FIPS Product: YES FIPS Kernel: NO FIPS Mode: NO NSS DB directory: sql:/etc/ipsec.d Initializing NSS Opening NSS database "sql:/etc/ipsec.d" read-only NSS initialized NSS crypto library initialized FIPS HMAC integrity support [enabled] FIPS mode disabled for pluto daemon FIPS HMAC integrity verification self-test FAILED libcap-ng support [enabled] Linux audit support [enabled] Linux audit activated Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:3257 core dump dir: /var/tmp secrets file: /etc/ipsec.secrets leak-detective enabled NSS crypto [enabled] XAUTH PAM support [enabled] | libevent is using pluto's memory allocator Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) | libevent_malloc: new ptr-libevent@0x55767b865988 size 40 | libevent_malloc: new ptr-libevent@0x55767b865908 size 40 | libevent_malloc: new ptr-libevent@0x55767b865888 size 40 | creating event base | libevent_malloc: new ptr-libevent@0x55767b8574b8 size 56 | libevent_malloc: new ptr-libevent@0x55767b7d3ac8 size 664 | libevent_malloc: new ptr-libevent@0x55767b89ff88 size 24 | libevent_malloc: new ptr-libevent@0x55767b89ffd8 size 384 | libevent_malloc: new ptr-libevent@0x55767b89ff48 size 16 | libevent_malloc: new ptr-libevent@0x55767b865808 size 40 | libevent_malloc: new ptr-libevent@0x55767b865788 size 48 | libevent_realloc: new ptr-libevent@0x55767b7d3758 size 256 | libevent_malloc: new ptr-libevent@0x55767b8a0188 size 16 | libevent_free: release ptr-libevent@0x55767b8574b8 | libevent initialized | libevent_realloc: new ptr-libevent@0x55767b8574b8 size 64 | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds | init_nat_traversal() initialized with keep_alive=0s NAT-Traversal support [enabled] | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized | global one-shot timer EVENT_FREE_ROOT_CERTS initialized | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds | global one-shot timer EVENT_REVIVE_CONNS initialized | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Encryption algorithms: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac NULL IKEv1: ESP IKEv2: ESP [] CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Hash algorithms: MD5 IKEv1: IKE IKEv2: SHA1 IKEv1: IKE IKEv2: FIPS sha SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 PRF algorithms: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Integrity algorithms: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac NONE IKEv1: ESP IKEv2: IKE ESP FIPS null DH algorithms: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 testing CAMELLIA_CBC: Camellia: 16 bytes with 128-bit key Camellia: 16 bytes with 128-bit key Camellia: 16 bytes with 256-bit key Camellia: 16 bytes with 256-bit key testing AES_GCM_16: empty string one block two blocks two blocks with associated data testing AES_CTR: Encrypting 16 octets using AES-CTR with 128-bit key Encrypting 32 octets using AES-CTR with 128-bit key Encrypting 36 octets using AES-CTR with 128-bit key Encrypting 16 octets using AES-CTR with 192-bit key Encrypting 32 octets using AES-CTR with 192-bit key Encrypting 36 octets using AES-CTR with 192-bit key Encrypting 16 octets using AES-CTR with 256-bit key Encrypting 32 octets using AES-CTR with 256-bit key Encrypting 36 octets using AES-CTR with 256-bit key testing AES_CBC: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key testing AES_XCBC: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) testing HMAC_MD5: RFC 2104: MD5_HMAC test 1 RFC 2104: MD5_HMAC test 2 RFC 2104: MD5_HMAC test 3 8 CPU cores online starting up 7 crypto helpers started thread for crypto helper 0 | starting up helper thread 0 | starting up helper thread 1 started thread for crypto helper 1 | status value returned by setting the priority of this thread (crypto helper 1) 22 | crypto helper 1 waiting (nothing to do) | status value returned by setting the priority of this thread (crypto helper 0) 22 | crypto helper 0 waiting (nothing to do) started thread for crypto helper 2 | starting up helper thread 2 | status value returned by setting the priority of this thread (crypto helper 2) 22 | crypto helper 2 waiting (nothing to do) started thread for crypto helper 3 | starting up helper thread 3 | status value returned by setting the priority of this thread (crypto helper 3) 22 | crypto helper 3 waiting (nothing to do) started thread for crypto helper 4 | starting up helper thread 4 | status value returned by setting the priority of this thread (crypto helper 4) 22 | crypto helper 4 waiting (nothing to do) started thread for crypto helper 5 | starting up helper thread 5 | status value returned by setting the priority of this thread (crypto helper 5) 22 | crypto helper 5 waiting (nothing to do) started thread for crypto helper 6 | starting up helper thread 6 | checking IKEv1 state table | status value returned by setting the priority of this thread (crypto helper 6) 22 | crypto helper 6 waiting (nothing to do) | MAIN_R0: category: half-open IKE SA flags: 0: | -> MAIN_R1 EVENT_SO_DISCARD | MAIN_I1: category: half-open IKE SA flags: 0: | -> MAIN_I2 EVENT_RETRANSMIT | MAIN_R1: category: open IKE SA flags: 200: | -> MAIN_R2 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_I2: category: open IKE SA flags: 0: | -> MAIN_I3 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_R2: category: open IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | -> MAIN_R3 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_I3: category: open IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | -> MAIN_I4 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_R3: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | MAIN_I4: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | AGGR_R0: category: half-open IKE SA flags: 0: | -> AGGR_R1 EVENT_SO_DISCARD | AGGR_I1: category: half-open IKE SA flags: 0: | -> AGGR_I2 EVENT_SA_REPLACE | -> AGGR_I2 EVENT_SA_REPLACE | AGGR_R1: category: open IKE SA flags: 200: | -> AGGR_R2 EVENT_SA_REPLACE | -> AGGR_R2 EVENT_SA_REPLACE | AGGR_I2: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | AGGR_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | QUICK_R0: category: established CHILD SA flags: 0: | -> QUICK_R1 EVENT_RETRANSMIT | QUICK_I1: category: established CHILD SA flags: 0: | -> QUICK_I2 EVENT_SA_REPLACE | QUICK_R1: category: established CHILD SA flags: 0: | -> QUICK_R2 EVENT_SA_REPLACE | QUICK_I2: category: established CHILD SA flags: 200: | -> UNDEFINED EVENT_NULL | QUICK_R2: category: established CHILD SA flags: 0: | -> UNDEFINED EVENT_NULL | INFO: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | INFO_PROTECTED: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | XAUTH_R0: category: established IKE SA flags: 0: | -> XAUTH_R1 EVENT_NULL | XAUTH_R1: category: established IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | MODE_CFG_R0: category: informational flags: 0: | -> MODE_CFG_R1 EVENT_SA_REPLACE | MODE_CFG_R1: category: established IKE SA flags: 0: | -> MODE_CFG_R2 EVENT_SA_REPLACE | MODE_CFG_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | MODE_CFG_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | XAUTH_I0: category: established IKE SA flags: 0: | -> XAUTH_I1 EVENT_RETRANSMIT | XAUTH_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_RETRANSMIT | checking IKEv2 state table | PARENT_I0: category: ignore flags: 0: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) | PARENT_I1: category: half-open IKE SA flags: 0: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) | PARENT_I2: category: open IKE SA flags: 0: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) | PARENT_I3: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) | PARENT_R0: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) | PARENT_R1: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) | PARENT_R2: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) | V2_CREATE_I0: category: established IKE SA flags: 0: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) | V2_CREATE_I: category: established IKE SA flags: 0: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) | V2_REKEY_IKE_I: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: | V2_CREATE_R: category: established IKE SA flags: 0: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) | V2_REKEY_IKE_R: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: | V2_IPSEC_I: category: established CHILD SA flags: 0: | V2_IPSEC_R: category: established CHILD SA flags: 0: | IKESA_DEL: category: established IKE SA flags: 0: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) | CHILDSA_DEL: category: informational flags: 0: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 | Hard-wiring algorithms | adding AES_CCM_16 to kernel algorithm db | adding AES_CCM_12 to kernel algorithm db | adding AES_CCM_8 to kernel algorithm db | adding 3DES_CBC to kernel algorithm db | adding CAMELLIA_CBC to kernel algorithm db | adding AES_GCM_16 to kernel algorithm db | adding AES_GCM_12 to kernel algorithm db | adding AES_GCM_8 to kernel algorithm db | adding AES_CTR to kernel algorithm db | adding AES_CBC to kernel algorithm db | adding SERPENT_CBC to kernel algorithm db | adding TWOFISH_CBC to kernel algorithm db | adding NULL_AUTH_AES_GMAC to kernel algorithm db | adding NULL to kernel algorithm db | adding CHACHA20_POLY1305 to kernel algorithm db | adding HMAC_MD5_96 to kernel algorithm db | adding HMAC_SHA1_96 to kernel algorithm db | adding HMAC_SHA2_512_256 to kernel algorithm db | adding HMAC_SHA2_384_192 to kernel algorithm db | adding HMAC_SHA2_256_128 to kernel algorithm db | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db | adding AES_XCBC_96 to kernel algorithm db | adding AES_CMAC_96 to kernel algorithm db | adding NONE to kernel algorithm db | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds | setup kernel fd callback | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x55767b85f6a8 | libevent_malloc: new ptr-libevent@0x55767b89e608 size 128 | libevent_malloc: new ptr-libevent@0x55767b8a5818 size 16 | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x55767b8a57a8 | libevent_malloc: new ptr-libevent@0x55767b89e6b8 size 128 | libevent_malloc: new ptr-libevent@0x55767b8a5478 size 16 | global one-shot timer EVENT_CHECK_CRLS initialized selinux support is enabled. | unbound context created - setting debug level to 5 | /etc/hosts lookups activated | /etc/resolv.conf usage activated | outgoing-port-avoid set 0-65535 | outgoing-port-permit set 32768-60999 | Loading dnssec root key from:/var/lib/unbound/root.key | No additional dnssec trust anchors defined via dnssec-trusted= option | Setting up events, loop start | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x55767b8a5c48 | libevent_malloc: new ptr-libevent@0x55767b8b1aa8 size 128 | libevent_malloc: new ptr-libevent@0x55767b8bcd98 size 16 | libevent_realloc: new ptr-libevent@0x55767b8bcdd8 size 256 | libevent_malloc: new ptr-libevent@0x55767b8bcf08 size 8 | libevent_realloc: new ptr-libevent@0x55767b8bcf48 size 144 | libevent_malloc: new ptr-libevent@0x55767b863c78 size 152 | libevent_malloc: new ptr-libevent@0x55767b8bd008 size 16 | signal event handler PLUTO_SIGCHLD installed | libevent_malloc: new ptr-libevent@0x55767b8bd048 size 8 | libevent_malloc: new ptr-libevent@0x55767b7d5028 size 152 | signal event handler PLUTO_SIGTERM installed | libevent_malloc: new ptr-libevent@0x55767b8bd088 size 8 | libevent_malloc: new ptr-libevent@0x55767b7dca18 size 152 | signal event handler PLUTO_SIGHUP installed | libevent_malloc: new ptr-libevent@0x55767b8bd0c8 size 8 | libevent_realloc: release ptr-libevent@0x55767b8bcf48 | libevent_realloc: new ptr-libevent@0x55767b8bd108 size 256 | libevent_malloc: new ptr-libevent@0x55767b8bd238 size 152 | signal event handler PLUTO_SIGSYS installed | created addconn helper (pid:3416) using fork+execve | forked child 3416 | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.0.2.254 | Inspecting interface eth1 | found eth1 with address 192.1.2.23 Kernel supports NIC esp-hw-offload adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.23:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth1/eth1 192.1.2.23:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.2.254:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.0.2.254:4500 adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface lo/lo 127.0.0.1:4500 | no interfaces to sort | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | add_fd_read_event_handler: new ethX-pe@0x55767b8bd818 | libevent_malloc: new ptr-libevent@0x55767b8b19f8 size 128 | libevent_malloc: new ptr-libevent@0x55767b8bd888 size 16 | setup callback for interface lo 127.0.0.1:4500 fd 22 | add_fd_read_event_handler: new ethX-pe@0x55767b8bd8c8 | libevent_malloc: new ptr-libevent@0x55767b858168 size 128 | libevent_malloc: new ptr-libevent@0x55767b8bd938 size 16 | setup callback for interface lo 127.0.0.1:500 fd 21 | add_fd_read_event_handler: new ethX-pe@0x55767b8bd978 | libevent_malloc: new ptr-libevent@0x55767b858218 size 128 | libevent_malloc: new ptr-libevent@0x55767b8bd9e8 size 16 | setup callback for interface eth0 192.0.2.254:4500 fd 20 | add_fd_read_event_handler: new ethX-pe@0x55767b8bda28 | libevent_malloc: new ptr-libevent@0x55767b8571d8 size 128 | libevent_malloc: new ptr-libevent@0x55767b8bda98 size 16 | setup callback for interface eth0 192.0.2.254:500 fd 19 | add_fd_read_event_handler: new ethX-pe@0x55767b8bdad8 | libevent_malloc: new ptr-libevent@0x55767b85f4e8 size 128 | libevent_malloc: new ptr-libevent@0x55767b8bdb48 size 16 | setup callback for interface eth1 192.1.2.23:4500 fd 18 | add_fd_read_event_handler: new ethX-pe@0x55767b8bdb88 | libevent_malloc: new ptr-libevent@0x55767b860008 size 128 | libevent_malloc: new ptr-libevent@0x55767b8bdbf8 size 16 | setup callback for interface eth1 192.1.2.23:500 fd 17 | certs and keys locked by 'free_preshared_secrets' | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | saving Modulus | saving PublicExponent | ignoring PrivateExponent | ignoring Prime1 | ignoring Prime2 | ignoring Exponent1 | ignoring Exponent2 | ignoring Coefficient | ignoring CKAIDNSS | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 | computed rsa CKAID 8a 82 25 f1 loaded private key for keyid: PKK_RSA:AQO9bJbr3 | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.824 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.0.2.254 | Inspecting interface eth1 | found eth1 with address 192.1.2.23 | no interfaces to sort | libevent_free: release ptr-libevent@0x55767b8b19f8 | free_event_entry: release EVENT_NULL-pe@0x55767b8bd818 | add_fd_read_event_handler: new ethX-pe@0x55767b8bd818 | libevent_malloc: new ptr-libevent@0x55767b8b19f8 size 128 | setup callback for interface lo 127.0.0.1:4500 fd 22 | libevent_free: release ptr-libevent@0x55767b858168 | free_event_entry: release EVENT_NULL-pe@0x55767b8bd8c8 | add_fd_read_event_handler: new ethX-pe@0x55767b8bd8c8 | libevent_malloc: new ptr-libevent@0x55767b858168 size 128 | setup callback for interface lo 127.0.0.1:500 fd 21 | libevent_free: release ptr-libevent@0x55767b858218 | free_event_entry: release EVENT_NULL-pe@0x55767b8bd978 | add_fd_read_event_handler: new ethX-pe@0x55767b8bd978 | libevent_malloc: new ptr-libevent@0x55767b858218 size 128 | setup callback for interface eth0 192.0.2.254:4500 fd 20 | libevent_free: release ptr-libevent@0x55767b8571d8 | free_event_entry: release EVENT_NULL-pe@0x55767b8bda28 | add_fd_read_event_handler: new ethX-pe@0x55767b8bda28 | libevent_malloc: new ptr-libevent@0x55767b8571d8 size 128 | setup callback for interface eth0 192.0.2.254:500 fd 19 | libevent_free: release ptr-libevent@0x55767b85f4e8 | free_event_entry: release EVENT_NULL-pe@0x55767b8bdad8 | add_fd_read_event_handler: new ethX-pe@0x55767b8bdad8 | libevent_malloc: new ptr-libevent@0x55767b85f4e8 size 128 | setup callback for interface eth1 192.1.2.23:4500 fd 18 | libevent_free: release ptr-libevent@0x55767b860008 | free_event_entry: release EVENT_NULL-pe@0x55767b8bdb88 | add_fd_read_event_handler: new ethX-pe@0x55767b8bdb88 | libevent_malloc: new ptr-libevent@0x55767b860008 size 128 | setup callback for interface eth1 192.1.2.23:500 fd 17 | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | saving Modulus | saving PublicExponent | ignoring PrivateExponent | ignoring Prime1 | ignoring Prime2 | ignoring Exponent1 | ignoring Exponent2 | ignoring Coefficient | ignoring CKAIDNSS | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 | computed rsa CKAID 8a 82 25 f1 loaded private key for keyid: PKK_RSA:AQO9bJbr3 | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.296 milliseconds in whack | processing signal PLUTO_SIGCHLD | waitpid returned pid 3416 (exited with status 0) | reaped addconn helper child (status 0) | waitpid returned ECHILD (no child processes left) | spent 0.0151 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection northnet-eastnet-nat with policy ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | No AUTH policy was set - defaulting to RSASIG | counting wild cards for %fromcert is 0 | setting ID to ID_DER_ASN1_DN: 'E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' | loading right certificate 'east' pubkey | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55767b8bfcc8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55767b8bfc78 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55767b8bfc28 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55767b8bf978 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55767b8bf928 | unreference key: 0x55767b8bfd18 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | certs and keys locked by 'lsw_add_rsa_secret' | certs and keys unlocked by 'lsw_add_rsa_secret' | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org is 0 | based upon policy, the connection is a template. | connect_to_host_pair: 192.1.2.23:500 0.0.0.0:500 -> hp@(nil): none | new hp@0x55767b8c5688 added connection description "northnet-eastnet-nat" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.0.2.0/24===192.1.2.23<192.1.2.23>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org]---192.1.2.254...%virtual[%fromcert]===vnet:? | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.903 milliseconds in whack | spent 0.00296 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 792 bytes from 192.1.2.254:500 on eth1 (192.1.2.23:500) | 47 05 87 28 0a 02 22 3b 00 00 00 00 00 00 00 00 | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 | 7c fd b2 fc 68 b6 a4 48 | start processing: from 192.1.2.254:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 47 05 87 28 0a 02 22 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_SA (0x1) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | length: 792 (0x318) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) | State DB: IKEv1 state not found (find_state_ikev1_init) | #null state always idle | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 644 (0x284) | DOI: ISAKMP_DOI_IPSEC (0x1) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 20 (0x14) | message 'main_inI1_outR1' HASH payload not checked early | received Vendor ID payload [FRAGMENTATION] | received Vendor ID payload [Dead Peer Detection] | quirks.qnat_traversal_vid set to=117 [RFC 3947] | received Vendor ID payload [RFC 3947] | Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] | Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] | Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] | in statetime_start() with no state | find_host_connection local=192.1.2.23:500 remote=192.1.2.254:500 policy=IKEV1_ALLOW but ignoring ports | find_next_host_connection policy=IKEV1_ALLOW | find_next_host_connection returns empty | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 632 (0x278) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 18 (0x12) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 36 (0x24) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 36 (0x24) | ISAKMP transform number: 1 (0x1) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 36 (0x24) | ISAKMP transform number: 2 (0x2) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 36 (0x24) | ISAKMP transform number: 3 (0x3) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 36 (0x24) | ISAKMP transform number: 4 (0x4) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 36 (0x24) | ISAKMP transform number: 5 (0x5) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 36 (0x24) | ISAKMP transform number: 6 (0x6) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 36 (0x24) | ISAKMP transform number: 7 (0x7) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 36 (0x24) | ISAKMP transform number: 8 (0x8) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 36 (0x24) | ISAKMP transform number: 9 (0x9) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 36 (0x24) | ISAKMP transform number: 10 (0xa) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 36 (0x24) | ISAKMP transform number: 11 (0xb) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 32 (0x20) | ISAKMP transform number: 12 (0xc) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 32 (0x20) | ISAKMP transform number: 13 (0xd) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 32 (0x20) | ISAKMP transform number: 14 (0xe) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 32 (0x20) | ISAKMP transform number: 15 (0xf) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 32 (0x20) | ISAKMP transform number: 16 (0x10) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | ISAKMP transform number: 17 (0x11) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | find_host_connection local=192.1.2.23:500 remote= policy=RSASIG+IKEV1_ALLOW but ignoring ports | find_host_pair: comparing 192.1.2.23:500 to 0.0.0.0:500 but ignoring ports | find_next_host_connection policy=RSASIG+IKEV1_ALLOW | found policy = RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (northnet-eastnet-nat) | find_next_host_connection returns northnet-eastnet-nat | find_next_host_connection policy=RSASIG+IKEV1_ALLOW | find_next_host_connection returns empty | instantiating "northnet-eastnet-nat" for initial Main Mode message received on 192.1.2.23:500 | connect_to_host_pair: 192.1.2.23:500 192.1.2.254:500 -> hp@(nil): none | new hp@0x55767b8c4258 | rw_instantiate() instantiated "northnet-eastnet-nat"[1] 192.1.2.254 for 192.1.2.254 | creating state object #1 at 0x55767b8c6e48 | State DB: adding IKEv1 state #1 in UNDEFINED | pstats #1 ikev1.isakmp started | #1 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) | start processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254:500 (in main_inI1_outR1() at ikev1_main.c:667) | parent state #1: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) | sender checking NAT-T: enabled; VID 117 | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) "northnet-eastnet-nat"[1] 192.1.2.254 #1: responding to Main Mode from unknown peer 192.1.2.254 on port 500 | ICOOKIE-DUMP: 47 05 87 28 0a 02 22 3b | **emit ISAKMP Message: | initiator cookie: | 47 05 87 28 0a 02 22 3b | responder cookie: | 7a fa 89 ce 72 e7 db 5c | next payload type: ISAKMP_NEXT_SA (0x1) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 632 (0x278) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 18 (0x12) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 36 (0x24) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | OAKLEY proposal verified unconditionally; no alg_info to check against | Oakley Transform 0 accepted | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 1 (0x1) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | emitting 28 raw bytes of attributes into ISAKMP Transform Payload (ISAKMP) | attributes 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 | attributes 80 03 00 03 80 04 00 0e 80 0e 01 00 | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | emitting length of ISAKMP Proposal Payload: 44 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 56 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | out_vid(): sending [FRAGMENTATION] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [Dead Peer Detection] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [RFC 3947] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | emitting length of ISAKMP Vendor ID Payload: 20 | no IKEv1 message padding required | emitting length of ISAKMP Message: 144 | complete v1 state transition with STF_OK | [RE]START processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254:500 (in complete_v1_state_transition() at ikev1.c:2673) | #1 is idle | doing_xauth:no, t_xauth_client_done:no | peer supports fragmentation | peer supports DPD | IKEv1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 | parent state #1: MAIN_R0(half-open IKE SA) => MAIN_R1(open IKE SA) | event_already_set, deleting event | sending reply packet to 192.1.2.254:500 (from 192.1.2.23:500) | sending 144 bytes for STATE_MAIN_R0 through eth1 from 192.1.2.23:500 to 192.1.2.254:500 (using #1) | 47 05 87 28 0a 02 22 3b 7a fa 89 ce 72 e7 db 5c | 01 10 02 00 00 00 00 00 00 00 00 90 0d 00 00 38 | 00 00 00 01 00 00 00 01 00 00 00 2c 00 01 00 01 | 00 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e | 80 0e 01 00 0d 00 00 14 40 48 b7 d5 6e bc e8 85 | 25 e7 de 7f 00 d6 c2 d3 0d 00 00 14 af ca d7 13 | 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 00 00 00 14 | 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | !event_already_set at reschedule | event_schedule: new EVENT_SO_DISCARD-pe@0x55767b8bfca8 | inserting event EVENT_SO_DISCARD, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x55767b8bf878 size 128 "northnet-eastnet-nat"[1] 192.1.2.254 #1: STATE_MAIN_R1: sent MR1, expecting MI2 | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | stop processing: from 192.1.2.254:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 1.57 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00289 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 396 bytes from 192.1.2.254:500 on eth1 (192.1.2.23:500) | 47 05 87 28 0a 02 22 3b 7a fa 89 ce 72 e7 db 5c | 04 10 02 00 00 00 00 00 00 00 01 8c 0a 00 01 04 | 2c 11 f5 8d 12 58 5a b2 d7 af a5 e8 65 2a a6 4b | 48 33 72 3b ea 7f 3e 15 9f 35 0a 67 98 e3 f8 70 | bd ce fa bc 3a 68 93 29 5d b2 ab bd cb 8c 5a 96 | 9f bf 5e 20 4e 75 53 c4 9c 9c 34 91 c4 9b a7 dd | a3 62 fb fc ef 1b 7d d5 de c4 78 2e d9 a1 3f 77 | f7 dc 4f 7b e7 bb 3d 3f c8 bc c7 45 2a 3f 45 e2 | 85 d4 0c 6e e0 ca 64 51 b5 a5 a3 41 e4 d6 50 f3 | ff 11 7b c9 d7 36 0e 8f de 45 db ba 35 0d 0d ec | d2 94 a5 65 14 c5 5d c5 8f 1d ec 17 ec 97 0e 50 | 1b 18 02 42 29 bf d1 4c 30 eb 83 13 17 03 f8 55 | ae d0 44 af 65 0d 75 ea 94 c8 8d bb 67 ed 13 83 | 84 e3 e8 b8 58 7c be 29 e3 e1 02 cf 11 8f 23 8f | 22 68 6e 41 b3 a5 fd c9 fc b2 03 6e e7 a8 11 1e | 57 14 08 13 e6 36 af 23 2e 0b 03 7e 13 99 d5 0b | 4e b0 c3 b5 2f 79 07 53 0a a5 cf 0a 3d 9a 07 7e | fa 1b af cc 7d 69 51 47 e4 ce 09 65 94 33 5c 71 | 14 00 00 24 f4 d6 42 92 5b 1b 33 34 db 70 38 1d | 04 45 27 bd 93 99 b0 85 ca b8 65 ca e0 4c d6 6b | 52 6d 49 a2 14 00 00 24 d2 68 56 b9 9b d8 59 c3 | 40 f6 08 8c 9d 61 72 09 08 45 79 a2 ad cc 40 0b | 5b f3 d3 99 42 f5 a0 92 00 00 00 24 8e 66 22 56 | 85 ec 36 16 a6 5d f3 02 7d 73 59 89 bd 9a 7d 6d | c7 e0 c2 c1 f1 f1 d7 8b 9b 06 11 f1 | start processing: from 192.1.2.254:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 47 05 87 28 0a 02 22 3b | responder cookie: | 7a fa 89 ce 72 e7 db 5c | next payload type: ISAKMP_NEXT_KE (0x4) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | length: 396 (0x18c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) | State DB: found IKEv1 state #1 in MAIN_R1 (find_state_ikev1) | start processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254:500 (in process_v1_packet() at ikev1.c:1459) | #1 is idle | #1 idle | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080 | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | length: 260 (0x104) | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080 | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | length: 36 (0x24) | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 | ***parse ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | length: 36 (0x24) | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 | ***parse ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 36 (0x24) | message 'main_inI2_outR2' HASH payload not checked early | init checking NAT-T: enabled; RFC 3947 (NAT-Traversal) | natd_hash: hasher=0x55767a60fca0(32) | natd_hash: icookie= 47 05 87 28 0a 02 22 3b | natd_hash: rcookie= 7a fa 89 ce 72 e7 db 5c | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d2 68 56 b9 9b d8 59 c3 40 f6 08 8c 9d 61 72 09 | natd_hash: hash= 08 45 79 a2 ad cc 40 0b 5b f3 d3 99 42 f5 a0 92 | natd_hash: hasher=0x55767a60fca0(32) | natd_hash: icookie= 47 05 87 28 0a 02 22 3b | natd_hash: rcookie= 7a fa 89 ce 72 e7 db 5c | natd_hash: ip= c0 01 02 fe | natd_hash: port=500 | natd_hash: hash= ac 8f a2 af ca f0 0d 02 69 19 a2 20 aa 89 26 bc | natd_hash: hash= 0a 68 a4 16 ec 29 37 c5 6b 92 15 32 43 47 ab 82 | expected NAT-D(me): d2 68 56 b9 9b d8 59 c3 40 f6 08 8c 9d 61 72 09 | expected NAT-D(me): 08 45 79 a2 ad cc 40 0b 5b f3 d3 99 42 f5 a0 92 | expected NAT-D(him): | ac 8f a2 af ca f0 0d 02 69 19 a2 20 aa 89 26 bc | 0a 68 a4 16 ec 29 37 c5 6b 92 15 32 43 47 ab 82 | received NAT-D: d2 68 56 b9 9b d8 59 c3 40 f6 08 8c 9d 61 72 09 | received NAT-D: 08 45 79 a2 ad cc 40 0b 5b f3 d3 99 42 f5 a0 92 | received NAT-D: 8e 66 22 56 85 ec 36 16 a6 5d f3 02 7d 73 59 89 | received NAT-D: bd 9a 7d 6d c7 e0 c2 c1 f1 f1 d7 8b 9b 06 11 f1 | NAT_TRAVERSAL encaps using auto-detect | NAT_TRAVERSAL this end is NOT behind NAT | NAT_TRAVERSAL that end is behind NAT 192.1.2.254 | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.254 | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: peer behind NAT | NAT_T_WITH_KA detected | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds | adding inI2_outR2 KE work-order 1 for state #1 | state #1 requesting EVENT_SO_DISCARD to be deleted | libevent_free: release ptr-libevent@0x55767b8bf878 | free_event_entry: release EVENT_SO_DISCARD-pe@0x55767b8bfca8 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55767b8bfca8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x55767b8c45c8 size 128 | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254:500 (in complete_v1_state_transition() at ikev1.c:2648) | crypto helper 1 resuming | suspending state #1 and saving MD | #1 is busy; has a suspended MD | crypto helper 1 starting work-order 1 for state #1 | #1 spent 0.134 milliseconds in process_packet_tail() | crypto helper 1 doing build KE and nonce (inI2_outR2 KE); request ID 1 | stop processing: from 192.1.2.254:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.287 milliseconds in comm_handle_cb() reading and processing packet | crypto helper 1 finished build KE and nonce (inI2_outR2 KE); request ID 1 time elapsed 0.000589 seconds | (#1) spent 0.591 milliseconds in crypto helper computing work-order 1: inI2_outR2 KE (pcr) | crypto helper 1 sending results from work-order 1 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7f07ac002888 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 1 | calling continuation function 0x55767a53ab50 | main_inI2_outR2_continue for #1: calculated ke+nonce, sending R2 | **emit ISAKMP Message: | initiator cookie: | 47 05 87 28 0a 02 22 3b | responder cookie: | 7a fa 89 ce 72 e7 db 5c | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value 5a 0d 7c 42 8a d1 8f 9b 4a f7 28 1c 36 73 b1 74 | keyex value 24 6d 32 06 cd 42 07 7e 2d 42 ea 45 84 f1 31 b4 | keyex value 2d 43 07 63 a5 98 f0 c6 1e 53 b1 02 9b e3 9f 04 | keyex value 1d 41 97 fe 6f ec 87 88 b6 57 a5 29 d4 c1 fb e9 | keyex value 23 0e 47 61 30 45 dd 13 0e 02 7f eb 57 85 fd 66 | keyex value cb 1d 8d 6e 14 a0 9f f9 fb 6b 40 78 65 3d 64 b5 | keyex value 82 a1 cf 8b 1d 22 3d 1c 08 90 24 28 e2 b3 a6 df | keyex value 98 88 d6 32 b1 bc fa 03 c8 2b 65 de 2d c7 20 bf | keyex value 84 da 44 df a8 86 c6 8e 86 13 0d 46 72 f6 f3 95 | keyex value d0 a9 a6 aa 21 af 98 e6 66 e0 cc 75 79 9d b7 8b | keyex value 21 c7 57 3e 2d 01 e0 59 97 32 bf 5c 98 93 d8 5f | keyex value 53 9a 4b 52 a8 b4 e5 c0 f4 92 30 9c 74 f8 f0 25 | keyex value eb 14 91 f3 cb 14 d8 9b 17 40 09 6f b0 e4 21 a2 | keyex value e5 dc 4b cf 1b 05 09 0e 37 fa 8f a2 e9 2c 5e f3 | keyex value 6c bf 57 4b fa e4 3b bc da 94 f8 81 64 12 3c 76 | keyex value 02 6d 41 ad bf b0 ed 4d 17 fc 9f bc 00 7a ba ea | emitting length of ISAKMP Key Exchange Payload: 260 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_CR (0x7) | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 7:ISAKMP_NEXT_CR | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Nr into ISAKMP Nonce Payload | Nr 7b f8 ab 61 b5 48 ea ca 9a 1c 5a 32 0d 45 90 75 | Nr 8a 47 af 34 66 3f 04 99 a5 d7 aa ef d7 b9 f8 49 | emitting length of ISAKMP Nonce Payload: 36 | find_host_pair: comparing 192.1.2.23:500 to 0.0.0.0:500 but ignoring ports | ***emit ISAKMP Certificate RequestPayload: | next payload type: ISAKMP_NEXT_NONE (0x0) | cert type: CERT_X509_SIGNATURE (0x4) | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Certificate RequestPayload (7:ISAKMP_NEXT_CR) | next payload chain: saving location 'ISAKMP Certificate RequestPayload'.'next payload type' in 'reply packet' | emitting 175 raw bytes of CA into ISAKMP Certificate RequestPayload | CA 30 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 | CA 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | CA 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | CA 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | CA 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | CA 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | CA 6e 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 | CA 72 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 | CA 6f 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a | CA 86 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e | CA 67 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 | emitting length of ISAKMP Certificate RequestPayload: 180 | sending NAT-D payloads | natd_hash: hasher=0x55767a60fca0(32) | natd_hash: icookie= 47 05 87 28 0a 02 22 3b | natd_hash: rcookie= 7a fa 89 ce 72 e7 db 5c | natd_hash: ip= c0 01 02 fe | natd_hash: port=500 | natd_hash: hash= ac 8f a2 af ca f0 0d 02 69 19 a2 20 aa 89 26 bc | natd_hash: hash= 0a 68 a4 16 ec 29 37 c5 6b 92 15 32 43 47 ab 82 | ***emit ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | next payload chain: ignoring supplied 'ISAKMP NAT-D Payload'.'next payload type' value 20:ISAKMP_NEXT_NATD_RFC | next payload chain: setting previous 'ISAKMP Certificate RequestPayload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload | NAT-D ac 8f a2 af ca f0 0d 02 69 19 a2 20 aa 89 26 bc | NAT-D 0a 68 a4 16 ec 29 37 c5 6b 92 15 32 43 47 ab 82 | emitting length of ISAKMP NAT-D Payload: 36 | natd_hash: hasher=0x55767a60fca0(32) | natd_hash: icookie= 47 05 87 28 0a 02 22 3b | natd_hash: rcookie= 7a fa 89 ce 72 e7 db 5c | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= d2 68 56 b9 9b d8 59 c3 40 f6 08 8c 9d 61 72 09 | natd_hash: hash= 08 45 79 a2 ad cc 40 0b 5b f3 d3 99 42 f5 a0 92 | ***emit ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP NAT-D Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload | NAT-D d2 68 56 b9 9b d8 59 c3 40 f6 08 8c 9d 61 72 09 | NAT-D 08 45 79 a2 ad cc 40 0b 5b f3 d3 99 42 f5 a0 92 | emitting length of ISAKMP NAT-D Payload: 36 | no IKEv1 message padding required | emitting length of ISAKMP Message: 576 | main inI2_outR2: starting async DH calculation (group=14) | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org->%fromcert of kind PKK_PSK | actually looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org->%fromcert of kind PKK_PSK | line 0: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org) to type PKK_RSA | line 1: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org) to type PKK_RSA | concluding with best_match=000 best=(nil) (lineno=-1) | no PreShared Key Found | adding main_inI2_outR2_tail work-order 2 for state #1 | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55767b8c45c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55767b8bfca8 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55767b8bfca8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x55767b8bf878 size 128 | #1 main_inI2_outR2_continue1_tail:1165 st->st_calculating = FALSE; | complete v1 state transition with STF_OK | crypto helper 0 resuming | [RE]START processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254:500 (in complete_v1_state_transition() at ikev1.c:2673) | #1 is idle; has background offloaded task | crypto helper 0 starting work-order 2 for state #1 | doing_xauth:no, t_xauth_client_done:no | crypto helper 0 doing compute dh+iv (V1 Phase 1) (main_inI2_outR2_tail); request ID 2 | IKEv1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 | parent state #1: MAIN_R1(open IKE SA) => MAIN_R2(open IKE SA) | event_already_set, deleting event | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55767b8bf878 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55767b8bfca8 | sending reply packet to 192.1.2.254:500 (from 192.1.2.23:500) | sending 576 bytes for STATE_MAIN_R1 through eth1 from 192.1.2.23:500 to 192.1.2.254:500 (using #1) | 47 05 87 28 0a 02 22 3b 7a fa 89 ce 72 e7 db 5c | 04 10 02 00 00 00 00 00 00 00 02 40 0a 00 01 04 | 5a 0d 7c 42 8a d1 8f 9b 4a f7 28 1c 36 73 b1 74 | 24 6d 32 06 cd 42 07 7e 2d 42 ea 45 84 f1 31 b4 | 2d 43 07 63 a5 98 f0 c6 1e 53 b1 02 9b e3 9f 04 | 1d 41 97 fe 6f ec 87 88 b6 57 a5 29 d4 c1 fb e9 | 23 0e 47 61 30 45 dd 13 0e 02 7f eb 57 85 fd 66 | cb 1d 8d 6e 14 a0 9f f9 fb 6b 40 78 65 3d 64 b5 | 82 a1 cf 8b 1d 22 3d 1c 08 90 24 28 e2 b3 a6 df | 98 88 d6 32 b1 bc fa 03 c8 2b 65 de 2d c7 20 bf | 84 da 44 df a8 86 c6 8e 86 13 0d 46 72 f6 f3 95 | d0 a9 a6 aa 21 af 98 e6 66 e0 cc 75 79 9d b7 8b | 21 c7 57 3e 2d 01 e0 59 97 32 bf 5c 98 93 d8 5f | 53 9a 4b 52 a8 b4 e5 c0 f4 92 30 9c 74 f8 f0 25 | eb 14 91 f3 cb 14 d8 9b 17 40 09 6f b0 e4 21 a2 | e5 dc 4b cf 1b 05 09 0e 37 fa 8f a2 e9 2c 5e f3 | 6c bf 57 4b fa e4 3b bc da 94 f8 81 64 12 3c 76 | 02 6d 41 ad bf b0 ed 4d 17 fc 9f bc 00 7a ba ea | 07 00 00 24 7b f8 ab 61 b5 48 ea ca 9a 1c 5a 32 | 0d 45 90 75 8a 47 af 34 66 3f 04 99 a5 d7 aa ef | d7 b9 f8 49 14 00 00 b4 04 30 81 ac 31 0b 30 09 | 06 03 55 04 06 13 02 43 41 31 10 30 0e 06 03 55 | 04 08 0c 07 4f 6e 74 61 72 69 6f 31 10 30 0e 06 | 03 55 04 07 0c 07 54 6f 72 6f 6e 74 6f 31 12 30 | 10 06 03 55 04 0a 0c 09 4c 69 62 72 65 73 77 61 | 6e 31 18 30 16 06 03 55 04 0b 0c 0f 54 65 73 74 | 20 44 65 70 61 72 74 6d 65 6e 74 31 25 30 23 06 | 03 55 04 03 0c 1c 4c 69 62 72 65 73 77 61 6e 20 | 74 65 73 74 20 43 41 20 66 6f 72 20 6d 61 69 6e | 63 61 31 24 30 22 06 09 2a 86 48 86 f7 0d 01 09 | 01 16 15 74 65 73 74 69 6e 67 40 6c 69 62 72 65 | 73 77 61 6e 2e 6f 72 67 14 00 00 24 ac 8f a2 af | ca f0 0d 02 69 19 a2 20 aa 89 26 bc 0a 68 a4 16 | ec 29 37 c5 6b 92 15 32 43 47 ab 82 00 00 00 24 | d2 68 56 b9 9b d8 59 c3 40 f6 08 8c 9d 61 72 09 | 08 45 79 a2 ad cc 40 0b 5b f3 d3 99 42 f5 a0 92 | !event_already_set at reschedule | event_schedule: new EVENT_RETRANSMIT-pe@0x55767b8bfca8 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 | libevent_malloc: new ptr-libevent@0x55767b8bf878 size 128 | #1 STATE_MAIN_R2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29822.004688 "northnet-eastnet-nat"[1] 192.1.2.254 #1: STATE_MAIN_R2: sent MR2, expecting MI3 | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | resume sending helper answer for #1 suppresed complete_v1_state_transition() | #1 spent 0.419 milliseconds in resume sending helper answer | stop processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f07ac002888 | crypto helper 0 finished compute dh+iv (V1 Phase 1) (main_inI2_outR2_tail); request ID 2 time elapsed 0.000871 seconds | (#1) spent 0.878 milliseconds in crypto helper computing work-order 2: main_inI2_outR2_tail (pcr) | crypto helper 0 sending results from work-order 2 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7f07a4000f48 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 2 | calling continuation function 0x55767a53ab50 | main_inI2_outR2_calcdone for #1: calculate DH finished | [RE]START processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254:500 (in main_inI2_outR2_continue2() at ikev1_main.c:1015) | stop processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254:500 (in main_inI2_outR2_continue2() at ikev1_main.c:1028) | resume sending helper answer for #1 suppresed complete_v1_state_transition() | #1 spent 0.0206 milliseconds in resume sending helper answer | processing: STOP state #0 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f07a4000f48 | spent 0.00267 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 2028 bytes from 192.1.2.254:4500 on eth1 (192.1.2.23:4500) | 47 05 87 28 0a 02 22 3b 7a fa 89 ce 72 e7 db 5c | 05 10 02 01 00 00 00 00 00 00 07 ec cc b2 1f 18 | f5 93 07 b6 f3 2a 87 fc 89 33 dc 67 00 a6 7f b7 | ac e0 3f 58 4c 18 71 4c 39 32 85 93 cc 36 b9 55 | 2e ad 34 fa 31 41 4b 84 fb 5c c1 ff cd 0a 3d 78 | 45 e8 68 48 13 3e 8b 59 74 05 32 5c 3b 3f d5 ed | 0a 14 d4 aa fe 08 ce 29 92 54 df 2a 9f 54 4f c7 | 52 4b eb 9a 0b 8a 0c f9 a7 97 fd 27 75 56 54 ff | 0d cf ec d0 89 f2 cf 27 fe 7a b5 3d 9d 64 1e 1d | 71 31 1d 73 e1 42 9f 30 45 7b b6 12 f1 0f c3 24 | bf a8 ff 53 99 0f 58 9c 93 31 16 e5 90 82 2f 7d | 42 c9 25 de fa 98 99 77 c2 00 a4 26 1d 6f b6 61 | b0 f7 21 08 b5 c4 92 2c e2 f5 33 2a 8c 3e 61 02 | 27 96 0e 76 df aa e8 cd 79 57 c5 8f ac d0 76 54 | 9c 70 8c c9 00 33 3c c1 e5 29 fc bf 2c d6 48 9a | fc 3c 65 0d 99 48 ef 3c bc e8 2e bf 24 a8 4d 97 | 0c eb 89 f4 d4 ed fe 8e 5a c0 3a de d9 4a ed 15 | fc 0d ed e5 5b f4 8a 96 73 8d ee ab f7 22 a8 4c | c9 1d c7 a2 21 b9 26 6e a2 a1 88 d2 64 0e 0b 58 | 8c 91 f0 b8 ce d2 1f 2b 7c cc 73 39 df 26 c5 25 | ee 5b 96 45 51 6b 95 ca 6d cb ef c5 d3 ab 9b 63 | db c6 91 c9 5c 38 e0 e4 e5 66 57 dc 50 02 2b d6 | 37 10 ec ef 4b 9b 9b c6 06 e1 04 d2 e4 b2 aa b2 | 0a 45 51 48 f0 67 e8 16 ca cf 91 bb d5 9d 8a c7 | b0 72 d3 ba 57 98 f8 25 70 d2 c8 fa 66 19 30 59 | ed 8e 08 a5 75 dc 0b 1e 20 8e ea 12 66 fb 45 12 | b5 1c 70 34 a7 c8 a3 b1 b7 fb 5d c6 cc af 6b 2c | 42 7d 3a 4b f9 d7 3c e0 6b 6d 0e 0e 56 71 bc 27 | 28 d0 52 53 7f db 97 b7 16 39 b9 ee ae c4 1e 57 | 21 23 fd d1 80 5d 02 df 89 b6 a7 86 69 c5 6e e7 | 03 6e 27 dc 03 f5 ef 61 4a 10 75 57 9a 06 89 6d | a0 b1 63 04 54 2b bf 7f 15 0e c0 b7 cc 11 b7 78 | 09 fc cd 91 5d 70 bb 71 71 a1 20 d1 33 fb b2 41 | a0 b1 ae 9b 81 21 e5 7c e3 6f d7 68 e8 72 87 8a | b3 59 ea d3 9b a3 a1 1f 74 13 c0 50 1b 85 a2 67 | 11 53 64 b5 1d 6b bc 91 2b d3 19 40 f2 9f 97 ff | 35 72 99 5a 03 f7 55 d1 18 d3 a0 b6 12 fe c0 ba | 8a 1e 1b 20 ab 08 c1 d7 07 5c d8 8d ca 7a 70 11 | f6 39 d1 f2 10 95 10 04 c0 c0 ef 80 2e 7f 8e 3f | 76 d1 88 5b 68 88 e3 30 48 59 53 19 7f eb ce 9b | 6e 97 9e 23 41 c9 b5 4f 9f e8 e5 25 00 d2 39 7c | 18 27 b8 a4 f6 4e 16 e1 11 85 bf 19 6e dd 36 9a | ee 47 e8 e3 84 1d 01 c4 67 41 22 49 43 6b 7a f5 | 90 d4 d9 f4 6b 87 80 32 2d e2 fa cf c6 65 da c4 | e0 bf 8b 9d 24 da 62 9d 85 bb d2 0c 8d f1 47 22 | ee a1 a6 e8 3e d4 ed c4 60 9c 3d e2 05 7e 39 00 | 7a 5c c9 5b da 74 92 4a 11 35 7f 4b de 19 ea b3 | 43 3f 0b c7 fc 8e f4 18 38 de 28 94 0c 9e 54 41 | d9 b3 19 87 1b b0 04 96 73 c7 eb 6b 25 87 3d 27 | 95 89 d9 58 7f a3 c2 23 94 b7 9b 90 f4 19 c8 59 | c6 db dd 1d 84 e0 a1 45 85 50 b3 ff 3d 76 73 a4 | d9 ed ff 2d 3b 34 d5 6d 3e bd 33 48 9c 9a d7 54 | 91 7e 39 14 b8 53 a9 98 51 b6 0b 26 67 a2 77 12 | d9 e4 85 14 13 5a 49 27 6b ab 80 64 8d 8f ea a6 | 18 c3 9d 6b 9b 0b c4 ae 44 98 d9 f7 70 52 17 04 | 7a af ad d2 51 f9 13 a7 97 5c b8 5b f8 26 84 62 | 63 51 d1 32 ea f6 c5 ab ea 41 a7 86 22 33 70 7d | 8b bf cb 9d 32 20 02 72 bc 1d ed c7 dc 98 88 49 | 86 f6 ac 26 ea ac fd d6 0b 94 37 21 cc 88 50 87 | 15 e4 66 03 c6 9b 15 0d df 3d 4e 0f df c7 f9 61 | 2c 28 ea dc 0e cf da 3d b1 ab dd 4f fc e0 e3 44 | 34 e8 75 8e 87 00 23 2c 18 b5 73 0f f5 6f 9a 91 | fa 9e 21 4c de 0a f1 ab 5e a2 75 cd a8 e1 9c eb | 19 50 93 71 70 2c 1a 37 e1 52 53 6a e7 16 b7 86 | c5 aa 49 08 03 90 f8 bb 80 32 c8 fa e6 a6 9b b6 | 0a ed ac 6a aa 77 f9 a7 78 e0 f5 dc 8f eb 5f da | 88 1a 8b 75 eb ed c6 8c ad ee df 3c d5 2d 96 5f | 5e d3 98 0a 83 31 6b 18 69 98 27 c3 79 60 ec 2f | da 7e f0 cf 1a 41 4c e3 70 83 65 c6 c1 69 ac 30 | 8f 02 e1 4f 30 9f fb e8 ec 38 e7 ec a8 9c a0 6e | ef c7 47 b0 5b 16 cb c2 28 31 30 85 1d 06 04 90 | 98 a3 4c 38 c5 10 dc 00 ff 06 ce b0 25 c1 c3 81 | 0a c6 b5 cd 1b ae 12 bc 26 1f 32 2d 67 aa 24 a0 | 2a ab cb f6 c7 ce a8 f7 1d d4 89 40 d8 35 0a db | 75 7b 06 21 b9 aa d9 40 13 b6 f0 e4 ca 50 fa ea | e8 c2 b6 f1 af 47 2b 96 f3 c0 0f 1b e7 c8 54 57 | f6 ad e1 03 32 cc c6 4a 96 e1 9a 69 90 41 67 33 | 46 3b 29 5b 37 2f 65 f2 d8 03 03 18 95 4a 31 17 | 54 40 1a 2c 0e 01 5e 3d 8f 38 38 8a 1d 85 f0 16 | e6 cd a1 22 bb f7 c9 2f 4d 80 db 1c f3 10 e7 15 | b1 89 dd 98 06 63 99 63 46 b3 4b c9 06 0b 77 34 | 4a 53 b1 24 c4 0c f5 23 85 af 11 56 93 3d 05 10 | ce ee 5d 96 47 f8 97 26 f1 3c 83 7d 5a 9b 0a 54 | 10 a1 80 ac 9e 44 12 88 49 39 b2 f9 50 67 f4 bf | 1a a5 64 31 40 c9 7b ee bb c0 05 f6 04 8a cd c2 | f7 33 79 b2 5f 63 6b fc 2d 66 71 61 63 2c dc 4f | 70 3f 94 0b ba 7d 84 f7 f7 30 f3 70 6a cb fd e9 | c5 b4 0a 11 8c bf 30 1c c3 fa f5 b5 de 49 90 1b | 48 40 9d a0 23 c8 f2 02 c5 49 d5 eb d2 ed d7 b5 | db 6a e7 c5 03 fb 7d bf 4b 06 89 be 60 62 16 23 | 18 1b 08 f7 2f 8a de fa 22 af 53 c9 89 6f d1 43 | 40 31 0f ac db 0b 27 03 37 6f 12 ce fc a3 1e 79 | 04 84 d3 51 b7 2f ee a1 58 56 39 38 cf f8 07 dd | fc 47 74 59 03 73 6e 28 bb 97 a8 91 7d 6e 66 b3 | c3 a3 5b 43 0a ec ea d0 b4 74 88 96 cf 02 08 fc | e2 75 95 7b 16 23 87 4c 16 91 5b a5 7c ea cc 3f | 89 c2 e9 5d a0 21 66 e2 c1 ee 9d 0f bd 17 31 af | bd 79 7d a8 1f c0 1f 13 fc c9 59 a3 ed 17 d0 11 | 82 28 91 b3 47 bf 4c 80 ce 3f 9c 53 88 07 35 8f | d4 2a 17 9d bb 8b 69 2a 7b ff 9d 6d 2d 57 94 c9 | 47 0a 66 1a 5b 66 8a b8 cb fa 9a c2 3a 0d a6 97 | e7 c2 05 33 9a cd e0 aa d8 16 58 10 f2 d6 ee 8a | 37 e8 0f 88 01 d9 6f 5b c9 7f d7 a7 67 94 cd 8d | d4 83 52 5d 3e d8 9d 0a 3c 9a 53 43 ba f8 37 ea | bf 7c a4 19 15 b3 1e 56 96 ed 0b ee da 05 a7 48 | 32 d1 95 a6 72 12 a3 df 2f 98 e7 5f 58 21 b5 61 | 0c 99 2d 31 57 34 80 ec 8d 22 f3 f8 a9 7a e0 bd | c7 7b a0 3d b9 42 91 96 18 31 ec 90 f8 20 96 1e | 78 21 89 d1 ae 7c c6 08 ba 81 68 98 82 67 be 80 | 48 60 00 9e 47 90 0e 16 ae ba 3d 5f 5b f7 6a 72 | 84 5a 82 f5 cf 4c 52 2c 36 39 46 8d e3 1f 6e f3 | 7d 74 70 90 48 77 05 0f 09 bc 44 a5 fc 45 73 bf | 93 06 49 41 16 fd 6d 77 7e 66 bd 1c 6f 93 f2 4c | 35 f4 8c 44 b3 c8 b6 c5 ab d1 82 70 e1 6f bc b6 | 21 5d 28 ea fb b7 7a 38 8a ba bc 17 79 87 6c 9b | d6 4d b3 62 de 0d 69 11 fc ab eb 4d 7c ba 7d 06 | 94 84 d2 3f 5c 96 0e 3e d0 b6 6e 18 c4 27 e6 71 | 0b d0 e0 85 4e 8a f9 aa 1d e3 f7 c4 77 6b 5a 97 | a5 29 a9 be b9 76 e1 ea bc c2 ab 0c 5e 24 a6 5a | 30 ae 5a eb 61 39 5f f4 d5 09 31 7c 76 e8 6a ed | fd aa 28 73 bd cb 05 26 34 1b e3 bd 16 23 ca 32 | 43 ed 72 7f d0 c1 ba f6 7b 57 ad 91 7d ca 86 64 | b6 70 a2 c2 09 26 95 9e 66 7e f4 a8 b0 b1 77 6b | c9 6d 4e 8a 36 bd e3 93 e0 20 60 d0 ee 11 7a 49 | 35 fd 6d fd 8c 96 88 9f 0f 15 d2 fe 85 8f c1 01 | a2 bc b7 11 b6 c6 e9 85 ef 44 c2 d3 dd 82 5e 87 | 39 69 fe 42 a3 c5 bd 92 3f b2 4a 5f | start processing: from 192.1.2.254:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 47 05 87 28 0a 02 22 3b | responder cookie: | 7a fa 89 ce 72 e7 db 5c | next payload type: ISAKMP_NEXT_ID (0x5) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 0 (0x0) | length: 2028 (0x7ec) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) | State DB: found IKEv1 state #1 in MAIN_R2 (find_state_ikev1) | start processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254:500 (in process_v1_packet() at ikev1.c:1459) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.254:4500 | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x220 opt: 0x20c0 | ***parse ISAKMP Identification Payload: | next payload type: ISAKMP_NEXT_CERT (0x6) | length: 193 (0xc1) | ID type: ID_DER_ASN1_DN (0x9) | DOI specific A: 0 (0x0) | DOI specific B: 0 (0x0) | obj: 30 81 b6 31 0b 30 09 06 03 55 04 06 13 02 43 41 | obj: 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | obj: 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | obj: 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | obj: 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | obj: 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | obj: 6e 74 31 24 30 22 06 03 55 04 03 0c 1b 6e 6f 72 | obj: 74 68 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 | obj: 73 77 61 6e 2e 6f 72 67 31 2f 30 2d 06 09 2a 86 | obj: 48 86 f7 0d 01 09 01 16 20 75 73 65 72 2d 6e 6f | obj: 72 74 68 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 | obj: 65 73 77 61 6e 2e 6f 72 67 | got payload 0x40 (ISAKMP_NEXT_CERT) needed: 0x200 opt: 0x20c0 | ***parse ISAKMP Certificate Payload: | next payload type: ISAKMP_NEXT_CR (0x7) | length: 1232 (0x4d0) | cert encoding: CERT_X509_SIGNATURE (0x4) | got payload 0x80 (ISAKMP_NEXT_CR) needed: 0x200 opt: 0x20c0 | ***parse ISAKMP Certificate RequestPayload: | next payload type: ISAKMP_NEXT_SIG (0x9) | length: 180 (0xb4) | cert type: CERT_X509_SIGNATURE (0x4) | got payload 0x200 (ISAKMP_NEXT_SIG) needed: 0x200 opt: 0x20c0 | ***parse ISAKMP Signature Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 388 (0x184) | removing 7 bytes of padding | message 'main_inI3_outR3' HASH payload not checked early | DER ASN1 DN: 30 81 b6 31 0b 30 09 06 03 55 04 06 13 02 43 41 | DER ASN1 DN: 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | DER ASN1 DN: 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | DER ASN1 DN: 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | DER ASN1 DN: 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | DER ASN1 DN: 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | DER ASN1 DN: 6e 74 31 24 30 22 06 03 55 04 03 0c 1b 6e 6f 72 | DER ASN1 DN: 74 68 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 | DER ASN1 DN: 73 77 61 6e 2e 6f 72 67 31 2f 30 2d 06 09 2a 86 | DER ASN1 DN: 48 86 f7 0d 01 09 01 16 20 75 73 65 72 2d 6e 6f | DER ASN1 DN: 72 74 68 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 | DER ASN1 DN: 65 73 77 61 6e 2e 6f 72 67 "northnet-eastnet-nat"[1] 192.1.2.254 #1: Peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' | global one-shot timer EVENT_FREE_ROOT_CERTS scheduled in 300 seconds loading root certificate cache | spent 3.8 milliseconds in get_root_certs() calling PK11_ListCertsInSlot() | spent 0.032 milliseconds in get_root_certs() filtering CAs | #1 spent 3.87 milliseconds in find_and_verify_certs() calling get_root_certs() | checking for known CERT payloads | saving certificate of type 'X509_SIGNATURE' | decoded cert: E=user-north@testing.libreswan.org,CN=north.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | #1 spent 0.628 milliseconds in find_and_verify_certs() calling decode_cert_payloads() | cert_issuer_has_current_crl: looking for a CRL issued by E=testing@libreswan.org,CN=Libreswan test CA for mainca,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | #1 spent 0.0372 milliseconds in find_and_verify_certs() calling crl_update_check() | missing or expired CRL | crl_strict: 0, ocsp: 0, ocsp_strict: 0, ocsp_post: 0 | verify_end_cert trying profile IPsec | certificate is valid (profile IPsec) | #1 spent 0.127 milliseconds in find_and_verify_certs() calling verify_end_cert() "northnet-eastnet-nat"[1] 192.1.2.254 #1: certificate verified OK: E=user-north@testing.libreswan.org,CN=north.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55767b89a108 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55767b89a0b8 | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x55767b8dd5c8 | unreference key: 0x55767b8e0248 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org cnt 1-- | #1 spent 0.249 milliseconds in decode_certs() calling add_pubkey_from_nss_cert() | #1 spent 4.95 milliseconds in decode_certs() | ID_DER_ASN1_DN 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' needs further ID comparison against 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' | ID_DER_ASN1_DN 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' matched our ID | SAN ID matched, updating that.cert | X509: CERT and ID matches current connection | CR 30 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 | CR 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | CR 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | CR 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | CR 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | CR 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | CR 6e 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 | CR 72 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 | CR 6f 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a | CR 86 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e | CR 67 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 | requested CA: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | refine_host_connection for IKEv1: starting with "northnet-eastnet-nat"[1] 192.1.2.254 | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | refine_host_connection: happy with starting point: "northnet-eastnet-nat"[1] 192.1.2.254 | The remote did not specify an IDr and our current connection is good enough | offered CA: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | required RSA CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | checking RSA keyid 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' for match with 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | key issuer CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | an RSA Sig check passed with *AwEAAcBZv [remote certificates] | #1 spent 0.18 milliseconds in try_all_RSA_keys() trying a pubkey "northnet-eastnet-nat"[1] 192.1.2.254 #1: Authenticated using RSA | thinking about whether to send my certificate: | I have RSA key: OAKLEY_RSA_SIG cert.type: CERT_X509_SIGNATURE | sendcert: CERT_ALWAYSSEND and I did not get a certificate request | so send cert. | **emit ISAKMP Message: | initiator cookie: | 47 05 87 28 0a 02 22 3b | responder cookie: | 7a fa 89 ce 72 e7 db 5c | next payload type: ISAKMP_NEXT_ID (0x5) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 5:ISAKMP_NEXT_ID | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_CERT (0x6) | ID type: ID_DER_ASN1_DN (0x9) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 6:ISAKMP_NEXT_CERT | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 183 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) | my identity 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 | my identity 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 | my identity 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 | my identity 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c | my identity 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 | my identity 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 | my identity 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 61 73 | my identity 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | my identity 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 | my identity 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 61 73 | my identity 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 | my identity 77 61 6e 2e 6f 72 67 | emitting length of ISAKMP Identification Payload (IPsec DOI): 191 "northnet-eastnet-nat"[1] 192.1.2.254 #1: I am sending my cert | ***emit ISAKMP Certificate Payload: | next payload type: ISAKMP_NEXT_SIG (0x9) | cert encoding: CERT_X509_SIGNATURE (0x4) | next payload chain: ignoring supplied 'ISAKMP Certificate Payload'.'next payload type' value 9:ISAKMP_NEXT_SIG | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Certificate Payload (6:ISAKMP_NEXT_CERT) | next payload chain: saving location 'ISAKMP Certificate Payload'.'next payload type' in 'reply packet' | emitting 1260 raw bytes of CERT into ISAKMP Certificate Payload | CERT 30 82 04 e8 30 82 04 51 a0 03 02 01 02 02 01 03 | CERT 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 | CERT 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 31 | CERT 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 69 | CERT 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 6f | CERT 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c 69 | CERT 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 0b | CERT 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 6e | CERT 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 72 | CERT 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 6f | CERT 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a 86 | CERT 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e 67 | CERT 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 30 22 | CERT 18 0f 32 30 31 39 30 38 32 34 30 39 30 37 35 33 | CERT 5a 18 0f 32 30 32 32 30 38 32 33 30 39 30 37 35 | CERT 33 5a 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 | CERT 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 | CERT 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 | CERT 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c | CERT 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 | CERT 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 | CERT 6d 65 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 | CERT 61 73 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a | CERT 86 48 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 | CERT 61 73 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 30 82 01 a2 30 0d 06 | CERT 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 8f | CERT 00 30 82 01 8a 02 82 01 81 00 b1 1e 7c b3 bf 11 | CERT 96 94 23 ca 97 5e c7 66 36 55 71 49 95 8d 0c 2a | CERT 5c 30 4d 58 29 a3 7b 4d 3b 3f 03 06 46 a6 04 63 | CERT 71 0d e1 59 4f 9c ec 3a 17 24 8d 91 6a a8 e2 da | CERT 57 41 de f4 ff 65 bf f6 11 34 d3 7d 5a 7f 6e 3a | CERT 3b 74 3c 51 2b e4 bf ce 6b b2 14 47 26 52 f5 57 | CERT 28 bc c5 fb f9 bc 2d 4e b9 f8 46 54 c7 95 41 a7 | CERT a4 b4 d3 b3 fe 55 4b df f5 c3 78 39 8b 4e 04 57 | CERT c0 1d 5b 17 3c 28 eb 40 9d 1d 7c b3 bb 0f f0 63 | CERT c7 c0 84 b0 4e e4 a9 7c c5 4b 08 43 a6 2d 00 22 | CERT fd 98 d4 03 d0 ad 97 85 d1 48 15 d3 e4 e5 2d 46 | CERT 7c ab 41 97 05 27 61 77 3d b6 b1 58 a0 5f e0 8d | CERT 26 84 9b 03 20 ce 5e 27 7f 7d 14 03 b6 9d 6b 9f | CERT fd 0c d4 c7 2d eb be ea 62 87 fa 99 e0 a6 1c 85 | CERT 4f 34 da 93 2e 5f db 03 10 58 a8 c4 99 17 2d b1 | CERT bc e5 7b bd af 0e 28 aa a5 74 ea 69 74 5e fa 2c | CERT c3 00 3c 2f 58 d0 20 cf e3 46 8d de aa f9 f7 30 | CERT 5c 16 05 04 89 4c 92 9b 8a 33 11 70 83 17 58 24 | CERT 2a 4b ab be b6 ec 84 9c 78 9c 11 04 2a 02 ce 27 | CERT 83 a1 1f 2b 38 3f 27 7d 46 94 63 ff 64 59 4e 6c | CERT 87 ca 3e e6 31 df 1e 7d 48 88 02 c7 9d fa 4a d7 | CERT f2 5b a5 fd 7f 1b c6 dc 1a bb a6 c4 f8 32 cd bf | CERT a7 0b 71 8b 2b 31 41 17 25 a4 18 52 7d 32 fc 0f | CERT 5f b8 bb ca e1 94 1a 42 4d 1f 37 16 67 84 ae b4 | CERT 32 42 9c 5a 91 71 62 b4 4b 07 02 03 01 00 01 a3 | CERT 82 01 06 30 82 01 02 30 09 06 03 55 1d 13 04 02 | CERT 30 00 30 47 06 03 55 1d 11 04 40 30 3e 82 1a 65 | CERT 61 73 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 | CERT 65 73 77 61 6e 2e 6f 72 67 81 1a 65 61 73 74 40 | CERT 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 | CERT 6e 2e 6f 72 67 87 04 c0 01 02 17 30 0b 06 03 55 | CERT 1d 0f 04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 | CERT 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b | CERT 06 01 05 05 07 03 02 30 41 06 08 2b 06 01 05 05 | CERT 07 01 01 04 35 30 33 30 31 06 08 2b 06 01 05 05 | CERT 07 30 01 86 25 68 74 74 70 3a 2f 2f 6e 69 63 2e | CERT 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 | CERT 6e 2e 6f 72 67 3a 32 35 36 30 30 3d 06 03 55 1d | CERT 1f 04 36 30 34 30 32 a0 30 a0 2e 86 2c 68 74 74 | CERT 70 3a 2f 2f 6e 69 63 2e 74 65 73 74 69 6e 67 2e | CERT 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 2f 72 65 | CERT 76 6f 6b 65 64 2e 63 72 6c 30 0d 06 09 2a 86 48 | CERT 86 f7 0d 01 01 0b 05 00 03 81 81 00 3a 56 a3 7d | CERT b1 4e 62 2f 82 0d e3 fe 74 40 ef cb eb 93 ea ad | CERT e4 74 8b 80 6f ae 8b 65 87 12 a6 24 0d 21 9c 5f | CERT 70 5c 6f d9 66 8d 98 8b ea 59 f8 96 52 6a 6c 86 | CERT d6 7d ba 37 a9 8c 33 8c 77 18 23 0b 1b 2a 66 47 | CERT e7 95 94 e6 75 84 30 d4 db b8 23 eb 89 82 a9 fd | CERT ed 46 8b ce 46 7f f9 19 8f 49 da 29 2e 1e 97 cd | CERT 12 42 86 c7 57 fc 4f 0a 19 26 8a a1 0d 26 81 4d | CERT 53 f4 5c 92 a1 03 03 8d 6c 51 33 cc | emitting length of ISAKMP Certificate Payload: 1265 | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org of kind PKK_RSA | searching for certificate PKK_RSA:AwEAAbEef vs PKK_RSA:AwEAAbEef | ***emit ISAKMP Signature Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Certificate Payload'.'next payload type' to current ISAKMP Signature Payload (9:ISAKMP_NEXT_SIG) | next payload chain: saving location 'ISAKMP Signature Payload'.'next payload type' in 'reply packet' | emitting 384 raw bytes of SIG_R into ISAKMP Signature Payload | SIG_R 32 97 c6 c0 56 16 d5 70 87 2a 48 73 00 69 d4 18 | SIG_R 27 3e 48 5e 5e fb b9 77 4d 51 82 66 85 a1 49 a1 | SIG_R df c3 1e e7 1f 31 e6 20 3c eb f3 d5 0e c6 ad d9 | SIG_R 35 b4 e0 76 3d 37 0b fa 4f 23 81 cd ea f4 98 05 | SIG_R 41 6e 63 65 6b d6 93 70 31 d9 7d 16 ba ce db 5f | SIG_R 0b 63 fb 92 d6 d2 00 01 77 61 98 f3 bd 3d 54 4a | SIG_R af 96 a7 9a 12 9b 09 8f 9c bb 05 c0 1f 30 35 e0 | SIG_R 86 b8 b2 ea 3d 3e 60 f2 93 fc 38 95 c5 a0 39 a0 | SIG_R 52 24 00 d1 ee f6 c3 53 a4 26 14 ae 3e 01 5e 3f | SIG_R 97 c7 f1 8c 5b 9d 84 fd 2a 86 b7 34 5e c1 f9 76 | SIG_R 7c af 49 d0 c0 24 1c 7b d6 d1 70 84 99 59 61 03 | SIG_R 07 17 d5 35 b2 75 8e 64 64 57 f0 7a 6b f2 d2 71 | SIG_R 9a de bf 0d a9 e5 f0 a4 19 3b 16 9d 16 18 c4 b8 | SIG_R 2c 21 24 82 0e 33 42 6c 1d fb 56 3a be 4e 5b 71 | SIG_R 57 d2 09 d3 44 4d eb 5d 68 a6 88 7d 83 12 81 5d | SIG_R b4 1f 34 3b 29 ee 6f fd 57 82 7e df 0b 8a e8 df | SIG_R 07 e4 c6 cc 8f d2 58 83 96 67 96 6c 02 78 98 64 | SIG_R 5d 3b 17 12 e6 00 a9 a6 aa 49 ba ed cc 18 61 af | SIG_R e4 b6 16 12 b5 0b af b2 f6 3c 60 d3 84 ca a4 eb | SIG_R 63 d9 1b 61 04 2a 91 21 88 e1 91 09 22 0f 9e f1 | SIG_R c9 15 13 53 70 a6 b8 11 c4 dd 96 6a 38 64 86 6f | SIG_R 80 3a c9 05 25 2a f3 f6 05 09 8f 8e 87 8c b4 0b | SIG_R 0e 42 75 9f 2e ab 7b 3d 49 0e 07 67 ec 06 61 b1 | SIG_R a6 9b 2d d3 3c 79 1d 41 02 6e c1 4e 1d 9e 65 5b | emitting length of ISAKMP Signature Payload: 388 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 1884 | FOR_EACH_CONNECTION_... in ISAKMP_SA_established | complete v1 state transition with STF_OK | [RE]START processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254:500 (in complete_v1_state_transition() at ikev1.c:2673) | #1 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 | parent state #1: MAIN_R2(open IKE SA) => MAIN_R3(established IKE SA) | event_already_set, deleting event | state #1 requesting EVENT_RETRANSMIT to be deleted | #1 STATE_MAIN_R3: retransmits: cleared | libevent_free: release ptr-libevent@0x55767b8bf878 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55767b8bfca8 | state #1 NAT-T: new mapping 192.1.2.254:4500 | new NAT mapping for #1, was 192.1.2.254:500, now 192.1.2.254:4500 | State DB: IKEv1 state not found (nat_traversal_new_mapping) | NAT-T: #1 updating local interface from 192.1.2.23:500 to 192.1.2.23:4500 (using md->iface in nat_traversal_change_port_lookup()) | sending reply packet to 192.1.2.254:4500 (from 192.1.2.23:4500) | sending 1888 bytes for STATE_MAIN_R2 through eth1 from 192.1.2.23:4500 to 192.1.2.254:4500 (using #1) | 00 00 00 00 47 05 87 28 0a 02 22 3b 7a fa 89 ce | 72 e7 db 5c 05 10 02 01 00 00 00 00 00 00 07 5c | 25 44 3c d4 a2 7a fb 59 34 53 00 83 13 80 3b fd | 6d 0f 7a ee 0d 9f b4 a1 3a 68 13 76 fa 3e 44 9a | 9d 3a f8 98 56 80 d9 0e ab 9b 39 2a 99 d6 2d 5f | b9 74 60 98 b1 43 5b 71 bb 89 d3 f8 d9 fa 38 2a | 5f b1 17 13 2d 45 57 57 8e b1 28 a1 9e dc a0 49 | 78 57 1f 2f 4e 31 2c 6b f3 7f c9 35 a2 81 33 13 | a4 90 bf 43 b7 bc cc d3 a3 ac 9a 9f 3f 60 99 3b | 31 71 d2 45 89 ee 6f d9 c7 fe 3f cb 75 81 3d 44 | 94 b9 57 f4 3c 3b cf f2 ae 66 bf 96 ab 51 4b 9e | f9 09 e3 1b 4b 45 79 d4 b6 5b 32 1a 8f 21 31 0d | 93 ad fe c9 cf aa 22 79 0f 54 d6 6c 9e 5c 91 96 | 3c b7 08 ef f3 07 e4 94 99 10 a6 90 bb 1d 64 2d | af 4a fc 92 67 1f 49 94 5a c1 38 ee 97 47 d8 a6 | 6d ae 60 72 4a 20 26 40 c9 fd 67 26 c1 5f 38 a4 | 96 44 ff 20 34 27 c9 26 8b 13 ba 35 a5 51 37 12 | 3e b3 65 a7 5b 5f f5 5f 8c 06 9c 57 fd 65 57 11 | d7 dc ee 44 c6 5e 66 8e 78 d7 6b 98 e2 bd 71 e7 | bd 19 59 df 5a 18 91 ba b7 88 f8 fd 8f f8 df 23 | 9f 82 8e 4f a3 03 38 59 76 3d 54 11 2e 96 45 c5 | b6 73 1e ff 7a db 31 22 44 cf fd 97 2c e7 2a 4e | c4 4a 37 08 96 41 e2 68 36 10 40 ca 76 c1 1f 35 | 1c 7d 1f a4 88 16 f6 fc ce 55 9d f5 0b 3c 15 8b | 57 25 22 e0 ea 48 e3 47 9a 85 f0 85 5d 0d c5 f2 | f7 b0 7a 43 f3 c5 f2 c8 c7 98 99 e2 9f f6 b3 f0 | c5 81 67 85 f0 52 ce 13 d7 e2 c3 ad 27 d5 5f d6 | 85 16 56 97 8c c4 48 53 ee 43 3b 73 be af 8b 97 | 71 82 2e be d5 9f 2b 2c 33 74 46 e6 ef e1 36 06 | 5d 55 c1 df 46 44 e8 09 5d fa 41 92 15 38 56 9e | fa 86 ab 6b 3b c4 52 9f 10 12 50 a7 c3 2c cc 1f | d6 be 7c ae 2c fb 83 78 e7 fe ae f9 02 5f 1f 92 | 99 d8 d1 3e c0 f8 ea e3 5e 42 b6 13 29 ba 48 7f | 78 c8 46 3a 9d 88 f7 cb 91 09 ad 76 b0 c4 a8 b6 | dc b9 19 fa 74 c3 51 4c 6b cf 87 89 fd 72 1c 1f | 40 b6 1b b8 a1 56 81 60 fa 87 c9 bd 92 97 fa ec | 51 5f 95 e7 e0 5f 2b 4f dd f2 88 03 05 1d ac e1 | 9b cc ce a7 15 c5 58 7c 9a 33 82 da bd 27 ea af | a5 61 da 39 fb 5e 57 be 96 e0 80 cc 8b 53 a3 cd | 89 17 ca 25 1a b4 55 6e 9a 8d 19 bf 02 a3 e8 bd | 43 2e fd 2e 35 7b e1 3f 1a 03 be e3 c0 fd 93 96 | 80 ba 54 ac 55 3a 4f 4b 13 68 8d ff 82 bb 0c b7 | 39 70 bf b8 10 68 a8 9f 1d 53 bb 7c 01 62 d1 f7 | 90 95 73 27 d8 44 d4 dd dd 31 26 31 f3 03 87 d1 | e7 e8 a0 7f ae fd 97 22 f9 8d 9b d5 58 96 49 b4 | 5a 59 48 cd 8d 22 cc 14 55 70 9c 99 da 88 b6 24 | 2d 93 cd 52 dc e3 07 dd 9d 6b d4 5c e9 74 a9 9d | cf 85 80 c7 12 28 d0 e6 5d 8a f6 5f 19 92 f0 07 | 30 18 b3 56 64 f8 91 bf b8 b8 49 db 3c e7 f8 de | a5 dd f2 88 15 f0 9f 40 3c b3 75 74 20 37 59 8f | 21 6f 60 88 a1 d9 dc 77 ee 62 1f e8 f5 5b da 9e | 2b fb 73 14 a2 0c 71 b0 7c 8c af 1f 14 22 78 bf | 0a a1 9d 47 51 f2 d9 9a 2a ce f6 d4 1a 54 2e 51 | 4d d2 84 4d b4 fe 7e a6 ff c0 ac 5f eb 13 40 cb | 88 9f e3 e6 6b ad 8d 5f 2b 94 69 21 15 99 85 67 | ee 9c 14 a1 89 62 24 f8 1a 44 24 18 52 6c 0e 9a | 4b f0 5b da a9 5b d9 a2 eb 97 b5 d8 53 6a dd a1 | a4 60 f7 c0 af 98 ab 63 fe 78 d1 a8 67 ea 3b 35 | 28 49 80 4a e4 74 f1 49 ad 5c 70 7d 7b 5a 8c 51 | e9 ec 30 3c 82 bd 18 7e 96 8f 88 e8 53 7b 75 8f | 4d b2 17 a6 ae af d9 ac ae 91 4b 5f 31 f0 1e c4 | a3 bd d1 3d f5 ad 44 1d 6c 5e 05 91 fc 79 ec 6f | 7f 6c 60 88 07 c3 c8 a1 70 15 c4 2c e9 2e f0 fc | 19 b4 e5 eb fe 87 35 bd 25 23 6a 5d 1e e7 7f b5 | 10 ec 06 53 ba 4e 9c 5f 18 ed 43 0d f4 d7 5c f9 | 3b e8 99 98 70 ce 91 60 9e 0b 81 4c a4 62 bd ac | 6b 4f 70 3e 43 31 46 97 61 79 53 66 0c 17 5c 80 | 77 75 e0 7c 68 6c 91 b0 18 a9 78 4c 21 90 6f 26 | c2 86 c8 aa 20 f0 43 0b 09 76 52 a2 d9 18 8a a9 | 81 bd 3e 00 38 1a ea 5f 46 8e 1d b6 f0 26 de dd | 07 ce 7a a8 93 6f 77 eb b8 69 73 8c 66 94 aa 53 | 1d 58 00 3c 19 f2 d7 e3 59 56 61 cf 11 63 34 42 | 5d 76 88 85 03 ed 50 ec 4e c0 e6 d4 e7 0c a1 c0 | 32 51 80 e0 75 e6 57 d2 1b f2 ab 23 1c 62 f1 80 | 00 10 bf df 8c ce e1 d8 5f e9 32 51 94 e4 a4 2d | 0a 14 d8 7f ba df 09 2b 96 36 08 71 c6 19 bd de | b3 ef 51 c9 c7 19 63 0b 85 1e bf 59 b4 ba 47 4d | d3 2d 14 98 65 bc f5 ef 02 dd 0a ec 13 d3 13 b0 | c6 1e cf 20 99 c6 61 5e fe 86 75 a5 83 58 57 7e | cf 56 c7 62 a9 b0 33 92 9a e2 38 db ee 11 2d 00 | 51 36 89 d8 61 be fe 40 1c cc 7a 25 82 ff b7 79 | 83 96 f4 bf 07 1f 92 fc e1 a7 73 87 52 90 57 6d | ee 44 79 1d 68 1e 2b fa a7 e2 61 f8 ef a8 7f 72 | 00 74 56 1a 09 42 0e 65 dc 14 6d 62 44 65 39 9d | b4 df 2b 95 d7 93 6e e6 ab f5 a0 2d fd 25 c3 f5 | 25 ea cd c7 c5 43 24 06 05 dc f1 c1 21 af 7e bd | 33 4b 86 4d 0d 2b 82 ab b2 4d 4a 10 96 72 d6 62 | bb 94 69 ca 50 01 34 f3 43 cd 2b 23 f4 95 18 1f | b4 eb 68 2d 42 a3 5e ab 2a de 86 fd 7d d5 e4 64 | 43 60 b5 6d b5 76 1f 3e e3 35 6d c3 a3 04 f8 02 | 3d ae b8 23 6a 06 91 12 ab db c6 ef 0a a0 24 7d | 14 24 c1 00 6f 9e 6c ae 14 9d 38 e6 35 f1 b7 65 | 9d 14 d4 cb 27 69 3b 49 50 dc 63 55 0d 18 88 31 | 6a 2a ee ea bb e4 39 31 8a 13 5f 1d 2f 5d a2 8f | d8 ec ea e3 2d 18 06 4d 37 10 8c 01 dc 8d be 26 | f2 01 c4 6f 49 c0 16 59 95 ff 12 ee 21 75 b7 a8 | 32 df 95 d8 d1 6e 37 f7 1d ab e5 93 a2 35 b8 47 | 89 8f e7 e5 a8 f6 84 66 66 86 29 91 1f 85 cb c6 | 5c 26 78 5c d7 98 e1 a4 67 42 b6 48 23 88 1a df | 46 ea 8d 97 5f 7f 73 24 b0 48 89 96 0a d3 c7 a6 | f5 bd 5f 9d 3f af 30 f5 df 60 25 ec d2 e1 dc d0 | bd 0d 80 79 68 03 12 06 21 13 0c 56 50 9f f0 32 | aa 97 5c 7c 19 34 45 5b 8f a8 81 de 74 b4 74 ac | 77 ca 46 18 99 65 65 b2 00 fc e0 d2 9a 46 59 e2 | 81 c9 0a 62 8e 5d 36 94 a8 0a bf 41 74 9f c1 54 | 9d fa 07 41 c4 1a 04 e2 56 ac f3 02 a0 ac 6a bd | 1b c0 6f cc 20 97 23 d4 66 78 2f 0d d1 d7 f7 82 | ec cf f7 71 82 ed b8 67 aa 9a 9f 0c 2c 59 f5 97 | 7b 97 09 a6 74 ec 03 8f 4a 5b e9 61 44 92 5b 01 | 51 13 84 23 fe d4 fe a5 e2 9c a2 b7 da 4a e1 88 | e8 2b d9 86 2a a7 d2 16 5b 0b a3 69 d6 91 5f 8c | 6c c7 83 96 e5 08 44 2c 0c 07 58 32 00 1f 54 54 | 07 29 86 9e a2 42 5f dd d8 37 0f 4f fc 3f d4 79 | d1 7e 04 6f 12 17 37 07 b2 6f 59 3f 52 90 c1 a7 | 9c b4 c0 a7 e9 c9 e4 84 d5 a6 f7 4a ee 97 93 51 | ce d9 fd cc 11 10 8f 77 c4 e1 44 a6 e7 05 f2 2c | a9 88 6e a7 56 4d 2a b0 76 ae 47 b5 1b 6f 3d 21 | e6 23 8a 48 cf 18 ee f7 4f a3 5b 3f 7f d9 a6 04 | !event_already_set at reschedule | event_schedule: new EVENT_SA_REPLACE-pe@0x55767b8bfca8 | inserting event EVENT_SA_REPLACE, timeout in 3330 seconds for #1 | libevent_malloc: new ptr-libevent@0x55767b8d31c8 size 128 | pstats #1 ikev1.isakmp established "northnet-eastnet-nat"[1] 192.1.2.254 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} | DPD: dpd_init() called on ISAKMP SA | DPD: Peer supports Dead Peer Detection | DPD: not initializing DPD because DPD is disabled locally | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | unpending state #1 | #1 spent 9.85 milliseconds | #1 spent 15.2 milliseconds in process_packet_tail() | stop processing: from 192.1.2.254:4500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 15.5 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00337 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 476 bytes from 192.1.2.254:4500 on eth1 (192.1.2.23:4500) | 47 05 87 28 0a 02 22 3b 7a fa 89 ce 72 e7 db 5c | 08 10 20 01 bf 42 8e 33 00 00 01 dc ba 06 3c 83 | e6 78 f0 93 6d 0a a4 96 3d b3 89 0b 9b d1 40 bf | 18 43 73 df 4b 10 ab 66 fb 9a bc 20 ab 6c 3d 5b | 81 49 2d ee d0 09 46 f5 6d 81 6e 5f 8f b3 fd 12 | 65 12 0d f2 de 05 6f 02 06 5e 81 17 c7 9e c3 ff | bf 2e b7 3e 6f e6 51 9a f4 87 83 d5 df 39 f4 38 | 35 3f c0 bd 33 57 cd 27 4d 32 33 0e 3b 68 2d 9b | 1c d5 88 41 2a b0 87 4c 31 49 d5 ba 75 c3 c6 51 | 11 92 5c 01 c9 c2 7d 29 ec c6 3d 64 43 fc 45 ad | 0b ae 7d a3 84 d9 a5 58 03 54 40 76 88 5c f8 cc | 76 79 6a d8 66 ec db 1e b9 df 89 83 9c a6 4d cd | 63 78 f8 78 9b 42 43 a0 4d d2 00 b8 40 0b fd a5 | 63 75 80 29 2b 1d 91 9e e0 b5 49 88 60 48 45 e0 | 76 51 dc a7 df 2a 78 c5 a6 24 1e 5c 95 e7 e7 e8 | 75 47 3b 7c 8a 43 1a 42 e4 5a 7e ee c4 fe e2 93 | 47 55 4b 2f 18 2b 6d 67 5c a4 c8 64 78 38 15 20 | 1a a4 46 b3 e8 e8 73 76 93 d3 0c 16 a9 96 db e4 | 5f 20 54 9b b2 3b 02 34 c9 9c 7a 84 d4 e7 43 2d | 26 00 f6 c9 c0 de f1 81 39 31 89 0c ef 72 3b 37 | 7b 39 22 b0 f8 c6 35 98 82 f7 ab 69 9a f1 9b 64 | 14 bf 3d ac 59 2e 8a ab e0 d2 3e bb c7 03 4e 3f | 47 f5 1a 3e c0 1a 70 0c c7 f1 17 2c f2 82 c2 6e | 84 3a 36 ae b6 19 b2 22 5b 03 35 a2 00 62 4d a9 | bb a3 74 04 79 94 dc e5 71 eb 58 51 76 6e a9 8c | 48 47 b5 f8 ca 53 85 3e 31 7a bb 4c 9f 79 c9 bc | ba 08 1a f5 aa 6d a6 9d fd ad 12 00 8e 33 b3 7c | 75 d7 af 85 26 bd 06 59 60 1d a0 f7 cd fa 91 a4 | ee 3d 50 97 3c f0 9a 30 f0 ab 58 85 8c b7 de d0 | 42 a4 1c 42 0f e2 39 15 23 4b e3 fb | start processing: from 192.1.2.254:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 47 05 87 28 0a 02 22 3b | responder cookie: | 7a fa 89 ce 72 e7 db 5c | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3208810035 (0xbf428e33) | length: 476 (0x1dc) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) | State DB: IKEv1 state not found (find_state_ikev1) | State DB: found IKEv1 state #1 in MAIN_R3 (find_state_ikev1) | start processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in process_v1_packet() at ikev1.c:1607) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.254:4500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_SA (0x1) | length: 36 (0x24) | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | length: 84 (0x54) | DOI: ISAKMP_DOI_IPSEC (0x1) | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030 | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | length: 36 (0x24) | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | length: 260 (0x104) | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | length: 16 (0x10) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | obj: c0 00 03 00 ff ff ff 00 | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 16 (0x10) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | obj: c0 00 02 00 ff ff ff 00 | quick_inI1_outR1 HASH(1): | 78 fe 2d 18 40 47 24 65 4d 6a e2 95 84 4c 0b 5f | 87 a2 52 89 f5 00 a3 f6 0c 9e 3e 96 65 da 5f 0b | received 'quick_inI1_outR1' message HASH(1) data ok | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address | ID address c0 00 03 00 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask | ID mask ff ff ff 00 | peer client is subnet 192.0.3.0/24 | peer client protocol/port is 0/0 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address | ID address c0 00 02 00 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask | ID mask ff ff ff 00 | our client is subnet 192.0.2.0/24 | our client protocol/port is 0/0 "northnet-eastnet-nat"[1] 192.1.2.254 #1: the peer proposed: 192.0.2.0/24:0/0 -> 192.0.3.0/24:0/0 | find_client_connection starting with northnet-eastnet-nat | looking for 192.0.2.0/24:0/0 -> 192.0.3.0/24:0/0 | concrete checking against sr#0 192.0.2.0/24 -> 0.0.0.0/32 | match_id a=C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org | b=C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org | results matched | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' | fc_try trying northnet-eastnet-nat:192.0.2.0/24:0/0 -> 192.0.3.0/24:0/0(virt) vs northnet-eastnet-nat:192.0.2.0/24:0/0 -> 0.0.0.0/32:0/0(virt) | FOR_EACH_CONNECTION_... in is_virtual_net_used | fc_try concluding with northnet-eastnet-nat [129] | fc_try northnet-eastnet-nat gives northnet-eastnet-nat | concluding with d = northnet-eastnet-nat | client wildcard: no port wildcard: no virtual: yes | setting phase 2 virtual values to 192.0.3.0/24===192.1.2.254[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org] | NAT-Traversal: received 0 NAT-OA. | creating state object #2 at 0x55767b8d4308 | State DB: adding IKEv1 state #2 in UNDEFINED | pstats #2 ikev1.ipsec started | duplicating state object #1 "northnet-eastnet-nat"[1] 192.1.2.254 as #2 for IPSEC SA | #2 setting local endpoint to 192.1.2.23:4500 from #1.st_localport (in duplicate_state() at state.c:1484) | suspend processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in quick_inI1_outR1_tail() at ikev1_quick.c:1295) | start processing: state #2 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in quick_inI1_outR1_tail() at ikev1_quick.c:1295) | child state #2: UNDEFINED(ignore) => QUICK_R0(established CHILD SA) | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 72 (0x48) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 2 (0x2) | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI | SPI 89 ea e9 89 | *****parse ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 32 (0x20) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 3 (0x3) | [3 is ENCAPSULATION_MODE_UDP_TUNNEL_RFC] | NAT-T RFC: Installing IPsec SA with ENCAP, st->hidden_variables.st_nat_traversal is RFC 3947 (NAT-Traversal)+peer behind NAT | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | ESP IPsec Transform verified unconditionally; no alg_info to check against | adding quick_outI1 KE work-order 3 for state #2 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55767b8d9748 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x55767b8db6a8 size 128 | libevent_realloc: release ptr-libevent@0x55767b8574b8 | libevent_realloc: new ptr-libevent@0x55767b8bf658 size 128 | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #2 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in complete_v1_state_transition() at ikev1.c:2648) | suspending state #2 and saving MD | #2 is busy; has a suspended MD | crypto helper 2 resuming | crypto helper 2 starting work-order 3 for state #2 | #1 spent 0.273 milliseconds in process_packet_tail() | crypto helper 2 doing build KE and nonce (quick_outI1 KE); request ID 3 | stop processing: from 192.1.2.254:4500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #2 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.543 milliseconds in comm_handle_cb() reading and processing packet | crypto helper 2 finished build KE and nonce (quick_outI1 KE); request ID 3 time elapsed 0.001018 seconds | (#2) spent 0.984 milliseconds in crypto helper computing work-order 3: quick_outI1 KE (pcr) | crypto helper 2 sending results from work-order 3 for state #2 to event queue | scheduling resume sending helper answer for #2 | libevent_malloc: new ptr-libevent@0x7f07a8003f28 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #2 | start processing: state #2 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 3 | calling continuation function 0x55767a53ab50 | quick_inI1_outR1_cryptocontinue1 for #2: calculated ke+nonce, calculating DH | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org of kind PKK_PSK | actually looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org of kind PKK_PSK | line 0: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org) to type PKK_RSA | line 1: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org) to type PKK_RSA | concluding with best_match=000 best=(nil) (lineno=-1) | no PreShared Key Found | adding quick outR1 DH work-order 4 for state #2 | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55767b8db6a8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55767b8d9748 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55767b8d9748 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x55767b8db6a8 size 128 | suspending state #2 and saving MD | #2 is busy; has a suspended MD | resume sending helper answer for #2 suppresed complete_v1_state_transition() and stole MD | crypto helper 3 resuming | #2 spent 0.0543 milliseconds in resume sending helper answer | crypto helper 3 starting work-order 4 for state #2 | stop processing: state #2 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f07a8003f28 | crypto helper 3 doing compute dh (V1 Phase 2 PFS) (quick outR1 DH); request ID 4 | crypto helper 3 finished compute dh (V1 Phase 2 PFS) (quick outR1 DH); request ID 4 time elapsed 0.000539 seconds | (#2) spent 0.541 milliseconds in crypto helper computing work-order 4: quick outR1 DH (pcr) | crypto helper 3 sending results from work-order 4 for state #2 to event queue | scheduling resume sending helper answer for #2 | libevent_malloc: new ptr-libevent@0x7f079c003618 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #2 | start processing: state #2 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 4 | calling continuation function 0x55767a53ab50 | quick_inI1_outR1_cryptocontinue2 for #2: calculated DH, sending R1 | **emit ISAKMP Message: | initiator cookie: | 47 05 87 28 0a 02 22 3b | responder cookie: | 7a fa 89 ce 72 e7 db 5c | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3208810035 (0xbf428e33) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 72 (0x48) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 2 (0x2) | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI | SPI 89 ea e9 89 | *****parse ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 32 (0x20) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 3 (0x3) | [3 is ENCAPSULATION_MODE_UDP_TUNNEL_RFC] | NAT-T RFC: Installing IPsec SA with ENCAP, st->hidden_variables.st_nat_traversal is RFC 3947 (NAT-Traversal)+peer behind NAT | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | ESP IPsec Transform verified unconditionally; no alg_info to check against | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 1 (0x1) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | netlink_get_spi: allocated 0x3a802c25 for esp.0@192.1.2.23 | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload | SPI 3a 80 2c 25 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | emitting 24 raw bytes of attributes into ISAKMP Transform Payload (ESP) | attributes 80 03 00 0e 80 04 00 03 80 01 00 01 80 02 70 80 | attributes 80 05 00 02 80 06 00 80 | emitting length of ISAKMP Transform Payload (ESP): 32 | emitting length of ISAKMP Proposal Payload: 44 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 56 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 "northnet-eastnet-nat"[1] 192.1.2.254 #2: responding to Quick Mode proposal {msgid:bf428e33} "northnet-eastnet-nat"[1] 192.1.2.254 #2: us: 192.0.2.0/24===192.1.2.23<192.1.2.23>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org] "northnet-eastnet-nat"[1] 192.1.2.254 #2: them: 192.1.2.254[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org]===192.0.3.0/24 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Nr into ISAKMP Nonce Payload | Nr 83 ff 61 5a d6 e8 b8 19 38 32 d9 44 a2 8a 83 1f | Nr 13 37 45 c7 0e 95 13 d4 07 f8 e8 ef 8b b3 8f 5d | emitting length of ISAKMP Nonce Payload: 36 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value b2 b7 b2 47 3e 57 ef 41 96 39 1f 64 ca 5c b6 6b | keyex value c5 94 06 b1 a2 8d ee e3 00 a5 ae 06 5b db f0 77 | keyex value 1e 4f 0f a2 99 0b d1 46 0e 01 b9 03 35 ab 67 ac | keyex value 6e f0 c2 8e 61 92 e4 d1 44 8b 59 56 c1 f7 e0 eb | keyex value 40 aa 4a c8 51 85 35 bd 8c bd b0 1d 40 04 16 be | keyex value 6f 52 34 93 5c b4 c8 44 8e 4b 17 ca 84 aa ca d3 | keyex value 9b be 3e c2 03 fe dd 36 e7 25 1c 75 62 f1 38 e1 | keyex value 2b 82 83 89 12 e8 63 89 d1 12 fb db da 8d 74 e0 | keyex value 73 b2 de 6c 08 8b 89 ad ea f4 05 52 0f b2 4c c8 | keyex value f1 e7 de 85 93 7b 1e 13 66 b6 47 0c 8e 5a db a1 | keyex value 8a 6d fb 6c ed a3 e3 d8 40 76 ba 55 26 77 18 58 | keyex value 68 ed 08 63 01 7d 48 b4 91 da b8 83 ef 83 97 82 | keyex value 24 e6 bf bb 49 a9 4e 41 42 7d 29 44 8e 77 eb 6a | keyex value d5 74 e7 53 90 3f d0 59 9b 1f 19 69 fc 0f 04 5e | keyex value 99 5a 6d fe 6d 53 63 57 e3 1c b0 e0 36 55 29 53 | keyex value 03 ef ca c0 6f df fa 48 3b f3 d7 22 fe da 39 85 | emitting length of ISAKMP Key Exchange Payload: 260 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 8 raw bytes of ID body into ISAKMP Identification Payload (IPsec DOI) | ID body c0 00 03 00 ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 8 raw bytes of ID body into ISAKMP Identification Payload (IPsec DOI) | ID body c0 00 02 00 ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | quick inR1 outI2 HASH(2): | 33 fa 86 f3 f0 8d 0c 92 46 64 ee 47 bc c7 77 39 | 56 5a b9 e4 75 fc ac aa bc 95 4c c6 60 7d b2 91 | compute_proto_keymat: needed_len (after ESP enc)=16 | compute_proto_keymat: needed_len (after ESP auth)=36 | FOR_EACH_CONNECTION_... in route_owner | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 vs | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 vs | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 | route owner of "northnet-eastnet-nat"[1] 192.1.2.254 unrouted: NULL | install_inbound_ipsec_sa() checking if we can route | could_route called for northnet-eastnet-nat (kind=CK_INSTANCE) | FOR_EACH_CONNECTION_... in route_owner | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 vs | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 vs | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 | route owner of "northnet-eastnet-nat"[1] 192.1.2.254 unrouted: NULL; eroute owner: NULL | routing is easy, or has resolvable near-conflict | checking if this is a replacement state | st=0x55767b8d4308 ost=(nil) st->serialno=#2 ost->serialno=#0 | installing outgoing SA now as refhim=0 | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'northnet-eastnet-nat' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.89eae989@192.1.2.254 included non-error error | outgoing SA has refhim=0 | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'northnet-eastnet-nat' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.3a802c25@192.1.2.23 included non-error error | priority calculation of connection "northnet-eastnet-nat" is 0xfe7e7 | add inbound eroute 192.0.3.0/24:0 --0-> 192.0.2.0/24:0 => tun.10000@192.1.2.23 (raw_eroute) | IPsec Sa SPD priority set to 1042407 | raw_eroute result=success | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 460 | finished processing quick inI1 | complete v1 state transition with STF_OK | [RE]START processing: state #2 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in complete_v1_state_transition() at ikev1.c:2673) | #2 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | child state #2: QUICK_R0(established CHILD SA) => QUICK_R1(established CHILD SA) | event_already_set, deleting event | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x55767b8db6a8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55767b8d9748 | sending reply packet to 192.1.2.254:4500 (from 192.1.2.23:4500) | sending 464 bytes for STATE_QUICK_R0 through eth1 from 192.1.2.23:4500 to 192.1.2.254:4500 (using #2) | 00 00 00 00 47 05 87 28 0a 02 22 3b 7a fa 89 ce | 72 e7 db 5c 08 10 20 01 bf 42 8e 33 00 00 01 cc | 77 fb 8d 4e 42 2c 7e 46 c0 05 c8 b2 94 36 3f c1 | 97 58 f8 d3 d8 ad f5 a0 90 0b 2d 54 2d 1a 95 fd | c0 63 80 55 77 8a b0 e4 a2 09 1a 8a dd f8 f1 00 | bf 1d 37 43 6f 1d a3 84 77 3b 5b 41 94 4e ad 94 | 67 3a 29 bf 5e 87 cc f8 3e a3 0f 8e c2 08 16 4a | b7 c6 9e 60 54 7e aa 98 e3 6b 3c d4 d0 01 4b 5d | b4 04 c0 fc 9f 19 c0 06 cb 9e c8 da 1e 4b 60 f1 | 4a 1a 64 c7 68 c8 e4 b0 06 40 d5 8e 25 cf 26 91 | e9 4f 9d 8b 54 39 6a 0b 9d 3b ce 8a 90 36 0e e1 | 4a cf 5b 88 53 6f 8b 65 95 59 67 12 80 0d 0c fc | a0 b2 a6 5b 61 44 ad 76 d0 e5 b9 a7 ca b0 31 72 | c9 a8 64 0e fb c6 a6 de 73 5f 0f 06 66 f4 c6 cb | ba 8c e4 4f 98 ef c1 21 ab 29 08 22 8c bb 4e ff | 4e c1 56 80 c2 5c 99 27 32 97 cd 87 8a 03 4d ca | e0 c2 a4 d2 cc 02 db 74 e1 3e 97 91 de a3 ad 86 | 97 8b 73 37 9d fd 97 bb 79 6a 1e 9d 8e 9c 26 27 | 8a 08 c8 44 0a fb bc ba 66 23 a6 e2 bd 55 05 bc | 0c 4d 7b ed 93 69 39 f7 ae 20 64 66 25 40 3b 77 | ac 7c 8d 81 70 2f 46 66 4c a9 41 97 bb 76 bf 8a | 13 cd 0b e4 09 07 3c bc b5 b4 3f 48 a7 20 ff bf | 8d e8 bf 7b db 93 83 fb 9d fb 4c 86 ea 83 e1 7a | 03 31 da 71 98 33 b5 c1 9f 15 d3 56 6b 41 6c bc | 3a ee b7 ad 41 91 07 e9 5e ba d3 44 3c 8e 21 59 | de 1d 14 90 e3 4f 28 f0 ff 3d 0a 87 6b c7 4a 33 | 2f 8b 7d 65 4a 9d 1e 00 d7 53 fd 2f 0c 39 10 c5 | 37 6d f0 0a 40 8d 34 3f e8 54 23 6b c4 ad 17 02 | 50 bc 5b 4c 74 dc f7 26 9a 30 37 12 4b 95 c7 a7 | !event_already_set at reschedule | event_schedule: new EVENT_RETRANSMIT-pe@0x55767b8d9748 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #2 | libevent_malloc: new ptr-libevent@0x55767b8bf878 size 128 | #2 STATE_QUICK_R1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29822.043546 | pstats #2 ikev1.ipsec established | NAT-T: NAT Traversal detected - their IKE port is '500' | NAT-T: encaps is 'auto' "northnet-eastnet-nat"[1] 192.1.2.254 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 tunnel mode {ESP/NAT=>0x89eae989 <0x3a802c25 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=192.1.2.254:4500 DPD=passive} | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | resume sending helper answer for #2 suppresed complete_v1_state_transition() | #2 spent 0.732 milliseconds in resume sending helper answer | stop processing: state #2 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f079c003618 | spent 0.00332 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 76 bytes from 192.1.2.254:4500 on eth1 (192.1.2.23:4500) | 47 05 87 28 0a 02 22 3b 7a fa 89 ce 72 e7 db 5c | 08 10 20 01 bf 42 8e 33 00 00 00 4c 40 47 01 57 | a2 5b f9 fb 67 96 1d 8b 0b 01 c6 0b 90 8b f8 c4 | 9c 5b 6f e9 83 24 54 d5 26 b3 3e c6 b8 22 24 80 | a0 dc 1e 51 ec 32 e3 fa 92 79 b9 e3 | start processing: from 192.1.2.254:4500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 47 05 87 28 0a 02 22 3b | responder cookie: | 7a fa 89 ce 72 e7 db 5c | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3208810035 (0xbf428e33) | length: 76 (0x4c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) | State DB: found IKEv1 state #2 in QUICK_R1 (find_state_ikev1) | start processing: state #2 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in process_v1_packet() at ikev1.c:1633) | #2 is idle | #2 idle | received encrypted packet from 192.1.2.254:4500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 36 (0x24) | removing 12 bytes of padding | quick_inI2 HASH(3): | 74 49 05 b1 32 1c 51 be b1 f5 a7 8e 02 e5 90 58 | 00 cd 7b bc 09 d8 2a 1a eb 72 7c f6 61 51 5e 28 | received 'quick_inI2' message HASH(3) data ok | install_ipsec_sa() for #2: outbound only | could_route called for northnet-eastnet-nat (kind=CK_INSTANCE) | FOR_EACH_CONNECTION_... in route_owner | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 vs | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 vs | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 | route owner of "northnet-eastnet-nat"[1] 192.1.2.254 unrouted: NULL; eroute owner: NULL | sr for #2: unrouted | route_and_eroute() for proto 0, and source port 0 dest port 0 | FOR_EACH_CONNECTION_... in route_owner | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 vs | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 vs | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 | route owner of "northnet-eastnet-nat"[1] 192.1.2.254 unrouted: NULL; eroute owner: NULL | route_and_eroute with c: northnet-eastnet-nat (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2 | priority calculation of connection "northnet-eastnet-nat" is 0xfe7e7 | eroute_connection add eroute 192.0.2.0/24:0 --0-> 192.0.3.0/24:0 => tun.0@192.1.2.254 (raw_eroute) | IPsec Sa SPD priority set to 1042407 | raw_eroute result=success | running updown command "ipsec _updown" for verb up | command executing up-client | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-nat' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.254' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.254' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.3.0/24' PLUTO_PEER_CLIENT_NET='192.0.3.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFA | popen cmd is 1284 chars long | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-na: | cmd( 80):t' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.254' PLUTO_ME='192.1.2.23' PLU: | cmd( 160):TO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.: | cmd( 240):testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='192.0: | cmd( 320):.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PL: | cmd( 400):UTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP': | cmd( 480): PLUTO_PEER='192.1.2.254' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswa: | cmd( 560):n, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libr: | cmd( 640):eswan.org' PLUTO_PEER_CLIENT='192.0.3.0/24' PLUTO_PEER_CLIENT_NET='192.0.3.0' PL: | cmd( 720):UTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0': | cmd( 800): PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSAS: | cmd( 880):IG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_: | cmd( 960):KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CIS: | cmd(1040):CO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLU: | cmd(1120):TO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_: | cmd(1200):ROUTING='no' VTI_SHARED='no' SPI_IN=0x89eae989 SPI_OUT=0x3a802c25 ipsec _updown : | cmd(1280):2>&1: | route_and_eroute: firewall_notified: true | running updown command "ipsec _updown" for verb prepare | command executing prepare-client | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-nat' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.254' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.254' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.3.0/24' PLUTO_PEER_CLIENT_NET='192.0.3.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_C | popen cmd is 1289 chars long | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastn: | cmd( 80):et-nat' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.254' PLUTO_ME='192.1.2.23: | cmd( 160):' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=: | cmd( 240):east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT=': | cmd( 320):192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.: | cmd( 400):0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE=: | cmd( 480):'ESP' PLUTO_PEER='192.1.2.254' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Lib: | cmd( 560):reswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing: | cmd( 640):.libreswan.org' PLUTO_PEER_CLIENT='192.0.3.0/24' PLUTO_PEER_CLIENT_NET='192.0.3.: | cmd( 720):0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCO: | cmd( 800):L='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY=: | cmd( 880):'RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_: | cmd( 960):CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEE: | cmd(1040):R_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER=': | cmd(1120):' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='': | cmd(1200): VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x89eae989 SPI_OUT=0x3a802c25 ipsec _up: | cmd(1280):down 2>&1: | running updown command "ipsec _updown" for verb route | command executing route-client | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-nat' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.254' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.254' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.3.0/24' PLUTO_PEER_CLIENT_NET='192.0.3.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ | popen cmd is 1287 chars long | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet: | cmd( 80):-nat' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.254' PLUTO_ME='192.1.2.23' : | cmd( 160):PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=ea: | cmd( 240):st.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='19: | cmd( 320):2.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0': | cmd( 400): PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='E: | cmd( 480):SP' PLUTO_PEER='192.1.2.254' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libre: | cmd( 560):swan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.l: | cmd( 640):ibreswan.org' PLUTO_PEER_CLIENT='192.0.3.0/24' PLUTO_PEER_CLIENT_NET='192.0.3.0': | cmd( 720): PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL=: | cmd( 800):'0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='R: | cmd( 880):SASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CO: | cmd( 960):NN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_: | cmd(1040):CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' : | cmd(1120):PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' V: | cmd(1200):TI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x89eae989 SPI_OUT=0x3a802c25 ipsec _updo: | cmd(1280):wn 2>&1: | route_and_eroute: instance "northnet-eastnet-nat"[1] 192.1.2.254, setting eroute_owner {spd=0x55767b8c3b38,sr=0x55767b8c3b38} to #2 (was #0) (newest_ipsec_sa=#0) | #1 spent 1.73 milliseconds in install_ipsec_sa() | inI2: instance northnet-eastnet-nat[1], setting IKEv1 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1 | DPD: dpd_init() called on IPsec SA | DPD: Peer does not support Dead Peer Detection | complete v1 state transition with STF_OK | [RE]START processing: state #2 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in complete_v1_state_transition() at ikev1.c:2673) | #2 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | child state #2: QUICK_R1(established CHILD SA) => QUICK_R2(established CHILD SA) | event_already_set, deleting event | state #2 requesting EVENT_RETRANSMIT to be deleted | #2 STATE_QUICK_R2: retransmits: cleared | libevent_free: release ptr-libevent@0x55767b8bf878 | free_event_entry: release EVENT_RETRANSMIT-pe@0x55767b8d9748 | !event_already_set at reschedule | event_schedule: new EVENT_SA_REPLACE-pe@0x55767b8d9748 | inserting event EVENT_SA_REPLACE, timeout in 28530 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f079c003618 size 128 | pstats #2 ikev1.ipsec established | NAT-T: NAT Traversal detected - their IKE port is '500' | NAT-T: encaps is 'auto' "northnet-eastnet-nat"[1] 192.1.2.254 #2: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0x89eae989 <0x3a802c25 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=192.1.2.254:4500 DPD=passive} | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | #2 spent 1.84 milliseconds in process_packet_tail() | stop processing: from 192.1.2.254:4500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #2 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 1.98 milliseconds in comm_handle_cb() reading and processing packet | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00461 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00297 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00271 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in show_connections_status | FOR_EACH_CONNECTION_... in show_connections_status | FOR_EACH_STATE_... in show_states_status (sort_states) | FOR_EACH_STATE_... in sort_states | get_sa_info esp.3a802c25@192.1.2.23 | get_sa_info esp.89eae989@192.1.2.254 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.402 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) shutting down | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825) destroying root certificate cache | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' | unreference key: 0x55767b8c54b8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- | unreference key: 0x55767b8c4d78 user-east@testing.libreswan.org cnt 1-- | unreference key: 0x55767b8c4b18 @east.testing.libreswan.org cnt 1-- | unreference key: 0x55767b8c33d8 east@testing.libreswan.org cnt 1-- | unreference key: 0x55767b8c31b8 192.1.2.23 cnt 1-- | start processing: connection "northnet-eastnet-nat"[1] 192.1.2.254 (in delete_connection() at connections.c:189) "northnet-eastnet-nat"[1] 192.1.2.254: deleting connection "northnet-eastnet-nat"[1] 192.1.2.254 instance with peer 192.1.2.254 {isakmp=#1/ipsec=#2} | Deleting states for connection - including all other IPsec SA's of this IKE SA | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #2 | suspend processing: connection "northnet-eastnet-nat"[1] 192.1.2.254 (in foreach_state_by_connection_func_delete() at state.c:1310) | start processing: state #2 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in foreach_state_by_connection_func_delete() at state.c:1310) | pstats #2 ikev1.ipsec deleted completed | [RE]START processing: state #2 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in delete_state() at state.c:879) "northnet-eastnet-nat"[1] 192.1.2.254 #2: deleting state (STATE_QUICK_R2) aged 3.497s and sending notification | child state #2: QUICK_R2(established CHILD SA) => delete | get_sa_info esp.89eae989@192.1.2.254 | get_sa_info esp.3a802c25@192.1.2.23 "northnet-eastnet-nat"[1] 192.1.2.254 #2: ESP traffic information: in=252B out=252B | #2 send IKEv1 delete notification for STATE_QUICK_R2 | FOR_EACH_STATE_... in find_phase1_state | **emit ISAKMP Message: | initiator cookie: | 47 05 87 28 0a 02 22 3b | responder cookie: | 7a fa 89 ce 72 e7 db 5c | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3547473089 (0xd37224c1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 3 (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload | delete payload 3a 80 2c 25 | emitting length of ISAKMP Delete Payload: 16 | send delete HASH(1): | d7 44 89 fb c6 9b a7 74 a9 a1 31 c4 eb e0 b0 3c | 8d 6b 90 a0 49 6a 17 d5 01 b5 c3 3f 41 58 52 e8 | emitting 12 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 92 | sending 96 bytes for delete notify through eth1 from 192.1.2.23:4500 to 192.1.2.254:4500 (using #1) | 00 00 00 00 47 05 87 28 0a 02 22 3b 7a fa 89 ce | 72 e7 db 5c 08 10 05 01 d3 72 24 c1 00 00 00 5c | 8b da e9 87 b4 3c 32 05 3c 00 6a 1d 83 d5 3c e9 | b4 7b 0c 54 f4 5c 49 52 1a c3 01 0e 87 d5 34 41 | 54 52 1a 27 85 8e d0 1c a3 2a 34 5e 6a 62 24 66 | f5 49 10 25 51 cf 52 df e6 02 2f 25 a5 d8 5a b4 | state #2 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x7f079c003618 | free_event_entry: release EVENT_SA_REPLACE-pe@0x55767b8d9748 | running updown command "ipsec _updown" for verb down | command executing down-client | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-nat' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.254' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.254' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.3.0/24' PLUTO_PEER_CLIENT_NET='192.0.3.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844536' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PL | popen cmd is 1297 chars long | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-: | cmd( 80):nat' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.254' PLUTO_ME='192.1.2.23' P: | cmd( 160):LUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=eas: | cmd( 240):t.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='192: | cmd( 320):.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' : | cmd( 400):PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ES: | cmd( 480):P' PLUTO_PEER='192.1.2.254' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libres: | cmd( 560):wan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.li: | cmd( 640):breswan.org' PLUTO_PEER_CLIENT='192.0.3.0/24' PLUTO_PEER_CLIENT_NET='192.0.3.0' : | cmd( 720):PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL=': | cmd( 800):0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844536' PLUTO_CONN_P: | cmd( 880):OLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' : | cmd( 960):PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUT: | cmd(1040):O_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_: | cmd(1120):BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_: | cmd(1200):IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x89eae989 SPI_OUT=0x3a802c25 i: | cmd(1280):psec _updown 2>&1: | shunt_eroute() called for connection 'northnet-eastnet-nat' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "northnet-eastnet-nat" is 0xfe7e7 | IPsec Sa SPD priority set to 1042407 | delete esp.89eae989@192.1.2.254 | netlink response for Del SA esp.89eae989@192.1.2.254 included non-error error | priority calculation of connection "northnet-eastnet-nat" is 0xfe7e7 | delete inbound eroute 192.0.3.0/24:0 --0-> 192.0.2.0/24:0 => unk255.10000@192.1.2.23 (raw_eroute) | raw_eroute result=success | delete esp.3a802c25@192.1.2.23 | netlink response for Del SA esp.3a802c25@192.1.2.23 included non-error error | stop processing: connection "northnet-eastnet-nat"[1] 192.1.2.254 (BACKGROUND) (in update_state_connection() at connections.c:4076) | start processing: connection NULL (in update_state_connection() at connections.c:4077) | in connection_discard for connection northnet-eastnet-nat | State DB: deleting IKEv1 state #2 in QUICK_R2 | child state #2: QUICK_R2(established CHILD SA) => UNDEFINED(ignore) | stop processing: state #2 from 192.1.2.254 (in delete_state() at state.c:1143) | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) | state #1 | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #1 | start processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in foreach_state_by_connection_func_delete() at state.c:1310) | pstats #1 ikev1.isakmp deleted completed | [RE]START processing: state #1 connection "northnet-eastnet-nat"[1] 192.1.2.254 from 192.1.2.254 (in delete_state() at state.c:879) "northnet-eastnet-nat"[1] 192.1.2.254 #1: deleting state (STATE_MAIN_R3) aged 3.550s and sending notification | parent state #1: MAIN_R3(established IKE SA) => delete | #1 send IKEv1 delete notification for STATE_MAIN_R3 | **emit ISAKMP Message: | initiator cookie: | 47 05 87 28 0a 02 22 3b | responder cookie: | 7a fa 89 ce 72 e7 db 5c | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1590939417 (0x5ed3cf19) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | number of SPIs: 1 (0x1) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' | emitting 8 raw bytes of initiator SPI into ISAKMP Delete Payload | initiator SPI 47 05 87 28 0a 02 22 3b | emitting 8 raw bytes of responder SPI into ISAKMP Delete Payload | responder SPI 7a fa 89 ce 72 e7 db 5c | emitting length of ISAKMP Delete Payload: 28 | send delete HASH(1): | 85 f3 bd ec b7 88 2d 61 e3 c4 11 05 30 06 29 ce | 57 1c 18 0c 34 db 9b 13 d2 2b 90 73 35 20 f7 fb | no IKEv1 message padding required | emitting length of ISAKMP Message: 92 | sending 96 bytes for delete notify through eth1 from 192.1.2.23:4500 to 192.1.2.254:4500 (using #1) | 00 00 00 00 47 05 87 28 0a 02 22 3b 7a fa 89 ce | 72 e7 db 5c 08 10 05 01 5e d3 cf 19 00 00 00 5c | fc cc 4b 59 e5 b3 45 72 20 90 a1 0b 32 02 d2 ae | 20 5c a0 32 c1 d8 17 0d 62 b5 28 8c 3d 10 4b a2 | 1a 0b f9 5c 4b 09 a4 27 08 4b 54 f5 ac 4d ee a8 | a4 ac 18 e0 7e 93 b7 cd 93 b4 eb d7 72 f9 32 83 | state #1 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x55767b8d31c8 | free_event_entry: release EVENT_SA_REPLACE-pe@0x55767b8bfca8 | State DB: IKEv1 state not found (flush_incomplete_children) | in connection_discard for connection northnet-eastnet-nat | State DB: deleting IKEv1 state #1 in MAIN_R3 | parent state #1: MAIN_R3(established IKE SA) => UNDEFINED(ignore) | unreference key: 0x55767b8cce48 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org cnt 2-- | stop processing: state #1 from 192.1.2.254 (in delete_state() at state.c:1143) | unreference key: 0x55767b8cce48 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org cnt 1-- | unreference key: 0x55767b8dbbf8 user-north@testing.libreswan.org cnt 1-- | unreference key: 0x55767b8de8a8 @north.testing.libreswan.org cnt 1-- | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) | shunt_eroute() called for connection 'northnet-eastnet-nat' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "northnet-eastnet-nat" is 0xfe7e7 | priority calculation of connection "northnet-eastnet-nat" is 0xfe7e7 | FOR_EACH_CONNECTION_... in route_owner | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 vs | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 vs | conn northnet-eastnet-nat mark 0/00000000, 0/00000000 | route owner of "northnet-eastnet-nat" unrouted: NULL | running updown command "ipsec _updown" for verb unroute | command executing unroute-client | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-nat' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.254' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.254' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.3.0/24' PLUTO_PEER_CLIENT_NET='192.0.3.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUT | popen cmd is 1278 chars long | cmd( 0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastn: | cmd( 80):et-nat' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.254' PLUTO_ME='192.1.2.23: | cmd( 160):' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=: | cmd( 240):east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT=': | cmd( 320):192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.: | cmd( 400):0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE=: | cmd( 480):'none' PLUTO_PEER='192.1.2.254' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Li: | cmd( 560):breswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testin: | cmd( 640):g.libreswan.org' PLUTO_PEER_CLIENT='192.0.3.0/24' PLUTO_PEER_CLIENT_NET='192.0.3: | cmd( 720):.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOC: | cmd( 800):OL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY: | cmd( 880):='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO: | cmd( 960):_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_: | cmd(1040):PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNE: | cmd(1120):R='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE: | cmd(1200):='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1: unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. | free hp@0x55767b8c4258 | flush revival: connection 'northnet-eastnet-nat' wasn't on the list | processing: STOP connection NULL (in discard_connection() at connections.c:249) | start processing: connection "northnet-eastnet-nat" (in delete_connection() at connections.c:189) | Deleting states for connection - including all other IPsec SA's of this IKE SA | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | free hp@0x55767b8c5688 | flush revival: connection 'northnet-eastnet-nat' wasn't on the list | stop processing: connection "northnet-eastnet-nat" (in discard_connection() at connections.c:249) | crl fetch request list locked by 'free_crl_fetch' | crl fetch request list unlocked by 'free_crl_fetch' shutting down interface lo/lo 127.0.0.1:4500 shutting down interface lo/lo 127.0.0.1:500 shutting down interface eth0/eth0 192.0.2.254:4500 shutting down interface eth0/eth0 192.0.2.254:500 shutting down interface eth1/eth1 192.1.2.23:4500 shutting down interface eth1/eth1 192.1.2.23:500 | FOR_EACH_STATE_... in delete_states_dead_interfaces | libevent_free: release ptr-libevent@0x55767b8b19f8 | free_event_entry: release EVENT_NULL-pe@0x55767b8bd818 | libevent_free: release ptr-libevent@0x55767b858168 | free_event_entry: release EVENT_NULL-pe@0x55767b8bd8c8 | libevent_free: release ptr-libevent@0x55767b858218 | free_event_entry: release EVENT_NULL-pe@0x55767b8bd978 | libevent_free: release ptr-libevent@0x55767b8571d8 | free_event_entry: release EVENT_NULL-pe@0x55767b8bda28 | libevent_free: release ptr-libevent@0x55767b85f4e8 | free_event_entry: release EVENT_NULL-pe@0x55767b8bdad8 | libevent_free: release ptr-libevent@0x55767b860008 | free_event_entry: release EVENT_NULL-pe@0x55767b8bdb88 | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | libevent_free: release ptr-libevent@0x55767b8b1aa8 | free_event_entry: release EVENT_NULL-pe@0x55767b8a5c48 | libevent_free: release ptr-libevent@0x55767b89e6b8 | free_event_entry: release EVENT_NULL-pe@0x55767b8a57a8 | libevent_free: release ptr-libevent@0x55767b89e608 | free_event_entry: release EVENT_NULL-pe@0x55767b85f6a8 | global timer EVENT_REINIT_SECRET uninitialized | global timer EVENT_SHUNT_SCAN uninitialized | global timer EVENT_PENDING_DDNS uninitialized | global timer EVENT_PENDING_PHASE2 uninitialized | global timer EVENT_CHECK_CRLS uninitialized | global timer EVENT_REVIVE_CONNS uninitialized | global timer EVENT_FREE_ROOT_CERTS uninitialized | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized | global timer EVENT_NAT_T_KEEPALIVE uninitialized | libevent_free: release ptr-libevent@0x55767b863c78 | signal event handler PLUTO_SIGCHLD uninstalled | libevent_free: release ptr-libevent@0x55767b7d5028 | signal event handler PLUTO_SIGTERM uninstalled | libevent_free: release ptr-libevent@0x55767b7dca18 | signal event handler PLUTO_SIGHUP uninstalled | libevent_free: release ptr-libevent@0x55767b8bd238 | signal event handler PLUTO_SIGSYS uninstalled | releasing event base | libevent_free: release ptr-libevent@0x55767b8bd108 | libevent_free: release ptr-libevent@0x55767b89ffd8 | libevent_free: release ptr-libevent@0x55767b89ff88 | libevent_free: release ptr-libevent@0x55767b8bf658 | libevent_free: release ptr-libevent@0x55767b89ff48 | libevent_free: release ptr-libevent@0x55767b8bcd98 | libevent_free: release ptr-libevent@0x55767b8bd008 | libevent_free: release ptr-libevent@0x55767b8a0188 | libevent_free: release ptr-libevent@0x55767b8a5818 | libevent_free: release ptr-libevent@0x55767b8a5478 | libevent_free: release ptr-libevent@0x55767b8bdbf8 | libevent_free: release ptr-libevent@0x55767b8bdb48 | libevent_free: release ptr-libevent@0x55767b8bda98 | libevent_free: release ptr-libevent@0x55767b8bd9e8 | libevent_free: release ptr-libevent@0x55767b8bd938 | libevent_free: release ptr-libevent@0x55767b8bd888 | libevent_free: release ptr-libevent@0x55767b7d3758 | libevent_free: release ptr-libevent@0x55767b8bd088 | libevent_free: release ptr-libevent@0x55767b8bd048 | libevent_free: release ptr-libevent@0x55767b8bcf08 | libevent_free: release ptr-libevent@0x55767b8bd0c8 | libevent_free: release ptr-libevent@0x55767b8bcdd8 | libevent_free: release ptr-libevent@0x55767b865808 | libevent_free: release ptr-libevent@0x55767b865788 | libevent_free: release ptr-libevent@0x55767b7d3ac8 | releasing global libevent data | libevent_free: release ptr-libevent@0x55767b865988 | libevent_free: release ptr-libevent@0x55767b865908 | libevent_free: release ptr-libevent@0x55767b865888 leak: virtual description, item size: 4 leak detective found 1 leaks, total size 4