 18:34:00.426227: | found eth1 with address 192.1.2.45 Aug 26 18:34:00.426367: Kernel supports NIC esp-hw-offload Aug 26 18:34:00.426387: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.45:500 Aug 26 18:34:00.426470: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 18:34:00.426477: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 18:34:00.426482: adding interface eth1/eth1 192.1.2.45:4500 Aug 26 18:34:00.426520: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.1.254:500 Aug 26 18:34:00.426546: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 18:34:00.426551: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 18:34:00.426555: adding interface eth0/eth0 192.0.1.254:4500 Aug 26 18:34:00.426595: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Aug 26 18:34:00.426623: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 18:34:00.426628: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 18:34:00.426633: adding interface lo/lo 127.0.0.1:4500 Aug 26 18:34:00.426723: | no interfaces to sort Aug 26 18:34:00.426728: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 18:34:00.426738: | add_fd_read_event_handler: new ethX-pe@0x55f2f3884d78 Aug 26 18:34:00.426742: | libevent_malloc: new ptr-libevent@0x55f2f38790d8 size 128 Aug 26 18:34:00.426747: | libevent_malloc: new ptr-libevent@0x55f2f3884de8 size 16 Aug 26 18:34:00.426754: | setup callback for interface lo 127.0.0.1:4500 fd 22 Aug 26 18:34:00.426757: | add_fd_read_event_handler: new ethX-pe@0x55f2f3884e28 Aug 26 18:34:00.426762: | libevent_malloc: new ptr-libevent@0x55f2f380cb98 size 128 Aug 26 18:34:00.426765: | libevent_malloc: new ptr-libevent@0x55f2f3884e98 size 16 Aug 26 18:34:00.426770: | setup callback for interface lo 127.0.0.1:500 fd 21 Aug 26 18:34:00.426773: | add_fd_read_event_handler: new ethX-pe@0x55f2f3884ed8 Aug 26 18:34:00.426776: | libevent_malloc: new ptr-libevent@0x55f2f380ca98 size 128 Aug 26 18:34:00.426779: | libevent_malloc: new ptr-libevent@0x55f2f3884f48 size 16 Aug 26 18:34:00.426784: | setup callback for interface eth0 192.0.1.254:4500 fd 20 Aug 26 18:34:00.426787: | add_fd_read_event_handler: new ethX-pe@0x55f2f3884f88 Aug 26 18:34:00.426791: | libevent_malloc: new ptr-libevent@0x55f2f380fa08 size 128 Aug 26 18:34:00.426794: | libevent_malloc: new ptr-libevent@0x55f2f3884ff8 size 16 Aug 26 18:34:00.426799: | setup callback for interface eth0 192.0.1.254:500 fd 19 Aug 26 18:34:00.426801: | add_fd_read_event_handler: new ethX-pe@0x55f2f3885038 Aug 26 18:34:00.426805: | libevent_malloc: new ptr-libevent@0x55f2f37e34e8 size 128 Aug 26 18:34:00.426808: | libevent_malloc: new ptr-libevent@0x55f2f38850a8 size 16 Aug 26 18:34:00.426813: | setup callback for interface eth1 192.1.2.45:4500 fd 18 Aug 26 18:34:00.426816: | add_fd_read_event_handler: new ethX-pe@0x55f2f38850e8 Aug 26 18:34:00.426819: | libevent_malloc: new ptr-libevent@0x55f2f37e31d8 size 128 Aug 26 18:34:00.426821: | libevent_malloc: new ptr-libevent@0x55f2f3885158 size 16 Aug 26 18:34:00.426826: | setup callback for interface eth1 192.1.2.45:500 fd 17 Aug 26 18:34:00.426832: | certs and keys locked by 'free_preshared_secrets' Aug 26 18:34:00.426835: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 18:34:00.426855: loading secrets from "/etc/ipsec.secrets" Aug 26 18:34:00.426869: | id type added to secret(0x55f2f37deb58) PKK_PSK: @west Aug 26 18:34:00.426873: | id type added to secret(0x55f2f37deb58) PKK_PSK: @east Aug 26 18:34:00.426878: | Processing PSK at line 1: passed Aug 26 18:34:00.426880: | certs and keys locked by 'process_secret' Aug 26 18:34:00.426884: | certs and keys unlocked by 'process_secret' Aug 26 18:34:00.426895: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:34:00.426903: | spent 1.2 milliseconds in whack Aug 26 18:34:00.448918: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:34:00.448940: listening for IKE messages Aug 26 18:34:00.448969: | Inspecting interface lo Aug 26 18:34:00.448974: | found lo with address 127.0.0.1 Aug 26 18:34:00.448976: | Inspecting interface eth0 Aug 26 18:34:00.448979: | found eth0 with address 192.0.1.254 Aug 26 18:34:00.448981: | Inspecting interface eth1 Aug 26 18:34:00.448984: | found eth1 with address 192.1.2.45 Aug 26 18:34:00.449318: | no interfaces to sort Aug 26 18:34:00.449347: | libevent_free: release ptr-libevent@0x55f2f38790d8 Aug 26 18:34:00.449350: | free_event_entry: release EVENT_NULL-pe@0x55f2f3884d78 Aug 26 18:34:00.449352: | add_fd_read_event_handler: new ethX-pe@0x55f2f3884d78 Aug 26 18:34:00.449355: | libevent_malloc: new ptr-libevent@0x55f2f38790d8 size 128 Aug 26 18:34:00.449359: | setup callback for interface lo 127.0.0.1:4500 fd 22 Aug 26 18:34:00.449362: | libevent_free: release ptr-libevent@0x55f2f380cb98 Aug 26 18:34:00.449364: | free_event_entry: release EVENT_NULL-pe@0x55f2f3884e28 Aug 26 18:34:00.449366: | add_fd_read_event_handler: new ethX-pe@0x55f2f3884e28 Aug 26 18:34:00.449368: | libevent_malloc: new ptr-libevent@0x55f2f380cb98 size 128 Aug 26 18:34:00.449371: | setup callback for interface lo 127.0.0.1:500 fd 21 Aug 26 18:34:00.449373: | libevent_free: release ptr-libevent@0x55f2f380ca98 Aug 26 18:34:00.449375: | free_event_entry: release EVENT_NULL-pe@0x55f2f3884ed8 Aug 26 18:34:00.449377: | add_fd_read_event_handler: new ethX-pe@0x55f2f3884ed8 Aug 26 18:34:00.449378: | libevent_malloc: new ptr-libevent@0x55f2f380ca98 size 128 Aug 26 18:34:00.449381: | setup callback for interface eth0 192.0.1.254:4500 fd 20 Aug 26 18:34:00.449384: | libevent_free: release ptr-libevent@0x55f2f380fa08 Aug 26 18:34:00.449386: | free_event_entry: release EVENT_NULL-pe@0x55f2f3884f88 Aug 26 18:34:00.449387: | add_fd_read_event_handler: new ethX-pe@0x55f2f3884f88 Aug 26 18:34:00.449389: | libevent_malloc: new ptr-libevent@0x55f2f380fa08 size 128 Aug 26 18:34:00.449392: | setup callback for interface eth0 192.0.1.254:500 fd 19 Aug 26 18:34:00.449395: | libevent_free: release ptr-libevent@0x55f2f37e34e8 Aug 26 18:34:00.449396: | free_event_entry: release EVENT_NULL-pe@0x55f2f3885038 Aug 26 18:34:00.449398: | add_fd_read_event_handler: new ethX-pe@0x55f2f3885038 Aug 26 18:34:00.449400: | libevent_malloc: new ptr-libevent@0x55f2f37e34e8 size 128 Aug 26 18:34:00.449403: | setup callback for interface eth1 192.1.2.45:4500 fd 18 Aug 26 18:34:00.449405: | libevent_free: release ptr-libevent@0x55f2f37e31d8 Aug 26 18:34:00.449407: | free_event_entry: release EVENT_NULL-pe@0x55f2f38850e8 Aug 26 18:34:00.449408: | add_fd_read_event_handler: new ethX-pe@0x55f2f38850e8 Aug 26 18:34:00.449410: | libevent_malloc: new ptr-libevent@0x55f2f37e31d8 size 128 Aug 26 18:34:00.449413: | setup callback for interface eth1 192.1.2.45:500 fd 17 Aug 26 18:34:00.449415: | certs and keys locked by 'free_preshared_secrets' Aug 26 18:34:00.449417: forgetting secrets Aug 26 18:34:00.449423: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 18:34:00.449436: loading secrets from "/etc/ipsec.secrets" Aug 26 18:34:00.449443: | id type added to secret(0x55f2f37deb58) PKK_PSK: @west Aug 26 18:34:00.449445: | id type added to secret(0x55f2f37deb58) PKK_PSK: @east Aug 26 18:34:00.449448: | Processing PSK at line 1: passed Aug 26 18:34:00.449450: | certs and keys locked by 'process_secret' Aug 26 18:34:00.449451: | certs and keys unlocked by 'process_secret' Aug 26 18:34:00.449459: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:34:00.449464: | spent 0.526 milliseconds in whack Aug 26 18:34:00.449991: | processing signal PLUTO_SIGCHLD Aug 26 18:34:00.450004: | waitpid returned pid 1893 (exited with status 0) Aug 26 18:34:00.450007: | reaped addconn helper child (status 0) Aug 26 18:34:00.450011: | waitpid returned ECHILD (no child processes left) Aug 26 18:34:00.450015: | spent 0.0154 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 18:34:00.514935: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:34:00.514959: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:34:00.514964: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 18:34:00.514967: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:34:00.514970: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 18:34:00.514974: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:34:00.514983: | Added new connection west with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 18:34:00.515047: | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 Aug 26 18:34:00.515052: | from whack: got --esp= Aug 26 18:34:00.515090: | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 Aug 26 18:34:00.515096: | counting wild cards for @west is 0 Aug 26 18:34:00.515100: | counting wild cards for @east is 0 Aug 26 18:34:00.515111: | connect_to_host_pair: 192.1.2.45:500 192.1.2.23:500 -> hp@(nil): none Aug 26 18:34:00.515114: | new hp@0x55f2f38875a8 Aug 26 18:34:00.515119: added connection description "west" Aug 26 18:34:00.515131: | ike_life: 30s; ipsec_life: 28800s; rekey_margin: 5s; rekey_fuzz: 0%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 18:34:00.515144: | 192.0.1.0/24===192.1.2.45<192.1.2.45>[@west]...192.1.2.23<192.1.2.23>[@east]===192.0.2.0/24 Aug 26 18:34:00.515153: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:34:00.515161: | spent 0.236 milliseconds in whack Aug 26 18:34:00.515199: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:34:00.515209: add keyid @west Aug 26 18:34:00.515213: | add pubkey 01 03 a6 f5 d6 3f e3 8f 6c 01 6a fc 7b 7c 6d 57 Aug 26 18:34:00.515216: | add pubkey 8b 49 39 0d 77 f7 ac e2 85 f1 98 1e 4b 6d a5 3e Aug 26 18:34:00.515218: | add pubkey b3 96 9a d1 99 5a bc 10 f2 97 de f2 28 f9 5f 92 Aug 26 18:34:00.515221: | add pubkey 09 f0 c8 d4 12 e4 60 6e 9c 60 98 10 01 7d 26 b7 Aug 26 18:34:00.515224: | add pubkey 8f 95 62 2d 87 dd cd de f6 d3 8f 35 b0 50 d0 18 Aug 26 18:34:00.515226: | add pubkey f5 99 f8 04 f1 ff 61 5b bc 7f 1f c0 04 d8 e4 8c Aug 26 18:34:00.515229: | add pubkey ac 34 ad 7a c1 da 3c 2d 8c 30 ae d6 3c 59 b1 3a Aug 26 18:34:00.515231: | add pubkey 94 d3 d5 2a 73 91 bd 59 5f 3e 72 bf 4a 1b 9d c5 Aug 26 18:34:00.515234: | add pubkey b2 2b 4d e7 0d 24 3e 77 f9 7f 2d d6 9d 29 ef 70 Aug 26 18:34:00.515236: | add pubkey 7d 7a 6d a2 b8 61 0c 4b 09 4a 06 71 84 70 85 9a Aug 26 18:34:00.515239: | add pubkey 8f 52 a1 80 06 fd c6 fc 3e 27 fa 16 fa 32 83 a9 Aug 26 18:34:00.515242: | add pubkey ca 80 db 0f 4a bf f7 e9 55 8e bd 29 4d 23 a6 dc Aug 26 18:34:00.515244: | add pubkey 2a b3 5d 62 a9 21 1e be 83 d8 69 3c 03 0a 48 8e Aug 26 18:34:00.515247: | add pubkey d3 3a 11 f2 86 5a d1 30 65 bd c8 f4 83 87 ff 04 Aug 26 18:34:00.515249: | add pubkey 87 33 05 4f e0 d8 8c fe b3 19 4c dd 85 40 f3 4d Aug 26 18:34:00.515252: | add pubkey 6e e8 49 14 06 2c 1f 59 59 05 8f 20 b0 ca 46 3f Aug 26 18:34:00.515254: | add pubkey c9 20 7e 04 30 7d 9a 80 6c 3f 0a 89 f7 d3 af d8 Aug 26 18:34:00.515257: | add pubkey 15 04 37 f9 Aug 26 18:34:00.515302: | computed rsa CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 Aug 26 18:34:00.515308: | computed rsa CKAID 7f 0f 03 50 Aug 26 18:34:00.515320: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:34:00.515326: | spent 0.128 milliseconds in whack Aug 26 18:34:00.515357: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:34:00.515367: add keyid @east Aug 26 18:34:00.515372: | add pubkey 01 03 bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b Aug 26 18:34:00.515375: | add pubkey e5 16 c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 Aug 26 18:34:00.515377: | add pubkey 85 7a e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c Aug 26 18:34:00.515380: | add pubkey 78 ca 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 Aug 26 18:34:00.515386: | add pubkey 21 c9 f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d Aug 26 18:34:00.515389: | add pubkey d2 67 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 Aug 26 18:34:00.515391: | add pubkey 62 cd 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce Aug 26 18:34:00.515394: | add pubkey 62 b5 af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e Aug 26 18:34:00.515397: | add pubkey bb 23 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d Aug 26 18:34:00.515399: | add pubkey ac 47 f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce Aug 26 18:34:00.515402: | add pubkey e0 98 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a Aug 26 18:34:00.515404: | add pubkey 92 b8 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 Aug 26 18:34:00.515407: | add pubkey 4d 58 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 Aug 26 18:34:00.515410: | add pubkey 5f 56 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 Aug 26 18:34:00.515413: | add pubkey d5 f1 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c Aug 26 18:34:00.515415: | add pubkey 47 cc 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 Aug 26 18:34:00.515418: | add pubkey 07 8f 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 Aug 26 18:34:00.515420: | add pubkey 51 51 48 ef Aug 26 18:34:00.515431: | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Aug 26 18:34:00.515434: | computed rsa CKAID 8a 82 25 f1 Aug 26 18:34:00.515443: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:34:00.515449: | spent 0.0957 milliseconds in whack Aug 26 18:34:00.629119: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:34:00.629143: | dup_any(fd@16) -> fd@23 (in whack_process() at rcv_whack.c:590) Aug 26 18:34:00.629148: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:34:00.629154: | start processing: connection "west" (in initiate_a_connection() at initiate.c:186) Aug 26 18:34:00.629157: | connection 'west' +POLICY_UP Aug 26 18:34:00.629161: | dup_any(fd@23) -> fd@24 (in initiate_a_connection() at initiate.c:342) Aug 26 18:34:00.629164: | FOR_EACH_STATE_... in find_phase1_state Aug 26 18:34:00.629191: | creating state object #1 at 0x55f2f3887d18 Aug 26 18:34:00.629196: | State DB: adding IKEv2 state #1 in UNDEFINED Aug 26 18:34:00.629204: | pstats #1 ikev2.ike started Aug 26 18:34:00.629208: | Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 Aug 26 18:34:00.629211: | parent state #1: UNDEFINED(ignore) => PARENT_I0(ignore) Aug 26 18:34:00.629218: | Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 Aug 26 18:34:00.629226: | suspend processing: connection "west" (in ikev2_parent_outI1() at ikev2_parent.c:535) Aug 26 18:34:00.629231: | start processing: state #1 connection "west" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) Aug 26 18:34:00.629235: | dup_any(fd@24) -> fd@25 (in ikev2_parent_outI1() at ikev2_parent.c:551) Aug 26 18:34:00.629240: | Queuing pending IPsec SA negotiating with 192.1.2.23 "west" IKE SA #1 "west" Aug 26 18:34:00.629245: "west" #1: initiating v2 parent SA Aug 26 18:34:00.629257: | constructing local IKE proposals for west (IKE SA initiator selecting KE) Aug 26 18:34:00.629267: | converting ike_info AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 18:34:00.629277: | ... ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 18:34:00.629282: | converting ike_info AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 18:34:00.629304: | ... ikev2_proposal: 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 18:34:00.629310: | converting ike_info AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 18:34:00.629319: | ... ikev2_proposal: 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 18:34:00.629321: | converting ike_info AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 18:34:00.629325: | ... ikev2_proposal: 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 18:34:00.629331: "west": constructed local IKE proposals for west (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 18:34:00.629340: | adding ikev2_outI1 KE work-order 1 for state #1 Aug 26 18:34:00.629343: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55f2f3887688 Aug 26 18:34:00.629346: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 18:34:00.629349: | libevent_malloc: new ptr-libevent@0x55f2f3887b88 size 128 Aug 26 18:34:00.629362: | #1 spent 0.192 milliseconds in ikev2_parent_outI1() Aug 26 18:34:00.629364: | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) Aug 26 18:34:00.629367: | crypto helper 0 resuming Aug 26 18:34:00.629367: | RESET processing: state #1 connection "west" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) Aug 26 18:34:00.629384: | crypto helper 0 starting work-order 1 for state #1 Aug 26 18:34:00.629388: | RESET processing: connection "west" (in ikev2_parent_outI1() at ikev2_parent.c:610) Aug 26 18:34:00.629391: | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 1 Aug 26 18:34:00.629392: | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) Aug 26 18:34:00.629401: | close_any(fd@23) (in initiate_connection() at initiate.c:372) Aug 26 18:34:00.629405: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:34:00.629410: | spent 0.282 milliseconds in whack Aug 26 18:34:00.630473: | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 1 time elapsed 0.001082 seconds Aug 26 18:34:00.630488: | (#1) spent 1.08 milliseconds in crypto helper computing work-order 1: ikev2_outI1 KE (pcr) Aug 26 18:34:00.630491: | crypto helper 0 sending results from work-order 1 for state #1 to event queue Aug 26 18:34:00.630495: | scheduling resume sending helper answer for #1 Aug 26 18:34:00.630498: | libevent_malloc: new ptr-libevent@0x7f9afc002888 size 128 Aug 26 18:34:00.630507: | crypto helper 0 waiting (nothing to do) Aug 26 18:34:00.630517: | processing resume sending helper answer for #1 Aug 26 18:34:00.630530: | start processing: state #1 connection "west" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 18:34:00.630535: | crypto helper 0 replies to request ID 1 Aug 26 18:34:00.630538: | calling continuation function 0x55f2f1d2ab50 Aug 26 18:34:00.630541: | ikev2_parent_outI1_continue for #1 Aug 26 18:34:00.630573: | **emit ISAKMP Message: Aug 26 18:34:00.630577: | initiator cookie: Aug 26 18:34:00.630580: | d3 c7 17 ff 29 c7 6c 97 Aug 26 18:34:00.630583: | responder cookie: Aug 26 18:34:00.630585: | 00 00 00 00 00 00 00 00 Aug 26 18:34:00.630589: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:34:00.630592: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 18:34:00.630599: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Aug 26 18:34:00.630603: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 18:34:00.630605: | Message ID: 0 (0x0) Aug 26 18:34:00.630609: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:34:00.630626: | using existing local IKE proposals for connection west (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 18:34:00.630630: | Emitting ikev2_proposals ... Aug 26 18:34:00.630633: | ***emit IKEv2 Security Association Payload: Aug 26 18:34:00.630636: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:34:00.630639: | flags: none (0x0) Aug 26 18:34:00.630643: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Aug 26 18:34:00.630646: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:34:00.630649: | discarding INTEG=NONE Aug 26 18:34:00.630652: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 18:34:00.630655: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:34:00.630658: | prop #: 1 (0x1) Aug 26 18:34:00.630661: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 18:34:00.630663: | spi size: 0 (0x0) Aug 26 18:34:00.630666: | # transforms: 11 (0xb) Aug 26 18:34:00.630669: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 18:34:00.630672: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.630675: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630678: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:34:00.630681: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 18:34:00.630684: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.630687: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 18:34:00.630690: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:34:00.630693: | length/value: 256 (0x100) Aug 26 18:34:00.630696: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 18:34:00.630699: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.630702: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630704: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:34:00.630707: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 18:34:00.630711: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630714: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.630717: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.630720: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.630723: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630725: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:34:00.630728: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 18:34:00.630732: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630737: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.630740: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.630743: | discarding INTEG=NONE Aug 26 18:34:00.630745: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.630748: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630751: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.630754: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 18:34:00.630757: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630760: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.630763: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.630766: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.630768: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630771: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.630774: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 18:34:00.630777: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630780: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.630783: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.630786: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.630788: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630791: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.630794: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 18:34:00.630797: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630800: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.630803: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.630806: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.630808: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630811: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.630814: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 18:34:00.630817: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630820: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.630823: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.630825: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.630828: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630831: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.630833: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 18:34:00.630836: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630839: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.630842: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.630845: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.630847: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630850: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.630853: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 18:34:00.630858: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630862: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.630865: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.630867: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.630870: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630873: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.630875: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 18:34:00.630879: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630882: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.630885: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.630887: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.630890: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:34:00.630893: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.630896: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 18:34:00.630899: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630902: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.630905: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.630908: | emitting length of IKEv2 Proposal Substructure Payload: 100 Aug 26 18:34:00.630911: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 18:34:00.630913: | discarding INTEG=NONE Aug 26 18:34:00.630916: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 18:34:00.630919: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:34:00.630922: | prop #: 2 (0x2) Aug 26 18:34:00.630924: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 18:34:00.630927: | spi size: 0 (0x0) Aug 26 18:34:00.630930: | # transforms: 11 (0xb) Aug 26 18:34:00.630934: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:34:00.630937: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 18:34:00.630940: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.630943: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630946: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:34:00.630948: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 18:34:00.630952: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.630955: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 18:34:00.630958: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:34:00.630961: | length/value: 128 (0x80) Aug 26 18:34:00.630964: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 18:34:00.630966: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.630969: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630971: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:34:00.630974: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 18:34:00.630977: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630980: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.630986: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.630988: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.630991: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.630994: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:34:00.630996: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 18:34:00.630999: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631002: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631005: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631007: | discarding INTEG=NONE Aug 26 18:34:00.631010: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631013: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631015: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631018: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 18:34:00.631021: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631024: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631027: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631029: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631032: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631035: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631037: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 18:34:00.631040: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631043: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631046: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631049: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631051: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631054: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631057: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 18:34:00.631060: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631063: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631065: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631068: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631071: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631073: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631076: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 18:34:00.631079: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631082: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631085: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631088: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631091: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631093: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631096: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 18:34:00.631103: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631106: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631109: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631111: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631114: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631117: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631119: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 18:34:00.631123: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631126: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631128: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631131: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631133: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631136: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631139: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 18:34:00.631142: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631145: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631148: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631150: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631153: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:34:00.631156: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631159: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 18:34:00.631162: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631165: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631168: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631170: | emitting length of IKEv2 Proposal Substructure Payload: 100 Aug 26 18:34:00.631173: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 18:34:00.631176: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 18:34:00.631179: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:34:00.631182: | prop #: 3 (0x3) Aug 26 18:34:00.631184: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 18:34:00.631187: | spi size: 0 (0x0) Aug 26 18:34:00.631189: | # transforms: 13 (0xd) Aug 26 18:34:00.631193: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:34:00.631196: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 18:34:00.631199: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631202: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631204: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:34:00.631207: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 18:34:00.631210: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631213: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 18:34:00.631216: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:34:00.631220: | length/value: 256 (0x100) Aug 26 18:34:00.631223: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 18:34:00.631226: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631229: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631232: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:34:00.631234: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 18:34:00.631237: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631240: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631243: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631246: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631249: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631252: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:34:00.631255: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 18:34:00.631259: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631262: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631265: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631268: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631271: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631274: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 18:34:00.631277: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 18:34:00.631280: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631284: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631287: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631298: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631300: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631303: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 18:34:00.631305: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 18:34:00.631308: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631311: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631314: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631316: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631319: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631321: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631324: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 18:34:00.631327: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631330: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631332: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631335: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631338: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631341: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631344: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 18:34:00.631347: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631352: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631355: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631358: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631360: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631362: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631365: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 18:34:00.631369: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631372: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631375: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631378: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631380: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631383: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631385: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 18:34:00.631389: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631392: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631394: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631397: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631400: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631402: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631405: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 18:34:00.631408: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631411: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631414: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631417: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631419: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631422: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631425: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 18:34:00.631428: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631431: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631434: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631437: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631439: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631442: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631445: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 18:34:00.631448: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631451: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631454: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631457: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631460: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:34:00.631463: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631467: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 18:34:00.631470: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631473: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631476: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631479: | emitting length of IKEv2 Proposal Substructure Payload: 116 Aug 26 18:34:00.631482: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 18:34:00.631485: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 18:34:00.631488: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 18:34:00.631491: | prop #: 4 (0x4) Aug 26 18:34:00.631493: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 18:34:00.631496: | spi size: 0 (0x0) Aug 26 18:34:00.631499: | # transforms: 13 (0xd) Aug 26 18:34:00.631502: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:34:00.631505: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 18:34:00.631508: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631511: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631514: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:34:00.631516: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 18:34:00.631519: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631522: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 18:34:00.631525: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:34:00.631528: | length/value: 128 (0x80) Aug 26 18:34:00.631531: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 18:34:00.631534: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631536: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631539: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:34:00.631542: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 18:34:00.631545: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631548: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631551: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631554: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631556: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631559: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:34:00.631562: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 18:34:00.631565: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631569: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631572: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631575: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631578: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631581: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 18:34:00.631584: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 18:34:00.631587: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631590: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631594: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631597: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631600: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631603: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 18:34:00.631605: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 18:34:00.631608: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631611: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631614: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631617: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631620: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631622: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631625: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 18:34:00.631628: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631632: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631635: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631637: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631640: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631643: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631645: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 18:34:00.631649: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631652: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631655: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631657: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631660: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631663: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631665: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 18:34:00.631669: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631672: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631674: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631677: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631680: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631682: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631685: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 18:34:00.631688: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631691: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631694: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631697: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631699: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631702: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631705: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 18:34:00.631709: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631714: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631717: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631720: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631723: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631725: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631728: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 18:34:00.631731: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631734: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631737: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631740: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631743: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631745: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631748: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 18:34:00.631751: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631754: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631757: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631760: | *****emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.631762: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:34:00.631765: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.631768: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 18:34:00.631770: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.631773: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.631776: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.631779: | emitting length of IKEv2 Proposal Substructure Payload: 116 Aug 26 18:34:00.631783: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 18:34:00.631786: | emitting length of IKEv2 Security Association Payload: 436 Aug 26 18:34:00.631789: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Aug 26 18:34:00.631792: | ***emit IKEv2 Key Exchange Payload: Aug 26 18:34:00.631796: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:34:00.631798: | flags: none (0x0) Aug 26 18:34:00.631801: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 18:34:00.631804: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) Aug 26 18:34:00.631807: | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' Aug 26 18:34:00.631811: | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload Aug 26 18:34:00.631814: | ikev2 g^x 93 0f b3 30 bc b2 96 7d f4 51 8e e0 4d 03 a5 a6 Aug 26 18:34:00.631817: | ikev2 g^x d5 cb 23 53 f4 5f e2 0a 37 50 dd d8 77 9f eb c7 Aug 26 18:34:00.631820: | ikev2 g^x 27 b0 28 22 a8 88 b5 9d eb 72 dc 6d e2 48 b7 ad Aug 26 18:34:00.631822: | ikev2 g^x 0d a7 ae 4c ad a9 a7 e2 11 2d 30 78 27 7c b1 68 Aug 26 18:34:00.631825: | ikev2 g^x 75 6d 9e 8a 34 09 f5 98 a0 2e 5b 87 7e a1 9a 71 Aug 26 18:34:00.631830: | ikev2 g^x 60 0d db f1 7d 51 5d 5e 4d a2 b2 45 2a 67 45 84 Aug 26 18:34:00.631833: | ikev2 g^x af 7b e4 8f f3 87 a7 f3 cd 9f 9c 58 5c 45 ed 2a Aug 26 18:34:00.631835: | ikev2 g^x dc d0 08 79 9a 79 ff ab 4e 0d 5a 8d df 88 77 9b Aug 26 18:34:00.631838: | ikev2 g^x 03 c0 7d db e2 57 50 4f dc 5f 36 d7 1b f5 af fb Aug 26 18:34:00.631840: | ikev2 g^x 82 93 aa 0a e8 f0 74 0c 77 5b 8d be af f8 9f 36 Aug 26 18:34:00.631843: | ikev2 g^x ba c8 66 1a 8f cd be 86 84 57 39 6f b7 60 38 69 Aug 26 18:34:00.631845: | ikev2 g^x 0c 28 f1 da 50 a0 0b d2 d9 0e 3f b2 41 87 37 a6 Aug 26 18:34:00.631848: | ikev2 g^x 4f b0 fc 56 1b 29 22 85 d9 df 57 b9 1f 98 8d 54 Aug 26 18:34:00.631850: | ikev2 g^x eb a6 7e 29 61 08 e6 56 e4 62 1b 4d 22 1a d6 22 Aug 26 18:34:00.631853: | ikev2 g^x eb 37 1a 43 2c 8e 9f cb 4b 63 1c aa ba f3 29 f3 Aug 26 18:34:00.631855: | ikev2 g^x f5 38 a3 a4 10 74 dc a0 9d bd c7 73 7e ec 18 47 Aug 26 18:34:00.631858: | emitting length of IKEv2 Key Exchange Payload: 264 Aug 26 18:34:00.631861: | ***emit IKEv2 Nonce Payload: Aug 26 18:34:00.631863: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 18:34:00.631866: | flags: none (0x0) Aug 26 18:34:00.631869: | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N Aug 26 18:34:00.631872: | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Aug 26 18:34:00.631875: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' Aug 26 18:34:00.631879: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Aug 26 18:34:00.631882: | IKEv2 nonce b9 0d 99 1e 4e 82 1c 4c 32 36 aa d3 94 8f 30 62 Aug 26 18:34:00.631885: | IKEv2 nonce a5 e6 b6 ef 53 ee 6a 35 07 4e 59 34 5d b2 6c 67 Aug 26 18:34:00.631887: | emitting length of IKEv2 Nonce Payload: 36 Aug 26 18:34:00.631890: | Adding a v2N Payload Aug 26 18:34:00.631893: | ***emit IKEv2 Notify Payload: Aug 26 18:34:00.631896: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:34:00.631898: | flags: none (0x0) Aug 26 18:34:00.631901: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 18:34:00.631904: | SPI size: 0 (0x0) Aug 26 18:34:00.631907: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Aug 26 18:34:00.631910: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 18:34:00.631913: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 18:34:00.631916: | emitting length of IKEv2 Notify Payload: 8 Aug 26 18:34:00.631920: | NAT-Traversal support [enabled] add v2N payloads. Aug 26 18:34:00.631923: | natd_hash: rcookie is zero Aug 26 18:34:00.631939: | natd_hash: hasher=0x55f2f1dff800(20) Aug 26 18:34:00.631942: | natd_hash: icookie= d3 c7 17 ff 29 c7 6c 97 Aug 26 18:34:00.631945: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Aug 26 18:34:00.631947: | natd_hash: ip= c0 01 02 2d Aug 26 18:34:00.631950: | natd_hash: port=500 Aug 26 18:34:00.631953: | natd_hash: hash= 7a c3 9a bb 00 05 5d 9a 25 96 c4 4f 47 c5 95 0e Aug 26 18:34:00.631955: | natd_hash: hash= c7 54 0e 30 Aug 26 18:34:00.631958: | Adding a v2N Payload Aug 26 18:34:00.631961: | ***emit IKEv2 Notify Payload: Aug 26 18:34:00.631964: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:34:00.631966: | flags: none (0x0) Aug 26 18:34:00.631969: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 18:34:00.631972: | SPI size: 0 (0x0) Aug 26 18:34:00.631975: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Aug 26 18:34:00.631978: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 18:34:00.631981: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 18:34:00.631984: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Aug 26 18:34:00.631989: | Notify data 7a c3 9a bb 00 05 5d 9a 25 96 c4 4f 47 c5 95 0e Aug 26 18:34:00.631991: | Notify data c7 54 0e 30 Aug 26 18:34:00.631994: | emitting length of IKEv2 Notify Payload: 28 Aug 26 18:34:00.631996: | natd_hash: rcookie is zero Aug 26 18:34:00.632003: | natd_hash: hasher=0x55f2f1dff800(20) Aug 26 18:34:00.632006: | natd_hash: icookie= d3 c7 17 ff 29 c7 6c 97 Aug 26 18:34:00.632009: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Aug 26 18:34:00.632012: | natd_hash: ip= c0 01 02 17 Aug 26 18:34:00.632014: | natd_hash: port=500 Aug 26 18:34:00.632017: | natd_hash: hash= ca aa e8 cd 5f 10 99 5e ca f7 e7 18 70 c7 0b b3 Aug 26 18:34:00.632020: | natd_hash: hash= b4 b3 42 18 Aug 26 18:34:00.632022: | Adding a v2N Payload Aug 26 18:34:00.632025: | ***emit IKEv2 Notify Payload: Aug 26 18:34:00.632028: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:34:00.632030: | flags: none (0x0) Aug 26 18:34:00.632033: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 18:34:00.632035: | SPI size: 0 (0x0) Aug 26 18:34:00.632038: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Aug 26 18:34:00.632041: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 18:34:00.632044: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 18:34:00.632047: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Aug 26 18:34:00.632050: | Notify data ca aa e8 cd 5f 10 99 5e ca f7 e7 18 70 c7 0b b3 Aug 26 18:34:00.632053: | Notify data b4 b3 42 18 Aug 26 18:34:00.632055: | emitting length of IKEv2 Notify Payload: 28 Aug 26 18:34:00.632058: | emitting length of ISAKMP Message: 828 Aug 26 18:34:00.632066: | stop processing: state #1 connection "west" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) Aug 26 18:34:00.632077: | start processing: state #1 connection "west" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 18:34:00.632081: | #1 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK Aug 26 18:34:00.632084: | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 Aug 26 18:34:00.632088: | parent state #1: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) Aug 26 18:34:00.632092: | Message ID: updating counters for #1 to 4294967295 after switching state Aug 26 18:34:00.632095: | Message ID: IKE #1 skipping update_recv as MD is fake Aug 26 18:34:00.632100: | Message ID: sent #1 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 Aug 26 18:34:00.632103: "west" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 Aug 26 18:34:00.632116: | sending V2 reply packet to 192.1.2.23:500 (from 192.1.2.45:500) Aug 26 18:34:00.632127: | sending 828 bytes for STATE_PARENT_I0 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) Aug 26 18:34:00.632130: | d3 c7 17 ff 29 c7 6c 97 00 00 00 00 00 00 00 00 Aug 26 18:34:00.632133: | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 Aug 26 18:34:00.632135: | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 Aug 26 18:34:00.632138: | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 Aug 26 18:34:00.632140: | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 Aug 26 18:34:00.632143: | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 Aug 26 18:34:00.632145: | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 Aug 26 18:34:00.632148: | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 Aug 26 18:34:00.632150: | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c Aug 26 18:34:00.632152: | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 Aug 26 18:34:00.632155: | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e Aug 26 18:34:00.632157: | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 Aug 26 18:34:00.632159: | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 Aug 26 18:34:00.632162: | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 Aug 26 18:34:00.632166: | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d Aug 26 18:34:00.632169: | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 Aug 26 18:34:00.632172: | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 Aug 26 18:34:00.632174: | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 Aug 26 18:34:00.632176: | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 Aug 26 18:34:00.632179: | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 Aug 26 18:34:00.632182: | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 Aug 26 18:34:00.632184: | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 Aug 26 18:34:00.632186: | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 Aug 26 18:34:00.632189: | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 Aug 26 18:34:00.632191: | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c Aug 26 18:34:00.632193: | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f Aug 26 18:34:00.632196: | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 Aug 26 18:34:00.632198: | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 Aug 26 18:34:00.632201: | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f Aug 26 18:34:00.632203: | 28 00 01 08 00 0e 00 00 93 0f b3 30 bc b2 96 7d Aug 26 18:34:00.632206: | f4 51 8e e0 4d 03 a5 a6 d5 cb 23 53 f4 5f e2 0a Aug 26 18:34:00.632209: | 37 50 dd d8 77 9f eb c7 27 b0 28 22 a8 88 b5 9d Aug 26 18:34:00.632211: | eb 72 dc 6d e2 48 b7 ad 0d a7 ae 4c ad a9 a7 e2 Aug 26 18:34:00.632213: | 11 2d 30 78 27 7c b1 68 75 6d 9e 8a 34 09 f5 98 Aug 26 18:34:00.632216: | a0 2e 5b 87 7e a1 9a 71 60 0d db f1 7d 51 5d 5e Aug 26 18:34:00.632218: | 4d a2 b2 45 2a 67 45 84 af 7b e4 8f f3 87 a7 f3 Aug 26 18:34:00.632220: | cd 9f 9c 58 5c 45 ed 2a dc d0 08 79 9a 79 ff ab Aug 26 18:34:00.632223: | 4e 0d 5a 8d df 88 77 9b 03 c0 7d db e2 57 50 4f Aug 26 18:34:00.632225: | dc 5f 36 d7 1b f5 af fb 82 93 aa 0a e8 f0 74 0c Aug 26 18:34:00.632228: | 77 5b 8d be af f8 9f 36 ba c8 66 1a 8f cd be 86 Aug 26 18:34:00.632230: | 84 57 39 6f b7 60 38 69 0c 28 f1 da 50 a0 0b d2 Aug 26 18:34:00.632233: | d9 0e 3f b2 41 87 37 a6 4f b0 fc 56 1b 29 22 85 Aug 26 18:34:00.632236: | d9 df 57 b9 1f 98 8d 54 eb a6 7e 29 61 08 e6 56 Aug 26 18:34:00.632239: | e4 62 1b 4d 22 1a d6 22 eb 37 1a 43 2c 8e 9f cb Aug 26 18:34:00.632241: | 4b 63 1c aa ba f3 29 f3 f5 38 a3 a4 10 74 dc a0 Aug 26 18:34:00.632244: | 9d bd c7 73 7e ec 18 47 29 00 00 24 b9 0d 99 1e Aug 26 18:34:00.632246: | 4e 82 1c 4c 32 36 aa d3 94 8f 30 62 a5 e6 b6 ef Aug 26 18:34:00.632249: | 53 ee 6a 35 07 4e 59 34 5d b2 6c 67 29 00 00 08 Aug 26 18:34:00.632251: | 00 00 40 2e 29 00 00 1c 00 00 40 04 7a c3 9a bb Aug 26 18:34:00.632254: | 00 05 5d 9a 25 96 c4 4f 47 c5 95 0e c7 54 0e 30 Aug 26 18:34:00.632256: | 00 00 00 1c 00 00 40 05 ca aa e8 cd 5f 10 99 5e Aug 26 18:34:00.632259: | ca f7 e7 18 70 c7 0b b3 b4 b3 42 18 Aug 26 18:34:00.632348: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 18:34:00.632358: | libevent_free: release ptr-libevent@0x55f2f3887b88 Aug 26 18:34:00.632362: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55f2f3887688 Aug 26 18:34:00.632365: | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=15000ms Aug 26 18:34:00.632369: | event_schedule: new EVENT_RETRANSMIT-pe@0x55f2f3887688 Aug 26 18:34:00.632373: | inserting event EVENT_RETRANSMIT, timeout in 15 seconds for #1 Aug 26 18:34:00.632376: | libevent_malloc: new ptr-libevent@0x55f2f388a7a8 size 128 Aug 26 18:34:00.632382: | #1 STATE_PARENT_I1: retransmits: first event in 15 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29726.374835 Aug 26 18:34:00.632386: | resume sending helper answer for #1 suppresed complete_v2_state_transition() and stole MD Aug 26 18:34:00.632391: | #1 spent 1.79 milliseconds in resume sending helper answer Aug 26 18:34:00.632397: | stop processing: state #1 connection "west" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 18:34:00.632402: | libevent_free: release ptr-libevent@0x7f9afc002888 Aug 26 18:34:00.634966: | spent 0.00264 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:34:00.634987: | *received 432 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) Aug 26 18:34:00.634991: | d3 c7 17 ff 29 c7 6c 97 d6 87 4f e0 26 26 18 04 Aug 26 18:34:00.634994: | 21 20 22 20 00 00 00 00 00 00 01 b0 22 00 00 28 Aug 26 18:34:00.634996: | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 Aug 26 18:34:00.634999: | 80 0e 01 00 03 00 00 08 02 00 00 07 00 00 00 08 Aug 26 18:34:00.635001: | 04 00 00 0e 28 00 01 08 00 0e 00 00 4e d2 81 66 Aug 26 18:34:00.635004: | 56 d6 3d d3 09 a9 5d a8 98 18 5f 2b e5 7c d6 84 Aug 26 18:34:00.635006: | 88 a4 d4 5d 9b 1c 74 bf be f5 28 db f7 74 c2 8e Aug 26 18:34:00.635009: | d9 b2 53 c5 b0 2d b6 aa 78 57 3f 56 65 43 1a b2 Aug 26 18:34:00.635011: | ef 16 42 1b 3b 3f e0 3c 1f 8f 4b 1c 28 0d 0f 0a Aug 26 18:34:00.635014: | 5d b9 c7 82 b9 26 8c 11 b6 0b 19 e6 a6 3d 6c c9 Aug 26 18:34:00.635016: | 88 a2 a6 bd ee f8 51 8b ea ff f4 ca d5 a6 f7 52 Aug 26 18:34:00.635019: | b2 a2 81 1d 8f b5 9d 9d 2e 6d ee 90 90 cc 85 2d Aug 26 18:34:00.635021: | 06 23 66 48 1c 7c d7 2b 7e cf d4 c4 99 ee 99 58 Aug 26 18:34:00.635024: | b3 18 3a c4 7e eb 63 54 93 6f a7 f9 81 f7 49 8f Aug 26 18:34:00.635026: | a6 8c f8 3e 73 9f 5c 89 3e 85 f6 e7 a5 ae d9 99 Aug 26 18:34:00.635029: | c8 27 0a bc 46 aa 26 d4 85 b1 d5 60 c5 02 fc 95 Aug 26 18:34:00.635031: | b0 92 79 32 74 63 84 85 4f 61 6c 3c be 9d ea 92 Aug 26 18:34:00.635034: | 13 5a ed da 1f 4a bf 8d ca 90 8e 00 26 00 bb ae Aug 26 18:34:00.635036: | f4 7d 95 84 2d 7d 33 a4 5d a3 2b 6f 25 d2 9a 2a Aug 26 18:34:00.635039: | 25 3e 57 2a 82 c3 b8 f4 d9 da fa e9 ca 99 f9 48 Aug 26 18:34:00.635041: | eb 64 52 c3 5d 9c 2c aa b8 66 f0 3f 29 00 00 24 Aug 26 18:34:00.635044: | 19 6b 8c cf 40 45 a4 00 89 e9 55 f6 e9 b0 2f e4 Aug 26 18:34:00.635047: | f5 db dd ee 25 5b 8a 0c d4 3f 01 7a 37 2f 48 cf Aug 26 18:34:00.635049: | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 Aug 26 18:34:00.635051: | 34 91 8e 50 7f e1 7a ec ea ef fa a0 ef 57 ce b2 Aug 26 18:34:00.635054: | fa 4a dc 52 00 00 00 1c 00 00 40 05 5a a4 df f1 Aug 26 18:34:00.635056: | a1 7c b9 86 cf c4 2f da 3a e2 3e ec 4f 88 c4 ad Aug 26 18:34:00.635061: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 18:34:00.635065: | **parse ISAKMP Message: Aug 26 18:34:00.635067: | initiator cookie: Aug 26 18:34:00.635070: | d3 c7 17 ff 29 c7 6c 97 Aug 26 18:34:00.635073: | responder cookie: Aug 26 18:34:00.635075: | d6 87 4f e0 26 26 18 04 Aug 26 18:34:00.635078: | next payload type: ISAKMP_NEXT_v2SA (0x21) Aug 26 18:34:00.635081: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 18:34:00.635084: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Aug 26 18:34:00.635087: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Aug 26 18:34:00.635089: | Message ID: 0 (0x0) Aug 26 18:34:00.635092: | length: 432 (0x1b0) Aug 26 18:34:00.635095: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) Aug 26 18:34:00.635098: | I am the IKE SA Original Initiator receiving an IKEv2 IKE_SA_INIT response Aug 26 18:34:00.635102: | State DB: found IKEv2 state #1 in PARENT_I1 (find_v2_ike_sa_by_initiator_spi) Aug 26 18:34:00.635108: | start processing: state #1 connection "west" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) Aug 26 18:34:00.635113: | [RE]START processing: state #1 connection "west" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) Aug 26 18:34:00.635115: | #1 is idle Aug 26 18:34:00.635118: | #1 idle Aug 26 18:34:00.635120: | unpacking clear payload Aug 26 18:34:00.635123: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Aug 26 18:34:00.635126: | ***parse IKEv2 Security Association Payload: Aug 26 18:34:00.635129: | next payload type: ISAKMP_NEXT_v2KE (0x22) Aug 26 18:34:00.635134: | flags: none (0x0) Aug 26 18:34:00.635137: | length: 40 (0x28) Aug 26 18:34:00.635139: | processing payload: ISAKMP_NEXT_v2SA (len=36) Aug 26 18:34:00.635142: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) Aug 26 18:34:00.635145: | ***parse IKEv2 Key Exchange Payload: Aug 26 18:34:00.635148: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Aug 26 18:34:00.635150: | flags: none (0x0) Aug 26 18:34:00.635153: | length: 264 (0x108) Aug 26 18:34:00.635155: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 18:34:00.635158: | processing payload: ISAKMP_NEXT_v2KE (len=256) Aug 26 18:34:00.635161: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Aug 26 18:34:00.635163: | ***parse IKEv2 Nonce Payload: Aug 26 18:34:00.635166: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 18:34:00.635169: | flags: none (0x0) Aug 26 18:34:00.635171: | length: 36 (0x24) Aug 26 18:34:00.635174: | processing payload: ISAKMP_NEXT_v2Ni (len=32) Aug 26 18:34:00.635176: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 18:34:00.635179: | ***parse IKEv2 Notify Payload: Aug 26 18:34:00.635182: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 18:34:00.635185: | flags: none (0x0) Aug 26 18:34:00.635187: | length: 8 (0x8) Aug 26 18:34:00.635190: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 18:34:00.635193: | SPI size: 0 (0x0) Aug 26 18:34:00.635195: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Aug 26 18:34:00.635198: | processing payload: ISAKMP_NEXT_v2N (len=0) Aug 26 18:34:00.635201: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 18:34:00.635203: | ***parse IKEv2 Notify Payload: Aug 26 18:34:00.635206: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 18:34:00.635209: | flags: none (0x0) Aug 26 18:34:00.635211: | length: 28 (0x1c) Aug 26 18:34:00.635214: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 18:34:00.635216: | SPI size: 0 (0x0) Aug 26 18:34:00.635219: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Aug 26 18:34:00.635222: | processing payload: ISAKMP_NEXT_v2N (len=20) Aug 26 18:34:00.635224: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 18:34:00.635227: | ***parse IKEv2 Notify Payload: Aug 26 18:34:00.635230: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:34:00.635232: | flags: none (0x0) Aug 26 18:34:00.635235: | length: 28 (0x1c) Aug 26 18:34:00.635237: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 18:34:00.635240: | SPI size: 0 (0x0) Aug 26 18:34:00.635243: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Aug 26 18:34:00.635245: | processing payload: ISAKMP_NEXT_v2N (len=20) Aug 26 18:34:00.635248: | State DB: re-hashing IKEv2 state #1 IKE SPIi and SPI[ir] Aug 26 18:34:00.635254: | #1 in state PARENT_I1: sent v2I1, expected v2R1 Aug 26 18:34:00.635257: | selected state microcode Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH Aug 26 18:34:00.635260: | Now let's proceed with state specific processing Aug 26 18:34:00.635262: | calling processor Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH Aug 26 18:34:00.635266: | ikev2 parent inR1: calculating g^{xy} in order to send I2 Aug 26 18:34:00.635282: | using existing local IKE proposals for connection west (IKE SA initiator accepting remote proposal): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 18:34:00.635286: | Comparing remote proposals against IKE initiator (accepting) 4 local proposals Aug 26 18:34:00.635296: | local proposal 1 type ENCR has 1 transforms Aug 26 18:34:00.635299: | local proposal 1 type PRF has 2 transforms Aug 26 18:34:00.635302: | local proposal 1 type INTEG has 1 transforms Aug 26 18:34:00.635305: | local proposal 1 type DH has 8 transforms Aug 26 18:34:00.635308: | local proposal 1 type ESN has 0 transforms Aug 26 18:34:00.635311: | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG Aug 26 18:34:00.635314: | local proposal 2 type ENCR has 1 transforms Aug 26 18:34:00.635316: | local proposal 2 type PRF has 2 transforms Aug 26 18:34:00.635319: | local proposal 2 type INTEG has 1 transforms Aug 26 18:34:00.635322: | local proposal 2 type DH has 8 transforms Aug 26 18:34:00.635324: | local proposal 2 type ESN has 0 transforms Aug 26 18:34:00.635328: | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG Aug 26 18:34:00.635330: | local proposal 3 type ENCR has 1 transforms Aug 26 18:34:00.635333: | local proposal 3 type PRF has 2 transforms Aug 26 18:34:00.635336: | local proposal 3 type INTEG has 2 transforms Aug 26 18:34:00.635338: | local proposal 3 type DH has 8 transforms Aug 26 18:34:00.635354: | local proposal 3 type ESN has 0 transforms Aug 26 18:34:00.635357: | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none Aug 26 18:34:00.635360: | local proposal 4 type ENCR has 1 transforms Aug 26 18:34:00.635363: | local proposal 4 type PRF has 2 transforms Aug 26 18:34:00.635365: | local proposal 4 type INTEG has 2 transforms Aug 26 18:34:00.635368: | local proposal 4 type DH has 8 transforms Aug 26 18:34:00.635370: | local proposal 4 type ESN has 0 transforms Aug 26 18:34:00.635373: | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none Aug 26 18:34:00.635376: | ****parse IKEv2 Proposal Substructure Payload: Aug 26 18:34:00.635379: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 18:34:00.635381: | length: 36 (0x24) Aug 26 18:34:00.635384: | prop #: 1 (0x1) Aug 26 18:34:00.635386: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 18:34:00.635389: | spi size: 0 (0x0) Aug 26 18:34:00.635391: | # transforms: 3 (0x3) Aug 26 18:34:00.635395: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 4 local proposals Aug 26 18:34:00.635398: | *****parse IKEv2 Transform Substructure Payload: Aug 26 18:34:00.635401: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.635403: | length: 12 (0xc) Aug 26 18:34:00.635406: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:34:00.635408: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 18:34:00.635411: | ******parse IKEv2 Attribute Substructure Payload: Aug 26 18:34:00.635414: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:34:00.635417: | length/value: 256 (0x100) Aug 26 18:34:00.635421: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 Aug 26 18:34:00.635424: | *****parse IKEv2 Transform Substructure Payload: Aug 26 18:34:00.635426: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.635429: | length: 8 (0x8) Aug 26 18:34:00.635432: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 18:34:00.635434: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 18:34:00.635438: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 Aug 26 18:34:00.635441: | *****parse IKEv2 Transform Substructure Payload: Aug 26 18:34:00.635443: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:34:00.635446: | length: 8 (0x8) Aug 26 18:34:00.635448: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 18:34:00.635451: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 18:34:00.635454: | remote proposal 1 transform 2 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Aug 26 18:34:00.635458: | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none Aug 26 18:34:00.635463: | comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH Aug 26 18:34:00.635467: | remote proposal 1 matches local proposal 1 Aug 26 18:34:00.635470: | remote accepted the proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048[first-match] Aug 26 18:34:00.635472: | converting proposal to internal trans attrs Aug 26 18:34:00.635484: | natd_hash: hasher=0x55f2f1dff800(20) Aug 26 18:34:00.635487: | natd_hash: icookie= d3 c7 17 ff 29 c7 6c 97 Aug 26 18:34:00.635490: | natd_hash: rcookie= d6 87 4f e0 26 26 18 04 Aug 26 18:34:00.635492: | natd_hash: ip= c0 01 02 2d Aug 26 18:34:00.635495: | natd_hash: port=500 Aug 26 18:34:00.635498: | natd_hash: hash= 5a a4 df f1 a1 7c b9 86 cf c4 2f da 3a e2 3e ec Aug 26 18:34:00.635500: | natd_hash: hash= 4f 88 c4 ad Aug 26 18:34:00.635506: | natd_hash: hasher=0x55f2f1dff800(20) Aug 26 18:34:00.635509: | natd_hash: icookie= d3 c7 17 ff 29 c7 6c 97 Aug 26 18:34:00.635512: | natd_hash: rcookie= d6 87 4f e0 26 26 18 04 Aug 26 18:34:00.635514: | natd_hash: ip= c0 01 02 17 Aug 26 18:34:00.635517: | natd_hash: port=500 Aug 26 18:34:00.635520: | natd_hash: hash= 34 91 8e 50 7f e1 7a ec ea ef fa a0 ef 57 ce b2 Aug 26 18:34:00.635522: | natd_hash: hash= fa 4a dc 52 Aug 26 18:34:00.635525: | NAT_TRAVERSAL encaps using auto-detect Aug 26 18:34:00.635527: | NAT_TRAVERSAL this end is NOT behind NAT Aug 26 18:34:00.635530: | NAT_TRAVERSAL that end is NOT behind NAT Aug 26 18:34:00.635533: | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 Aug 26 18:34:00.635537: | offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_512 integ=NONE cipherkey=AES_GCM_16 Aug 26 18:34:00.635541: | adding ikev2_inR1outI2 KE work-order 2 for state #1 Aug 26 18:34:00.635544: | state #1 requesting EVENT_RETRANSMIT to be deleted Aug 26 18:34:00.635546: | #1 STATE_PARENT_I1: retransmits: cleared Aug 26 18:34:00.635550: | libevent_free: release ptr-libevent@0x55f2f388a7a8 Aug 26 18:34:00.635553: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55f2f3887688 Aug 26 18:34:00.635556: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55f2f3887688 Aug 26 18:34:00.635560: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 18:34:00.635563: | libevent_malloc: new ptr-libevent@0x7f9afc002888 size 128 Aug 26 18:34:00.635573: | #1 spent 0.303 milliseconds in processing: Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH in ikev2_process_state_packet() Aug 26 18:34:00.635593: | [RE]START processing: state #1 connection "west" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 18:34:00.635596: | #1 complete_v2_state_transition() PARENT_I1->PARENT_I2 with status STF_SUSPEND Aug 26 18:34:00.635599: | suspending state #1 and saving MD Aug 26 18:34:00.635602: | #1 is busy; has a suspended MD Aug 26 18:34:00.635602: | crypto helper 2 resuming Aug 26 18:34:00.635614: | crypto helper 2 starting work-order 2 for state #1 Aug 26 18:34:00.635607: | [RE]START processing: state #1 connection "west" from 192.1.2.23 (in log_stf_suspend() at ikev2.c:3269) Aug 26 18:34:00.635620: | crypto helper 2 doing compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 Aug 26 18:34:00.635626: | "west" #1 complete v2 state STATE_PARENT_I1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 Aug 26 18:34:00.635631: | stop processing: state #1 connection "west" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) Aug 26 18:34:00.635635: | #1 spent 0.651 milliseconds in ikev2_process_packet() Aug 26 18:34:00.635639: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Aug 26 18:34:00.635643: | processing: STOP state #0 (in process_md() at demux.c:382) Aug 26 18:34:00.635646: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:34:00.635649: | spent 0.665 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:34:00.636158: | calculating skeyseed using prf=sha2_512 integ=none cipherkey-size=32 salt-size=4 Aug 26 18:34:00.636439: | crypto helper 2 finished compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 time elapsed 0.000819 seconds Aug 26 18:34:00.636450: | (#1) spent 0.825 milliseconds in crypto helper computing work-order 2: ikev2_inR1outI2 KE (pcr) Aug 26 18:34:00.636452: | crypto helper 2 sending results from work-order 2 for state #1 to event queue Aug 26 18:34:00.636454: | scheduling resume sending helper answer for #1 Aug 26 18:34:00.636457: | libevent_malloc: new ptr-libevent@0x7f9af4000f48 size 128 Aug 26 18:34:00.636462: | crypto helper 2 waiting (nothing to do) Aug 26 18:34:00.636469: | processing resume sending helper answer for #1 Aug 26 18:34:00.636478: | start processing: state #1 connection "west" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 18:34:00.636495: | crypto helper 2 replies to request ID 2 Aug 26 18:34:00.636498: | calling continuation function 0x55f2f1d2ab50 Aug 26 18:34:00.636501: | ikev2_parent_inR1outI2_continue for #1: calculating g^{xy}, sending I2 Aug 26 18:34:00.636508: | creating state object #2 at 0x55f2f388cf18 Aug 26 18:34:00.636511: | State DB: adding IKEv2 state #2 in UNDEFINED Aug 26 18:34:00.636515: | pstats #2 ikev2.child started Aug 26 18:34:00.636518: | duplicating state object #1 "west" as #2 for IPSEC SA Aug 26 18:34:00.636523: | #2 setting local endpoint to 192.1.2.45:500 from #1.st_localport (in duplicate_state() at state.c:1484) Aug 26 18:34:00.636529: | Message ID: init_child #1.#2; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1 Aug 26 18:34:00.636534: | Message ID: switch-from #1 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=0->-1 wip.responder=-1 Aug 26 18:34:00.636538: | Message ID: switch-to #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->0 wip.responder=-1 Aug 26 18:34:00.636541: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 18:34:00.636545: | libevent_free: release ptr-libevent@0x7f9afc002888 Aug 26 18:34:00.636548: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55f2f3887688 Aug 26 18:34:00.636551: | event_schedule: new EVENT_SA_REPLACE-pe@0x55f2f3887688 Aug 26 18:34:00.636554: | inserting event EVENT_SA_REPLACE, timeout in 60 seconds for #1 Aug 26 18:34:00.636557: | libevent_malloc: new ptr-libevent@0x7f9afc002888 size 128 Aug 26 18:34:00.636561: | parent state #1: PARENT_I1(half-open IKE SA) => PARENT_I2(open IKE SA) Aug 26 18:34:00.636566: | **emit ISAKMP Message: Aug 26 18:34:00.636569: | initiator cookie: Aug 26 18:34:00.636571: | d3 c7 17 ff 29 c7 6c 97 Aug 26 18:34:00.636574: | responder cookie: Aug 26 18:34:00.636576: | d6 87 4f e0 26 26 18 04 Aug 26 18:34:00.636579: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:34:00.636582: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 18:34:00.636585: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Aug 26 18:34:00.636588: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 18:34:00.636590: | Message ID: 1 (0x1) Aug 26 18:34:00.636593: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:34:00.636596: | ***emit IKEv2 Encryption Payload: Aug 26 18:34:00.636599: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:34:00.636602: | flags: none (0x0) Aug 26 18:34:00.636605: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Aug 26 18:34:00.636608: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' Aug 26 18:34:00.636611: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload Aug 26 18:34:00.636618: | IKEv2 CERT: send a certificate? Aug 26 18:34:00.636621: | IKEv2 CERT: policy does not have RSASIG or ECDSA: PSK Aug 26 18:34:00.636624: | IDr payload will be sent Aug 26 18:34:00.636639: | ****emit IKEv2 Identification - Initiator - Payload: Aug 26 18:34:00.636642: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:34:00.636645: | flags: none (0x0) Aug 26 18:34:00.636650: | ID type: ID_FQDN (0x2) Aug 26 18:34:00.636653: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Initiator - Payload (35:ISAKMP_NEXT_v2IDi) Aug 26 18:34:00.636656: | next payload chain: saving location 'IKEv2 Identification - Initiator - Payload'.'next payload type' in 'reply packet' Aug 26 18:34:00.636660: | emitting 4 raw bytes of my identity into IKEv2 Identification - Initiator - Payload Aug 26 18:34:00.636662: | my identity 77 65 73 74 Aug 26 18:34:00.636665: | emitting length of IKEv2 Identification - Initiator - Payload: 12 Aug 26 18:34:00.636674: | ****emit IKEv2 Identification - Responder - Payload: Aug 26 18:34:00.636677: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) Aug 26 18:34:00.636679: | flags: none (0x0) Aug 26 18:34:00.636682: | ID type: ID_FQDN (0x2) Aug 26 18:34:00.636685: | next payload chain: ignoring supplied 'IKEv2 Identification - Responder - Payload'.'next payload type' value 39:ISAKMP_NEXT_v2AUTH Aug 26 18:34:00.636688: | next payload chain: setting previous 'IKEv2 Identification - Initiator - Payload'.'next payload type' to current IKEv2 Identification - Responder - Payload (36:ISAKMP_NEXT_v2IDr) Aug 26 18:34:00.636691: | next payload chain: saving location 'IKEv2 Identification - Responder - Payload'.'next payload type' in 'reply packet' Aug 26 18:34:00.636695: | emitting 4 raw bytes of IDr into IKEv2 Identification - Responder - Payload Aug 26 18:34:00.636698: | IDr 65 61 73 74 Aug 26 18:34:00.636700: | emitting length of IKEv2 Identification - Responder - Payload: 12 Aug 26 18:34:00.636703: | not sending INITIAL_CONTACT Aug 26 18:34:00.636706: | ****emit IKEv2 Authentication Payload: Aug 26 18:34:00.636709: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:34:00.636711: | flags: none (0x0) Aug 26 18:34:00.636714: | auth method: IKEv2_AUTH_SHARED (0x2) Aug 26 18:34:00.636717: | next payload chain: setting previous 'IKEv2 Identification - Responder - Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH) Aug 26 18:34:00.636720: | next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet' Aug 26 18:34:00.636724: | ikev2_calculate_psk_sighash() called from STATE_PARENT_I2 to create PSK with authby=secret Aug 26 18:34:00.636728: | started looking for secret for @west->@east of kind PKK_PSK Aug 26 18:34:00.636731: | actually looking for secret for @west->@east of kind PKK_PSK Aug 26 18:34:00.636734: | line 1: key type PKK_PSK(@west) to type PKK_PSK Aug 26 18:34:00.636738: | 1: compared key @east to @west / @east -> 004 Aug 26 18:34:00.636741: | 2: compared key @west to @west / @east -> 014 Aug 26 18:34:00.636744: | line 1: match=014 Aug 26 18:34:00.636747: | match 014 beats previous best_match 000 match=0x55f2f37deb58 (line=1) Aug 26 18:34:00.636750: | concluding with best_match=014 best=0x55f2f37deb58 (lineno=1) Aug 26 18:34:00.636812: | emitting 64 raw bytes of PSK auth into IKEv2 Authentication Payload Aug 26 18:34:00.636816: | PSK auth 25 32 44 3e 40 54 20 b1 53 6c 61 5a 48 77 88 27 Aug 26 18:34:00.636819: | PSK auth 7a 55 bd 70 57 d8 f3 45 73 ca 64 25 dc 55 c2 1c Aug 26 18:34:00.636821: | PSK auth fe ce e4 54 b8 1c f7 b9 38 a7 96 91 cb c1 de 64 Aug 26 18:34:00.636824: | PSK auth a4 eb 79 d6 39 e8 fe d7 d6 22 ca c2 1b 72 ae ba Aug 26 18:34:00.636827: | emitting length of IKEv2 Authentication Payload: 72 Aug 26 18:34:00.636829: | getting first pending from state #1 Aug 26 18:34:00.636849: | netlink_get_spi: allocated 0x8f957a8d for esp.0@192.1.2.45 Aug 26 18:34:00.636853: | constructing ESP/AH proposals with all DH removed for west (IKE SA initiator emitting ESP/AH proposals) Aug 26 18:34:00.636861: | converting proposal AES_GCM_16_256-NONE to ikev2 ... Aug 26 18:34:00.636866: | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED Aug 26 18:34:00.636869: | converting proposal AES_GCM_16_128-NONE to ikev2 ... Aug 26 18:34:00.636873: | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED Aug 26 18:34:00.636878: | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... Aug 26 18:34:00.636883: | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Aug 26 18:34:00.636886: | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... Aug 26 18:34:00.636890: | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Aug 26 18:34:00.636899: "west": constructed local ESP/AH proposals for west (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Aug 26 18:34:00.636907: | Emitting ikev2_proposals ... Aug 26 18:34:00.636910: | ****emit IKEv2 Security Association Payload: Aug 26 18:34:00.636913: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:34:00.636916: | flags: none (0x0) Aug 26 18:34:00.636919: | next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Aug 26 18:34:00.636937: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:34:00.636940: | discarding INTEG=NONE Aug 26 18:34:00.636942: | discarding DH=NONE Aug 26 18:34:00.636945: | *****emit IKEv2 Proposal Substructure Payload: Aug 26 18:34:00.636948: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:34:00.636951: | prop #: 1 (0x1) Aug 26 18:34:00.636953: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Aug 26 18:34:00.636956: | spi size: 4 (0x4) Aug 26 18:34:00.636959: | # transforms: 2 (0x2) Aug 26 18:34:00.636975: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 18:34:00.636978: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Aug 26 18:34:00.636980: | our spi 8f 95 7a 8d Aug 26 18:34:00.636983: | ******emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.636986: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.636988: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:34:00.636991: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 18:34:00.636994: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.636997: | *******emit IKEv2 Attribute Substructure Payload: Aug 26 18:34:00.637000: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:34:00.637003: | length/value: 256 (0x100) Aug 26 18:34:00.637005: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 18:34:00.637008: | discarding INTEG=NONE Aug 26 18:34:00.637010: | discarding DH=NONE Aug 26 18:34:00.637013: | ******emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.637016: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:34:00.637019: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Aug 26 18:34:00.637021: | IKEv2 transform ID: ESN_DISABLED (0x0) Aug 26 18:34:00.637025: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637028: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.637031: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.637033: | emitting length of IKEv2 Proposal Substructure Payload: 32 Aug 26 18:34:00.637036: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 18:34:00.637039: | discarding INTEG=NONE Aug 26 18:34:00.637041: | discarding DH=NONE Aug 26 18:34:00.637045: | *****emit IKEv2 Proposal Substructure Payload: Aug 26 18:34:00.637048: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:34:00.637050: | prop #: 2 (0x2) Aug 26 18:34:00.637053: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Aug 26 18:34:00.637056: | spi size: 4 (0x4) Aug 26 18:34:00.637058: | # transforms: 2 (0x2) Aug 26 18:34:00.637061: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:34:00.637064: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 18:34:00.637067: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Aug 26 18:34:00.637070: | our spi 8f 95 7a 8d Aug 26 18:34:00.637072: | ******emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.637075: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637078: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:34:00.637081: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 18:34:00.637084: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.637087: | *******emit IKEv2 Attribute Substructure Payload: Aug 26 18:34:00.637089: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:34:00.637092: | length/value: 128 (0x80) Aug 26 18:34:00.637095: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 18:34:00.637097: | discarding INTEG=NONE Aug 26 18:34:00.637099: | discarding DH=NONE Aug 26 18:34:00.637102: | ******emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.637105: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:34:00.637107: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Aug 26 18:34:00.637110: | IKEv2 transform ID: ESN_DISABLED (0x0) Aug 26 18:34:00.637113: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637116: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.637119: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.637121: | emitting length of IKEv2 Proposal Substructure Payload: 32 Aug 26 18:34:00.637124: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 18:34:00.637127: | discarding DH=NONE Aug 26 18:34:00.637130: | *****emit IKEv2 Proposal Substructure Payload: Aug 26 18:34:00.637132: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:34:00.637135: | prop #: 3 (0x3) Aug 26 18:34:00.637137: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Aug 26 18:34:00.637140: | spi size: 4 (0x4) Aug 26 18:34:00.637143: | # transforms: 4 (0x4) Aug 26 18:34:00.637146: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:34:00.637149: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 18:34:00.637152: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Aug 26 18:34:00.637154: | our spi 8f 95 7a 8d Aug 26 18:34:00.637157: | ******emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.637159: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637162: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:34:00.637165: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 18:34:00.637168: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.637171: | *******emit IKEv2 Attribute Substructure Payload: Aug 26 18:34:00.637173: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:34:00.637176: | length/value: 256 (0x100) Aug 26 18:34:00.637180: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 18:34:00.637183: | ******emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.637185: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637188: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 18:34:00.637191: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 18:34:00.637194: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637197: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.637200: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.637203: | ******emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.637205: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637208: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 18:34:00.637211: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 18:34:00.637214: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637217: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.637220: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.637222: | discarding DH=NONE Aug 26 18:34:00.637225: | ******emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.637227: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:34:00.637230: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Aug 26 18:34:00.637233: | IKEv2 transform ID: ESN_DISABLED (0x0) Aug 26 18:34:00.637236: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637239: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.637241: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.637244: | emitting length of IKEv2 Proposal Substructure Payload: 48 Aug 26 18:34:00.637247: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 18:34:00.637250: | discarding DH=NONE Aug 26 18:34:00.637252: | *****emit IKEv2 Proposal Substructure Payload: Aug 26 18:34:00.637255: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 18:34:00.637257: | prop #: 4 (0x4) Aug 26 18:34:00.637260: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Aug 26 18:34:00.637263: | spi size: 4 (0x4) Aug 26 18:34:00.637265: | # transforms: 4 (0x4) Aug 26 18:34:00.637268: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 18:34:00.637271: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 18:34:00.637275: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Aug 26 18:34:00.637277: | our spi 8f 95 7a 8d Aug 26 18:34:00.637280: | ******emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.637282: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637285: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:34:00.637308: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 18:34:00.637314: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.637317: | *******emit IKEv2 Attribute Substructure Payload: Aug 26 18:34:00.637320: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:34:00.637323: | length/value: 128 (0x80) Aug 26 18:34:00.637325: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 18:34:00.637330: | ******emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.637332: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637348: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 18:34:00.637350: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 18:34:00.637354: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637356: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.637359: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.637362: | ******emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.637364: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637367: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 18:34:00.637370: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 18:34:00.637373: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637376: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.637379: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.637381: | discarding DH=NONE Aug 26 18:34:00.637384: | ******emit IKEv2 Transform Substructure Payload: Aug 26 18:34:00.637386: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:34:00.637389: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Aug 26 18:34:00.637391: | IKEv2 transform ID: ESN_DISABLED (0x0) Aug 26 18:34:00.637395: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.637397: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 18:34:00.637400: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 18:34:00.637403: | emitting length of IKEv2 Proposal Substructure Payload: 48 Aug 26 18:34:00.637406: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 18:34:00.637408: | emitting length of IKEv2 Security Association Payload: 164 Aug 26 18:34:00.637411: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Aug 26 18:34:00.637415: | ****emit IKEv2 Traffic Selector - Initiator - Payload: Aug 26 18:34:00.637418: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:34:00.637420: | flags: none (0x0) Aug 26 18:34:00.637423: | number of TS: 1 (0x1) Aug 26 18:34:00.637426: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) Aug 26 18:34:00.637429: | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' Aug 26 18:34:00.637432: | *****emit IKEv2 Traffic Selector: Aug 26 18:34:00.637435: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Aug 26 18:34:00.637438: | IP Protocol ID: 0 (0x0) Aug 26 18:34:00.637440: | start port: 0 (0x0) Aug 26 18:34:00.637443: | end port: 65535 (0xffff) Aug 26 18:34:00.637446: | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector Aug 26 18:34:00.637448: | ipv4 start c0 00 01 00 Aug 26 18:34:00.637451: | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector Aug 26 18:34:00.637454: | ipv4 end c0 00 01 ff Aug 26 18:34:00.637457: | emitting length of IKEv2 Traffic Selector: 16 Aug 26 18:34:00.637459: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 Aug 26 18:34:00.637462: | ****emit IKEv2 Traffic Selector - Responder - Payload: Aug 26 18:34:00.637466: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:34:00.637468: | flags: none (0x0) Aug 26 18:34:00.637471: | number of TS: 1 (0x1) Aug 26 18:34:00.637474: | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) Aug 26 18:34:00.637477: | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' Aug 26 18:34:00.637480: | *****emit IKEv2 Traffic Selector: Aug 26 18:34:00.637483: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Aug 26 18:34:00.637485: | IP Protocol ID: 0 (0x0) Aug 26 18:34:00.637488: | start port: 0 (0x0) Aug 26 18:34:00.637491: | end port: 65535 (0xffff) Aug 26 18:34:00.637493: | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector Aug 26 18:34:00.637496: | ipv4 start c0 00 02 00 Aug 26 18:34:00.637499: | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector Aug 26 18:34:00.637501: | ipv4 end c0 00 02 ff Aug 26 18:34:00.637504: | emitting length of IKEv2 Traffic Selector: 16 Aug 26 18:34:00.637506: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 Aug 26 18:34:00.637509: | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE Aug 26 18:34:00.637512: | Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED Aug 26 18:34:00.637515: | adding 1 bytes of padding (including 1 byte padding-length) Aug 26 18:34:00.637518: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Aug 26 18:34:00.637521: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Aug 26 18:34:00.637524: | emitting length of IKEv2 Encryption Payload: 337 Aug 26 18:34:00.637527: | emitting length of ISAKMP Message: 365 Aug 26 18:34:00.637539: | suspend processing: state #1 connection "west" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 18:34:00.637544: | start processing: state #2 connection "west" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 18:34:00.637548: | #2 complete_v2_state_transition() md.from_state=PARENT_I1 md.svm.state[from]=PARENT_I1 UNDEFINED->PARENT_I2 with status STF_OK Aug 26 18:34:00.637551: | IKEv2: transition from state STATE_PARENT_I1 to state STATE_PARENT_I2 Aug 26 18:34:00.637555: | child state #2: UNDEFINED(ignore) => PARENT_I2(open IKE SA) Aug 26 18:34:00.637557: | Message ID: updating counters for #2 to 0 after switching state Aug 26 18:34:00.637563: | Message ID: recv #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1->0 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=-1 Aug 26 18:34:00.637568: | Message ID: sent #1.#2 request 1; ike: initiator.sent=0->1 initiator.recv=0 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->1 wip.responder=-1 Aug 26 18:34:00.637572: "west" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} Aug 26 18:34:00.637581: | sending V2 reply packet to 192.1.2.23:500 (from 192.1.2.45:500) Aug 26 18:34:00.637586: | sending 365 bytes for STATE_PARENT_I1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) Aug 26 18:34:00.637604: | d3 c7 17 ff 29 c7 6c 97 d6 87 4f e0 26 26 18 04 Aug 26 18:34:00.637607: | 2e 20 23 08 00 00 00 01 00 00 01 6d 23 00 01 51 Aug 26 18:34:00.637609: | 42 94 5b 94 ad 92 58 86 b3 55 aa ba 38 04 9b df Aug 26 18:34:00.637612: | dd fa b1 34 1d ed 0f 56 0d 30 22 69 32 e0 47 27 Aug 26 18:34:00.637614: | a2 94 4f fd 36 56 00 22 9e ca 82 fd 74 d4 29 9b Aug 26 18:34:00.637617: | f0 26 1c 08 0b 84 12 22 88 e8 bc ee f7 e6 a6 4b Aug 26 18:34:00.637620: | e7 2b c6 94 76 d4 5b 45 d6 87 01 1c b3 04 ca 26 Aug 26 18:34:00.637622: | 74 e0 16 b4 22 df da 43 59 d7 9f c4 3a 21 1e f7 Aug 26 18:34:00.637625: | 44 5c 86 46 96 f9 32 8a 5a 62 b1 3c c6 0c b4 bb Aug 26 18:34:00.637640: | a3 f1 e6 0c 0e ff 29 86 d5 8b f1 83 8e 31 c8 2d Aug 26 18:34:00.637644: | 25 1f 77 3e 98 33 ea c2 69 78 a3 ba 53 07 31 d0 Aug 26 18:34:00.637646: | de ff 1b fa 1e a5 6d cd fe 95 c8 51 c1 a9 38 2f Aug 26 18:34:00.637649: | 57 3e 50 ef b5 9d 29 07 8e 52 69 22 8f fa 08 ad Aug 26 18:34:00.637651: | 31 51 38 99 df 74 43 29 f3 c7 d0 04 1a fb f4 ae Aug 26 18:34:00.637654: | 5c c9 f0 34 7f 74 fe 28 45 24 31 c2 ec 54 ac 95 Aug 26 18:34:00.637656: | 42 eb 30 75 60 09 7e 9f 2b e0 51 b5 6c ab 93 98 Aug 26 18:34:00.637659: | d4 f3 cc b2 65 05 59 02 2e 77 ae 02 4c 23 04 59 Aug 26 18:34:00.637661: | 38 38 b3 d3 5f eb aa c8 02 f0 69 81 2f c5 77 7e Aug 26 18:34:00.637664: | 49 e0 a7 2e d2 61 0e c3 dd 9a ba 4b f1 a5 2f 81 Aug 26 18:34:00.637666: | 82 e7 99 64 76 a7 22 37 3a b3 02 4b 27 cb c2 f2 Aug 26 18:34:00.637669: | 46 3d 29 e8 25 db 78 0a d7 03 2f f5 33 26 df ca Aug 26 18:34:00.637671: | 5a a0 a0 97 62 47 28 bc 36 72 49 d0 1b 96 be 32 Aug 26 18:34:00.637674: | 8d 6e 19 86 f6 5a d9 6c 67 02 d5 f4 24 Aug 26 18:34:00.637696: | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=15000ms Aug 26 18:34:00.637716: | event_schedule: new EVENT_RETRANSMIT-pe@0x7f9afc002b78 Aug 26 18:34:00.637720: | inserting event EVENT_RETRANSMIT, timeout in 15 seconds for #2 Aug 26 18:34:00.637723: | libevent_malloc: new ptr-libevent@0x55f2f388a7a8 size 128 Aug 26 18:34:00.637728: | #2 STATE_PARENT_I2: retransmits: first event in 15 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29726.380182 Aug 26 18:34:00.637731: | resume sending helper answer for #1 suppresed complete_v2_state_transition() Aug 26 18:34:00.637737: | #1 spent 1.22 milliseconds in resume sending helper answer Aug 26 18:34:00.637742: | stop processing: state #2 connection "west" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 18:34:00.637745: | libevent_free: release ptr-libevent@0x7f9af4000f48 Aug 26 18:34:00.673194: | spent 0.00286 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:34:00.673213: | *received 225 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) Aug 26 18:34:00.673216: | d3 c7 17 ff 29 c7 6c 97 d6 87 4f e0 26 26 18 04 Aug 26 18:34:00.673218: | 2e 20 23 20 00 00 00 01 00 00 00 e1 24 00 00 c5 Aug 26 18:34:00.673220: | 77 db 2c b0 1f 1b 17 1d 65 85 fa 26 e4 22 cf f1 Aug 26 18:34:00.673222: | 18 4a fb a6 6d b5 12 45 73 90 e1 8c 69 6c 19 45 Aug 26 18:34:00.673223: | 2b 3e 59 c2 88 5a ba ed 54 f4 28 c8 7f 2d a3 fd Aug 26 18:34:00.673225: | 20 f7 50 95 4c 28 27 5e c8 4c 7d 31 38 2e f4 4f Aug 26 18:34:00.673227: | e2 0f dc 41 a4 04 36 ef 39 82 d4 8b b9 7e f0 e2 Aug 26 18:34:00.673228: | 1a 87 0e d2 fd 05 c1 a1 7b ce b0 c0 6c 81 a2 b8 Aug 26 18:34:00.673230: | 43 16 ee 82 b4 65 93 88 6f 54 69 c4 66 61 23 19 Aug 26 18:34:00.673232: | 52 f2 e7 52 18 2c 7e 49 97 50 a7 98 45 99 72 c0 Aug 26 18:34:00.673233: | d5 47 5e f9 72 0b 02 29 c6 2d 91 5e cb b9 cb b9 Aug 26 18:34:00.673235: | a7 3a a0 f8 b6 9c 02 4d 8e 5e a9 d6 c7 d9 0c 00 Aug 26 18:34:00.673237: | c5 28 49 59 31 31 c0 79 a0 4c 7e 4b 28 da 4e 4b Aug 26 18:34:00.673238: | 16 87 2a cc c4 34 05 cf 67 ff 74 c1 1b 15 c7 9c Aug 26 18:34:00.673240: | 83 Aug 26 18:34:00.673243: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 18:34:00.673246: | **parse ISAKMP Message: Aug 26 18:34:00.673248: | initiator cookie: Aug 26 18:34:00.673250: | d3 c7 17 ff 29 c7 6c 97 Aug 26 18:34:00.673252: | responder cookie: Aug 26 18:34:00.673253: | d6 87 4f e0 26 26 18 04 Aug 26 18:34:00.673255: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Aug 26 18:34:00.673257: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 18:34:00.673259: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Aug 26 18:34:00.673261: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Aug 26 18:34:00.673263: | Message ID: 1 (0x1) Aug 26 18:34:00.673265: | length: 225 (0xe1) Aug 26 18:34:00.673267: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Aug 26 18:34:00.673272: | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response Aug 26 18:34:00.673275: | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) Aug 26 18:34:00.673280: | start processing: state #1 connection "west" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) Aug 26 18:34:00.673282: | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) Aug 26 18:34:00.673285: | suspend processing: state #1 connection "west" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) Aug 26 18:34:00.673301: | start processing: state #2 connection "west" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) Aug 26 18:34:00.673305: | #2 is idle Aug 26 18:34:00.673307: | #2 idle Aug 26 18:34:00.673309: | unpacking clear payload Aug 26 18:34:00.673310: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Aug 26 18:34:00.673313: | ***parse IKEv2 Encryption Payload: Aug 26 18:34:00.673314: | next payload type: ISAKMP_NEXT_v2IDr (0x24) Aug 26 18:34:00.673316: | flags: none (0x0) Aug 26 18:34:00.673318: | length: 197 (0xc5) Aug 26 18:34:00.673320: | processing payload: ISAKMP_NEXT_v2SK (len=193) Aug 26 18:34:00.673322: | #2 in state PARENT_I2: sent v2I2, expected v2R2 Aug 26 18:34:00.673335: | #2 ikev2 ISAKMP_v2_IKE_AUTH decrypt success Aug 26 18:34:00.673337: | Now let's proceed with payload (ISAKMP_NEXT_v2IDr) Aug 26 18:34:00.673339: | **parse IKEv2 Identification - Responder - Payload: Aug 26 18:34:00.673341: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) Aug 26 18:34:00.673343: | flags: none (0x0) Aug 26 18:34:00.673344: | length: 12 (0xc) Aug 26 18:34:00.673346: | ID type: ID_FQDN (0x2) Aug 26 18:34:00.673348: | processing payload: ISAKMP_NEXT_v2IDr (len=4) Aug 26 18:34:00.673350: | Now let's proceed with payload (ISAKMP_NEXT_v2AUTH) Aug 26 18:34:00.673352: | **parse IKEv2 Authentication Payload: Aug 26 18:34:00.673353: | next payload type: ISAKMP_NEXT_v2SA (0x21) Aug 26 18:34:00.673355: | flags: none (0x0) Aug 26 18:34:00.673356: | length: 72 (0x48) Aug 26 18:34:00.673358: | auth method: IKEv2_AUTH_SHARED (0x2) Aug 26 18:34:00.673360: | processing payload: ISAKMP_NEXT_v2AUTH (len=64) Aug 26 18:34:00.673361: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Aug 26 18:34:00.673363: | **parse IKEv2 Security Association Payload: Aug 26 18:34:00.673378: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) Aug 26 18:34:00.673379: | flags: none (0x0) Aug 26 18:34:00.673381: | length: 36 (0x24) Aug 26 18:34:00.673382: | processing payload: ISAKMP_NEXT_v2SA (len=32) Aug 26 18:34:00.673384: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) Aug 26 18:34:00.673386: | **parse IKEv2 Traffic Selector - Initiator - Payload: Aug 26 18:34:00.673387: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) Aug 26 18:34:00.673389: | flags: none (0x0) Aug 26 18:34:00.673390: | length: 24 (0x18) Aug 26 18:34:00.673392: | number of TS: 1 (0x1) Aug 26 18:34:00.673393: | processing payload: ISAKMP_NEXT_v2TSi (len=16) Aug 26 18:34:00.673395: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) Aug 26 18:34:00.673397: | **parse IKEv2 Traffic Selector - Responder - Payload: Aug 26 18:34:00.673398: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 18:34:00.673400: | flags: none (0x0) Aug 26 18:34:00.673401: | length: 24 (0x18) Aug 26 18:34:00.673418: | number of TS: 1 (0x1) Aug 26 18:34:00.673420: | processing payload: ISAKMP_NEXT_v2TSr (len=16) Aug 26 18:34:00.673422: | selected state microcode Initiator: process IKE_AUTH response Aug 26 18:34:00.673423: | Now let's proceed with state specific processing Aug 26 18:34:00.673425: | calling processor Initiator: process IKE_AUTH response Aug 26 18:34:00.673429: | offered CA: '%none' Aug 26 18:34:00.673432: "west" #2: IKEv2 mode peer ID is ID_FQDN: '@east' Aug 26 18:34:00.673465: | verifying AUTH payload Aug 26 18:34:00.673469: | ikev2_calculate_psk_sighash() called from STATE_PARENT_I2 to verify PSK with authby=secret Aug 26 18:34:00.673472: | started looking for secret for @west->@east of kind PKK_PSK Aug 26 18:34:00.673476: | actually looking for secret for @west->@east of kind PKK_PSK Aug 26 18:34:00.673478: | line 1: key type PKK_PSK(@west) to type PKK_PSK Aug 26 18:34:00.673481: | 1: compared key @east to @west / @east -> 004 Aug 26 18:34:00.673482: | 2: compared key @west to @west / @east -> 014 Aug 26 18:34:00.673484: | line 1: match=014 Aug 26 18:34:00.673486: | match 014 beats previous best_match 000 match=0x55f2f37deb58 (line=1) Aug 26 18:34:00.673488: | concluding with best_match=014 best=0x55f2f37deb58 (lineno=1) Aug 26 18:34:00.673529: "west" #2: Authenticated using authby=secret Aug 26 18:34:00.673536: | parent state #1: PARENT_I2(open IKE SA) => PARENT_I3(established IKE SA) Aug 26 18:34:00.673540: | #1 will start re-keying in 25 seconds with margin of 5 seconds (attempting re-key) Aug 26 18:34:00.673542: | state #1 requesting EVENT_SA_REPLACE to be deleted Aug 26 18:34:00.673546: | libevent_free: release ptr-libevent@0x7f9afc002888 Aug 26 18:34:00.673549: | free_event_entry: release EVENT_SA_REPLACE-pe@0x55f2f3887688 Aug 26 18:34:00.673552: | event_schedule: new EVENT_SA_REKEY-pe@0x55f2f3887688 Aug 26 18:34:00.673554: | inserting event EVENT_SA_REKEY, timeout in 25 seconds for #1 Aug 26 18:34:00.673562: | libevent_malloc: new ptr-libevent@0x7f9af4000f48 size 128 Aug 26 18:34:00.673648: | pstats #1 ikev2.ike established Aug 26 18:34:00.673656: | TSi: parsing 1 traffic selectors Aug 26 18:34:00.673660: | ***parse IKEv2 Traffic Selector: Aug 26 18:34:00.673664: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Aug 26 18:34:00.673667: | IP Protocol ID: 0 (0x0) Aug 26 18:34:00.673670: | length: 16 (0x10) Aug 26 18:34:00.673673: | start port: 0 (0x0) Aug 26 18:34:00.673689: | end port: 65535 (0xffff) Aug 26 18:34:00.673692: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low Aug 26 18:34:00.673695: | TS low c0 00 01 00 Aug 26 18:34:00.673698: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high Aug 26 18:34:00.673701: | TS high c0 00 01 ff Aug 26 18:34:00.673704: | TSi: parsed 1 traffic selectors Aug 26 18:34:00.673707: | TSr: parsing 1 traffic selectors Aug 26 18:34:00.673710: | ***parse IKEv2 Traffic Selector: Aug 26 18:34:00.673713: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Aug 26 18:34:00.673716: | IP Protocol ID: 0 (0x0) Aug 26 18:34:00.673719: | length: 16 (0x10) Aug 26 18:34:00.673722: | start port: 0 (0x0) Aug 26 18:34:00.673724: | end port: 65535 (0xffff) Aug 26 18:34:00.673728: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low Aug 26 18:34:00.673730: | TS low c0 00 02 00 Aug 26 18:34:00.673733: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high Aug 26 18:34:00.673736: | TS high c0 00 02 ff Aug 26 18:34:00.673738: | TSr: parsed 1 traffic selectors Aug 26 18:34:00.673744: | evaluating our conn="west" I=192.0.1.0/24:0/0 R=192.0.2.0/24:0/0 to their: Aug 26 18:34:00.673751: | TSi[0] .net=192.0.1.0-192.0.1.255 .iporotoid=0 .{start,end}port=0..65535 Aug 26 18:34:00.673757: | match address end->client=192.0.1.0/24 == TSi[0]net=192.0.1.0-192.0.1.255: YES fitness 32 Aug 26 18:34:00.673760: | narrow port end=0..65535 == TSi[0]=0..65535: 0 Aug 26 18:34:00.673762: | TSi[0] port match: YES fitness 65536 Aug 26 18:34:00.673777: | narrow protocol end=*0 == TSi[0]=*0: 0 Aug 26 18:34:00.673779: | match end->protocol=*0 == TSi[0].ipprotoid=*0: YES fitness 255 Aug 26 18:34:00.673782: | TSr[0] .net=192.0.2.0-192.0.2.255 .iporotoid=0 .{start,end}port=0..65535 Aug 26 18:34:00.673785: | match address end->client=192.0.2.0/24 == TSr[0]net=192.0.2.0-192.0.2.255: YES fitness 32 Aug 26 18:34:00.673787: | narrow port end=0..65535 == TSr[0]=0..65535: 0 Aug 26 18:34:00.673789: | TSr[0] port match: YES fitness 65536 Aug 26 18:34:00.673790: | narrow protocol end=*0 == TSr[0]=*0: 0 Aug 26 18:34:00.673792: | match end->protocol=*0 == TSr[0].ipprotoid=*0: YES fitness 255 Aug 26 18:34:00.673794: | best fit so far: TSi[0] TSr[0] Aug 26 18:34:00.673798: | found an acceptable TSi/TSr Traffic Selector Aug 26 18:34:00.673800: | printing contents struct traffic_selector Aug 26 18:34:00.673801: | ts_type: IKEv2_TS_IPV6_ADDR_RANGE Aug 26 18:34:00.673803: | ipprotoid: 0 Aug 26 18:34:00.673804: | port range: 0-65535 Aug 26 18:34:00.673807: | ip range: 192.0.1.0-192.0.1.255 Aug 26 18:34:00.673808: | printing contents struct traffic_selector Aug 26 18:34:00.673810: | ts_type: IKEv2_TS_IPV6_ADDR_RANGE Aug 26 18:34:00.673811: | ipprotoid: 0 Aug 26 18:34:00.673813: | port range: 0-65535 Aug 26 18:34:00.673815: | ip range: 192.0.2.0-192.0.2.255 Aug 26 18:34:00.673837: | using existing local ESP/AH proposals for west (IKE_AUTH initiator accepting remote ESP/AH proposal): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Aug 26 18:34:00.673839: | Comparing remote proposals against IKE_AUTH initiator accepting remote ESP/AH proposal 4 local proposals Aug 26 18:34:00.673842: | local proposal 1 type ENCR has 1 transforms Aug 26 18:34:00.673844: | local proposal 1 type PRF has 0 transforms Aug 26 18:34:00.673845: | local proposal 1 type INTEG has 1 transforms Aug 26 18:34:00.673847: | local proposal 1 type DH has 1 transforms Aug 26 18:34:00.673849: | local proposal 1 type ESN has 1 transforms Aug 26 18:34:00.673851: | local proposal 1 transforms: required: ENCR+ESN; optional: INTEG+DH Aug 26 18:34:00.673853: | local proposal 2 type ENCR has 1 transforms Aug 26 18:34:00.673854: | local proposal 2 type PRF has 0 transforms Aug 26 18:34:00.673869: | local proposal 2 type INTEG has 1 transforms Aug 26 18:34:00.673871: | local proposal 2 type DH has 1 transforms Aug 26 18:34:00.673872: | local proposal 2 type ESN has 1 transforms Aug 26 18:34:00.673874: | local proposal 2 transforms: required: ENCR+ESN; optional: INTEG+DH Aug 26 18:34:00.673876: | local proposal 3 type ENCR has 1 transforms Aug 26 18:34:00.673877: | local proposal 3 type PRF has 0 transforms Aug 26 18:34:00.673879: | local proposal 3 type INTEG has 2 transforms Aug 26 18:34:00.673881: | local proposal 3 type DH has 1 transforms Aug 26 18:34:00.673882: | local proposal 3 type ESN has 1 transforms Aug 26 18:34:00.673884: | local proposal 3 transforms: required: ENCR+INTEG+ESN; optional: DH Aug 26 18:34:00.673886: | local proposal 4 type ENCR has 1 transforms Aug 26 18:34:00.673887: | local proposal 4 type PRF has 0 transforms Aug 26 18:34:00.673889: | local proposal 4 type INTEG has 2 transforms Aug 26 18:34:00.673891: | local proposal 4 type DH has 1 transforms Aug 26 18:34:00.673892: | local proposal 4 type ESN has 1 transforms Aug 26 18:34:00.673894: | local proposal 4 transforms: required: ENCR+INTEG+ESN; optional: DH Aug 26 18:34:00.673896: | ***parse IKEv2 Proposal Substructure Payload: Aug 26 18:34:00.673898: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 18:34:00.673900: | length: 32 (0x20) Aug 26 18:34:00.673902: | prop #: 1 (0x1) Aug 26 18:34:00.673903: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Aug 26 18:34:00.673905: | spi size: 4 (0x4) Aug 26 18:34:00.673906: | # transforms: 2 (0x2) Aug 26 18:34:00.673909: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Aug 26 18:34:00.673910: | remote SPI 8e 88 b4 3a Aug 26 18:34:00.673912: | Comparing remote proposal 1 containing 2 transforms against local proposal [1..1] of 4 local proposals Aug 26 18:34:00.673915: | ****parse IKEv2 Transform Substructure Payload: Aug 26 18:34:00.673916: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 18:34:00.673918: | length: 12 (0xc) Aug 26 18:34:00.673920: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 18:34:00.673921: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 18:34:00.673923: | *****parse IKEv2 Attribute Substructure Payload: Aug 26 18:34:00.673925: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 18:34:00.673928: | length/value: 256 (0x100) Aug 26 18:34:00.673931: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 Aug 26 18:34:00.673932: | ****parse IKEv2 Transform Substructure Payload: Aug 26 18:34:00.673934: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 18:34:00.673936: | length: 8 (0x8) Aug 26 18:34:00.673937: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Aug 26 18:34:00.673939: | IKEv2 transform ID: ESN_DISABLED (0x0) Aug 26 18:34:00.673941: | remote proposal 1 transform 1 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 Aug 26 18:34:00.673944: | remote proposal 1 proposed transforms: ENCR+ESN; matched: ENCR+ESN; unmatched: none Aug 26 18:34:00.673946: | comparing remote proposal 1 containing ENCR+ESN transforms to local proposal 1; required: ENCR+ESN; optional: INTEG+DH; matched: ENCR+ESN Aug 26 18:34:00.673948: | remote proposal 1 matches local proposal 1 Aug 26 18:34:00.673950: | remote accepted the proposal 1:ESP:ENCR=AES_GCM_C_256;ESN=DISABLED[first-match] Aug 26 18:34:00.673953: | IKE_AUTH initiator accepting remote ESP/AH proposal ikev2_proposal: 1:ESP:SPI=8e88b43a;ENCR=AES_GCM_C_256;ESN=DISABLED Aug 26 18:34:00.673955: | converting proposal to internal trans attrs Aug 26 18:34:00.673959: | integ=none: .key_size=0 encrypt=aes_gcm_16: .key_size=32 .salt_size=4 keymat_len=36 Aug 26 18:34:00.674063: | install_ipsec_sa() for #2: inbound and outbound Aug 26 18:34:00.674067: | could_route called for west (kind=CK_PERMANENT) Aug 26 18:34:00.674069: | FOR_EACH_CONNECTION_... in route_owner Aug 26 18:34:00.674071: | conn west mark 0/00000000, 0/00000000 vs Aug 26 18:34:00.674073: | conn west mark 0/00000000, 0/00000000 Aug 26 18:34:00.674076: | route owner of "west" unrouted: NULL; eroute owner: NULL Aug 26 18:34:00.674078: | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE Aug 26 18:34:00.674081: | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 Aug 26 18:34:00.674083: | AES_GCM_16 requires 4 salt bytes Aug 26 18:34:00.674085: | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 Aug 26 18:34:00.674088: | setting IPsec SA replay-window to 32 Aug 26 18:34:00.674090: | NIC esp-hw-offload not for connection 'west' not available on interface eth1 Aug 26 18:34:00.674092: | netlink: enabling tunnel mode Aug 26 18:34:00.674094: | netlink: setting IPsec SA replay-window to 32 using old-style req Aug 26 18:34:00.674096: | netlink: esp-hw-offload not set for IPsec SA Aug 26 18:34:00.674157: | netlink response for Add SA esp.8e88b43a@192.1.2.23 included non-error error Aug 26 18:34:00.674163: | set up outgoing SA, ref=0/0 Aug 26 18:34:00.674167: | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE Aug 26 18:34:00.674170: | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 Aug 26 18:34:00.674173: | AES_GCM_16 requires 4 salt bytes Aug 26 18:34:00.674177: | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 Aug 26 18:34:00.674181: | setting IPsec SA replay-window to 32 Aug 26 18:34:00.674185: | NIC esp-hw-offload not for connection 'west' not available on interface eth1 Aug 26 18:34:00.674188: | netlink: enabling tunnel mode Aug 26 18:34:00.674192: | netlink: setting IPsec SA replay-window to 32 using old-style req Aug 26 18:34:00.674195: | netlink: esp-hw-offload not set for IPsec SA Aug 26 18:34:00.674232: | netlink response for Add SA esp.8f957a8d@192.1.2.45 included non-error error Aug 26 18:34:00.674240: | priority calculation of connection "west" is 0xfe7e7 Aug 26 18:34:00.674249: | add inbound eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => tun.10000@192.1.2.45 (raw_eroute) Aug 26 18:34:00.674253: | IPsec Sa SPD priority set to 1042407 Aug 26 18:34:00.674280: | raw_eroute result=success Aug 26 18:34:00.674284: | set up incoming SA, ref=0/0 Aug 26 18:34:00.674286: | sr for #2: unrouted Aug 26 18:34:00.674293: | route_and_eroute() for proto 0, and source port 0 dest port 0 Aug 26 18:34:00.674299: | FOR_EACH_CONNECTION_... in route_owner Aug 26 18:34:00.674304: | conn west mark 0/00000000, 0/00000000 vs Aug 26 18:34:00.674308: | conn west mark 0/00000000, 0/00000000 Aug 26 18:34:00.674311: | route owner of "west" unrouted: NULL; eroute owner: NULL Aug 26 18:34:00.674313: | route_and_eroute with c: west (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2 Aug 26 18:34:00.674315: | priority calculation of connection "west" is 0xfe7e7 Aug 26 18:34:00.674320: | eroute_connection add eroute 192.0.1.0/24:0 --0-> 192.0.2.0/24:0 => tun.0@192.1.2.23 (raw_eroute) Aug 26 18:34:00.674322: | IPsec Sa SPD priority set to 1042407 Aug 26 18:34:00.674340: | raw_eroute result=success Aug 26 18:34:00.674347: | running updown command "ipsec _updown" for verb up Aug 26 18:34:00.674350: | command executing up-client Aug 26 18:34:00.674382: | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x8e88b43a SPI_OUT=0x Aug 26 18:34:00.674387: | popen cmd is 1023 chars long Aug 26 18:34:00.674390: | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west' PLUTO_INTERFA: Aug 26 18:34:00.674392: | cmd( 80):CE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' : Aug 26 18:34:00.674394: | cmd( 160):PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_M: Aug 26 18:34:00.674395: | cmd( 240):ASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='1638: Aug 26 18:34:00.674397: | cmd( 320):8' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_: Aug 26 18:34:00.674399: | cmd( 400):CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK=': Aug 26 18:34:00.674400: | cmd( 480):255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUT: Aug 26 18:34:00.674402: | cmd( 560):O_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+UP+: Aug 26 18:34:00.674404: | cmd( 640):IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PL: Aug 26 18:34:00.674405: | cmd( 720):UTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS: Aug 26 18:34:00.674407: | cmd( 800):_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLU: Aug 26 18:34:00.674409: | cmd( 880):TO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHAR: Aug 26 18:34:00.674410: | cmd( 960):ED='no' SPI_IN=0x8e88b43a SPI_OUT=0x8f957a8d ipsec _updown 2>&1: Aug 26 18:34:00.685257: | route_and_eroute: firewall_notified: true Aug 26 18:34:00.685275: | running updown command "ipsec _updown" for verb prepare Aug 26 18:34:00.685279: | command executing prepare-client Aug 26 18:34:00.685311: | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x8e88b43a Aug 26 18:34:00.685318: | popen cmd is 1028 chars long Aug 26 18:34:00.685321: | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west' PLUTO_IN: Aug 26 18:34:00.685323: | cmd( 80):TERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@w: Aug 26 18:34:00.685325: | cmd( 160):est' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLI: Aug 26 18:34:00.685326: | cmd( 240):ENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID=: Aug 26 18:34:00.685328: | cmd( 320):'16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_: Aug 26 18:34:00.685330: | cmd( 400):PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_M: Aug 26 18:34:00.685332: | cmd( 480):ASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='': Aug 26 18:34:00.685333: | cmd( 560): PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PF: Aug 26 18:34:00.685335: | cmd( 640):S+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANEN: Aug 26 18:34:00.685337: | cmd( 720):T' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEE: Aug 26 18:34:00.685338: | cmd( 800):R_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0: Aug 26 18:34:00.685340: | cmd( 880):' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI: Aug 26 18:34:00.685342: | cmd( 960):_SHARED='no' SPI_IN=0x8e88b43a SPI_OUT=0x8f957a8d ipsec _updown 2>&1: Aug 26 18:34:00.692814: | running updown command "ipsec _updown" for verb route Aug 26 18:34:00.692832: | command executing route-client Aug 26 18:34:00.692857: | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x8e88b43a SPI_ Aug 26 18:34:00.692860: | popen cmd is 1026 chars long Aug 26 18:34:00.692862: | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west' PLUTO_INTE: Aug 26 18:34:00.692864: | cmd( 80):RFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@wes: Aug 26 18:34:00.692865: | cmd( 160):t' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIEN: Aug 26 18:34:00.692867: | cmd( 240):T_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='1: Aug 26 18:34:00.692869: | cmd( 320):6388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PE: Aug 26 18:34:00.692870: | cmd( 400):ER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MAS: Aug 26 18:34:00.692876: | cmd( 480):K='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' P: Aug 26 18:34:00.692878: | cmd( 560):LUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+: Aug 26 18:34:00.692879: | cmd( 640):UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT': Aug 26 18:34:00.692881: | cmd( 720): PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_: Aug 26 18:34:00.692883: | cmd( 800):DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' : Aug 26 18:34:00.692884: | cmd( 880):PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_S: Aug 26 18:34:00.692886: | cmd( 960):HARED='no' SPI_IN=0x8e88b43a SPI_OUT=0x8f957a8d ipsec _updown 2>&1: Aug 26 18:34:00.704377: | route_and_eroute: instance "west", setting eroute_owner {spd=0x55f2f38859c8,sr=0x55f2f38859c8} to #2 (was #0) (newest_ipsec_sa=#0) Aug 26 18:34:00.704477: | #1 spent 1.77 milliseconds in install_ipsec_sa() Aug 26 18:34:00.704488: | inR2: instance west[0], setting IKEv2 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1 Aug 26 18:34:00.704493: | state #2 requesting EVENT_RETRANSMIT to be deleted Aug 26 18:34:00.704498: | #2 STATE_PARENT_I2: retransmits: cleared Aug 26 18:34:00.704512: | libevent_free: release ptr-libevent@0x55f2f388a7a8 Aug 26 18:34:00.704519: | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f9afc002b78 Aug 26 18:34:00.704528: | #2 spent 2.44 milliseconds in processing: Initiator: process IKE_AUTH response in ikev2_process_state_packet() Aug 26 18:34:00.704538: | [RE]START processing: state #2 connection "west" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 18:34:00.704544: | #2 complete_v2_state_transition() PARENT_I2->V2_IPSEC_I with status STF_OK Aug 26 18:34:00.704548: | IKEv2: transition from state STATE_PARENT_I2 to state STATE_V2_IPSEC_I Aug 26 18:34:00.704553: | child state #2: PARENT_I2(open IKE SA) => V2_IPSEC_I(established CHILD SA) Aug 26 18:34:00.704557: | Message ID: updating counters for #2 to 1 after switching state Aug 26 18:34:00.704566: | Message ID: recv #1.#2 response 1; ike: initiator.sent=1 initiator.recv=0->1 responder.sent=-1 responder.recv=-1; child: wip.initiator=1->-1 wip.responder=-1 Aug 26 18:34:00.704572: | Message ID: #1.#2 skipping update_send as nothing to send; initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 Aug 26 18:34:00.704576: | pstats #2 ikev2.child established Aug 26 18:34:00.704586: "west" #2: negotiated connection [192.0.1.0-192.0.1.255:0-65535 0] -> [192.0.2.0-192.0.2.255:0-65535 0] Aug 26 18:34:00.704599: | NAT-T: encaps is 'auto' Aug 26 18:34:00.704604: "west" #2: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0x8e88b43a <0x8f957a8d xfrm=AES_GCM_16_256-NONE NATOA=none NATD=none DPD=passive} Aug 26 18:34:00.704609: | releasing whack for #2 (sock=fd@25) Aug 26 18:34:00.704614: | close_any(fd@25) (in release_whack() at state.c:654) Aug 26 18:34:00.704617: | releasing whack and unpending for parent #1 Aug 26 18:34:00.704621: | unpending state #1 connection "west" Aug 26 18:34:00.704627: | delete from pending Child SA with 192.1.2.23 "west" Aug 26 18:34:00.704630: | removing pending policy for no connection {0x55f2f3878568} Aug 26 18:34:00.704640: | close_any(fd@24) (in release_whack() at state.c:654) Aug 26 18:34:00.704648: | #2 will start re-keying in 28795 seconds with margin of 5 seconds (attempting re-key) Aug 26 18:34:00.704654: | event_schedule: new EVENT_SA_REKEY-pe@0x7f9afc002b78 Aug 26 18:34:00.704658: | inserting event EVENT_SA_REKEY, timeout in 28795 seconds for #2 Aug 26 18:34:00.704661: | libevent_malloc: new ptr-libevent@0x55f2f388ccd8 size 128 Aug 26 18:34:00.704668: | stop processing: state #2 connection "west" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) Aug 26 18:34:00.704674: | #1 spent 2.8 milliseconds in ikev2_process_packet() Aug 26 18:34:00.704680: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Aug 26 18:34:00.704688: | processing: STOP state #0 (in process_md() at demux.c:382) Aug 26 18:34:00.704692: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:34:00.704696: | spent 2.82 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:34:00.704710: | processing signal PLUTO_SIGCHLD Aug 26 18:34:00.704716: | waitpid returned ECHILD (no child processes left) Aug 26 18:34:00.704721: | spent 0.00614 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 18:34:00.704724: | processing signal PLUTO_SIGCHLD Aug 26 18:34:00.704729: | waitpid returned ECHILD (no child processes left) Aug 26 18:34:00.704733: | spent 0.00374 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 18:34:00.704736: | processing signal PLUTO_SIGCHLD Aug 26 18:34:00.704739: | waitpid returned ECHILD (no child processes left) Aug 26 18:34:00.704743: | spent 0.00332 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 18:34:03.908163: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:34:03.908181: | FOR_EACH_STATE_... in show_traffic_status (sort_states) Aug 26 18:34:03.908185: | FOR_EACH_STATE_... in sort_states Aug 26 18:34:03.908190: | get_sa_info esp.8f957a8d@192.1.2.45 Aug 26 18:34:03.908203: | get_sa_info esp.8e88b43a@192.1.2.23 Aug 26 18:34:03.908218: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:34:03.908225: | spent 0.068 milliseconds in whack