FIPS Product: YES
FIPS Kernel: NO
FIPS Mode: NO
NSS DB directory: sql:/etc/ipsec.d
Initializing NSS
Opening NSS database "sql:/etc/ipsec.d" read-only
NSS initialized
NSS crypto library initialized
FIPS HMAC integrity support [enabled]
FIPS mode disabled for pluto daemon
FIPS HMAC integrity verification self-test FAILED
libcap-ng support [enabled]
Linux audit support [enabled]
Linux audit activated
Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:2970
core dump dir: /tmp
secrets file: /etc/ipsec.secrets
leak-detective enabled
NSS crypto [enabled]
XAUTH PAM support [enabled]
| libevent is using pluto's memory allocator
Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800)
| libevent_malloc: new ptr-libevent@0x5649fe80ea88 size 40
| libevent_malloc: new ptr-libevent@0x5649fe8104d8 size 40
| libevent_malloc: new ptr-libevent@0x5649fe810458 size 40
| creating event base
| libevent_malloc: new ptr-libevent@0x5649fe80f258 size 56
| libevent_malloc: new ptr-libevent@0x5649fe7a11e8 size 664
| libevent_malloc: new ptr-libevent@0x5649fe840648 size 24
| libevent_malloc: new ptr-libevent@0x5649fe840698 size 384
| libevent_malloc: new ptr-libevent@0x5649fe840608 size 16
| libevent_malloc: new ptr-libevent@0x5649fe8103d8 size 40
| libevent_malloc: new ptr-libevent@0x5649fe810358 size 48
| libevent_realloc: new ptr-libevent@0x5649fe7a0e78 size 256
| libevent_malloc: new ptr-libevent@0x5649fe840848 size 16
| libevent_free: release ptr-libevent@0x5649fe80f258
| libevent initialized
| libevent_realloc: new ptr-libevent@0x5649fe80f258 size 64
| global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds
| init_nat_traversal() initialized with keep_alive=0s
NAT-Traversal support  [enabled]
| global one-shot timer EVENT_NAT_T_KEEPALIVE initialized
| global one-shot timer EVENT_FREE_ROOT_CERTS initialized
| global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds
| global one-shot timer EVENT_REVIVE_CONNS initialized
| global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds
| global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds
Encryption algorithms:
  AES_CCM_16              IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm, aes_ccm_c
  AES_CCM_12              IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm_b
  AES_CCM_8               IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_ccm_a
  3DES_CBC                IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  [*192]  3des
  CAMELLIA_CTR            IKEv1:     ESP     IKEv2:     ESP           {256,192,*128}
  CAMELLIA_CBC            IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  camellia
  AES_GCM_16              IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm, aes_gcm_c
  AES_GCM_12              IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm_b
  AES_GCM_8               IKEv1:     ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes_gcm_a
  AES_CTR                 IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aesctr
  AES_CBC                 IKEv1: IKE ESP     IKEv2: IKE ESP     FIPS  {256,192,*128}  aes
  SERPENT_CBC             IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  serpent
  TWOFISH_CBC             IKEv1: IKE ESP     IKEv2: IKE ESP           {256,192,*128}  twofish
  TWOFISH_SSH             IKEv1: IKE         IKEv2: IKE ESP           {256,192,*128}  twofish_cbc_ssh
  NULL_AUTH_AES_GMAC      IKEv1:     ESP     IKEv2:     ESP     FIPS  {256,192,*128}  aes_gmac
  NULL                    IKEv1:     ESP     IKEv2:     ESP           []
  CHACHA20_POLY1305       IKEv1:             IKEv2: IKE ESP           [*256]  chacha20poly1305
Hash algorithms:
  MD5                     IKEv1: IKE         IKEv2:                 
  SHA1                    IKEv1: IKE         IKEv2:             FIPS  sha
  SHA2_256                IKEv1: IKE         IKEv2:             FIPS  sha2, sha256
  SHA2_384                IKEv1: IKE         IKEv2:             FIPS  sha384
  SHA2_512                IKEv1: IKE         IKEv2:             FIPS  sha512
PRF algorithms:
  HMAC_MD5                IKEv1: IKE         IKEv2: IKE               md5
  HMAC_SHA1               IKEv1: IKE         IKEv2: IKE         FIPS  sha, sha1
  HMAC_SHA2_256           IKEv1: IKE         IKEv2: IKE         FIPS  sha2, sha256, sha2_256
  HMAC_SHA2_384           IKEv1: IKE         IKEv2: IKE         FIPS  sha384, sha2_384
  HMAC_SHA2_512           IKEv1: IKE         IKEv2: IKE         FIPS  sha512, sha2_512
  AES_XCBC                IKEv1:             IKEv2: IKE               aes128_xcbc
Integrity algorithms:
  HMAC_MD5_96             IKEv1: IKE ESP AH  IKEv2: IKE ESP AH        md5, hmac_md5
  HMAC_SHA1_96            IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha, sha1, sha1_96, hmac_sha1
  HMAC_SHA2_512_256       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha512, sha2_512, sha2_512_256, hmac_sha2_512
  HMAC_SHA2_384_192       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha384, sha2_384, sha2_384_192, hmac_sha2_384
  HMAC_SHA2_256_128       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256
  HMAC_SHA2_256_TRUNCBUG  IKEv1:     ESP AH  IKEv2:         AH      
  AES_XCBC_96             IKEv1:     ESP AH  IKEv2: IKE ESP AH        aes_xcbc, aes128_xcbc, aes128_xcbc_96
  AES_CMAC_96             IKEv1:     ESP AH  IKEv2:     ESP AH  FIPS  aes_cmac
  NONE                    IKEv1:     ESP     IKEv2: IKE ESP     FIPS  null
DH algorithms:
  NONE                    IKEv1:             IKEv2: IKE ESP AH  FIPS  null, dh0
  MODP1536                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH        dh5
  MODP2048                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh14
  MODP3072                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh15
  MODP4096                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh16
  MODP6144                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh17
  MODP8192                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH  FIPS  dh18
  DH19                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_256, ecp256
  DH20                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_384, ecp384
  DH21                    IKEv1: IKE         IKEv2: IKE ESP AH  FIPS  ecp_521, ecp521
  DH31                    IKEv1: IKE         IKEv2: IKE ESP AH        curve25519
testing CAMELLIA_CBC:
  Camellia: 16 bytes with 128-bit key
  Camellia: 16 bytes with 128-bit key
  Camellia: 16 bytes with 256-bit key
  Camellia: 16 bytes with 256-bit key
testing AES_GCM_16:
  empty string
  one block
  two blocks
  two blocks with associated data
testing AES_CTR:
  Encrypting 16 octets using AES-CTR with 128-bit key
  Encrypting 32 octets using AES-CTR with 128-bit key
  Encrypting 36 octets using AES-CTR with 128-bit key
  Encrypting 16 octets using AES-CTR with 192-bit key
  Encrypting 32 octets using AES-CTR with 192-bit key
  Encrypting 36 octets using AES-CTR with 192-bit key
  Encrypting 16 octets using AES-CTR with 256-bit key
  Encrypting 32 octets using AES-CTR with 256-bit key
  Encrypting 36 octets using AES-CTR with 256-bit key
testing AES_CBC:
  Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key
  Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key
  Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key
  Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key
testing AES_XCBC:
  RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input
  RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input
  RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input
  RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input
  RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input
  RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input
  RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input
  RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16)
  RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10)
  RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18)
testing HMAC_MD5:
  RFC 2104: MD5_HMAC test 1
  RFC 2104: MD5_HMAC test 2
  RFC 2104: MD5_HMAC test 3
8 CPU cores online
starting up 7 crypto helpers
started thread for crypto helper 0
| starting up helper thread 0
| status value returned by setting the priority of this thread (crypto helper 0) 22
| crypto helper 0 waiting (nothing to do)
started thread for crypto helper 1
| starting up helper thread 1
| status value returned by setting the priority of this thread (crypto helper 1) 22
| crypto helper 1 waiting (nothing to do)
started thread for crypto helper 2
| starting up helper thread 2
| status value returned by setting the priority of this thread (crypto helper 2) 22
started thread for crypto helper 3
| starting up helper thread 3
| status value returned by setting the priority of this thread (crypto helper 3) 22
| crypto helper 2 waiting (nothing to do)
| starting up helper thread 4
started thread for crypto helper 4
| crypto helper 3 waiting (nothing to do)
| status value returned by setting the priority of this thread (crypto helper 4) 22
| crypto helper 4 waiting (nothing to do)
started thread for crypto helper 5
started thread for crypto helper 6
| starting up helper thread 6
| checking IKEv1 state table
| starting up helper thread 5
|   MAIN_R0: category: half-open IKE SA flags: 0:
|     -> MAIN_R1 EVENT_SO_DISCARD
| status value returned by setting the priority of this thread (crypto helper 5) 22
|   MAIN_I1: category: half-open IKE SA flags: 0:
| crypto helper 5 waiting (nothing to do)
| status value returned by setting the priority of this thread (crypto helper 6) 22
|     -> MAIN_I2 EVENT_RETRANSMIT
|   MAIN_R1: category: open IKE SA flags: 200:
|     -> MAIN_R2 EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
|   MAIN_I2: category: open IKE SA flags: 0:
|     -> MAIN_I3 EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
|     -> UNDEFINED EVENT_RETRANSMIT
| crypto helper 6 waiting (nothing to do)
|   MAIN_R2: category: open IKE SA flags: 0:
|     -> MAIN_R3 EVENT_SA_REPLACE
|     -> MAIN_R3 EVENT_SA_REPLACE
|     -> UNDEFINED EVENT_SA_REPLACE
|   MAIN_I3: category: open IKE SA flags: 0:
|     -> MAIN_I4 EVENT_SA_REPLACE
|     -> MAIN_I4 EVENT_SA_REPLACE
|     -> UNDEFINED EVENT_SA_REPLACE
|   MAIN_R3: category: established IKE SA flags: 200:
|     -> UNDEFINED EVENT_NULL
|   MAIN_I4: category: established IKE SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   AGGR_R0: category: half-open IKE SA flags: 0:
|     -> AGGR_R1 EVENT_SO_DISCARD
|   AGGR_I1: category: half-open IKE SA flags: 0:
|     -> AGGR_I2 EVENT_SA_REPLACE
|     -> AGGR_I2 EVENT_SA_REPLACE
|   AGGR_R1: category: open IKE SA flags: 200:
|     -> AGGR_R2 EVENT_SA_REPLACE
|     -> AGGR_R2 EVENT_SA_REPLACE
|   AGGR_I2: category: established IKE SA flags: 200:
|     -> UNDEFINED EVENT_NULL
|   AGGR_R2: category: established IKE SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   QUICK_R0: category: established CHILD SA flags: 0:
|     -> QUICK_R1 EVENT_RETRANSMIT
|   QUICK_I1: category: established CHILD SA flags: 0:
|     -> QUICK_I2 EVENT_SA_REPLACE
|   QUICK_R1: category: established CHILD SA flags: 0:
|     -> QUICK_R2 EVENT_SA_REPLACE
|   QUICK_I2: category: established CHILD SA flags: 200:
|     -> UNDEFINED EVENT_NULL
|   QUICK_R2: category: established CHILD SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   INFO: category: informational flags: 0:
|     -> UNDEFINED EVENT_NULL
|   INFO_PROTECTED: category: informational flags: 0:
|     -> UNDEFINED EVENT_NULL
|   XAUTH_R0: category: established IKE SA flags: 0:
|     -> XAUTH_R1 EVENT_NULL
|   XAUTH_R1: category: established IKE SA flags: 0:
|     -> MAIN_R3 EVENT_SA_REPLACE
|   MODE_CFG_R0: category: informational flags: 0:
|     -> MODE_CFG_R1 EVENT_SA_REPLACE
|   MODE_CFG_R1: category: established IKE SA flags: 0:
|     -> MODE_CFG_R2 EVENT_SA_REPLACE
|   MODE_CFG_R2: category: established IKE SA flags: 0:
|     -> UNDEFINED EVENT_NULL
|   MODE_CFG_I1: category: established IKE SA flags: 0:
|     -> MAIN_I4 EVENT_SA_REPLACE
|   XAUTH_I0: category: established IKE SA flags: 0:
|     -> XAUTH_I1 EVENT_RETRANSMIT
|   XAUTH_I1: category: established IKE SA flags: 0:
|     -> MAIN_I4 EVENT_RETRANSMIT
| checking IKEv2 state table
|   PARENT_I0: category: ignore flags: 0:
|     -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT)
|   PARENT_I1: category: half-open IKE SA flags: 0:
|     -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification)
|     -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH)
|   PARENT_I2: category: open IKE SA flags: 0:
|     -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification)
|     -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification)
|     -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification)
|     -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response)
|     -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification)
|   PARENT_I3: category: established IKE SA flags: 0:
|     -> PARENT_I3 EVENT_RETAIN (I3: Informational Request)
|     -> PARENT_I3 EVENT_RETAIN (I3: Informational Response)
|     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request)
|     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response)
|   PARENT_R0: category: half-open IKE SA flags: 0:
|     -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT)
|   PARENT_R1: category: half-open IKE SA flags: 0:
|     -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED))
|     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request)
|   PARENT_R2: category: established IKE SA flags: 0:
|     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request)
|     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response)
|     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request)
|     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response)
|   V2_CREATE_I0: category: established IKE SA flags: 0:
|     -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA)
|   V2_CREATE_I: category: established IKE SA flags: 0:
|     -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response)
|   V2_REKEY_IKE_I0: category: established IKE SA flags: 0:
|     -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey)
|   V2_REKEY_IKE_I: category: established IKE SA flags: 0:
|     -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response)
|   V2_REKEY_CHILD_I0: category: established IKE SA flags: 0:
|     -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA)
|   V2_REKEY_CHILD_I: category: established IKE SA flags: 0: <none>
|   V2_CREATE_R: category: established IKE SA flags: 0:
|     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request)
|   V2_REKEY_IKE_R: category: established IKE SA flags: 0:
|     -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey)
|   V2_REKEY_CHILD_R: category: established IKE SA flags: 0: <none>
|   V2_IPSEC_I: category: established CHILD SA flags: 0: <none>
|   V2_IPSEC_R: category: established CHILD SA flags: 0: <none>
|   IKESA_DEL: category: established IKE SA flags: 0:
|     -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL)
|   CHILDSA_DEL: category: informational flags: 0: <none>
Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64
| Hard-wiring algorithms
| adding AES_CCM_16 to kernel algorithm db
| adding AES_CCM_12 to kernel algorithm db
| adding AES_CCM_8 to kernel algorithm db
| adding 3DES_CBC to kernel algorithm db
| adding CAMELLIA_CBC to kernel algorithm db
| adding AES_GCM_16 to kernel algorithm db
| adding AES_GCM_12 to kernel algorithm db
| adding AES_GCM_8 to kernel algorithm db
| adding AES_CTR to kernel algorithm db
| adding AES_CBC to kernel algorithm db
| adding SERPENT_CBC to kernel algorithm db
| adding TWOFISH_CBC to kernel algorithm db
| adding NULL_AUTH_AES_GMAC to kernel algorithm db
| adding NULL to kernel algorithm db
| adding CHACHA20_POLY1305 to kernel algorithm db
| adding HMAC_MD5_96 to kernel algorithm db
| adding HMAC_SHA1_96 to kernel algorithm db
| adding HMAC_SHA2_512_256 to kernel algorithm db
| adding HMAC_SHA2_384_192 to kernel algorithm db
| adding HMAC_SHA2_256_128 to kernel algorithm db
| adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db
| adding AES_XCBC_96 to kernel algorithm db
| adding AES_CMAC_96 to kernel algorithm db
| adding NONE to kernel algorithm db
| net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes
| global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds
| setup kernel fd callback
| add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x5649fe840048
| libevent_malloc: new ptr-libevent@0x5649fe83e868 size 128
| libevent_malloc: new ptr-libevent@0x5649fe845a68 size 16
| add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x5649fe845dd8
| libevent_malloc: new ptr-libevent@0x5649fe814178 size 128
| libevent_malloc: new ptr-libevent@0x5649fe846388 size 16
| global one-shot timer EVENT_CHECK_CRLS initialized
selinux support is enabled.
| unbound context created - setting debug level to 5
| /etc/hosts lookups activated
| /etc/resolv.conf usage activated
| outgoing-port-avoid set 0-65535
| outgoing-port-permit set 32768-60999
| Loading dnssec root key from:/var/lib/unbound/root.key
| No additional dnssec trust anchors defined via dnssec-trusted= option
| Setting up events, loop start
| add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x5649fe846278
| libevent_malloc: new ptr-libevent@0x5649fe8521d8 size 128
| libevent_malloc: new ptr-libevent@0x5649fe85d4a8 size 16
| libevent_realloc: new ptr-libevent@0x5649fe85d4e8 size 256
| libevent_malloc: new ptr-libevent@0x5649fe85d618 size 8
| libevent_realloc: new ptr-libevent@0x5649fe85d658 size 144
| libevent_malloc: new ptr-libevent@0x5649fe7a15d8 size 152
| libevent_malloc: new ptr-libevent@0x5649fe85d718 size 16
| signal event handler PLUTO_SIGCHLD installed
| libevent_malloc: new ptr-libevent@0x5649fe85d758 size 8
| libevent_malloc: new ptr-libevent@0x5649fe85d798 size 152
| signal event handler PLUTO_SIGTERM installed
| libevent_malloc: new ptr-libevent@0x5649fe85d868 size 8
| libevent_malloc: new ptr-libevent@0x5649fe85d8a8 size 152
| signal event handler PLUTO_SIGHUP installed
| libevent_malloc: new ptr-libevent@0x5649fe85d978 size 8
| libevent_realloc: release ptr-libevent@0x5649fe85d658
| libevent_realloc: new ptr-libevent@0x5649fe85d9b8 size 256
| libevent_malloc: new ptr-libevent@0x5649fe85dae8 size 152
| signal event handler PLUTO_SIGSYS installed
| created addconn helper (pid:3049) using fork+execve
| forked child 3049
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
listening for IKE messages
| Inspecting interface lo 
| found lo with address 127.0.0.1
| Inspecting interface eth0 
| found eth0 with address 192.1.3.209
Kernel supports NIC esp-hw-offload
adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.209:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
adding interface eth0/eth0 192.1.3.209:4500
adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
adding interface lo/lo 127.0.0.1:4500
| no interfaces to sort
| FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
| add_fd_read_event_handler: new ethX-pe@0x5649fe85de58
| libevent_malloc: new ptr-libevent@0x5649fe852128 size 128
| libevent_malloc: new ptr-libevent@0x5649fe85dec8 size 16
| setup callback for interface lo 127.0.0.1:4500 fd 20
| add_fd_read_event_handler: new ethX-pe@0x5649fe85df08
| libevent_malloc: new ptr-libevent@0x5649fe814228 size 128
| libevent_malloc: new ptr-libevent@0x5649fe85df78 size 16
| setup callback for interface lo 127.0.0.1:500 fd 19
| add_fd_read_event_handler: new ethX-pe@0x5649fe85dfb8
| libevent_malloc: new ptr-libevent@0x5649fe815458 size 128
| libevent_malloc: new ptr-libevent@0x5649fe85e028 size 16
| setup callback for interface eth0 192.1.3.209:4500 fd 18
| add_fd_read_event_handler: new ethX-pe@0x5649fe85e068
| libevent_malloc: new ptr-libevent@0x5649fe80ee58 size 128
| libevent_malloc: new ptr-libevent@0x5649fe85e0d8 size 16
| setup callback for interface eth0 192.1.3.209:500 fd 17
| certs and keys locked by 'free_preshared_secrets'
| certs and keys unlocked by 'free_preshared_secrets'
loading secrets from "/etc/ipsec.secrets"
| saving Modulus
| saving PublicExponent
| computed rsa CKAID  1a 15 cc e8  92 73 43 9c  2b f4 20 2a  c1 06 6e f2
| computed rsa CKAID  59 b0 ef 45
loaded private key for keyid: PKK_RSA:AQPHFfpyJ
| certs and keys locked by 'process_secret'
| certs and keys unlocked by 'process_secret'
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.811 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| Added new connection clear with policy AUTH_NEVER+GROUP+PASS+NEVER_NEGOTIATE
| counting wild cards for (none) is 15
| counting wild cards for (none) is 15
| connect_to_host_pair: 192.1.3.209:500 0.0.0.0:500 -> hp@(nil): none
| new hp@0x5649fe85e388
added connection description "clear"
| ike_life: 0s; ipsec_life: 0s; rekey_margin: 0s; rekey_fuzz: 0%; keyingtries: 0; replay_window: 0; policy: AUTH_NEVER+GROUP+PASS+NEVER_NEGOTIATE
| 192.1.3.209---192.1.3.254...%group
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.0776 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| Added new connection clear-or-private with policy AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS
| ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31
| from whack: got --esp=
| ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128
| counting wild cards for ID_NULL is 0
| counting wild cards for ID_NULL is 0
| find_host_pair: comparing 192.1.3.209:500 to 0.0.0.0:500 but ignoring ports
| connect_to_host_pair: 192.1.3.209:500 0.0.0.0:500 -> hp@0x5649fe85e388: clear
added connection description "clear-or-private"
| ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS
| 192.1.3.209[ID_NULL]---192.1.3.254...%opportunisticgroup[ID_NULL]
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.113 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| Added new connection private-or-clear with policy AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS
| ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31
| from whack: got --esp=
| ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128
| counting wild cards for ID_NULL is 0
| counting wild cards for ID_NULL is 0
| find_host_pair: comparing 192.1.3.209:500 to 0.0.0.0:500 but ignoring ports
| connect_to_host_pair: 192.1.3.209:500 0.0.0.0:500 -> hp@0x5649fe85e388: clear-or-private
added connection description "private-or-clear"
| ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS
| 192.1.3.209[ID_NULL]---192.1.3.254...%opportunisticgroup[ID_NULL]
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.11 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| Added new connection private with policy ENCRYPT+PFS+OPPORTUNISTIC+GROUP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failureDROP
| No AUTH policy was set - defaulting to RSASIG
| ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31
| from whack: got --esp=
| ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128
| counting wild cards for ID_NULL is 0
| counting wild cards for ID_NULL is 0
| find_host_pair: comparing 192.1.3.209:500 to 0.0.0.0:500 but ignoring ports
| connect_to_host_pair: 192.1.3.209:500 0.0.0.0:500 -> hp@0x5649fe85e388: private-or-clear
added connection description "private"
| ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+PFS+OPPORTUNISTIC+GROUP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failureDROP
| 192.1.3.209[ID_NULL]---192.1.3.254...%opportunisticgroup[ID_NULL]
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.111 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| Added new connection block with policy AUTH_NEVER+GROUP+REJECT+NEVER_NEGOTIATE
| counting wild cards for (none) is 15
| counting wild cards for (none) is 15
| find_host_pair: comparing 192.1.3.209:500 to 0.0.0.0:500 but ignoring ports
| connect_to_host_pair: 192.1.3.209:500 0.0.0.0:500 -> hp@0x5649fe85e388: private
added connection description "block"
| ike_life: 0s; ipsec_life: 0s; rekey_margin: 0s; rekey_fuzz: 0%; keyingtries: 0; replay_window: 0; policy: AUTH_NEVER+GROUP+REJECT+NEVER_NEGOTIATE
| 192.1.3.209---192.1.3.254...%group
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.0476 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
listening for IKE messages
| Inspecting interface lo 
| found lo with address 127.0.0.1
| Inspecting interface eth0 
| found eth0 with address 192.1.3.209
| no interfaces to sort
| libevent_free: release ptr-libevent@0x5649fe852128
| free_event_entry: release EVENT_NULL-pe@0x5649fe85de58
| add_fd_read_event_handler: new ethX-pe@0x5649fe85de58
| libevent_malloc: new ptr-libevent@0x5649fe852128 size 128
| setup callback for interface lo 127.0.0.1:4500 fd 20
| libevent_free: release ptr-libevent@0x5649fe814228
| free_event_entry: release EVENT_NULL-pe@0x5649fe85df08
| add_fd_read_event_handler: new ethX-pe@0x5649fe85df08
| libevent_malloc: new ptr-libevent@0x5649fe814228 size 128
| setup callback for interface lo 127.0.0.1:500 fd 19
| libevent_free: release ptr-libevent@0x5649fe815458
| free_event_entry: release EVENT_NULL-pe@0x5649fe85dfb8
| add_fd_read_event_handler: new ethX-pe@0x5649fe85dfb8
| libevent_malloc: new ptr-libevent@0x5649fe815458 size 128
| setup callback for interface eth0 192.1.3.209:4500 fd 18
| libevent_free: release ptr-libevent@0x5649fe80ee58
| free_event_entry: release EVENT_NULL-pe@0x5649fe85e068
| add_fd_read_event_handler: new ethX-pe@0x5649fe85e068
| libevent_malloc: new ptr-libevent@0x5649fe80ee58 size 128
| setup callback for interface eth0 192.1.3.209:500 fd 17
| certs and keys locked by 'free_preshared_secrets'
forgetting secrets
| certs and keys unlocked by 'free_preshared_secrets'
loading secrets from "/etc/ipsec.secrets"
| saving Modulus
| saving PublicExponent
| computed rsa CKAID  1a 15 cc e8  92 73 43 9c  2b f4 20 2a  c1 06 6e f2
| computed rsa CKAID  59 b0 ef 45
loaded private key for keyid: PKK_RSA:AQPHFfpyJ
| certs and keys locked by 'process_secret'
| certs and keys unlocked by 'process_secret'
loading group "/etc/ipsec.d/policies/block"
loading group "/etc/ipsec.d/policies/private"
loading group "/etc/ipsec.d/policies/private-or-clear"
loading group "/etc/ipsec.d/policies/clear-or-private"
loading group "/etc/ipsec.d/policies/clear"
| 192.1.3.209/32->192.1.2.254/32 0 sport 0 dport 0 clear
| 192.1.3.209/32->192.1.3.254/32 0 sport 0 dport 0 clear
| 192.1.3.209/32->192.1.3.253/32 0 sport 0 dport 0 clear
| 192.1.3.209/32->192.1.2.253/32 0 sport 0 dport 0 clear
| 192.1.3.209/32->192.1.3.0/24 0 sport 0 dport 0 private-or-clear
| 192.1.3.209/32->192.0.2.0/24 0 sport 0 dport 0 private-or-clear
| 192.1.3.209/32->7.0.0.0/8 0 sport 0 dport 0 private-or-clear
| 192.1.3.209/32->192.1.2.0/24 0 sport 0 dport 0 private-or-clear
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in conn_by_name
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.378 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in conn_by_name
| start processing: connection "clear" (in whack_route_connection() at rcv_whack.c:106)
| FOR_EACH_CONNECTION_... in conn_by_name
| suspend processing: connection "clear" (in route_group() at foodgroups.c:435)
| start processing: connection "clear#192.1.2.254/32" 0.0.0.0 (in route_group() at foodgroups.c:435)
| could_route called for clear#192.1.2.254/32 (kind=CK_INSTANCE)
| FOR_EACH_CONNECTION_... in route_owner
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "clear#192.1.2.254/32" 0.0.0.0 unrouted: NULL; eroute owner: NULL
| route_and_eroute() for proto 0, and source port 0 dest port 0
| FOR_EACH_CONNECTION_... in route_owner
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "clear#192.1.2.254/32" 0.0.0.0 unrouted: NULL; eroute owner: NULL
| route_and_eroute with c: clear#192.1.2.254/32 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #0
| shunt_eroute() called for connection 'clear#192.1.2.254/32' to 'add' for rt_kind 'prospective erouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "clear#192.1.2.254/32" is 0x17dfdf
| netlink_raw_eroute: SPI_PASS
| IPsec Sa SPD priority set to 1564639
| priority calculation of connection "clear#192.1.2.254/32" is 0x17dfdf
| netlink_raw_eroute: SPI_PASS
| IPsec Sa SPD priority set to 1564639
| route_and_eroute: firewall_notified: true
| running updown command "ipsec _updown" for verb prepare 
| command executing prepare-host
| executing prepare-host: PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.2.254/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.2.254/32' PLUTO_PEER_CLIENT_NET='192.1.2.254' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI
| popen cmd is 1020 chars long
| cmd(   0):PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.2.25:
| cmd(  80):4/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209':
| cmd( 160): PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET=:
| cmd( 240):'192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_:
| cmd( 320):PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PL:
| cmd( 400):UTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.2.254/32' PLUTO_PEER_CLIENT_NET='1:
| cmd( 480):92.1.2.254' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_P:
| cmd( 560):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_C:
| cmd( 640):ONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_I:
| cmd( 720):NSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLU:
| cmd( 800):TO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SER:
| cmd( 880):VER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='n:
| cmd( 960):o' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| running updown command "ipsec _updown" for verb route 
| command executing route-host
| executing route-host: PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.2.254/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.2.254/32' PLUTO_PEER_CLIENT_NET='192.1.2.254' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT
| popen cmd is 1018 chars long
| cmd(   0):PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.2.254/:
| cmd(  80):32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' P:
| cmd( 160):LUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='1:
| cmd( 240):92.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PR:
| cmd( 320):OTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUT:
| cmd( 400):O_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.2.254/32' PLUTO_PEER_CLIENT_NET='192:
| cmd( 480):.1.2.254' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEE:
| cmd( 560):R_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CON:
| cmd( 640):N_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_INS:
| cmd( 720):TANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO:
| cmd( 800):_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVE:
| cmd( 880):R='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no':
| cmd( 960): VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| suspend processing: connection "clear#192.1.2.254/32" 0.0.0.0 (in route_group() at foodgroups.c:439)
| start processing: connection "clear" (in route_group() at foodgroups.c:439)
| FOR_EACH_CONNECTION_... in conn_by_name
| suspend processing: connection "clear" (in route_group() at foodgroups.c:435)
| start processing: connection "clear#192.1.3.254/32" 0.0.0.0 (in route_group() at foodgroups.c:435)
| could_route called for clear#192.1.3.254/32 (kind=CK_INSTANCE)
| FOR_EACH_CONNECTION_... in route_owner
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "clear#192.1.3.254/32" 0.0.0.0 unrouted: NULL; eroute owner: NULL
| route_and_eroute() for proto 0, and source port 0 dest port 0
| FOR_EACH_CONNECTION_... in route_owner
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "clear#192.1.3.254/32" 0.0.0.0 unrouted: NULL; eroute owner: NULL
| route_and_eroute with c: clear#192.1.3.254/32 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #0
| shunt_eroute() called for connection 'clear#192.1.3.254/32' to 'add' for rt_kind 'prospective erouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "clear#192.1.3.254/32" is 0x17dfdf
| netlink_raw_eroute: SPI_PASS
| IPsec Sa SPD priority set to 1564639
| priority calculation of connection "clear#192.1.3.254/32" is 0x17dfdf
| netlink_raw_eroute: SPI_PASS
| IPsec Sa SPD priority set to 1564639
| route_and_eroute: firewall_notified: true
| running updown command "ipsec _updown" for verb prepare 
| command executing prepare-host
| executing prepare-host: PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.3.254/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16412' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.3.254/32' PLUTO_PEER_CLIENT_NET='192.1.3.254' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI
| popen cmd is 1020 chars long
| cmd(   0):PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.3.25:
| cmd(  80):4/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209':
| cmd( 160): PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET=:
| cmd( 240):'192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_:
| cmd( 320):PROTOCOL='0' PLUTO_SA_REQID='16412' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PL:
| cmd( 400):UTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.3.254/32' PLUTO_PEER_CLIENT_NET='1:
| cmd( 480):92.1.3.254' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_P:
| cmd( 560):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_C:
| cmd( 640):ONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_I:
| cmd( 720):NSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLU:
| cmd( 800):TO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SER:
| cmd( 880):VER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='n:
| cmd( 960):o' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| running updown command "ipsec _updown" for verb route 
| command executing route-host
| executing route-host: PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.3.254/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16412' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.3.254/32' PLUTO_PEER_CLIENT_NET='192.1.3.254' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT
| popen cmd is 1018 chars long
| cmd(   0):PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.3.254/:
| cmd(  80):32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' P:
| cmd( 160):LUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='1:
| cmd( 240):92.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PR:
| cmd( 320):OTOCOL='0' PLUTO_SA_REQID='16412' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUT:
| cmd( 400):O_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.3.254/32' PLUTO_PEER_CLIENT_NET='192:
| cmd( 480):.1.3.254' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEE:
| cmd( 560):R_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CON:
| cmd( 640):N_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_INS:
| cmd( 720):TANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO:
| cmd( 800):_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVE:
| cmd( 880):R='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no':
| cmd( 960): VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| suspend processing: connection "clear#192.1.3.254/32" 0.0.0.0 (in route_group() at foodgroups.c:439)
| start processing: connection "clear" (in route_group() at foodgroups.c:439)
| FOR_EACH_CONNECTION_... in conn_by_name
| suspend processing: connection "clear" (in route_group() at foodgroups.c:435)
| start processing: connection "clear#192.1.3.253/32" 0.0.0.0 (in route_group() at foodgroups.c:435)
| could_route called for clear#192.1.3.253/32 (kind=CK_INSTANCE)
| FOR_EACH_CONNECTION_... in route_owner
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "clear#192.1.3.253/32" 0.0.0.0 unrouted: NULL; eroute owner: NULL
| route_and_eroute() for proto 0, and source port 0 dest port 0
| FOR_EACH_CONNECTION_... in route_owner
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "clear#192.1.3.253/32" 0.0.0.0 unrouted: NULL; eroute owner: NULL
| route_and_eroute with c: clear#192.1.3.253/32 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #0
| shunt_eroute() called for connection 'clear#192.1.3.253/32' to 'add' for rt_kind 'prospective erouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "clear#192.1.3.253/32" is 0x17dfdf
| netlink_raw_eroute: SPI_PASS
| IPsec Sa SPD priority set to 1564639
| priority calculation of connection "clear#192.1.3.253/32" is 0x17dfdf
| netlink_raw_eroute: SPI_PASS
| IPsec Sa SPD priority set to 1564639
| route_and_eroute: firewall_notified: true
| running updown command "ipsec _updown" for verb prepare 
| command executing prepare-host
| executing prepare-host: PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.3.253/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16416' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.3.253/32' PLUTO_PEER_CLIENT_NET='192.1.3.253' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI
| popen cmd is 1020 chars long
| cmd(   0):PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.3.25:
| cmd(  80):3/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209':
| cmd( 160): PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET=:
| cmd( 240):'192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_:
| cmd( 320):PROTOCOL='0' PLUTO_SA_REQID='16416' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PL:
| cmd( 400):UTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.3.253/32' PLUTO_PEER_CLIENT_NET='1:
| cmd( 480):92.1.3.253' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_P:
| cmd( 560):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_C:
| cmd( 640):ONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_I:
| cmd( 720):NSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLU:
| cmd( 800):TO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SER:
| cmd( 880):VER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='n:
| cmd( 960):o' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| running updown command "ipsec _updown" for verb route 
| command executing route-host
| executing route-host: PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.3.253/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16416' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.3.253/32' PLUTO_PEER_CLIENT_NET='192.1.3.253' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT
| popen cmd is 1018 chars long
| cmd(   0):PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.3.253/:
| cmd(  80):32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' P:
| cmd( 160):LUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='1:
| cmd( 240):92.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PR:
| cmd( 320):OTOCOL='0' PLUTO_SA_REQID='16416' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUT:
| cmd( 400):O_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.3.253/32' PLUTO_PEER_CLIENT_NET='192:
| cmd( 480):.1.3.253' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEE:
| cmd( 560):R_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CON:
| cmd( 640):N_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_INS:
| cmd( 720):TANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO:
| cmd( 800):_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVE:
| cmd( 880):R='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no':
| cmd( 960): VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| suspend processing: connection "clear#192.1.3.253/32" 0.0.0.0 (in route_group() at foodgroups.c:439)
| start processing: connection "clear" (in route_group() at foodgroups.c:439)
| FOR_EACH_CONNECTION_... in conn_by_name
| suspend processing: connection "clear" (in route_group() at foodgroups.c:435)
| start processing: connection "clear#192.1.2.253/32" 0.0.0.0 (in route_group() at foodgroups.c:435)
| could_route called for clear#192.1.2.253/32 (kind=CK_INSTANCE)
| FOR_EACH_CONNECTION_... in route_owner
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "clear#192.1.2.253/32" 0.0.0.0 unrouted: NULL; eroute owner: NULL
| route_and_eroute() for proto 0, and source port 0 dest port 0
| FOR_EACH_CONNECTION_... in route_owner
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "clear#192.1.2.253/32" 0.0.0.0 unrouted: NULL; eroute owner: NULL
| route_and_eroute with c: clear#192.1.2.253/32 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #0
| shunt_eroute() called for connection 'clear#192.1.2.253/32' to 'add' for rt_kind 'prospective erouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "clear#192.1.2.253/32" is 0x17dfdf
| netlink_raw_eroute: SPI_PASS
| IPsec Sa SPD priority set to 1564639
| priority calculation of connection "clear#192.1.2.253/32" is 0x17dfdf
| netlink_raw_eroute: SPI_PASS
| IPsec Sa SPD priority set to 1564639
| route_and_eroute: firewall_notified: true
| running updown command "ipsec _updown" for verb prepare 
| command executing prepare-host
| executing prepare-host: PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.2.253/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16420' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.2.253/32' PLUTO_PEER_CLIENT_NET='192.1.2.253' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI
| popen cmd is 1020 chars long
| cmd(   0):PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.2.25:
| cmd(  80):3/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209':
| cmd( 160): PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET=:
| cmd( 240):'192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_:
| cmd( 320):PROTOCOL='0' PLUTO_SA_REQID='16420' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PL:
| cmd( 400):UTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.2.253/32' PLUTO_PEER_CLIENT_NET='1:
| cmd( 480):92.1.2.253' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_P:
| cmd( 560):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_C:
| cmd( 640):ONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_I:
| cmd( 720):NSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLU:
| cmd( 800):TO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SER:
| cmd( 880):VER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='n:
| cmd( 960):o' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| running updown command "ipsec _updown" for verb route 
| command executing route-host
| executing route-host: PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.2.253/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16420' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.2.253/32' PLUTO_PEER_CLIENT_NET='192.1.2.253' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT
| popen cmd is 1018 chars long
| cmd(   0):PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.2.253/:
| cmd(  80):32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' P:
| cmd( 160):LUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='1:
| cmd( 240):92.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PR:
| cmd( 320):OTOCOL='0' PLUTO_SA_REQID='16420' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUT:
| cmd( 400):O_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.2.253/32' PLUTO_PEER_CLIENT_NET='192:
| cmd( 480):.1.2.253' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEE:
| cmd( 560):R_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CON:
| cmd( 640):N_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_INS:
| cmd( 720):TANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO:
| cmd( 800):_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVE:
| cmd( 880):R='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no':
| cmd( 960): VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| suspend processing: connection "clear#192.1.2.253/32" 0.0.0.0 (in route_group() at foodgroups.c:439)
| start processing: connection "clear" (in route_group() at foodgroups.c:439)
| stop processing: connection "clear" (in whack_route_connection() at rcv_whack.c:116)
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 4.5 milliseconds in whack
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00446 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00283 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00283 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00289 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00627 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00275 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00277 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00276 milliseconds in signal handler PLUTO_SIGCHLD
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in conn_by_name
| start processing: connection "private-or-clear" (in whack_route_connection() at rcv_whack.c:106)
| FOR_EACH_CONNECTION_... in conn_by_name
| suspend processing: connection "private-or-clear" (in route_group() at foodgroups.c:435)
| start processing: connection "private-or-clear#192.1.3.0/24" (in route_group() at foodgroups.c:435)
| could_route called for private-or-clear#192.1.3.0/24 (kind=CK_TEMPLATE)
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#192.1.3.0/24" unrouted: NULL; eroute owner: NULL
| route_and_eroute() for proto 0, and source port 0 dest port 0
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#192.1.3.0/24" unrouted: NULL; eroute owner: NULL
| route_and_eroute with c: private-or-clear#192.1.3.0/24 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #0
| shunt_eroute() called for connection 'private-or-clear#192.1.3.0/24' to 'add' for rt_kind 'prospective erouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "private-or-clear#192.1.3.0/24" is 0x1fdfdf
| IPsec Sa SPD priority set to 2088927
| priority calculation of connection "private-or-clear#192.1.3.0/24" is 0x1fdfdf
| route_and_eroute: firewall_notified: true
| running updown command "ipsec _updown" for verb prepare 
| command executing prepare-host
| executing prepare-host: PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.1.3.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16424' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.3.0/24' PLUTO_PEER_CLIENT_NET='192.1.3.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONF
| popen cmd is 1091 chars long
| cmd(   0):PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear:
| cmd(  80):#192.1.3.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192:
| cmd( 160):.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT:
| cmd( 240):_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUT:
| cmd( 320):O_MY_PROTOCOL='0' PLUTO_SA_REQID='16424' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.:
| cmd( 400):0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.3.0/24' PLUTO_PEER_CLIENT_NE:
| cmd( 480):T='192.1.3.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_P:
| cmd( 560):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_C:
| cmd( 640):ONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALL:
| cmd( 720):OW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' :
| cmd( 800):PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_D:
| cmd( 880):NS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' P:
| cmd( 960):LUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SH:
| cmd(1040):ARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| running updown command "ipsec _updown" for verb route 
| command executing route-host
| executing route-host: PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.1.3.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16424' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.3.0/24' PLUTO_PEER_CLIENT_NET='192.1.3.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGUR
| popen cmd is 1089 chars long
| cmd(   0):PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#1:
| cmd(  80):92.1.3.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1:
| cmd( 160):.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_N:
| cmd( 240):ET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_:
| cmd( 320):MY_PROTOCOL='0' PLUTO_SA_REQID='16424' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0':
| cmd( 400): PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.3.0/24' PLUTO_PEER_CLIENT_NET=:
| cmd( 480):'192.1.3.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEE:
| cmd( 560):R_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CON:
| cmd( 640):N_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW:
| cmd( 720):+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PL:
| cmd( 800):UTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS:
| cmd( 880):_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLU:
| cmd( 960):TO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHAR:
| cmd(1040):ED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| suspend processing: connection "private-or-clear#192.1.3.0/24" (in route_group() at foodgroups.c:439)
| start processing: connection "private-or-clear" (in route_group() at foodgroups.c:439)
| FOR_EACH_CONNECTION_... in conn_by_name
| suspend processing: connection "private-or-clear" (in route_group() at foodgroups.c:435)
| start processing: connection "private-or-clear#192.0.2.0/24" (in route_group() at foodgroups.c:435)
| could_route called for private-or-clear#192.0.2.0/24 (kind=CK_TEMPLATE)
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#192.0.2.0/24" unrouted: NULL; eroute owner: NULL
| route_and_eroute() for proto 0, and source port 0 dest port 0
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#192.0.2.0/24" unrouted: NULL; eroute owner: NULL
| route_and_eroute with c: private-or-clear#192.0.2.0/24 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #0
| shunt_eroute() called for connection 'private-or-clear#192.0.2.0/24' to 'add' for rt_kind 'prospective erouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "private-or-clear#192.0.2.0/24" is 0x1fdfdf
| IPsec Sa SPD priority set to 2088927
| priority calculation of connection "private-or-clear#192.0.2.0/24" is 0x1fdfdf
| route_and_eroute: firewall_notified: true
| running updown command "ipsec _updown" for verb prepare 
| command executing prepare-host
| executing prepare-host: PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.0.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16428' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONF
| popen cmd is 1091 chars long
| cmd(   0):PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear:
| cmd(  80):#192.0.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192:
| cmd( 160):.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT:
| cmd( 240):_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUT:
| cmd( 320):O_MY_PROTOCOL='0' PLUTO_SA_REQID='16428' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.:
| cmd( 400):0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NE:
| cmd( 480):T='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_P:
| cmd( 560):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_C:
| cmd( 640):ONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALL:
| cmd( 720):OW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' :
| cmd( 800):PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_D:
| cmd( 880):NS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' P:
| cmd( 960):LUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SH:
| cmd(1040):ARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| running updown command "ipsec _updown" for verb route 
| command executing route-host
| executing route-host: PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.0.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16428' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGUR
| popen cmd is 1089 chars long
| cmd(   0):PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#1:
| cmd(  80):92.0.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1:
| cmd( 160):.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_N:
| cmd( 240):ET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_:
| cmd( 320):MY_PROTOCOL='0' PLUTO_SA_REQID='16428' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0':
| cmd( 400): PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET=:
| cmd( 480):'192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEE:
| cmd( 560):R_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CON:
| cmd( 640):N_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW:
| cmd( 720):+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PL:
| cmd( 800):UTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS:
| cmd( 880):_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLU:
| cmd( 960):TO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHAR:
| cmd(1040):ED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| suspend processing: connection "private-or-clear#192.0.2.0/24" (in route_group() at foodgroups.c:439)
| start processing: connection "private-or-clear" (in route_group() at foodgroups.c:439)
| FOR_EACH_CONNECTION_... in conn_by_name
| suspend processing: connection "private-or-clear" (in route_group() at foodgroups.c:435)
| start processing: connection "private-or-clear#7.0.0.0/8" (in route_group() at foodgroups.c:435)
| could_route called for private-or-clear#7.0.0.0/8 (kind=CK_TEMPLATE)
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#7.0.0.0/8" unrouted: NULL; eroute owner: NULL
| route_and_eroute() for proto 0, and source port 0 dest port 0
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#7.0.0.0/8" unrouted: NULL; eroute owner: NULL
| route_and_eroute with c: private-or-clear#7.0.0.0/8 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #0
| shunt_eroute() called for connection 'private-or-clear#7.0.0.0/8' to 'add' for rt_kind 'prospective erouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "private-or-clear#7.0.0.0/8" is 0x1fdfdf
| IPsec Sa SPD priority set to 2088927
| priority calculation of connection "private-or-clear#7.0.0.0/8" is 0x1fdfdf
| route_and_eroute: firewall_notified: true
| running updown command "ipsec _updown" for verb prepare 
| command executing prepare-host
| executing prepare-host: PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#7.0.0.0/8' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16432' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='7.0.0.0/8' PLUTO_PEER_CLIENT_NET='7.0.0.0' PLUTO_PEER_CLIENT_MASK='255.0.0.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' V
| popen cmd is 1079 chars long
| cmd(   0):PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear:
| cmd(  80):#7.0.0.0/8' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.:
| cmd( 160):3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NE:
| cmd( 240):T='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_M:
| cmd( 320):Y_PROTOCOL='0' PLUTO_SA_REQID='16432' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' :
| cmd( 400):PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='7.0.0.0/8' PLUTO_PEER_CLIENT_NET='7.0:
| cmd( 480):.0.0' PLUTO_PEER_CLIENT_MASK='255.0.0.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL:
| cmd( 560):='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY=':
| cmd( 640):AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRA:
| cmd( 720):CK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_A:
| cmd( 800):DDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' P:
| cmd( 880):LUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLI:
| cmd( 960):ENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SP:
| cmd(1040):I_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| running updown command "ipsec _updown" for verb route 
| command executing route-host
| executing route-host: PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#7.0.0.0/8' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16432' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='7.0.0.0/8' PLUTO_PEER_CLIENT_NET='7.0.0.0' PLUTO_PEER_CLIENT_MASK='255.0.0.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_I
| popen cmd is 1077 chars long
| cmd(   0):PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#7:
| cmd(  80):.0.0.0/8' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.:
| cmd( 160):209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET=:
| cmd( 240):'192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_:
| cmd( 320):PROTOCOL='0' PLUTO_SA_REQID='16432' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PL:
| cmd( 400):UTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='7.0.0.0/8' PLUTO_PEER_CLIENT_NET='7.0.0:
| cmd( 480):.0' PLUTO_PEER_CLIENT_MASK='255.0.0.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL=':
| cmd( 560):0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AU:
| cmd( 640):THNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK:
| cmd( 720):+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_ADD:
| cmd( 800):RFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLU:
| cmd( 880):TO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIEN:
| cmd( 960):T='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_:
| cmd(1040):IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| suspend processing: connection "private-or-clear#7.0.0.0/8" (in route_group() at foodgroups.c:439)
| start processing: connection "private-or-clear" (in route_group() at foodgroups.c:439)
| FOR_EACH_CONNECTION_... in conn_by_name
| suspend processing: connection "private-or-clear" (in route_group() at foodgroups.c:435)
| start processing: connection "private-or-clear#192.1.2.0/24" (in route_group() at foodgroups.c:435)
| could_route called for private-or-clear#192.1.2.0/24 (kind=CK_TEMPLATE)
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#192.1.2.0/24" unrouted: NULL; eroute owner: NULL
| route_and_eroute() for proto 0, and source port 0 dest port 0
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#192.1.2.0/24" unrouted: NULL; eroute owner: NULL
| route_and_eroute with c: private-or-clear#192.1.2.0/24 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #0
| shunt_eroute() called for connection 'private-or-clear#192.1.2.0/24' to 'add' for rt_kind 'prospective erouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "private-or-clear#192.1.2.0/24" is 0x1fdfdf
| IPsec Sa SPD priority set to 2088927
| priority calculation of connection "private-or-clear#192.1.2.0/24" is 0x1fdfdf
| route_and_eroute: firewall_notified: true
| running updown command "ipsec _updown" for verb prepare 
| command executing prepare-host
| executing prepare-host: PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16436' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.0/24' PLUTO_PEER_CLIENT_NET='192.1.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONF
| popen cmd is 1091 chars long
| cmd(   0):PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear:
| cmd(  80):#192.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192:
| cmd( 160):.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT:
| cmd( 240):_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUT:
| cmd( 320):O_MY_PROTOCOL='0' PLUTO_SA_REQID='16436' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.:
| cmd( 400):0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.0/24' PLUTO_PEER_CLIENT_NE:
| cmd( 480):T='192.1.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_P:
| cmd( 560):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_C:
| cmd( 640):ONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALL:
| cmd( 720):OW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' :
| cmd( 800):PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_D:
| cmd( 880):NS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' P:
| cmd( 960):LUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SH:
| cmd(1040):ARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| running updown command "ipsec _updown" for verb route 
| command executing route-host
| executing route-host: PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16436' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.0/24' PLUTO_PEER_CLIENT_NET='192.1.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGUR
| popen cmd is 1089 chars long
| cmd(   0):PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#1:
| cmd(  80):92.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1:
| cmd( 160):.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_N:
| cmd( 240):ET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_:
| cmd( 320):MY_PROTOCOL='0' PLUTO_SA_REQID='16436' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0':
| cmd( 400): PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.0/24' PLUTO_PEER_CLIENT_NET=:
| cmd( 480):'192.1.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEE:
| cmd( 560):R_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CON:
| cmd( 640):N_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW:
| cmd( 720):+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PL:
| cmd( 800):UTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS:
| cmd( 880):_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLU:
| cmd( 960):TO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHAR:
| cmd(1040):ED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
| suspend processing: connection "private-or-clear#192.1.2.0/24" (in route_group() at foodgroups.c:439)
| start processing: connection "private-or-clear" (in route_group() at foodgroups.c:439)
| stop processing: connection "private-or-clear" (in whack_route_connection() at rcv_whack.c:116)
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 4.08 milliseconds in whack
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00317 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00209 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00203 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00202 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00208 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00201 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.002 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned nothing left to do (all child processes are busy)
| spent 0.00201 milliseconds in signal handler PLUTO_SIGCHLD
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in conn_by_name
| start processing: connection "private" (in whack_route_connection() at rcv_whack.c:106)
| stop processing: connection "private" (in whack_route_connection() at rcv_whack.c:116)
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.0267 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in conn_by_name
| start processing: connection "block" (in whack_route_connection() at rcv_whack.c:106)
| stop processing: connection "block" (in whack_route_connection() at rcv_whack.c:116)
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.0199 milliseconds in whack
| processing signal PLUTO_SIGCHLD
| waitpid returned pid 3049 (exited with status 0)
| reaped addconn helper child (status 0)
| waitpid returned ECHILD (no child processes left)
| spent 0.0174 milliseconds in signal handler PLUTO_SIGCHLD
|  kernel_process_msg_cb process netlink message
| netlink_get: XFRM_MSG_ACQUIRE message
| xfrm netlink msg len 376
| xfrm acquire rtattribute type 5
| xfrm acquire rtattribute type 16
| add bare shunt 0x5649fe865f78 192.1.3.209/32:8 --1--> 192.1.2.23/32:0 => %hold 0    %acquire-netlink
initiate on demand from 192.1.3.209:8 to 192.1.2.23:0 proto=1 because: acquire
| find_connection: looking for policy for connection: 192.1.3.209:1/8 -> 192.1.2.23:1/0
| FOR_EACH_CONNECTION_... in find_connection_for_clients
| find_connection: conn "private-or-clear#192.1.2.0/24" has compatible peers: 192.1.3.209/32 -> 192.1.2.0/24 [pri: 33554442]
| find_connection: first OK "private-or-clear#192.1.2.0/24" [pri:33554442]{0x5649fe8689f8} (child none)
| find_connection: concluding with "private-or-clear#192.1.2.0/24" [pri:33554442]{0x5649fe8689f8} kind=CK_TEMPLATE
| creating new instance from "private-or-clear#192.1.2.0/24"
| shunt widened for protoports since conn does not limit protocols
| going to initiate opportunistic, first installing pass negotiationshunt
| priority calculation of connection "private-or-clear#192.1.2.0/24" is 0x1fdfdf
| oe-negotiating eroute 192.1.3.209/32:0 --0-> 192.1.2.23/32:0 => %pass (raw_eroute)
| netlink_raw_eroute: SPI_PASS
| IPsec Sa SPD priority set to 2088927
| raw_eroute result=success
| added bare (possibly wided) passthrough negotiationshunt succeeded (violating API)
| add bare shunt 0x5649fe8691a8 192.1.3.209/32:0 --0--> 192.1.2.23/32:0 => %hold 0    oe-negotiating
| fiddle_bare_shunt called
| fiddle_bare_shunt with transport_proto 1
| removing specific host-to-host bare shunt
| delete bare kernel shunt - was replaced with  negotiationshunt eroute 192.1.3.209/32:8 --1-> 192.1.2.23/32:0 => %hold (raw_eroute)
| netlink_raw_eroute: SPI_PASS
| raw_eroute result=success
| raw_eroute with op='delete' for transport_proto='1' kernel shunt succeeded, bare shunt lookup succeeded
| delete bare shunt 0x5649fe865f78 192.1.3.209/32:8 --1--> 192.1.2.23/32:0 => %hold 0    %acquire-netlink
| success taking down narrow bare shunt
| find_host_pair: comparing 192.1.3.209:500 to 0.0.0.0:500 but ignoring ports
| checking block
| checking private
| checking private-or-clear
| checking private-or-clear#192.1.2.0/24
| checking private-or-clear#7.0.0.0/8
| checking private-or-clear#192.0.2.0/24
| checking private-or-clear#192.1.3.0/24
| checking clear-or-private
| checking clear
| checking clear#192.1.2.253/32
| checking clear#192.1.3.253/32
| checking clear#192.1.3.254/32
| checking clear#192.1.2.254/32
| find_host_pair: comparing 192.1.3.209:500 to 0.0.0.0:500 but ignoring ports
| checking block
| checking private
| checking private-or-clear
| checking private-or-clear#192.1.2.0/24
| checking private-or-clear#7.0.0.0/8
| checking private-or-clear#192.0.2.0/24
| checking private-or-clear#192.1.3.0/24
| checking clear-or-private
| checking clear
| checking clear#192.1.2.253/32
| checking clear#192.1.3.253/32
| checking clear#192.1.3.254/32
| checking clear#192.1.2.254/32
| connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@(nil): none
| new hp@0x5649fe869988
| oppo instantiate d="private-or-clear#192.1.2.0/24" from c="private-or-clear#192.1.2.0/24" with c->routing prospective erouted, d->routing unrouted
| new oppo instance: 192.1.3.209[ID_NULL]---192.1.3.254...192.1.2.23[ID_NULL]===192.1.2.0/24
| oppo_instantiate() instantiated "[1] ...192.1.2.23"private-or-clear#192.1.2.0/24: 192.1.3.209[ID_NULL]---192.1.3.254...192.1.2.23[ID_NULL]
| assigning negotiation_shunt to connection
| assign hold, routing was unrouted, needs to be unrouted HOLD
| assign_holdpass() removing bare shunt
| delete bare shunt 0x5649fe8691a8 192.1.3.209/32:0 --0--> 192.1.2.23/32:0 => %hold 0    oe-negotiating
|  assign_holdpass() done - returning success
| assign_holdpass succeeded
| initiate on demand from 192.1.3.209:0 to 192.1.2.23:0 proto=1 because: acquire
| FOR_EACH_STATE_... in find_phase1_state
| creating state object #1 at 0x5649fe869a68
| State DB: adding IKEv2 state #1 in UNDEFINED
| pstats #1 ikev2.ike started
| Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0
| parent state #1: UNDEFINED(ignore) => PARENT_I0(ignore)
| Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1
| start processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535)
| dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551)
| Queuing pending IPsec SA negotiating with 192.1.2.23 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 IKE SA #1 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23
| constructing local IKE proposals for private-or-clear#192.1.2.0/24 (IKE SA initiator selecting KE)
| converting ike_info AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ...
| ...  ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519
| converting ike_info AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ...
| ...  ikev2_proposal: 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519
| converting ike_info AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ...
| ...  ikev2_proposal: 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519
| converting ike_info AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ...
| ...  ikev2_proposal: 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23: constructed local IKE proposals for private-or-clear#192.1.2.0/24 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519
| adding ikev2_outI1 KE work-order 1 for state #1
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x5649fe86c1d8
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1
| libevent_malloc: new ptr-libevent@0x5649fe865ec8 size 128
| #1 spent 0.351 milliseconds in ikev2_parent_outI1()
| RESET processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610)
| crypto helper 0 resuming
| initiate on demand using AUTH_NULL from 192.1.3.209 to 192.1.2.23
| crypto helper 0 starting work-order 1 for state #1
| spent 0.803 milliseconds in kernel message
| crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 1
| crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 1 time elapsed 0.000819 seconds
| (#1) spent 0.818 milliseconds in crypto helper computing work-order 1: ikev2_outI1 KE (pcr)
| crypto helper 0 sending results from work-order 1 for state #1 to event queue
| scheduling resume sending helper answer for #1
| libevent_malloc: new ptr-libevent@0x7fcda4002888 size 128
| crypto helper 0 waiting (nothing to do)
| processing resume sending helper answer for #1
| start processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:797)
| crypto helper 0 replies to request ID 1
| calling continuation function 0x5649fe365b50
| ikev2_parent_outI1_continue for #1
| **emit ISAKMP Message:
|    initiator cookie:
|   9d 40 a0 b5  82 aa bd 68
|    responder cookie:
|   00 00 00 00  00 00 00 00
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
|    exchange type: ISAKMP_v2_IKE_SA_INIT (0x22)
|    flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
|    Message ID: 0 (0x0)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| using existing local IKE proposals for connection private-or-clear#192.1.2.0/24 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519
| Emitting ikev2_proposals ...
| ***emit IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA)
| next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet'
| discarding INTEG=NONE
| ****emit IKEv2 Proposal Substructure Payload:
|    last proposal: v2_PROPOSAL_NON_LAST (0x2)
|    prop #: 1 (0x1)
|    proto ID: IKEv2_SEC_PROTO_IKE (0x1)
|    spi size: 0 (0x0)
|    # transforms: 11 (0xb)
| last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_GCM_C (0x14)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| ******emit IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of IKEv2 Transform Substructure Payload: 12
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
|    IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
|    IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| discarding INTEG=NONE
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_LAST (0x0)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 100
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
| discarding INTEG=NONE
| ****emit IKEv2 Proposal Substructure Payload:
|    last proposal: v2_PROPOSAL_NON_LAST (0x2)
|    prop #: 2 (0x2)
|    proto ID: IKEv2_SEC_PROTO_IKE (0x1)
|    spi size: 0 (0x0)
|    # transforms: 11 (0xb)
| last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2)
| last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_GCM_C (0x14)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| ******emit IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of IKEv2 Transform Substructure Payload: 12
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
|    IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
|    IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| discarding INTEG=NONE
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_LAST (0x0)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 100
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
| ****emit IKEv2 Proposal Substructure Payload:
|    last proposal: v2_PROPOSAL_NON_LAST (0x2)
|    prop #: 3 (0x3)
|    proto ID: IKEv2_SEC_PROTO_IKE (0x1)
|    spi size: 0 (0x0)
|    # transforms: 13 (0xd)
| last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2)
| last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_CBC (0xc)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| ******emit IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of IKEv2 Transform Substructure Payload: 12
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
|    IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
|    IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
|    IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
|    IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_LAST (0x0)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 116
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
| ****emit IKEv2 Proposal Substructure Payload:
|    last proposal: v2_PROPOSAL_LAST (0x0)
|    prop #: 4 (0x4)
|    proto ID: IKEv2_SEC_PROTO_IKE (0x1)
|    spi size: 0 (0x0)
|    # transforms: 13 (0xd)
| last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2)
| last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_CBC (0xc)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| ******emit IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of IKEv2 Transform Substructure Payload: 12
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
|    IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
|    IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
|    IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
|    IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| *****emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_LAST (0x0)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 116
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
| emitting length of IKEv2 Security Association Payload: 436
| last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0
| ***emit IKEv2 Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    DH group: OAKLEY_GROUP_MODP2048 (0xe)
| next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE)
| next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet'
| emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload
| ikev2 g^x  7c 90 f7 38  ec 9a e1 26  b2 f1 a2 bf  b1 3c f6 97
| ikev2 g^x  d2 f1 1e e8  2f 50 15 25  36 7b b6 53  b5 0b c8 36
| ikev2 g^x  9a eb 0a 60  6c a0 9c 0f  e9 bf c9 71  e5 65 07 b0
| ikev2 g^x  10 f1 93 6c  3c b8 9e a3  4e 25 c1 6f  ee 34 a3 2f
| ikev2 g^x  51 48 93 bc  1e 60 21 d9  07 04 0b f6  24 11 e5 b0
| ikev2 g^x  1f 4a 96 9f  c4 b3 b6 83  8c c8 48 1d  9d 41 5f c7
| ikev2 g^x  c1 cf 8e 6d  18 dc e7 76  fa 0b 36 5c  8e e5 07 86
| ikev2 g^x  f6 24 9f b5  f2 45 ea c8  1e f2 e8 1e  01 1c d4 67
| ikev2 g^x  91 d5 4e 23  75 64 9e b5  74 60 78 cf  ea 71 bf 26
| ikev2 g^x  84 18 da 66  29 4b 96 d9  ff 60 8e 2c  49 0d c4 31
| ikev2 g^x  fa fa 1b ee  94 7a 44 a8  e2 5a e7 4a  da ce 0a 0a
| ikev2 g^x  d1 bf f2 c5  68 05 e4 51  45 cb cd 83  c1 66 c4 9f
| ikev2 g^x  8c b9 2f 55  f4 92 02 57  26 47 0f 49  3b 7e 6a d0
| ikev2 g^x  2d 17 97 fd  64 60 bb 53  18 92 73 19  a6 2e 8e 52
| ikev2 g^x  b1 f5 06 37  e2 68 59 fe  52 29 3c 17  aa 71 e7 aa
| ikev2 g^x  e3 de 2c 12  ca 8b d3 a5  11 16 2b 54  24 b3 b4 48
| emitting length of IKEv2 Key Exchange Payload: 264
| ***emit IKEv2 Nonce Payload:
|    next payload type: ISAKMP_NEXT_v2N (0x29)
|    flags: none (0x0)
| next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N
| next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni)
| next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet'
| emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload
| IKEv2 nonce  06 29 bc 0d  50 f7 07 8a  dc 6a 8d ee  00 2d 6f 0d
| IKEv2 nonce  e3 74 64 48  a6 1f 50 3c  4b 9b a9 c8  4a 2a 0c 6a
| emitting length of IKEv2 Nonce Payload: 36
| Adding a v2N Payload
| ***emit IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    Protocol ID: PROTO_v2_RESERVED (0x0)
|    SPI size: 0 (0x0)
|    Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e)
| next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N)
| next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet'
| emitting length of IKEv2 Notify Payload: 8
|  NAT-Traversal support  [enabled] add v2N payloads.
| natd_hash: rcookie is zero
| natd_hash: hasher=0x5649fe43a800(20)
| natd_hash: icookie=  9d 40 a0 b5  82 aa bd 68
| natd_hash: rcookie=  00 00 00 00  00 00 00 00
| natd_hash: ip=  c0 01 03 d1
| natd_hash: port=500
| natd_hash: hash=  c8 b2 8a 2f  d4 39 44 a5  0a 19 90 85  64 88 da d2
| natd_hash: hash=  62 12 85 83
| Adding a v2N Payload
| ***emit IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    Protocol ID: PROTO_v2_RESERVED (0x0)
|    SPI size: 0 (0x0)
|    Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004)
| next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N)
| next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet'
| emitting 20 raw bytes of Notify data into IKEv2 Notify Payload
| Notify data  c8 b2 8a 2f  d4 39 44 a5  0a 19 90 85  64 88 da d2
| Notify data  62 12 85 83
| emitting length of IKEv2 Notify Payload: 28
| natd_hash: rcookie is zero
| natd_hash: hasher=0x5649fe43a800(20)
| natd_hash: icookie=  9d 40 a0 b5  82 aa bd 68
| natd_hash: rcookie=  00 00 00 00  00 00 00 00
| natd_hash: ip=  c0 01 02 17
| natd_hash: port=500
| natd_hash: hash=  68 46 91 90  33 a8 e5 c1  c8 75 4e a4  07 69 f8 5f
| natd_hash: hash=  1b 9d bd 36
| Adding a v2N Payload
| ***emit IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    Protocol ID: PROTO_v2_RESERVED (0x0)
|    SPI size: 0 (0x0)
|    Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005)
| next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N)
| next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet'
| emitting 20 raw bytes of Notify data into IKEv2 Notify Payload
| Notify data  68 46 91 90  33 a8 e5 c1  c8 75 4e a4  07 69 f8 5f
| Notify data  1b 9d bd 36
| emitting length of IKEv2 Notify Payload: 28
| ***emit IKEv2 Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
| next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Vendor ID Payload (43:ISAKMP_NEXT_v2V)
| next payload chain: saving location 'IKEv2 Vendor ID Payload'.'next payload type' in 'reply packet'
| emitting 19 raw bytes of Opportunistic IPsec into IKEv2 Vendor ID Payload
| Opportunistic IPsec  4f 70 70 6f  72 74 75 6e  69 73 74 69  63 20 49 50
| Opportunistic IPsec  73 65 63
| emitting length of IKEv2 Vendor ID Payload: 23
| emitting length of ISAKMP Message: 851
| stop processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817)
| start processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379)
| #1 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK
| IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1
| parent state #1: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA)
| Message ID: updating counters for #1 to 4294967295 after switching state
| Message ID: IKE #1 skipping update_recv as MD is fake
| Message ID: sent #1 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1
| STATE_PARENT_I1: sent v2I1, expected v2R1
| sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500)
| sending 851 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1)
|   9d 40 a0 b5  82 aa bd 68  00 00 00 00  00 00 00 00
|   21 20 22 08  00 00 00 00  00 00 03 53  22 00 01 b4
|   02 00 00 64  01 01 00 0b  03 00 00 0c  01 00 00 14
|   80 0e 01 00  03 00 00 08  02 00 00 07  03 00 00 08
|   02 00 00 05  03 00 00 08  04 00 00 0e  03 00 00 08
|   04 00 00 0f  03 00 00 08  04 00 00 10  03 00 00 08
|   04 00 00 12  03 00 00 08  04 00 00 13  03 00 00 08
|   04 00 00 14  03 00 00 08  04 00 00 15  00 00 00 08
|   04 00 00 1f  02 00 00 64  02 01 00 0b  03 00 00 0c
|   01 00 00 14  80 0e 00 80  03 00 00 08  02 00 00 07
|   03 00 00 08  02 00 00 05  03 00 00 08  04 00 00 0e
|   03 00 00 08  04 00 00 0f  03 00 00 08  04 00 00 10
|   03 00 00 08  04 00 00 12  03 00 00 08  04 00 00 13
|   03 00 00 08  04 00 00 14  03 00 00 08  04 00 00 15
|   00 00 00 08  04 00 00 1f  02 00 00 74  03 01 00 0d
|   03 00 00 0c  01 00 00 0c  80 0e 01 00  03 00 00 08
|   02 00 00 07  03 00 00 08  02 00 00 05  03 00 00 08
|   03 00 00 0e  03 00 00 08  03 00 00 0c  03 00 00 08
|   04 00 00 0e  03 00 00 08  04 00 00 0f  03 00 00 08
|   04 00 00 10  03 00 00 08  04 00 00 12  03 00 00 08
|   04 00 00 13  03 00 00 08  04 00 00 14  03 00 00 08
|   04 00 00 15  00 00 00 08  04 00 00 1f  00 00 00 74
|   04 01 00 0d  03 00 00 0c  01 00 00 0c  80 0e 00 80
|   03 00 00 08  02 00 00 07  03 00 00 08  02 00 00 05
|   03 00 00 08  03 00 00 0e  03 00 00 08  03 00 00 0c
|   03 00 00 08  04 00 00 0e  03 00 00 08  04 00 00 0f
|   03 00 00 08  04 00 00 10  03 00 00 08  04 00 00 12
|   03 00 00 08  04 00 00 13  03 00 00 08  04 00 00 14
|   03 00 00 08  04 00 00 15  00 00 00 08  04 00 00 1f
|   28 00 01 08  00 0e 00 00  7c 90 f7 38  ec 9a e1 26
|   b2 f1 a2 bf  b1 3c f6 97  d2 f1 1e e8  2f 50 15 25
|   36 7b b6 53  b5 0b c8 36  9a eb 0a 60  6c a0 9c 0f
|   e9 bf c9 71  e5 65 07 b0  10 f1 93 6c  3c b8 9e a3
|   4e 25 c1 6f  ee 34 a3 2f  51 48 93 bc  1e 60 21 d9
|   07 04 0b f6  24 11 e5 b0  1f 4a 96 9f  c4 b3 b6 83
|   8c c8 48 1d  9d 41 5f c7  c1 cf 8e 6d  18 dc e7 76
|   fa 0b 36 5c  8e e5 07 86  f6 24 9f b5  f2 45 ea c8
|   1e f2 e8 1e  01 1c d4 67  91 d5 4e 23  75 64 9e b5
|   74 60 78 cf  ea 71 bf 26  84 18 da 66  29 4b 96 d9
|   ff 60 8e 2c  49 0d c4 31  fa fa 1b ee  94 7a 44 a8
|   e2 5a e7 4a  da ce 0a 0a  d1 bf f2 c5  68 05 e4 51
|   45 cb cd 83  c1 66 c4 9f  8c b9 2f 55  f4 92 02 57
|   26 47 0f 49  3b 7e 6a d0  2d 17 97 fd  64 60 bb 53
|   18 92 73 19  a6 2e 8e 52  b1 f5 06 37  e2 68 59 fe
|   52 29 3c 17  aa 71 e7 aa  e3 de 2c 12  ca 8b d3 a5
|   11 16 2b 54  24 b3 b4 48  29 00 00 24  06 29 bc 0d
|   50 f7 07 8a  dc 6a 8d ee  00 2d 6f 0d  e3 74 64 48
|   a6 1f 50 3c  4b 9b a9 c8  4a 2a 0c 6a  29 00 00 08
|   00 00 40 2e  29 00 00 1c  00 00 40 04  c8 b2 8a 2f
|   d4 39 44 a5  0a 19 90 85  64 88 da d2  62 12 85 83
|   2b 00 00 1c  00 00 40 05  68 46 91 90  33 a8 e5 c1
|   c8 75 4e a4  07 69 f8 5f  1b 9d bd 36  00 00 00 17
|   4f 70 70 6f  72 74 75 6e  69 73 74 69  63 20 49 50
|   73 65 63
| state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x5649fe865ec8
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x5649fe86c1d8
| success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms
| event_schedule: new EVENT_RETRANSMIT-pe@0x5649fe86c1d8
| inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1
| libevent_malloc: new ptr-libevent@0x5649fe86c3b8 size 128
| #1 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29441.474836
| resume sending helper answer for #1 suppresed complete_v2_state_transition() and stole MD
| #1 spent 1.17 milliseconds in resume sending helper answer
| stop processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7fcda4002888
| spent 0.0024 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 455 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500)
|   9d 40 a0 b5  82 aa bd 68  13 6f e9 73  19 99 85 51
|   21 20 22 20  00 00 00 00  00 00 01 c7  22 00 00 28
|   00 00 00 24  01 01 00 03  03 00 00 0c  01 00 00 14
|   80 0e 01 00  03 00 00 08  02 00 00 07  00 00 00 08
|   04 00 00 0e  28 00 01 08  00 0e 00 00  51 0e 7a 72
|   ae a7 f5 24  01 69 40 6e  de 7e 62 0b  fa 39 b1 4a
|   ae 52 1e 00  95 8a 91 65  22 78 b8 f4  cd 82 48 a1
|   29 20 bf 22  82 7a b1 43  d1 18 52 27  40 d0 59 40
|   52 c3 c7 a2  fb d9 52 64  d9 26 a4 f2  e5 ff ac 07
|   87 b6 7e 8b  e8 f0 94 4c  ff 10 d1 42  fa 1f 9d b8
|   01 76 46 fb  d6 b2 a6 66  97 4d 2e bd  8e aa 68 dd
|   72 d8 84 1d  f8 0d 92 a1  63 16 b7 a5  df 1d 62 75
|   22 10 0e a3  c3 17 f8 ef  cd 52 ee 75  4e 7f f8 f6
|   c5 3d d1 59  67 cb 3d 61  1a 35 56 2d  8e 88 88 79
|   52 c0 67 88  b9 1a 8c 51  08 0a a2 7d  af 8c ec 4b
|   51 d8 8c 0f  ce 93 7f 01  b1 e1 35 d0  5c 98 2e fe
|   4b 0b 0e 29  48 a5 40 77  81 a8 c2 70  2a d9 7f 51
|   54 88 53 b3  26 f8 8f d5  8f 0b 80 5f  e0 b6 ea b6
|   d0 c7 84 ce  a0 13 19 e0  2e b1 24 e6  ba d3 a3 5b
|   be 17 d6 6c  70 ee 18 32  df 60 a3 8e  95 3d e3 9e
|   88 ee ac bf  ac 9c 95 21  90 74 7e f5  29 00 00 24
|   1b d8 87 e2  64 59 f5 32  80 2e 27 5a  77 9a a9 40
|   69 5f b7 d4  04 c4 2f 74  93 1e b3 44  4a 46 6b d0
|   29 00 00 08  00 00 40 2e  29 00 00 1c  00 00 40 04
|   42 13 d8 a5  b8 46 2e 22  a4 20 ff 6f  34 2c 9c 93
|   86 ad a9 45  2b 00 00 1c  00 00 40 05  d4 54 be 77
|   0f 82 a5 f8  af 30 c9 9a  7d 0c f8 78  50 5b b7 3e
|   00 00 00 17  4f 70 70 6f  72 74 75 6e  69 73 74 69
|   63 20 49 50  73 65 63
| start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   9d 40 a0 b5  82 aa bd 68
|    responder cookie:
|   13 6f e9 73  19 99 85 51
|    next payload type: ISAKMP_NEXT_v2SA (0x21)
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
|    exchange type: ISAKMP_v2_IKE_SA_INIT (0x22)
|    flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
|    Message ID: 0 (0x0)
|    length: 455 (0x1c7)
|  processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34)
| I am the IKE SA Original Initiator receiving an IKEv2 IKE_SA_INIT response 
| State DB: found IKEv2 state #1 in PARENT_I1 (find_v2_ike_sa_by_initiator_spi)
| start processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016)
| [RE]START processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062)
| #1 is idle
| #1 idle
| unpacking clear payload
| Now let's proceed with payload (ISAKMP_NEXT_v2SA)
| ***parse IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2KE (0x22)
|    flags: none (0x0)
|    length: 40 (0x28)
| processing payload: ISAKMP_NEXT_v2SA (len=36)
| Now let's proceed with payload (ISAKMP_NEXT_v2KE)
| ***parse IKEv2 Key Exchange Payload:
|    next payload type: ISAKMP_NEXT_v2Ni (0x28)
|    flags: none (0x0)
|    length: 264 (0x108)
|    DH group: OAKLEY_GROUP_MODP2048 (0xe)
| processing payload: ISAKMP_NEXT_v2KE (len=256)
| Now let's proceed with payload (ISAKMP_NEXT_v2Ni)
| ***parse IKEv2 Nonce Payload:
|    next payload type: ISAKMP_NEXT_v2N (0x29)
|    flags: none (0x0)
|    length: 36 (0x24)
| processing payload: ISAKMP_NEXT_v2Ni (len=32)
| Now let's proceed with payload (ISAKMP_NEXT_v2N)
| ***parse IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_v2N (0x29)
|    flags: none (0x0)
|    length: 8 (0x8)
|    Protocol ID: PROTO_v2_RESERVED (0x0)
|    SPI size: 0 (0x0)
|    Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e)
| processing payload: ISAKMP_NEXT_v2N (len=0)
| Now let's proceed with payload (ISAKMP_NEXT_v2N)
| ***parse IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_v2N (0x29)
|    flags: none (0x0)
|    length: 28 (0x1c)
|    Protocol ID: PROTO_v2_RESERVED (0x0)
|    SPI size: 0 (0x0)
|    Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004)
| processing payload: ISAKMP_NEXT_v2N (len=20)
| Now let's proceed with payload (ISAKMP_NEXT_v2N)
| ***parse IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_v2V (0x2b)
|    flags: none (0x0)
|    length: 28 (0x1c)
|    Protocol ID: PROTO_v2_RESERVED (0x0)
|    SPI size: 0 (0x0)
|    Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005)
| processing payload: ISAKMP_NEXT_v2N (len=20)
| Now let's proceed with payload (ISAKMP_NEXT_v2V)
| ***parse IKEv2 Vendor ID Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    length: 23 (0x17)
| processing payload: ISAKMP_NEXT_v2V (len=19)
| State DB: re-hashing IKEv2 state #1 IKE SPIi and SPI[ir]
| #1 in state PARENT_I1: sent v2I1, expected v2R1
| selected state microcode Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH
| Now let's proceed with state specific processing
| calling processor Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH
| ikev2 parent inR1: calculating g^{xy} in order to send I2
| using existing local IKE proposals for connection private-or-clear#192.1.2.0/24 (IKE SA initiator accepting remote proposal): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519
| Comparing remote proposals against IKE initiator (accepting) 4 local proposals
| local proposal 1 type ENCR has 1 transforms
| local proposal 1 type PRF has 2 transforms
| local proposal 1 type INTEG has 1 transforms
| local proposal 1 type DH has 8 transforms
| local proposal 1 type ESN has 0 transforms
| local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG
| local proposal 2 type ENCR has 1 transforms
| local proposal 2 type PRF has 2 transforms
| local proposal 2 type INTEG has 1 transforms
| local proposal 2 type DH has 8 transforms
| local proposal 2 type ESN has 0 transforms
| local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG
| local proposal 3 type ENCR has 1 transforms
| local proposal 3 type PRF has 2 transforms
| local proposal 3 type INTEG has 2 transforms
| local proposal 3 type DH has 8 transforms
| local proposal 3 type ESN has 0 transforms
| local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none
| local proposal 4 type ENCR has 1 transforms
| local proposal 4 type PRF has 2 transforms
| local proposal 4 type INTEG has 2 transforms
| local proposal 4 type DH has 8 transforms
| local proposal 4 type ESN has 0 transforms
| local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none
| ****parse IKEv2 Proposal Substructure Payload:
|    last proposal: v2_PROPOSAL_LAST (0x0)
|    length: 36 (0x24)
|    prop #: 1 (0x1)
|    proto ID: IKEv2_SEC_PROTO_IKE (0x1)
|    spi size: 0 (0x0)
|    # transforms: 3 (0x3)
| Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 4 local proposals
| *****parse IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    length: 12 (0xc)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_GCM_C (0x14)
| ******parse IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0
| *****parse IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    length: 8 (0x8)
|    IKEv2 transform type: TRANS_TYPE_PRF (0x2)
|    IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7)
| remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0
| *****parse IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_LAST (0x0)
|    length: 8 (0x8)
|    IKEv2 transform type: TRANS_TYPE_DH (0x4)
|    IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe)
| remote proposal 1 transform 2 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0
| remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none
| comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH
| remote proposal 1 matches local proposal 1
| remote accepted the proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048[first-match]
| converting proposal to internal trans attrs
| natd_hash: hasher=0x5649fe43a800(20)
| natd_hash: icookie=  9d 40 a0 b5  82 aa bd 68
| natd_hash: rcookie=  13 6f e9 73  19 99 85 51
| natd_hash: ip=  c0 01 03 d1
| natd_hash: port=500
| natd_hash: hash=  d4 54 be 77  0f 82 a5 f8  af 30 c9 9a  7d 0c f8 78
| natd_hash: hash=  50 5b b7 3e
| natd_hash: hasher=0x5649fe43a800(20)
| natd_hash: icookie=  9d 40 a0 b5  82 aa bd 68
| natd_hash: rcookie=  13 6f e9 73  19 99 85 51
| natd_hash: ip=  c0 01 02 17
| natd_hash: port=500
| natd_hash: hash=  42 13 d8 a5  b8 46 2e 22  a4 20 ff 6f  34 2c 9c 93
| natd_hash: hash=  86 ad a9 45
| NAT_TRAVERSAL encaps using auto-detect
| NAT_TRAVERSAL this end is NOT behind NAT
| NAT_TRAVERSAL that end is NOT behind NAT
| NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23
| offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_512 integ=NONE cipherkey=AES_GCM_16
| adding ikev2_inR1outI2 KE work-order 2 for state #1
| state #1 requesting EVENT_RETRANSMIT to be deleted
| #1 STATE_PARENT_I1: retransmits: cleared
| libevent_free: release ptr-libevent@0x5649fe86c3b8
| free_event_entry: release EVENT_RETRANSMIT-pe@0x5649fe86c1d8
| event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x5649fe86c1d8
| inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1
| libevent_malloc: new ptr-libevent@0x7fcda4002888 size 128
|   #1 spent 0.177 milliseconds in processing: Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH in ikev2_process_state_packet()
| [RE]START processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379)
| #1 complete_v2_state_transition() PARENT_I1->PARENT_I2 with status STF_SUSPEND
| suspending state #1 and saving MD
| #1 is busy; has a suspended MD
| [RE]START processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in log_stf_suspend() at ikev2.c:3269)
| "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #1 complete v2 state STATE_PARENT_I1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451
| stop processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018)
| #1 spent 0.387 milliseconds in ikev2_process_packet()
| stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380)
| processing: STOP state #0 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.396 milliseconds in comm_handle_cb() reading and processing packet
| crypto helper 1 resuming
| crypto helper 1 starting work-order 2 for state #1
| crypto helper 1 doing compute dh (V2) (ikev2_inR1outI2 KE); request ID 2
| calculating skeyseed using prf=sha2_512 integ=none cipherkey-size=32 salt-size=4
| crypto helper 1 finished compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 time elapsed 0.000981 seconds
| (#1) spent 0.986 milliseconds in crypto helper computing work-order 2: ikev2_inR1outI2 KE (pcr)
| crypto helper 1 sending results from work-order 2 for state #1 to event queue
| scheduling resume sending helper answer for #1
| libevent_malloc: new ptr-libevent@0x7fcd9c000f48 size 128
| crypto helper 1 waiting (nothing to do)
| processing resume sending helper answer for #1
| start processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:797)
| crypto helper 1 replies to request ID 2
| calling continuation function 0x5649fe365b50
| ikev2_parent_inR1outI2_continue for #1: calculating g^{xy}, sending I2
| creating state object #2 at 0x5649fe86ebb8
| State DB: adding IKEv2 state #2 in UNDEFINED
| pstats #2 ikev2.child started
| duplicating state object #1 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 as #2 for IPSEC SA
| #2 setting local endpoint to 192.1.3.209:500 from #1.st_localport (in duplicate_state() at state.c:1484)
| Message ID: init_child #1.#2; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1
| Message ID: switch-from #1 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=0->-1 wip.responder=-1
| Message ID: switch-to #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->0 wip.responder=-1
| state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
| libevent_free: release ptr-libevent@0x7fcda4002888
| free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x5649fe86c1d8
| event_schedule: new EVENT_SA_REPLACE-pe@0x5649fe86c1d8
| inserting event EVENT_SA_REPLACE, timeout in 60 seconds for #1
| libevent_malloc: new ptr-libevent@0x7fcda4002888 size 128
| parent state #1: PARENT_I1(half-open IKE SA) => PARENT_I2(open IKE SA)
| **emit ISAKMP Message:
|    initiator cookie:
|   9d 40 a0 b5  82 aa bd 68
|    responder cookie:
|   13 6f e9 73  19 99 85 51
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
|    exchange type: ISAKMP_v2_IKE_AUTH (0x23)
|    flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
|    Message ID: 1 (0x1)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK)
| next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet'
| emitting 8 zero bytes of IV into IKEv2 Encryption Payload
| IKEv2 CERT: send a certificate?
| IKEv2 CERT: policy does not have RSASIG or ECDSA: AUTHNULL
| IDr payload will be sent
| ****emit IKEv2 Identification - Initiator - Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    ID type: ID_NULL (0xd)
| next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Initiator - Payload (35:ISAKMP_NEXT_v2IDi)
| next payload chain: saving location 'IKEv2 Identification - Initiator - Payload'.'next payload type' in 'reply packet'
| emitting 0 raw bytes of my identity into IKEv2 Identification - Initiator - Payload
| my identity
| emitting length of IKEv2 Identification - Initiator - Payload: 8
| ****emit IKEv2 Identification - Responder - Payload:
|    next payload type: ISAKMP_NEXT_v2AUTH (0x27)
|    flags: none (0x0)
|    ID type: ID_NULL (0xd)
| next payload chain: ignoring supplied 'IKEv2 Identification - Responder - Payload'.'next payload type' value 39:ISAKMP_NEXT_v2AUTH
| next payload chain: setting previous 'IKEv2 Identification - Initiator - Payload'.'next payload type' to current IKEv2 Identification - Responder - Payload (36:ISAKMP_NEXT_v2IDr)
| next payload chain: saving location 'IKEv2 Identification - Responder - Payload'.'next payload type' in 'reply packet'
| emitting 0 raw bytes of IDr into IKEv2 Identification - Responder - Payload
| IDr
| emitting length of IKEv2 Identification - Responder - Payload: 8
| not sending INITIAL_CONTACT
| ****emit IKEv2 Authentication Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    auth method: IKEv2_AUTH_NULL (0xd)
| next payload chain: setting previous 'IKEv2 Identification - Responder - Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH)
| next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet'
| ikev2_calculate_psk_sighash() called from STATE_PARENT_I2 to create PSK with authby=null
| emitting 64 raw bytes of PSK auth into IKEv2 Authentication Payload
| PSK auth  ce 01 93 4f  1a af e3 ca  ac 11 b1 23  53 d2 d7 64
| PSK auth  72 7f 81 e8  46 03 81 2d  0b 9f a7 b3  71 fd ab 07
| PSK auth  cf 46 25 89  4d a2 6f 10  7c 19 9e 9b  10 e8 86 83
| PSK auth  e6 c4 c6 9c  fe 45 5d a0  55 cb 0f 9b  b0 bb 0a 8a
| emitting length of IKEv2 Authentication Payload: 72
| getting first pending from state #1
| netlink_get_spi: allocated 0x3fbd3504 for esp.0@192.1.3.209
| constructing ESP/AH proposals with all DH removed  for private-or-clear#192.1.2.0/24 (IKE SA initiator emitting ESP/AH proposals)
| converting proposal AES_GCM_16_256-NONE to ikev2 ...
| ...  ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED
| converting proposal AES_GCM_16_128-NONE to ikev2 ...
| ...  ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED
| converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ...
| ...  ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED
| converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ...
| ...  ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23: constructed local ESP/AH proposals for private-or-clear#192.1.2.0/24 (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED
| Emitting ikev2_proposals ...
| ****emit IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
| next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA)
| next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet'
| discarding INTEG=NONE
| discarding DH=NONE
| *****emit IKEv2 Proposal Substructure Payload:
|    last proposal: v2_PROPOSAL_NON_LAST (0x2)
|    prop #: 1 (0x1)
|    proto ID: IKEv2_SEC_PROTO_ESP (0x3)
|    spi size: 4 (0x4)
|    # transforms: 2 (0x2)
| last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  3f bd 35 04
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_GCM_C (0x14)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| *******emit IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of IKEv2 Transform Substructure Payload: 12
| discarding INTEG=NONE
| discarding DH=NONE
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_LAST (0x0)
|    IKEv2 transform type: TRANS_TYPE_ESN (0x5)
|    IKEv2 transform ID: ESN_DISABLED (0x0)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 32
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
| discarding INTEG=NONE
| discarding DH=NONE
| *****emit IKEv2 Proposal Substructure Payload:
|    last proposal: v2_PROPOSAL_NON_LAST (0x2)
|    prop #: 2 (0x2)
|    proto ID: IKEv2_SEC_PROTO_ESP (0x3)
|    spi size: 4 (0x4)
|    # transforms: 2 (0x2)
| last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2)
| last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  3f bd 35 04
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_GCM_C (0x14)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| *******emit IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of IKEv2 Transform Substructure Payload: 12
| discarding INTEG=NONE
| discarding DH=NONE
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_LAST (0x0)
|    IKEv2 transform type: TRANS_TYPE_ESN (0x5)
|    IKEv2 transform ID: ESN_DISABLED (0x0)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 32
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
| discarding DH=NONE
| *****emit IKEv2 Proposal Substructure Payload:
|    last proposal: v2_PROPOSAL_NON_LAST (0x2)
|    prop #: 3 (0x3)
|    proto ID: IKEv2_SEC_PROTO_ESP (0x3)
|    spi size: 4 (0x4)
|    # transforms: 4 (0x4)
| last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2)
| last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  3f bd 35 04
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_CBC (0xc)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| *******emit IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| emitting length of IKEv2 Transform Substructure Payload: 12
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
|    IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
|    IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| discarding DH=NONE
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_LAST (0x0)
|    IKEv2 transform type: TRANS_TYPE_ESN (0x5)
|    IKEv2 transform ID: ESN_DISABLED (0x0)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 48
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
| discarding DH=NONE
| *****emit IKEv2 Proposal Substructure Payload:
|    last proposal: v2_PROPOSAL_LAST (0x0)
|    prop #: 4 (0x4)
|    proto ID: IKEv2_SEC_PROTO_ESP (0x3)
|    spi size: 4 (0x4)
|    # transforms: 4 (0x4)
| last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2)
| last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal'
| emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload
| our spi  3f bd 35 04
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_CBC (0xc)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| *******emit IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 128 (0x80)
| emitting length of IKEv2 Transform Substructure Payload: 12
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
|    IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    IKEv2 transform type: TRANS_TYPE_INTEG (0x3)
|    IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| discarding DH=NONE
| ******emit IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_LAST (0x0)
|    IKEv2 transform type: TRANS_TYPE_ESN (0x5)
|    IKEv2 transform ID: ESN_DISABLED (0x0)
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3)
| last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform'
| emitting length of IKEv2 Transform Substructure Payload: 8
| emitting length of IKEv2 Proposal Substructure Payload: 48
| last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0
| emitting length of IKEv2 Security Association Payload: 164
| last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0
| ****emit IKEv2 Traffic Selector - Initiator - Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    number of TS: 1 (0x1)
| next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi)
| next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet'
| *****emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7)
|    IP Protocol ID: 0 (0x0)
|    start port: 0 (0x0)
|    end port: 65535 (0xffff)
| emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector
| ipv4 start  c0 01 03 d1
| emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector
| ipv4 end  c0 01 03 d1
| emitting length of IKEv2 Traffic Selector: 16
| emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24
| ****emit IKEv2 Traffic Selector - Responder - Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    number of TS: 1 (0x1)
| next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr)
| next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet'
| *****emit IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7)
|    IP Protocol ID: 0 (0x0)
|    start port: 0 (0x0)
|    end port: 65535 (0xffff)
| emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector
| ipv4 start  c0 01 02 17
| emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector
| ipv4 end  c0 01 02 17
| emitting length of IKEv2 Traffic Selector: 16
| emitting length of IKEv2 Traffic Selector - Responder - Payload: 24
| Initiator child policy is transport mode, sending v2N_USE_TRANSPORT_MODE
| Adding a v2N Payload
| ****emit IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    Protocol ID: PROTO_v2_RESERVED (0x0)
|    SPI size: 0 (0x0)
|    Notify Message Type: v2N_USE_TRANSPORT_MODE (0x4007)
| next payload chain: setting previous 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N)
| next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet'
| emitting length of IKEv2 Notify Payload: 8
| Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED
| adding 1 bytes of padding (including 1 byte padding-length)
| emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 337
| emitting length of ISAKMP Message: 365
| suspend processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379)
| start processing: state #2 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379)
| #2 complete_v2_state_transition() md.from_state=PARENT_I1 md.svm.state[from]=PARENT_I1 UNDEFINED->PARENT_I2 with status STF_OK
| IKEv2: transition from state STATE_PARENT_I1 to state STATE_PARENT_I2
| child state #2: UNDEFINED(ignore) => PARENT_I2(open IKE SA)
| Message ID: updating counters for #2 to 0 after switching state
| Message ID: recv #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1->0 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=-1
| Message ID: sent #1.#2 request 1; ike: initiator.sent=0->1 initiator.recv=0 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->1 wip.responder=-1
| STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048}
| sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500)
| sending 365 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1)
|   9d 40 a0 b5  82 aa bd 68  13 6f e9 73  19 99 85 51
|   2e 20 23 08  00 00 00 01  00 00 01 6d  23 00 01 51
|   d2 e7 bc 9a  b2 10 ef 60  89 22 90 9c  a8 d6 2a 03
|   ec 87 15 cb  86 ff dd 2e  3a a4 02 c9  c5 45 0a 4a
|   71 06 2d 12  bd 02 d1 41  61 3b a4 0a  a6 3a 42 b8
|   68 c9 a9 76  39 5a 07 47  9b 56 a8 08  ce 74 58 47
|   55 fc e5 17  c0 a8 a8 13  97 97 dc c5  6a 1e 21 78
|   49 24 40 98  21 3a 43 ec  3f 14 9a 8a  2d c3 cd 53
|   9b 1a 20 4d  21 19 cd 04  58 ef 64 33  68 a6 0b 7a
|   77 3e 92 06  58 08 74 f9  29 4d 68 83  69 34 59 61
|   a0 b7 d8 78  4d 66 8f 7e  96 91 40 29  3f d7 7a 5c
|   ad 7a 3e 1d  be 88 05 d4  f8 dc ea 02  27 39 8e 39
|   07 1a 22 99  2d 1b e8 9f  be f5 16 65  d9 85 e6 b7
|   d5 c7 eb e6  c4 ce 2b 9a  bd e9 2a 85  20 b6 a2 52
|   17 0c d6 b8  a8 57 cf d8  4a 9e 2c ef  00 6a 88 e8
|   7f cf 2b 18  e4 04 da 93  f8 6a 53 99  ee c3 3f 7b
|   e8 3a 45 0d  27 d1 34 45  fc e1 87 4b  1f 5a 01 11
|   46 48 10 00  9a a7 cc 71  b9 be e4 ea  5f d2 2b 0e
|   6a 35 6f bf  95 82 b7 b0  31 7d 18 1c  c4 89 0a 8e
|   76 06 9d c5  bd f4 e0 ac  42 ed e5 1d  00 42 81 80
|   3a 2d 19 e8  86 c1 d1 9a  ff f9 b2 34  84 bf 4f 23
|   34 63 6b eb  32 68 8d 61  1b 0b 1b 8a  6a 30 01 a6
|   ec dc cd 42  9e 38 2f e5  48 7a 6a 92  f8
| success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms
| event_schedule: new EVENT_RETRANSMIT-pe@0x7fcda4002b78
| inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #2
| libevent_malloc: new ptr-libevent@0x5649fe86c3b8 size 128
| #2 STATE_PARENT_I2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 29441.479652
| resume sending helper answer for #1 suppresed complete_v2_state_transition()
| #1 spent 0.69 milliseconds in resume sending helper answer
| stop processing: state #2 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in resume_handler() at server.c:833)
| libevent_free: release ptr-libevent@0x7fcd9c000f48
| spent 0.00334 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 229 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500)
|   9d 40 a0 b5  82 aa bd 68  13 6f e9 73  19 99 85 51
|   2e 20 23 20  00 00 00 01  00 00 00 e5  24 00 00 c9
|   af 8e cb ff  d9 e1 b1 12  78 01 55 f0  6f b3 f4 a5
|   fc 19 c9 cb  5a d8 8b 72  53 20 a7 5f  2d 4a cc d7
|   d7 b3 ec c7  ed c3 8d 3c  2b 91 f6 23  c9 6b 72 bc
|   47 d9 26 84  68 4a 15 13  69 b6 25 c8  b5 eb b6 ff
|   3f 44 d5 06  36 a6 22 23  32 3f 14 17  30 ea eb 43
|   bc b4 16 ec  41 a0 4c bc  ab 08 7f 44  34 cd 0f df
|   0a 1d 9a 21  ac 62 e2 d8  46 5e 44 85  0d b6 c6 60
|   1f de be 8a  9c 21 31 b3  7e c2 4a 3b  af 44 15 4a
|   46 3f 8c b4  26 74 0e b3  ca 11 4e d1  1e 82 b3 6d
|   30 2b ae 7d  dd ee b3 11  0f 1d 73 55  53 13 80 20
|   40 4a 98 5b  ca eb cf 86  91 9a c5 ca  bd 3c 8e 9f
|   7d 61 87 af  d8 3e bf f8  2a f3 83 1e  87 66 30 66
|   b7 59 b5 23  b6
| start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   9d 40 a0 b5  82 aa bd 68
|    responder cookie:
|   13 6f e9 73  19 99 85 51
|    next payload type: ISAKMP_NEXT_v2SK (0x2e)
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
|    exchange type: ISAKMP_v2_IKE_AUTH (0x23)
|    flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
|    Message ID: 1 (0x1)
|    length: 229 (0xe5)
|  processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35)
| I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response 
| State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa)
| start processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016)
| State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip)
| suspend processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062)
| start processing: state #2 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062)
| #2 is idle
| #2 idle
| unpacking clear payload
| Now let's proceed with payload (ISAKMP_NEXT_v2SK)
| ***parse IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2IDr (0x24)
|    flags: none (0x0)
|    length: 201 (0xc9)
| processing payload: ISAKMP_NEXT_v2SK (len=197)
| #2 in state PARENT_I2: sent v2I2, expected v2R2
| #2 ikev2 ISAKMP_v2_IKE_AUTH decrypt success
| Now let's proceed with payload (ISAKMP_NEXT_v2IDr)
| **parse IKEv2 Identification - Responder - Payload:
|    next payload type: ISAKMP_NEXT_v2AUTH (0x27)
|    flags: none (0x0)
|    length: 8 (0x8)
|    ID type: ID_NULL (0xd)
| processing payload: ISAKMP_NEXT_v2IDr (len=0)
| Now let's proceed with payload (ISAKMP_NEXT_v2AUTH)
| **parse IKEv2 Authentication Payload:
|    next payload type: ISAKMP_NEXT_v2SA (0x21)
|    flags: none (0x0)
|    length: 72 (0x48)
|    auth method: IKEv2_AUTH_NULL (0xd)
| processing payload: ISAKMP_NEXT_v2AUTH (len=64)
| Now let's proceed with payload (ISAKMP_NEXT_v2SA)
| **parse IKEv2 Security Association Payload:
|    next payload type: ISAKMP_NEXT_v2TSi (0x2c)
|    flags: none (0x0)
|    length: 36 (0x24)
| processing payload: ISAKMP_NEXT_v2SA (len=32)
| Now let's proceed with payload (ISAKMP_NEXT_v2TSi)
| **parse IKEv2 Traffic Selector - Initiator - Payload:
|    next payload type: ISAKMP_NEXT_v2TSr (0x2d)
|    flags: none (0x0)
|    length: 24 (0x18)
|    number of TS: 1 (0x1)
| processing payload: ISAKMP_NEXT_v2TSi (len=16)
| Now let's proceed with payload (ISAKMP_NEXT_v2TSr)
| **parse IKEv2 Traffic Selector - Responder - Payload:
|    next payload type: ISAKMP_NEXT_v2N (0x29)
|    flags: none (0x0)
|    length: 24 (0x18)
|    number of TS: 1 (0x1)
| processing payload: ISAKMP_NEXT_v2TSr (len=16)
| Now let's proceed with payload (ISAKMP_NEXT_v2N)
| **parse IKEv2 Notify Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    length: 8 (0x8)
|    Protocol ID: PROTO_v2_RESERVED (0x0)
|    SPI size: 0 (0x0)
|    Notify Message Type: v2N_USE_TRANSPORT_MODE (0x4007)
| processing payload: ISAKMP_NEXT_v2N (len=0)
| selected state microcode Initiator: process IKE_AUTH response
| Now let's proceed with state specific processing
| calling processor Initiator: process IKE_AUTH response
| Received v2N_USE_TRANSPORT_MODE in IKE_AUTH reply
| ID_NULL: id kind matches
| offered CA: '%none'
| IKEv2 mode peer ID is ID_NULL: 'ID_NULL'
| verifying AUTH payload
| ikev2_calculate_psk_sighash() called from STATE_PARENT_I2 to verify PSK with authby=null
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: Authenticated using authby=null
| parent state #1: PARENT_I2(open IKE SA) => PARENT_I3(established IKE SA)
| #1 will start re-keying in 2607 seconds with margin of 993 seconds (attempting re-key)
| state #1 requesting EVENT_SA_REPLACE to be deleted
| libevent_free: release ptr-libevent@0x7fcda4002888
| free_event_entry: release EVENT_SA_REPLACE-pe@0x5649fe86c1d8
| event_schedule: new EVENT_SA_REKEY-pe@0x5649fe86c1d8
| inserting event EVENT_SA_REKEY, timeout in 2607 seconds for #1
| libevent_malloc: new ptr-libevent@0x7fcd9c000f48 size 128
| pstats #1 ikev2.ike established
| TSi: parsing 1 traffic selectors
| ***parse IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7)
|    IP Protocol ID: 0 (0x0)
|    length: 16 (0x10)
|    start port: 0 (0x0)
|    end port: 65535 (0xffff)
| parsing 4 raw bytes of IKEv2 Traffic Selector into TS low
| TS low  c0 01 03 d1
| parsing 4 raw bytes of IKEv2 Traffic Selector into TS high
| TS high  c0 01 03 d1
| TSi: parsed 1 traffic selectors
| TSr: parsing 1 traffic selectors
| ***parse IKEv2 Traffic Selector:
|    TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7)
|    IP Protocol ID: 0 (0x0)
|    length: 16 (0x10)
|    start port: 0 (0x0)
|    end port: 65535 (0xffff)
| parsing 4 raw bytes of IKEv2 Traffic Selector into TS low
| TS low  c0 01 02 17
| parsing 4 raw bytes of IKEv2 Traffic Selector into TS high
| TS high  c0 01 02 17
| TSr: parsed 1 traffic selectors
| evaluating our conn="private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 I=192.1.3.209/32:0/0 R=192.1.2.23/32:0/0 to their:
|     TSi[0] .net=192.1.3.209-192.1.3.209 .iporotoid=0 .{start,end}port=0..65535
|         match address end->client=192.1.3.209/32 == TSi[0]net=192.1.3.209-192.1.3.209: YES fitness 32
|         narrow port end=0..65535 == TSi[0]=0..65535: 0
|           TSi[0] port match: YES fitness 65536
|         narrow protocol end=*0 == TSi[0]=*0: 0
|         match end->protocol=*0 == TSi[0].ipprotoid=*0: YES fitness 255
|     TSr[0] .net=192.1.2.23-192.1.2.23 .iporotoid=0 .{start,end}port=0..65535
|         match address end->client=192.1.2.23/32 == TSr[0]net=192.1.2.23-192.1.2.23: YES fitness 32
|         narrow port end=0..65535 == TSr[0]=0..65535: 0
|           TSr[0] port match: YES fitness 65536
|         narrow protocol end=*0 == TSr[0]=*0: 0
|         match end->protocol=*0 == TSr[0].ipprotoid=*0: YES fitness 255
| best fit so far: TSi[0] TSr[0]
| found an acceptable TSi/TSr Traffic Selector
| printing contents struct traffic_selector
|   ts_type: IKEv2_TS_IPV6_ADDR_RANGE
|   ipprotoid: 0
|   port range: 0-65535
|   ip range: 192.1.3.209-192.1.3.209
| printing contents struct traffic_selector
|   ts_type: IKEv2_TS_IPV6_ADDR_RANGE
|   ipprotoid: 0
|   port range: 0-65535
|   ip range: 192.1.2.23-192.1.2.23
| using existing local ESP/AH proposals for private-or-clear#192.1.2.0/24 (IKE_AUTH initiator accepting remote ESP/AH proposal): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED
| Comparing remote proposals against IKE_AUTH initiator accepting remote ESP/AH proposal 4 local proposals
| local proposal 1 type ENCR has 1 transforms
| local proposal 1 type PRF has 0 transforms
| local proposal 1 type INTEG has 1 transforms
| local proposal 1 type DH has 1 transforms
| local proposal 1 type ESN has 1 transforms
| local proposal 1 transforms: required: ENCR+ESN; optional: INTEG+DH
| local proposal 2 type ENCR has 1 transforms
| local proposal 2 type PRF has 0 transforms
| local proposal 2 type INTEG has 1 transforms
| local proposal 2 type DH has 1 transforms
| local proposal 2 type ESN has 1 transforms
| local proposal 2 transforms: required: ENCR+ESN; optional: INTEG+DH
| local proposal 3 type ENCR has 1 transforms
| local proposal 3 type PRF has 0 transforms
| local proposal 3 type INTEG has 2 transforms
| local proposal 3 type DH has 1 transforms
| local proposal 3 type ESN has 1 transforms
| local proposal 3 transforms: required: ENCR+INTEG+ESN; optional: DH
| local proposal 4 type ENCR has 1 transforms
| local proposal 4 type PRF has 0 transforms
| local proposal 4 type INTEG has 2 transforms
| local proposal 4 type DH has 1 transforms
| local proposal 4 type ESN has 1 transforms
| local proposal 4 transforms: required: ENCR+INTEG+ESN; optional: DH
| ***parse IKEv2 Proposal Substructure Payload:
|    last proposal: v2_PROPOSAL_LAST (0x0)
|    length: 32 (0x20)
|    prop #: 1 (0x1)
|    proto ID: IKEv2_SEC_PROTO_ESP (0x3)
|    spi size: 4 (0x4)
|    # transforms: 2 (0x2)
| parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI
| remote SPI  89 ed a8 75
| Comparing remote proposal 1 containing 2 transforms against local proposal [1..1] of 4 local proposals
| ****parse IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_NON_LAST (0x3)
|    length: 12 (0xc)
|    IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
|    IKEv2 transform ID: AES_GCM_C (0x14)
| *****parse IKEv2 Attribute Substructure Payload:
|    af+type: AF+IKEv2_KEY_LENGTH (0x800e)
|    length/value: 256 (0x100)
| remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0
| ****parse IKEv2 Transform Substructure Payload:
|    last transform: v2_TRANSFORM_LAST (0x0)
|    length: 8 (0x8)
|    IKEv2 transform type: TRANS_TYPE_ESN (0x5)
|    IKEv2 transform ID: ESN_DISABLED (0x0)
| remote proposal 1 transform 1 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0
| remote proposal 1 proposed transforms: ENCR+ESN; matched: ENCR+ESN; unmatched: none
| comparing remote proposal 1 containing ENCR+ESN transforms to local proposal 1; required: ENCR+ESN; optional: INTEG+DH; matched: ENCR+ESN
| remote proposal 1 matches local proposal 1
| remote accepted the proposal 1:ESP:ENCR=AES_GCM_C_256;ESN=DISABLED[first-match]
| IKE_AUTH initiator accepting remote ESP/AH proposal ikev2_proposal: 1:ESP:SPI=89eda875;ENCR=AES_GCM_C_256;ESN=DISABLED
| converting proposal to internal trans attrs
| Initiator policy is transport, responder sends v2N_USE_TRANSPORT_MODE, setting CHILD SA to transport mode
| integ=none: .key_size=0 encrypt=aes_gcm_16: .key_size=32 .salt_size=4 keymat_len=36
| install_ipsec_sa() for #2: inbound and outbound
| could_route called for private-or-clear#192.1.2.0/24 (kind=CK_INSTANCE)
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 unrouted HOLD: NULL; eroute owner: self
| looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE
| encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20
| AES_GCM_16 requires 4 salt bytes
| st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0
| setting IPsec SA replay-window to 32
| NIC esp-hw-offload not for connection 'private-or-clear#192.1.2.0/24' not available on interface eth0
| netlink: enabling transport mode
| netlink: setting IPsec SA replay-window to 32 using old-style req
| netlink: esp-hw-offload not set for IPsec SA
| netlink response for Add SA esp.89eda875@192.1.2.23 included non-error error
| set up outgoing SA, ref=0/0
| looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE
| encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20
| AES_GCM_16 requires 4 salt bytes
| st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0
| setting IPsec SA replay-window to 32
| NIC esp-hw-offload not for connection 'private-or-clear#192.1.2.0/24' not available on interface eth0
| netlink: enabling transport mode
| netlink: setting IPsec SA replay-window to 32 using old-style req
| netlink: esp-hw-offload not set for IPsec SA
| netlink response for Add SA esp.3fbd3504@192.1.3.209 included non-error error
| priority calculation of connection "private-or-clear#192.1.2.0/24" is 0x1fdfdf
| add inbound eroute 192.1.2.23/32:0 --0-> 192.1.3.209/32:0 => esp.10000@192.1.3.209 (raw_eroute)
| netlink_raw_eroute: using host address instead of client subnet
| IPsec Sa SPD priority set to 2088927
| raw_eroute result=success
| set up incoming SA, ref=0/0
| sr for #2: unrouted HOLD
| route_and_eroute() for proto 0, and source port 0 dest port 0
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 unrouted HOLD: NULL; eroute owner: self
| route_and_eroute with c: private-or-clear#192.1.2.0/24 (next: none) ero:private-or-clear#192.1.2.0/24 esr:{(nil)} ro:null rosr:{(nil)} and state: #2
| priority calculation of connection "private-or-clear#192.1.2.0/24" is 0x1fdfdf
| eroute_connection replace eroute 192.1.3.209/32:0 --0-> 192.1.2.23/32:0 => esp.89eda875@192.1.2.23>esp.89eda875@192.1.2.23 (raw_eroute)
| netlink_raw_eroute: using host address instead of client subnet
| IPsec Sa SPD priority set to 2088927
| raw_eroute result=success
| running updown command "ipsec _updown" for verb up 
| command executing up-host
| executing up-host: PLUTO_VERB='up-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16440' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGUR
| popen cmd is 1106 chars long
| cmd(   0):PLUTO_VERB='up-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.:
| cmd(  80):1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.:
| cmd( 160):209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET=:
| cmd( 240):'192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_:
| cmd( 320):PROTOCOL='0' PLUTO_SA_REQID='16440' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' :
| cmd( 400):PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET=:
| cmd( 480):'192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_:
| cmd( 560):PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_:
| cmd( 640):CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_AL:
| cmd( 720):LOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_INSTANCE':
| cmd( 800): PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_:
| cmd( 880):DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' :
| cmd( 960):PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_S:
| cmd(1040):HARED='no' SPI_IN=0x89eda875 SPI_OUT=0x3fbd3504 ipsec _updown 2>&1:
| route_and_eroute: firewall_notified: true
| running updown command "ipsec _updown" for verb prepare 
| command executing prepare-host
| executing prepare-host: PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16440' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_N
| popen cmd is 1111 chars long
| cmd(   0):PLUTO_VERB='prepare-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear:
| cmd(  80):#192.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192:
| cmd( 160):.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT:
| cmd( 240):_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUT:
| cmd( 320):O_MY_PROTOCOL='0' PLUTO_SA_REQID='16440' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2:
| cmd( 400):.23' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT:
| cmd( 480):_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' P:
| cmd( 560):LUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' P:
| cmd( 640):LUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKE:
| cmd( 720):V2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_INST:
| cmd( 800):ANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_:
| cmd( 880):PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER:
| cmd( 960):='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' :
| cmd(1040):VTI_SHARED='no' SPI_IN=0x89eda875 SPI_OUT=0x3fbd3504 ipsec _updown 2>&1:
| running updown command "ipsec _updown" for verb route 
| command executing route-host
| executing route-host: PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16440' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CO
| popen cmd is 1109 chars long
| cmd(   0):PLUTO_VERB='route-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#1:
| cmd(  80):92.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1:
| cmd( 160):.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_N:
| cmd( 240):ET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_:
| cmd( 320):MY_PROTOCOL='0' PLUTO_SA_REQID='16440' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.2:
| cmd( 400):3' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_N:
| cmd( 480):ET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLU:
| cmd( 560):TO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLU:
| cmd( 640):TO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2:
| cmd( 720):_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_INSTAN:
| cmd( 800):CE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PE:
| cmd( 880):ER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER=':
| cmd( 960):0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VT:
| cmd(1040):I_SHARED='no' SPI_IN=0x89eda875 SPI_OUT=0x3fbd3504 ipsec _updown 2>&1:
| route_and_eroute: instance "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23, setting eroute_owner {spd=0x5649fe8693c8,sr=0x5649fe8693c8} to #2 (was #0) (newest_ipsec_sa=#0)
|   #1 spent 1.61 milliseconds in install_ipsec_sa()
| inR2: instance private-or-clear#192.1.2.0/24[1], setting IKEv2 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1
| state #2 requesting EVENT_RETRANSMIT to be deleted
| #2 STATE_PARENT_I2: retransmits: cleared
| libevent_free: release ptr-libevent@0x5649fe86c3b8
| free_event_entry: release EVENT_RETRANSMIT-pe@0x7fcda4002b78
| #2 spent 2.08 milliseconds in processing: Initiator: process IKE_AUTH response in ikev2_process_state_packet()
| [RE]START processing: state #2 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379)
| #2 complete_v2_state_transition() PARENT_I2->V2_IPSEC_I with status STF_OK
| IKEv2: transition from state STATE_PARENT_I2 to state STATE_V2_IPSEC_I
| child state #2: PARENT_I2(open IKE SA) => V2_IPSEC_I(established CHILD SA)
| Message ID: updating counters for #2 to 1 after switching state
| Message ID: recv #1.#2 response 1; ike: initiator.sent=1 initiator.recv=0->1 responder.sent=-1 responder.recv=-1; child: wip.initiator=1->-1 wip.responder=-1
| Message ID: #1.#2 skipping update_send as nothing to send; initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1
| pstats #2 ikev2.child established
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: negotiated connection [192.1.3.209-192.1.3.209:0-65535 0] -> [192.1.2.23-192.1.2.23:0-65535 0]
| NAT-T: encaps is 'auto'
| STATE_V2_IPSEC_I: IPsec SA established transport mode {ESP=>0x89eda875 <0x3fbd3504 xfrm=AES_GCM_16_256-NONE NATOA=none NATD=none DPD=passive}
| releasing whack for #2 (sock=fd@-1)
| releasing whack and unpending for parent #1
| unpending state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23
| delete from pending Child SA with 192.1.2.23 "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23
| removing pending policy for no connection {0x5649fe8514a8}
| #2 will start re-keying in 28048 seconds with margin of 752 seconds (attempting re-key)
| event_schedule: new EVENT_SA_REKEY-pe@0x7fcda4002b78
| inserting event EVENT_SA_REKEY, timeout in 28048 seconds for #2
| libevent_malloc: new ptr-libevent@0x5649fe86e6a8 size 128
| stop processing: state #2 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018)
| #1 spent 2.3 milliseconds in ikev2_process_packet()
| stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380)
| processing: STOP state #0 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 2.31 milliseconds in comm_handle_cb() reading and processing packet
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.0033 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.00196 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.00196 milliseconds in signal handler PLUTO_SIGCHLD
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_STATE_... in show_traffic_status (sort_states)
| FOR_EACH_STATE_... in sort_states
| get_sa_info esp.3fbd3504@192.1.3.209
| get_sa_info esp.89eda875@192.1.2.23
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 0.58 milliseconds in whack
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
| FOR_EACH_CONNECTION_... in show_connections_status
| FOR_EACH_CONNECTION_... in show_connections_status
| FOR_EACH_STATE_... in show_states_status (sort_states)
| FOR_EACH_STATE_... in sort_states
| get_sa_info esp.3fbd3504@192.1.3.209
| get_sa_info esp.89eda875@192.1.2.23
| close_any(fd@16) (in whack_process() at rcv_whack.c:700)
| spent 1.15 milliseconds in whack
| processing global timer EVENT_SHUNT_SCAN
| expiring aged bare shunts from shunt table
| spent 0.00363 milliseconds in global timer EVENT_SHUNT_SCAN
| spent 0.00251 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 69 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500)
|   9d 40 a0 b5  82 aa bd 68  13 6f e9 73  19 99 85 51
|   2e 20 25 00  00 00 00 00  00 00 00 45  2a 00 00 29
|   60 4b 4f ec  8a 12 eb e2  4e 15 96 52  d7 12 42 54
|   0d 37 0a f4  8d 38 ae da  47 0a 65 f4  52 34 7e c3
|   14 4d 7b 7e  5b
| start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   9d 40 a0 b5  82 aa bd 68
|    responder cookie:
|   13 6f e9 73  19 99 85 51
|    next payload type: ISAKMP_NEXT_v2SK (0x2e)
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
|    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
|    flags: none (0x0)
|    Message ID: 0 (0x0)
|    length: 69 (0x45)
|  processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37)
| I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request 
| State DB: found IKEv2 state #1 in PARENT_I3 (find_v2_ike_sa)
| start processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016)
| State DB: IKEv2 state not found (find_v2_sa_by_responder_wip)
| [RE]START processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2064)
| #1 st.st_msgid_lastrecv -1 md.hdr.isa_msgid 00000000
| Message ID: #1 not a duplicate - message is new; initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1
| unpacking clear payload
| Now let's proceed with payload (ISAKMP_NEXT_v2SK)
| ***parse IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2D (0x2a)
|    flags: none (0x0)
|    length: 41 (0x29)
| processing payload: ISAKMP_NEXT_v2SK (len=37)
| Message ID: start-responder #1 request 0; ike: initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1->0
| #1 in state PARENT_I3: PARENT SA established
| #1 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success
| Now let's proceed with payload (ISAKMP_NEXT_v2D)
| **parse IKEv2 Delete Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    length: 12 (0xc)
|    protocol ID: PROTO_v2_ESP (0x3)
|    SPI size: 4 (0x4)
|    number of SPIs: 1 (0x1)
| processing payload: ISAKMP_NEXT_v2D (len=4)
| selected state microcode I3: INFORMATIONAL Request
| Now let's proceed with state specific processing
| calling processor I3: INFORMATIONAL Request
| an informational request should send a response 
| Received an INFORMATIONAL response, updating st_last_liveness, no pending_liveness
| **emit ISAKMP Message:
|    initiator cookie:
|   9d 40 a0 b5  82 aa bd 68
|    responder cookie:
|   13 6f e9 73  19 99 85 51
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
|    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
|    flags: ISAKMP_FLAG_v2_IKE_INIT+ISAKMP_FLAG_v2_MSG_RESPONSE (0x28)
|    Message ID: 0 (0x0)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK)
| next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'information exchange reply packet'
| emitting 8 zero bytes of IV into IKEv2 Encryption Payload
| parsing 4 raw bytes of IKEv2 Delete Payload into SPI
| SPI  89 ed a8 75
| delete PROTO_v2_ESP SA(0x89eda875)
| v2 CHILD SA #2 found using their inbound (our outbound) SPI, in STATE_V2_IPSEC_I
| State DB: found IKEv2 state #2 in V2_IPSEC_I (find_v2_child_sa_by_outbound_spi)
| our side SPI that needs to be deleted: PROTO_v2_ESP SA(0x89eda875)
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #1: received Delete SA payload: delete IPsec State #2 now
| pstats #2 ikev2.child deleted completed
| #2 spent 2.08 milliseconds in total
| suspend processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:879)
| start processing: state #2 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:879)
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: deleting other state #2 (STATE_V2_IPSEC_I) aged 14.762s and NOT sending notification
| child state #2: V2_IPSEC_I(established CHILD SA) => delete
| get_sa_info esp.89eda875@192.1.2.23
| get_sa_info esp.3fbd3504@192.1.3.209
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: ESP traffic information: in=0B out=192B
| child state #2: V2_IPSEC_I(established CHILD SA) => CHILDSA_DEL(informational)
| state #2 requesting EVENT_SA_REKEY to be deleted
| libevent_free: release ptr-libevent@0x5649fe86e6a8
| free_event_entry: release EVENT_SA_REKEY-pe@0x7fcda4002b78
| running updown command "ipsec _updown" for verb down 
| command executing down-host
| executing down-host: PLUTO_VERB='down-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16440' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844155' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUT
| popen cmd is 1117 chars long
| cmd(   0):PLUTO_VERB='down-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#19:
| cmd(  80):2.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.:
| cmd( 160):3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NE:
| cmd( 240):T='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_M:
| cmd( 320):Y_PROTOCOL='0' PLUTO_SA_REQID='16440' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23:
| cmd( 400):' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NE:
| cmd( 480):T='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUT:
| cmd( 560):O_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566844:
| cmd( 640):155' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTAN:
| cmd( 720):CE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='C:
| cmd( 800):K_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' :
| cmd( 880):PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_:
| cmd( 960):SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING:
| cmd(1040):='no' VTI_SHARED='no' SPI_IN=0x89eda875 SPI_OUT=0x3fbd3504 ipsec _updown 2>&1:
| shunt_eroute() called for connection 'private-or-clear#192.1.2.0/24' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "private-or-clear#192.1.2.0/24" is 0x1fdfdf
| netlink_raw_eroute: SPI_PASS
| netlink_raw_eroute: using host address instead of client subnet
| priority calculation of connection "private-or-clear#192.1.2.0/24" is 0x1fdfdf
| netlink_raw_eroute: SPI_PASS
| netlink_raw_eroute: using host address instead of client subnet
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn block mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 unrouted: NULL
| running updown command "ipsec _updown" for verb unroute 
| command executing unroute-host
| executing unroute-host: PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16440' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIENT_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_
| popen cmd is 1098 chars long
| cmd(   0):PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear:
| cmd(  80):#192.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192:
| cmd( 160):.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT:
| cmd( 240):_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUT:
| cmd( 320):O_MY_PROTOCOL='0' PLUTO_SA_REQID='16440' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.:
| cmd( 400):2.23' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.23/32' PLUTO_PEER_CLIEN:
| cmd( 480):T_NET='192.1.2.23' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' :
| cmd( 560):PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' :
| cmd( 640):PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IK:
| cmd( 720):EV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_INS:
| cmd( 800):TANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO:
| cmd( 880):_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVE:
| cmd( 960):R='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no':
| cmd(1040): VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #2: unroute-host output: Error: Peer netns reference is invalid.
| delete esp.89eda875@192.1.2.23
| netlink response for Del SA esp.89eda875@192.1.2.23 included non-error error
| priority calculation of connection "private-or-clear#192.1.2.0/24" is 0x1fdfdf
| delete inbound eroute 192.1.2.23/32:0 --0-> 192.1.3.209/32:0 => esp.10000@192.1.3.209 (raw_eroute)
| netlink_raw_eroute: using host address instead of client subnet
| raw_eroute result=success
| delete esp.3fbd3504@192.1.3.209
| netlink response for Del SA esp.3fbd3504@192.1.3.209 included non-error error
| in connection_discard for connection private-or-clear#192.1.2.0/24
| connection is instance
| not in pending use
| State DB: found state #1 in PARENT_I3 (connection_discard)
| states still using this connection instance, retaining
| State DB: deleting IKEv2 state #2 in CHILDSA_DEL
| child state #2: CHILDSA_DEL(informational) => UNDEFINED(ignore)
| stop processing: state #2 from 192.1.2.23 (in delete_state() at state.c:1143)
| resume processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:1143)
| ****emit IKEv2 Delete Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    protocol ID: PROTO_v2_ESP (0x3)
|    SPI size: 4 (0x4)
|    number of SPIs: 1 (0x1)
| next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Delete Payload (42:ISAKMP_NEXT_v2D)
| next payload chain: saving location 'IKEv2 Delete Payload'.'next payload type' in 'information exchange reply packet'
| emitting 4 raw bytes of local SPIs into IKEv2 Delete Payload
| local SPIs  3f bd 35 04
| emitting length of IKEv2 Delete Payload: 12
| adding 1 bytes of padding (including 1 byte padding-length)
| emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 41
| emitting length of ISAKMP Message: 69
| sending 69 bytes for reply packet for process_encrypted_informational_ikev2 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1)
|   9d 40 a0 b5  82 aa bd 68  13 6f e9 73  19 99 85 51
|   2e 20 25 28  00 00 00 00  00 00 00 45  2a 00 00 29
|   4f 56 b6 9a  7c 12 c3 b9  46 54 17 a0  ce 8e c1 f2
|   d1 79 71 15  ab e3 60 74  1f e9 9f 17  26 cd af bb
|   d0 ac 06 8f  15
| Message ID: #1 XXX: in process_encrypted_informational_ikev2() hacking around record'n'send bypassing send queue hacking around delete_my_family(); initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=0
| Message ID: sent #1 response 0; ike: initiator.sent=1 initiator.recv=1 responder.sent=-1->0 responder.recv=-1 wip.initiator=-1 wip.responder=0
|   #1 spent 1.98 milliseconds in processing: I3: INFORMATIONAL Request in ikev2_process_state_packet()
| [RE]START processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379)
| #1 complete_v2_state_transition() PARENT_I3->PARENT_I3 with status STF_OK
| Message ID: updating counters for #1 to 0 after switching state
| Message ID: recv #1 request 0; ike: initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=-1->0 wip.initiator=-1 wip.responder=0->-1
| Message ID: #1 skipping update_send as nothing to send; initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=-1
| STATE_PARENT_I3: PARENT SA established
| stop processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018)
| #1 spent 2.14 milliseconds in ikev2_process_packet()
| stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380)
| processing: STOP state #0 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 2.15 milliseconds in comm_handle_cb() reading and processing packet
| spent 0.00154 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue()
| *received 65 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500)
|   9d 40 a0 b5  82 aa bd 68  13 6f e9 73  19 99 85 51
|   2e 20 25 00  00 00 00 01  00 00 00 41  2a 00 00 25
|   1d ef ef 12  f1 a5 c4 82  40 5e d9 28  93 88 c8 5c
|   0c c8 8a f3  91 fc 4a ab  14 31 bd ae  be 00 42 7e
|   34
| start processing: from 192.1.2.23:500 (in process_md() at demux.c:378)
| **parse ISAKMP Message:
|    initiator cookie:
|   9d 40 a0 b5  82 aa bd 68
|    responder cookie:
|   13 6f e9 73  19 99 85 51
|    next payload type: ISAKMP_NEXT_v2SK (0x2e)
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
|    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
|    flags: none (0x0)
|    Message ID: 1 (0x1)
|    length: 65 (0x41)
|  processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37)
| I am the IKE SA Original Initiator receiving an IKEv2 INFORMATIONAL request 
| State DB: found IKEv2 state #1 in PARENT_I3 (find_v2_ike_sa)
| start processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016)
| State DB: IKEv2 state not found (find_v2_sa_by_responder_wip)
| [RE]START processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in ike_process_packet() at ikev2.c:2064)
| #1 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001
| Message ID: #1 not a duplicate - message is new; initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0
| unpacking clear payload
| Now let's proceed with payload (ISAKMP_NEXT_v2SK)
| ***parse IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2D (0x2a)
|    flags: none (0x0)
|    length: 37 (0x25)
| processing payload: ISAKMP_NEXT_v2SK (len=33)
| Message ID: start-responder #1 request 1; ike: initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=-1->1
| #1 in state PARENT_I3: PARENT SA established
| #1 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success
| Now let's proceed with payload (ISAKMP_NEXT_v2D)
| **parse IKEv2 Delete Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
|    length: 8 (0x8)
|    protocol ID: PROTO_v2_IKE (0x1)
|    SPI size: 0 (0x0)
|    number of SPIs: 0 (0x0)
| processing payload: ISAKMP_NEXT_v2D (len=0)
| selected state microcode I3: INFORMATIONAL Request
| Now let's proceed with state specific processing
| calling processor I3: INFORMATIONAL Request
| an informational request should send a response 
| Received an INFORMATIONAL response, updating st_last_liveness, no pending_liveness
| **emit ISAKMP Message:
|    initiator cookie:
|   9d 40 a0 b5  82 aa bd 68
|    responder cookie:
|   13 6f e9 73  19 99 85 51
|    next payload type: ISAKMP_NEXT_NONE (0x0)
|    ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
|    exchange type: ISAKMP_v2_INFORMATIONAL (0x25)
|    flags: ISAKMP_FLAG_v2_IKE_INIT+ISAKMP_FLAG_v2_MSG_RESPONSE (0x28)
|    Message ID: 1 (0x1)
| next payload chain: saving message location 'ISAKMP Message'.'next payload type'
| ***emit IKEv2 Encryption Payload:
|    next payload type: ISAKMP_NEXT_v2NONE (0x0)
|    flags: none (0x0)
| next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK)
| next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'information exchange reply packet'
| emitting 8 zero bytes of IV into IKEv2 Encryption Payload
| adding 1 bytes of padding (including 1 byte padding-length)
| emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload
| emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload
| emitting length of IKEv2 Encryption Payload: 29
| emitting length of ISAKMP Message: 57
| sending 57 bytes for reply packet for process_encrypted_informational_ikev2 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1)
|   9d 40 a0 b5  82 aa bd 68  13 6f e9 73  19 99 85 51
|   2e 20 25 28  00 00 00 01  00 00 00 39  00 00 00 1d
|   53 7a 87 85  6d b8 1c ea  51 71 69 e5  97 35 66 9f
|   0c d5 8f cb  a5 19 09 d1  76
| Message ID: #1 XXX: in process_encrypted_informational_ikev2() hacking around record'n'send bypassing send queue hacking around delete_my_family(); initiator.sent=1 initiator.recv=1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=1
| Message ID: sent #1 response 1; ike: initiator.sent=1 initiator.recv=1 responder.sent=0->1 responder.recv=0 wip.initiator=-1 wip.responder=1
| State DB: IKEv2 state not found (delete_my_family)
| parent state #1: PARENT_I3(established IKE SA) => IKESA_DEL(established IKE SA)
| pstats #1 ikev2.ike deleted completed
| #1 spent 8.84 milliseconds in total
| [RE]START processing: state #1 connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 from 192.1.2.23 (in delete_state() at state.c:879)
"private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 #1: deleting state (STATE_IKESA_DEL) aged 14.797s and NOT sending notification
| parent state #1: IKESA_DEL(established IKE SA) => delete
| state #1 requesting EVENT_SA_REKEY to be deleted
| libevent_free: release ptr-libevent@0x7fcd9c000f48
| free_event_entry: release EVENT_SA_REKEY-pe@0x5649fe86c1d8
| State DB: IKEv2 state not found (flush_incomplete_children)
| in connection_discard for connection private-or-clear#192.1.2.0/24
| connection is instance
| not in pending use
| State DB: state not found (connection_discard)
| no states use this connection instance, deleting
| start processing: connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 (BACKGROUND) (in delete_connection() at connections.c:189)
| Deleting states for connection - not including other IPsec SA's
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| state #1
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| state #1
| free hp@0x5649fe869988
| flush revival: connection 'private-or-clear#192.1.2.0/24' wasn't on the list
| stop processing: connection "private-or-clear#192.1.2.0/24"[1] ...192.1.2.23 (BACKGROUND) (in discard_connection() at connections.c:249)
| State DB: deleting IKEv2 state #1 in IKESA_DEL
| parent state #1: IKESA_DEL(established IKE SA) => UNDEFINED(ignore)
| stop processing: state #1 from 192.1.2.23 (in delete_state() at state.c:1143)
| in statetime_stop() and could not find #1
| skip start processing: state #0 (in complete_v2_state_transition() at ikev2.c:3379)
| #0 complete_v2_state_transition() md.from_state=PARENT_I3 md.svm.state[from]=PARENT_I3 UNDEFINED->PARENT_I3 with status STF_OK
| STF_OK but no state object remains
| processing: STOP state #0 (in ikev2_process_packet() at ikev2.c:2018)
| in statetime_stop() and could not find #1
| stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380)
| processing: STOP state #0 (in process_md() at demux.c:382)
| processing: STOP connection NULL (in process_md() at demux.c:383)
| spent 0.41 milliseconds in comm_handle_cb() reading and processing packet
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.00324 milliseconds in signal handler PLUTO_SIGCHLD
| processing signal PLUTO_SIGCHLD
| waitpid returned ECHILD (no child processes left)
| spent 0.00199 milliseconds in signal handler PLUTO_SIGCHLD
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722)
shutting down
| processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825)
| certs and keys locked by 'free_preshared_secrets'
forgetting secrets
| certs and keys unlocked by 'free_preshared_secrets'
| start processing: connection "block" (in delete_connection() at connections.c:189)
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| flush revival: connection 'block' wasn't on the list
| stop processing: connection "block" (in discard_connection() at connections.c:249)
| start processing: connection "private" (in delete_connection() at connections.c:189)
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| flush revival: connection 'private' wasn't on the list
| stop processing: connection "private" (in discard_connection() at connections.c:249)
| start processing: connection "private-or-clear#192.1.2.0/24" (in delete_connection() at connections.c:189)
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| shunt_eroute() called for connection 'private-or-clear#192.1.2.0/24' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "private-or-clear#192.1.2.0/24" is 0x1fdfdf
| netlink_raw_eroute: SPI_PASS
| priority calculation of connection "private-or-clear#192.1.2.0/24" is 0x1fdfdf
| netlink_raw_eroute: SPI_PASS
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#192.1.2.0/24" unrouted: NULL
| running updown command "ipsec _updown" for verb unroute 
| command executing unroute-host
| executing unroute-host: PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16436' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.0/24' PLUTO_PEER_CLIENT_NET='192.1.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONF
| popen cmd is 1091 chars long
| cmd(   0):PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear:
| cmd(  80):#192.1.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192:
| cmd( 160):.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT:
| cmd( 240):_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUT:
| cmd( 320):O_MY_PROTOCOL='0' PLUTO_SA_REQID='16436' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.:
| cmd( 400):0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.2.0/24' PLUTO_PEER_CLIENT_NE:
| cmd( 480):T='192.1.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_P:
| cmd( 560):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_C:
| cmd( 640):ONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALL:
| cmd( 720):OW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' :
| cmd( 800):PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_D:
| cmd( 880):NS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' P:
| cmd( 960):LUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SH:
| cmd(1040):ARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
| flush revival: connection 'private-or-clear#192.1.2.0/24' wasn't on the list
| stop processing: connection "private-or-clear#192.1.2.0/24" (in discard_connection() at connections.c:249)
| start processing: connection "private-or-clear#7.0.0.0/8" (in delete_connection() at connections.c:189)
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| shunt_eroute() called for connection 'private-or-clear#7.0.0.0/8' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "private-or-clear#7.0.0.0/8" is 0x1fdfdf
| netlink_raw_eroute: SPI_PASS
| priority calculation of connection "private-or-clear#7.0.0.0/8" is 0x1fdfdf
| netlink_raw_eroute: SPI_PASS
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#7.0.0.0/8 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#7.0.0.0/8" unrouted: NULL
| running updown command "ipsec _updown" for verb unroute 
| command executing unroute-host
| executing unroute-host: PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#7.0.0.0/8' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16432' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='7.0.0.0/8' PLUTO_PEER_CLIENT_NET='7.0.0.0' PLUTO_PEER_CLIENT_MASK='255.0.0.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' V
| popen cmd is 1079 chars long
| cmd(   0):PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear:
| cmd(  80):#7.0.0.0/8' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.:
| cmd( 160):3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NE:
| cmd( 240):T='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_M:
| cmd( 320):Y_PROTOCOL='0' PLUTO_SA_REQID='16432' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' :
| cmd( 400):PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='7.0.0.0/8' PLUTO_PEER_CLIENT_NET='7.0:
| cmd( 480):.0.0' PLUTO_PEER_CLIENT_MASK='255.0.0.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL:
| cmd( 560):='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY=':
| cmd( 640):AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRA:
| cmd( 720):CK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_A:
| cmd( 800):DDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' P:
| cmd( 880):LUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLI:
| cmd( 960):ENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SP:
| cmd(1040):I_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#7.0.0.0/8": unroute-host output: Error: Peer netns reference is invalid.
| flush revival: connection 'private-or-clear#7.0.0.0/8' wasn't on the list
| stop processing: connection "private-or-clear#7.0.0.0/8" (in discard_connection() at connections.c:249)
| start processing: connection "private-or-clear#192.0.2.0/24" (in delete_connection() at connections.c:189)
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| shunt_eroute() called for connection 'private-or-clear#192.0.2.0/24' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "private-or-clear#192.0.2.0/24" is 0x1fdfdf
| netlink_raw_eroute: SPI_PASS
| priority calculation of connection "private-or-clear#192.0.2.0/24" is 0x1fdfdf
| netlink_raw_eroute: SPI_PASS
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.0.2.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#192.0.2.0/24" unrouted: NULL
| running updown command "ipsec _updown" for verb unroute 
| command executing unroute-host
| executing unroute-host: PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.0.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16428' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONF
| popen cmd is 1091 chars long
| cmd(   0):PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear:
| cmd(  80):#192.0.2.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192:
| cmd( 160):.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT:
| cmd( 240):_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUT:
| cmd( 320):O_MY_PROTOCOL='0' PLUTO_SA_REQID='16428' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.:
| cmd( 400):0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NE:
| cmd( 480):T='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_P:
| cmd( 560):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_C:
| cmd( 640):ONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALL:
| cmd( 720):OW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' :
| cmd( 800):PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_D:
| cmd( 880):NS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' P:
| cmd( 960):LUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SH:
| cmd(1040):ARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.0.2.0/24": unroute-host output: Error: Peer netns reference is invalid.
| flush revival: connection 'private-or-clear#192.0.2.0/24' wasn't on the list
| stop processing: connection "private-or-clear#192.0.2.0/24" (in discard_connection() at connections.c:249)
| start processing: connection "private-or-clear#192.1.3.0/24" (in delete_connection() at connections.c:189)
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| shunt_eroute() called for connection 'private-or-clear#192.1.3.0/24' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "private-or-clear#192.1.3.0/24" is 0x1fdfdf
| netlink_raw_eroute: SPI_PASS
| priority calculation of connection "private-or-clear#192.1.3.0/24" is 0x1fdfdf
| netlink_raw_eroute: SPI_PASS
| FOR_EACH_CONNECTION_... in route_owner
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn private-or-clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn private-or-clear#192.1.3.0/24 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "private-or-clear#192.1.3.0/24" unrouted: NULL
| running updown command "ipsec _updown" for verb unroute 
| command executing unroute-host
| executing unroute-host: PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear#192.1.3.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16424' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.3.0/24' PLUTO_PEER_CLIENT_NET='192.1.3.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONF
| popen cmd is 1091 chars long
| cmd(   0):PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='private-or-clear:
| cmd(  80):#192.1.3.0/24' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192:
| cmd( 160):.1.3.209' PLUTO_MY_ID='ID_NULL' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT:
| cmd( 240):_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUT:
| cmd( 320):O_MY_PROTOCOL='0' PLUTO_SA_REQID='16424' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.:
| cmd( 400):0' PLUTO_PEER_ID='ID_NULL' PLUTO_PEER_CLIENT='192.1.3.0/24' PLUTO_PEER_CLIENT_NE:
| cmd( 480):T='192.1.3.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_P:
| cmd( 560):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_C:
| cmd( 640):ONN_POLICY='AUTHNULL+ENCRYPT+PFS+NEGO_PASS+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALL:
| cmd( 720):OW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO+failurePASS' PLUTO_CONN_KIND='CK_TEMPLATE' :
| cmd( 800):PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_D:
| cmd( 880):NS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' P:
| cmd( 960):LUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SH:
| cmd(1040):ARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
"private-or-clear#192.1.3.0/24": unroute-host output: Error: Peer netns reference is invalid.
| flush revival: connection 'private-or-clear#192.1.3.0/24' wasn't on the list
| stop processing: connection "private-or-clear#192.1.3.0/24" (in discard_connection() at connections.c:249)
| start processing: connection "private-or-clear" (in delete_connection() at connections.c:189)
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| flush revival: connection 'private-or-clear' wasn't on the list
| stop processing: connection "private-or-clear" (in discard_connection() at connections.c:249)
| start processing: connection "clear#192.1.2.253/32" 0.0.0.0 (in delete_connection() at connections.c:189)
"clear#192.1.2.253/32" 0.0.0.0: deleting connection "clear#192.1.2.253/32" 0.0.0.0 instance with peer 0.0.0.0 {isakmp=#0/ipsec=#0}
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| shunt_eroute() called for connection 'clear#192.1.2.253/32' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "clear#192.1.2.253/32" is 0x17dfdf
| priority calculation of connection "clear#192.1.2.253/32" is 0x17dfdf
| FOR_EACH_CONNECTION_... in route_owner
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn clear#192.1.2.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "clear#192.1.2.253/32" unrouted: NULL
| running updown command "ipsec _updown" for verb unroute 
| command executing unroute-host
| executing unroute-host: PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.2.253/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16420' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.2.253/32' PLUTO_PEER_CLIENT_NET='192.1.2.253' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 S
| popen cmd is 1022 chars long
| cmd(   0):PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.2.25:
| cmd(  80):3/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209':
| cmd( 160): PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET=:
| cmd( 240):'192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_:
| cmd( 320):PROTOCOL='0' PLUTO_SA_REQID='16420' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PL:
| cmd( 400):UTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.2.253/32' PLUTO_PEER_CLIENT_NET='1:
| cmd( 480):92.1.2.253' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_P:
| cmd( 560):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_C:
| cmd( 640):ONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_G:
| cmd( 720):OING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' P:
| cmd( 800):LUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_S:
| cmd( 880):ERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING=:
| cmd( 960):'no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
| flush revival: connection 'clear#192.1.2.253/32' wasn't on the list
| stop processing: connection "clear#192.1.2.253/32" 0.0.0.0 (in discard_connection() at connections.c:249)
| start processing: connection "clear#192.1.3.253/32" 0.0.0.0 (in delete_connection() at connections.c:189)
"clear#192.1.3.253/32" 0.0.0.0: deleting connection "clear#192.1.3.253/32" 0.0.0.0 instance with peer 0.0.0.0 {isakmp=#0/ipsec=#0}
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| shunt_eroute() called for connection 'clear#192.1.3.253/32' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "clear#192.1.3.253/32" is 0x17dfdf
| priority calculation of connection "clear#192.1.3.253/32" is 0x17dfdf
| FOR_EACH_CONNECTION_... in route_owner
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn clear#192.1.3.253/32 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "clear#192.1.3.253/32" unrouted: NULL
| running updown command "ipsec _updown" for verb unroute 
| command executing unroute-host
| executing unroute-host: PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.3.253/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16416' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.3.253/32' PLUTO_PEER_CLIENT_NET='192.1.3.253' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 S
| popen cmd is 1022 chars long
| cmd(   0):PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.3.25:
| cmd(  80):3/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209':
| cmd( 160): PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET=:
| cmd( 240):'192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_:
| cmd( 320):PROTOCOL='0' PLUTO_SA_REQID='16416' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PL:
| cmd( 400):UTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.3.253/32' PLUTO_PEER_CLIENT_NET='1:
| cmd( 480):92.1.3.253' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_P:
| cmd( 560):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_C:
| cmd( 640):ONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_G:
| cmd( 720):OING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' P:
| cmd( 800):LUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_S:
| cmd( 880):ERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING=:
| cmd( 960):'no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.253/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
| flush revival: connection 'clear#192.1.3.253/32' wasn't on the list
| stop processing: connection "clear#192.1.3.253/32" 0.0.0.0 (in discard_connection() at connections.c:249)
| start processing: connection "clear#192.1.3.254/32" 0.0.0.0 (in delete_connection() at connections.c:189)
"clear#192.1.3.254/32" 0.0.0.0: deleting connection "clear#192.1.3.254/32" 0.0.0.0 instance with peer 0.0.0.0 {isakmp=#0/ipsec=#0}
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| shunt_eroute() called for connection 'clear#192.1.3.254/32' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "clear#192.1.3.254/32" is 0x17dfdf
| priority calculation of connection "clear#192.1.3.254/32" is 0x17dfdf
| FOR_EACH_CONNECTION_... in route_owner
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn clear#192.1.3.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "clear#192.1.3.254/32" unrouted: NULL
| running updown command "ipsec _updown" for verb unroute 
| command executing unroute-host
| executing unroute-host: PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.3.254/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16412' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.3.254/32' PLUTO_PEER_CLIENT_NET='192.1.3.254' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 S
| popen cmd is 1022 chars long
| cmd(   0):PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.3.25:
| cmd(  80):4/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209':
| cmd( 160): PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET=:
| cmd( 240):'192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_:
| cmd( 320):PROTOCOL='0' PLUTO_SA_REQID='16412' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PL:
| cmd( 400):UTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.3.254/32' PLUTO_PEER_CLIENT_NET='1:
| cmd( 480):92.1.3.254' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_P:
| cmd( 560):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_C:
| cmd( 640):ONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_G:
| cmd( 720):OING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' P:
| cmd( 800):LUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_S:
| cmd( 880):ERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING=:
| cmd( 960):'no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.3.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
| flush revival: connection 'clear#192.1.3.254/32' wasn't on the list
| stop processing: connection "clear#192.1.3.254/32" 0.0.0.0 (in discard_connection() at connections.c:249)
| start processing: connection "clear#192.1.2.254/32" 0.0.0.0 (in delete_connection() at connections.c:189)
"clear#192.1.2.254/32" 0.0.0.0: deleting connection "clear#192.1.2.254/32" 0.0.0.0 instance with peer 0.0.0.0 {isakmp=#0/ipsec=#0}
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| shunt_eroute() called for connection 'clear#192.1.2.254/32' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
| netlink_shunt_eroute for proto 0, and source port 0 dest port 0
| priority calculation of connection "clear#192.1.2.254/32" is 0x17dfdf
| priority calculation of connection "clear#192.1.2.254/32" is 0x17dfdf
| FOR_EACH_CONNECTION_... in route_owner
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear mark 0/00000000, 0/00000000
|  conn clear#192.1.2.254/32 mark 0/00000000, 0/00000000 vs
|  conn clear-or-private mark 0/00000000, 0/00000000
| route owner of "clear#192.1.2.254/32" unrouted: NULL
| running updown command "ipsec _updown" for verb unroute 
| command executing unroute-host
| executing unroute-host: PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.2.254/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209' PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET='192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PLUTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.2.254/32' PLUTO_PEER_CLIENT_NET='192.1.2.254' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 S
| popen cmd is 1022 chars long
| cmd(   0):PLUTO_VERB='unroute-host' PLUTO_VERSION='2.0' PLUTO_CONNECTION='clear#192.1.2.25:
| cmd(  80):4/32' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.209':
| cmd( 160): PLUTO_MY_ID='192.1.3.209' PLUTO_MY_CLIENT='192.1.3.209/32' PLUTO_MY_CLIENT_NET=:
| cmd( 240):'192.1.3.209' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_:
| cmd( 320):PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='none' PLUTO_PEER='0.0.0.0' PL:
| cmd( 400):UTO_PEER_ID='(none)' PLUTO_PEER_CLIENT='192.1.2.254/32' PLUTO_PEER_CLIENT_NET='1:
| cmd( 480):92.1.2.254' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_P:
| cmd( 560):EER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_C:
| cmd( 640):ONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_G:
| cmd( 720):OING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' P:
| cmd( 800):LUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_S:
| cmd( 880):ERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING=:
| cmd( 960):'no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1:
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
"clear#192.1.2.254/32" 0.0.0.0: unroute-host output: Error: Peer netns reference is invalid.
| flush revival: connection 'clear#192.1.2.254/32' wasn't on the list
| stop processing: connection "clear#192.1.2.254/32" 0.0.0.0 (in discard_connection() at connections.c:249)
| start processing: connection "clear" (in delete_connection() at connections.c:189)
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| FOR_EACH_CONNECTION_... in conn_by_name
| FOR_EACH_CONNECTION_... in foreach_connection_by_alias
| flush revival: connection 'clear' wasn't on the list
| stop processing: connection "clear" (in discard_connection() at connections.c:249)
| start processing: connection "clear-or-private" (in delete_connection() at connections.c:189)
| Deleting states for connection - including all other IPsec SA's of this IKE SA
| pass 0
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| pass 1
| FOR_EACH_STATE_... in foreach_state_by_connection_func_delete
| free hp@0x5649fe85e388
| flush revival: connection 'clear-or-private' wasn't on the list
| stop processing: connection "clear-or-private" (in discard_connection() at connections.c:249)
| crl fetch request list locked by 'free_crl_fetch'
| crl fetch request list unlocked by 'free_crl_fetch'
shutting down interface lo/lo 127.0.0.1:4500
shutting down interface lo/lo 127.0.0.1:500
shutting down interface eth0/eth0 192.1.3.209:4500
shutting down interface eth0/eth0 192.1.3.209:500
| FOR_EACH_STATE_... in delete_states_dead_interfaces
| libevent_free: release ptr-libevent@0x5649fe852128
| free_event_entry: release EVENT_NULL-pe@0x5649fe85de58
| libevent_free: release ptr-libevent@0x5649fe814228
| free_event_entry: release EVENT_NULL-pe@0x5649fe85df08
| libevent_free: release ptr-libevent@0x5649fe815458
| free_event_entry: release EVENT_NULL-pe@0x5649fe85dfb8
| libevent_free: release ptr-libevent@0x5649fe80ee58
| free_event_entry: release EVENT_NULL-pe@0x5649fe85e068
| FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations
| libevent_free: release ptr-libevent@0x5649fe8521d8
| free_event_entry: release EVENT_NULL-pe@0x5649fe846278
| libevent_free: release ptr-libevent@0x5649fe814178
| free_event_entry: release EVENT_NULL-pe@0x5649fe845dd8
| libevent_free: release ptr-libevent@0x5649fe83e868
| free_event_entry: release EVENT_NULL-pe@0x5649fe840048
| global timer EVENT_REINIT_SECRET uninitialized
| global timer EVENT_SHUNT_SCAN uninitialized
| global timer EVENT_PENDING_DDNS uninitialized
| global timer EVENT_PENDING_PHASE2 uninitialized
| global timer EVENT_CHECK_CRLS uninitialized
| global timer EVENT_REVIVE_CONNS uninitialized
| global timer EVENT_FREE_ROOT_CERTS uninitialized
| global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized
| global timer EVENT_NAT_T_KEEPALIVE uninitialized
| libevent_free: release ptr-libevent@0x5649fe7a15d8
| signal event handler PLUTO_SIGCHLD uninstalled
| libevent_free: release ptr-libevent@0x5649fe85d798
| signal event handler PLUTO_SIGTERM uninstalled
| libevent_free: release ptr-libevent@0x5649fe85d8a8
| signal event handler PLUTO_SIGHUP uninstalled
| libevent_free: release ptr-libevent@0x5649fe85dae8
| signal event handler PLUTO_SIGSYS uninstalled
| releasing event base
| libevent_free: release ptr-libevent@0x5649fe85d9b8
| libevent_free: release ptr-libevent@0x5649fe840698
| libevent_free: release ptr-libevent@0x5649fe840648
| libevent_free: release ptr-libevent@0x5649fe80f258
| libevent_free: release ptr-libevent@0x5649fe840608
| libevent_free: release ptr-libevent@0x5649fe85d4a8
| libevent_free: release ptr-libevent@0x5649fe85d718
| libevent_free: release ptr-libevent@0x5649fe840848
| libevent_free: release ptr-libevent@0x5649fe845a68
| libevent_free: release ptr-libevent@0x5649fe846388
| libevent_free: release ptr-libevent@0x5649fe85e0d8
| libevent_free: release ptr-libevent@0x5649fe85e028
| libevent_free: release ptr-libevent@0x5649fe85df78
| libevent_free: release ptr-libevent@0x5649fe85dec8
| libevent_free: release ptr-libevent@0x5649fe7a0e78
| libevent_free: release ptr-libevent@0x5649fe85d868
| libevent_free: release ptr-libevent@0x5649fe85d758
| libevent_free: release ptr-libevent@0x5649fe85d618
| libevent_free: release ptr-libevent@0x5649fe85d978
| libevent_free: release ptr-libevent@0x5649fe85d4e8
| libevent_free: release ptr-libevent@0x5649fe8103d8
| libevent_free: release ptr-libevent@0x5649fe810358
| libevent_free: release ptr-libevent@0x5649fe7a11e8
| releasing global libevent data
| libevent_free: release ptr-libevent@0x5649fe80ea88
| libevent_free: release ptr-libevent@0x5649fe8104d8
| libevent_free: release ptr-libevent@0x5649fe810458
leak: group instance name, item size: 30
leak: cloned from groupname, item size: 17
leak: group instance name, item size: 27
leak: cloned from groupname, item size: 17
leak: group instance name, item size: 30
leak: cloned from groupname, item size: 17
leak: group instance name, item size: 30
leak: cloned from groupname, item size: 17
leak: group instance name, item size: 21
leak: cloned from groupname, item size: 6
leak: group instance name, item size: 21
leak: cloned from groupname, item size: 6
leak: group instance name, item size: 21
leak: cloned from groupname, item size: 6
leak: group instance name, item size: 21
leak: cloned from groupname, item size: 6
leak: policy group path, item size: 50
leak detective found 17 leaks, total size 343