Aug 26 18:35:56.204456: FIPS Product: YES Aug 26 18:35:56.204601: FIPS Kernel: NO Aug 26 18:35:56.204606: FIPS Mode: NO Aug 26 18:35:56.204609: NSS DB directory: sql:/etc/ipsec.d Aug 26 18:35:56.204778: Initializing NSS Aug 26 18:35:56.204787: Opening NSS database "sql:/etc/ipsec.d" read-only Aug 26 18:35:56.246833: NSS initialized Aug 26 18:35:56.246846: NSS crypto library initialized Aug 26 18:35:56.246849: FIPS HMAC integrity support [enabled] Aug 26 18:35:56.246852: FIPS mode disabled for pluto daemon Aug 26 18:35:56.278869: FIPS HMAC integrity verification self-test FAILED Aug 26 18:35:56.278959: libcap-ng support [enabled] Aug 26 18:35:56.278967: Linux audit support [enabled] Aug 26 18:35:56.279370: Linux audit activated Aug 26 18:35:56.279382: Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:25173 Aug 26 18:35:56.279385: core dump dir: /var/tmp Aug 26 18:35:56.279388: secrets file: /etc/ipsec.secrets Aug 26 18:35:56.279391: leak-detective enabled Aug 26 18:35:56.279393: NSS crypto [enabled] Aug 26 18:35:56.279395: XAUTH PAM support [enabled] Aug 26 18:35:56.279470: | libevent is using pluto's memory allocator Aug 26 18:35:56.279479: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Aug 26 18:35:56.279496: | libevent_malloc: new ptr-libevent@0x55b20a59ec28 size 40 Aug 26 18:35:56.279505: | libevent_malloc: new ptr-libevent@0x55b20a5a0678 size 40 Aug 26 18:35:56.279509: | libevent_malloc: new ptr-libevent@0x55b20a5a05f8 size 40 Aug 26 18:35:56.279512: | creating event base Aug 26 18:35:56.279517: | libevent_malloc: new ptr-libevent@0x55b20a59f3f8 size 56 Aug 26 18:35:56.279522: | libevent_malloc: new ptr-libevent@0x55b20a528d18 size 664 Aug 26 18:35:56.279534: | libevent_malloc: new ptr-libevent@0x55b20a5d07c8 size 24 Aug 26 18:35:56.279538: | libevent_malloc: new ptr-libevent@0x55b20a5d0818 size 384 Aug 26 18:35:56.279548: | libevent_malloc: new ptr-libevent@0x55b20a5d0788 size 16 Aug 26 18:35:56.279552: | libevent_malloc: new ptr-libevent@0x55b20a5a0578 size 40 Aug 26 18:35:56.279555: | libevent_malloc: new ptr-libevent@0x55b20a5a04f8 size 48 Aug 26 18:35:56.279561: | libevent_realloc: new ptr-libevent@0x55b20a5289a8 size 256 Aug 26 18:35:56.279564: | libevent_malloc: new ptr-libevent@0x55b20a5d09c8 size 16 Aug 26 18:35:56.279570: | libevent_free: release ptr-libevent@0x55b20a59f3f8 Aug 26 18:35:56.279574: | libevent initialized Aug 26 18:35:56.279578: | libevent_realloc: new ptr-libevent@0x55b20a59f3f8 size 64 Aug 26 18:35:56.279582: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Aug 26 18:35:56.279598: | init_nat_traversal() initialized with keep_alive=0s Aug 26 18:35:56.279601: NAT-Traversal support [enabled] Aug 26 18:35:56.279604: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Aug 26 18:35:56.279611: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Aug 26 18:35:56.279619: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Aug 26 18:35:56.279652: | global one-shot timer EVENT_REVIVE_CONNS initialized Aug 26 18:35:56.279657: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Aug 26 18:35:56.279661: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Aug 26 18:35:56.279713: Encryption algorithms: Aug 26 18:35:56.279725: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Aug 26 18:35:56.279730: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Aug 26 18:35:56.279735: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Aug 26 18:35:56.279740: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Aug 26 18:35:56.279744: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Aug 26 18:35:56.279754: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Aug 26 18:35:56.279760: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Aug 26 18:35:56.279765: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Aug 26 18:35:56.279768: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Aug 26 18:35:56.279773: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Aug 26 18:35:56.279776: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Aug 26 18:35:56.279780: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Aug 26 18:35:56.279784: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Aug 26 18:35:56.279789: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Aug 26 18:35:56.279793: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Aug 26 18:35:56.279796: NULL IKEv1: ESP IKEv2: ESP [] Aug 26 18:35:56.279799: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Aug 26 18:35:56.279807: Hash algorithms: Aug 26 18:35:56.279810: MD5 IKEv1: IKE IKEv2: Aug 26 18:35:56.279814: SHA1 IKEv1: IKE IKEv2: FIPS sha Aug 26 18:35:56.279818: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Aug 26 18:35:56.279821: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Aug 26 18:35:56.279824: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Aug 26 18:35:56.279838: PRF algorithms: Aug 26 18:35:56.279843: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Aug 26 18:35:56.279847: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Aug 26 18:35:56.279851: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Aug 26 18:35:56.279854: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Aug 26 18:35:56.279858: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Aug 26 18:35:56.279861: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Aug 26 18:35:56.279889: Integrity algorithms: Aug 26 18:35:56.279894: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Aug 26 18:35:56.279900: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Aug 26 18:35:56.279904: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Aug 26 18:35:56.279907: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Aug 26 18:35:56.279909: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Aug 26 18:35:56.279911: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Aug 26 18:35:56.279914: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Aug 26 18:35:56.279916: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Aug 26 18:35:56.279918: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Aug 26 18:35:56.279926: DH algorithms: Aug 26 18:35:56.279928: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Aug 26 18:35:56.279930: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Aug 26 18:35:56.279932: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Aug 26 18:35:56.279936: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Aug 26 18:35:56.279939: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Aug 26 18:35:56.279941: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Aug 26 18:35:56.279942: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Aug 26 18:35:56.279945: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Aug 26 18:35:56.279947: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Aug 26 18:35:56.279949: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Aug 26 18:35:56.279951: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Aug 26 18:35:56.279952: testing CAMELLIA_CBC: Aug 26 18:35:56.279955: Camellia: 16 bytes with 128-bit key Aug 26 18:35:56.280051: Camellia: 16 bytes with 128-bit key Aug 26 18:35:56.280080: Camellia: 16 bytes with 256-bit key Aug 26 18:35:56.280111: Camellia: 16 bytes with 256-bit key Aug 26 18:35:56.280141: testing AES_GCM_16: Aug 26 18:35:56.280146: empty string Aug 26 18:35:56.280175: one block Aug 26 18:35:56.280203: two blocks Aug 26 18:35:56.280230: two blocks with associated data Aug 26 18:35:56.280254: testing AES_CTR: Aug 26 18:35:56.280258: Encrypting 16 octets using AES-CTR with 128-bit key Aug 26 18:35:56.280285: Encrypting 32 octets using AES-CTR with 128-bit key Aug 26 18:35:56.280337: Encrypting 36 octets using AES-CTR with 128-bit key Aug 26 18:35:56.280370: Encrypting 16 octets using AES-CTR with 192-bit key Aug 26 18:35:56.280398: Encrypting 32 octets using AES-CTR with 192-bit key Aug 26 18:35:56.280422: Encrypting 36 octets using AES-CTR with 192-bit key Aug 26 18:35:56.280441: Encrypting 16 octets using AES-CTR with 256-bit key Aug 26 18:35:56.280458: Encrypting 32 octets using AES-CTR with 256-bit key Aug 26 18:35:56.280474: Encrypting 36 octets using AES-CTR with 256-bit key Aug 26 18:35:56.280492: testing AES_CBC: Aug 26 18:35:56.280494: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Aug 26 18:35:56.280520: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Aug 26 18:35:56.280542: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Aug 26 18:35:56.280560: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Aug 26 18:35:56.280581: testing AES_XCBC: Aug 26 18:35:56.280583: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Aug 26 18:35:56.280692: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Aug 26 18:35:56.280805: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Aug 26 18:35:56.280918: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Aug 26 18:35:56.280998: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Aug 26 18:35:56.281099: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Aug 26 18:35:56.281182: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Aug 26 18:35:56.281460: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Aug 26 18:35:56.281574: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Aug 26 18:35:56.281686: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Aug 26 18:35:56.281882: testing HMAC_MD5: Aug 26 18:35:56.281887: RFC 2104: MD5_HMAC test 1 Aug 26 18:35:56.281999: RFC 2104: MD5_HMAC test 2 Aug 26 18:35:56.282093: RFC 2104: MD5_HMAC test 3 Aug 26 18:35:56.282218: 8 CPU cores online Aug 26 18:35:56.282221: starting up 7 crypto helpers Aug 26 18:35:56.282252: started thread for crypto helper 0 Aug 26 18:35:56.282257: | starting up helper thread 0 Aug 26 18:35:56.282273: started thread for crypto helper 1 Aug 26 18:35:56.282274: | status value returned by setting the priority of this thread (crypto helper 0) 22 Aug 26 18:35:56.282282: | crypto helper 0 waiting (nothing to do) Aug 26 18:35:56.282300: started thread for crypto helper 2 Aug 26 18:35:56.282307: | starting up helper thread 2 Aug 26 18:35:56.282329: | status value returned by setting the priority of this thread (crypto helper 2) 22 Aug 26 18:35:56.282333: | crypto helper 2 waiting (nothing to do) Aug 26 18:35:56.282354: started thread for crypto helper 3 Aug 26 18:35:56.282355: | starting up helper thread 3 Aug 26 18:35:56.282363: | status value returned by setting the priority of this thread (crypto helper 3) 22 Aug 26 18:35:56.282366: | crypto helper 3 waiting (nothing to do) Aug 26 18:35:56.282374: started thread for crypto helper 4 Aug 26 18:35:56.282378: | starting up helper thread 4 Aug 26 18:35:56.282387: | status value returned by setting the priority of this thread (crypto helper 4) 22 Aug 26 18:35:56.282388: started thread for crypto helper 5 Aug 26 18:35:56.282391: | starting up helper thread 5 Aug 26 18:35:56.282390: | crypto helper 4 waiting (nothing to do) Aug 26 18:35:56.282400: | status value returned by setting the priority of this thread (crypto helper 5) 22 Aug 26 18:35:56.282408: started thread for crypto helper 6 Aug 26 18:35:56.282413: | checking IKEv1 state table Aug 26 18:35:56.282411: | crypto helper 5 waiting (nothing to do) Aug 26 18:35:56.282410: | starting up helper thread 6 Aug 26 18:35:56.282423: | MAIN_R0: category: half-open IKE SA flags: 0: Aug 26 18:35:56.282428: | status value returned by setting the priority of this thread (crypto helper 6) 22 Aug 26 18:35:56.282437: | crypto helper 6 waiting (nothing to do) Aug 26 18:35:56.282432: | -> MAIN_R1 EVENT_SO_DISCARD Aug 26 18:35:56.282445: | MAIN_I1: category: half-open IKE SA flags: 0: Aug 26 18:35:56.282448: | -> MAIN_I2 EVENT_RETRANSMIT Aug 26 18:35:56.282450: | MAIN_R1: category: open IKE SA flags: 200: Aug 26 18:35:56.282451: | -> MAIN_R2 EVENT_RETRANSMIT Aug 26 18:35:56.282453: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:35:56.282455: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:35:56.282456: | MAIN_I2: category: open IKE SA flags: 0: Aug 26 18:35:56.282458: | -> MAIN_I3 EVENT_RETRANSMIT Aug 26 18:35:56.282460: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:35:56.282461: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 18:35:56.282463: | MAIN_R2: category: open IKE SA flags: 0: Aug 26 18:35:56.282465: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:35:56.282466: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:35:56.282468: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 18:35:56.282469: | MAIN_I3: category: open IKE SA flags: 0: Aug 26 18:35:56.282471: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:35:56.282472: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:35:56.282474: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 18:35:56.282476: | MAIN_R3: category: established IKE SA flags: 200: Aug 26 18:35:56.282477: | -> UNDEFINED EVENT_NULL Aug 26 18:35:56.282479: | MAIN_I4: category: established IKE SA flags: 0: Aug 26 18:35:56.282481: | -> UNDEFINED EVENT_NULL Aug 26 18:35:56.282483: | AGGR_R0: category: half-open IKE SA flags: 0: Aug 26 18:35:56.282484: | -> AGGR_R1 EVENT_SO_DISCARD Aug 26 18:35:56.282486: | AGGR_I1: category: half-open IKE SA flags: 0: Aug 26 18:35:56.282488: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 18:35:56.282489: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 18:35:56.282491: | AGGR_R1: category: open IKE SA flags: 200: Aug 26 18:35:56.282492: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 18:35:56.282494: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 18:35:56.282496: | AGGR_I2: category: established IKE SA flags: 200: Aug 26 18:35:56.282497: | -> UNDEFINED EVENT_NULL Aug 26 18:35:56.282499: | AGGR_R2: category: established IKE SA flags: 0: Aug 26 18:35:56.282501: | -> UNDEFINED EVENT_NULL Aug 26 18:35:56.282502: | QUICK_R0: category: established CHILD SA flags: 0: Aug 26 18:35:56.282504: | -> QUICK_R1 EVENT_RETRANSMIT Aug 26 18:35:56.282506: | QUICK_I1: category: established CHILD SA flags: 0: Aug 26 18:35:56.282507: | -> QUICK_I2 EVENT_SA_REPLACE Aug 26 18:35:56.282509: | QUICK_R1: category: established CHILD SA flags: 0: Aug 26 18:35:56.282514: | -> QUICK_R2 EVENT_SA_REPLACE Aug 26 18:35:56.282516: | QUICK_I2: category: established CHILD SA flags: 200: Aug 26 18:35:56.282517: | -> UNDEFINED EVENT_NULL Aug 26 18:35:56.282519: | QUICK_R2: category: established CHILD SA flags: 0: Aug 26 18:35:56.282521: | -> UNDEFINED EVENT_NULL Aug 26 18:35:56.282522: | INFO: category: informational flags: 0: Aug 26 18:35:56.282524: | -> UNDEFINED EVENT_NULL Aug 26 18:35:56.282526: | INFO_PROTECTED: category: informational flags: 0: Aug 26 18:35:56.282527: | -> UNDEFINED EVENT_NULL Aug 26 18:35:56.282529: | XAUTH_R0: category: established IKE SA flags: 0: Aug 26 18:35:56.282531: | -> XAUTH_R1 EVENT_NULL Aug 26 18:35:56.282533: | XAUTH_R1: category: established IKE SA flags: 0: Aug 26 18:35:56.282534: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 18:35:56.282536: | MODE_CFG_R0: category: informational flags: 0: Aug 26 18:35:56.282538: | -> MODE_CFG_R1 EVENT_SA_REPLACE Aug 26 18:35:56.282539: | MODE_CFG_R1: category: established IKE SA flags: 0: Aug 26 18:35:56.282541: | -> MODE_CFG_R2 EVENT_SA_REPLACE Aug 26 18:35:56.282543: | MODE_CFG_R2: category: established IKE SA flags: 0: Aug 26 18:35:56.282544: | -> UNDEFINED EVENT_NULL Aug 26 18:35:56.282546: | MODE_CFG_I1: category: established IKE SA flags: 0: Aug 26 18:35:56.282548: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 18:35:56.282550: | XAUTH_I0: category: established IKE SA flags: 0: Aug 26 18:35:56.282551: | -> XAUTH_I1 EVENT_RETRANSMIT Aug 26 18:35:56.282553: | XAUTH_I1: category: established IKE SA flags: 0: Aug 26 18:35:56.282554: | -> MAIN_I4 EVENT_RETRANSMIT Aug 26 18:35:56.282559: | checking IKEv2 state table Aug 26 18:35:56.282564: | PARENT_I0: category: ignore flags: 0: Aug 26 18:35:56.282566: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Aug 26 18:35:56.282568: | PARENT_I1: category: half-open IKE SA flags: 0: Aug 26 18:35:56.282570: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Aug 26 18:35:56.282572: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Aug 26 18:35:56.282574: | PARENT_I2: category: open IKE SA flags: 0: Aug 26 18:35:56.282576: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Aug 26 18:35:56.282578: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Aug 26 18:35:56.282579: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Aug 26 18:35:56.282581: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Aug 26 18:35:56.282583: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Aug 26 18:35:56.282585: | PARENT_I3: category: established IKE SA flags: 0: Aug 26 18:35:56.282587: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Aug 26 18:35:56.282588: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Aug 26 18:35:56.282590: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Aug 26 18:35:56.282592: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Aug 26 18:35:56.282594: | PARENT_R0: category: half-open IKE SA flags: 0: Aug 26 18:35:56.282595: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Aug 26 18:35:56.282597: | PARENT_R1: category: half-open IKE SA flags: 0: Aug 26 18:35:56.282599: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Aug 26 18:35:56.282601: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Aug 26 18:35:56.282603: | PARENT_R2: category: established IKE SA flags: 0: Aug 26 18:35:56.282605: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Aug 26 18:35:56.282606: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Aug 26 18:35:56.282608: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Aug 26 18:35:56.282611: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Aug 26 18:35:56.282613: | V2_CREATE_I0: category: established IKE SA flags: 0: Aug 26 18:35:56.282615: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Aug 26 18:35:56.282617: | V2_CREATE_I: category: established IKE SA flags: 0: Aug 26 18:35:56.282619: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Aug 26 18:35:56.282621: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Aug 26 18:35:56.282623: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Aug 26 18:35:56.282625: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Aug 26 18:35:56.282626: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Aug 26 18:35:56.282628: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Aug 26 18:35:56.282630: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Aug 26 18:35:56.282632: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Aug 26 18:35:56.282634: | V2_CREATE_R: category: established IKE SA flags: 0: Aug 26 18:35:56.282636: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Aug 26 18:35:56.282638: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Aug 26 18:35:56.282639: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Aug 26 18:35:56.282641: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Aug 26 18:35:56.282643: | V2_IPSEC_I: category: established CHILD SA flags: 0: Aug 26 18:35:56.282645: | V2_IPSEC_R: category: established CHILD SA flags: 0: Aug 26 18:35:56.282647: | IKESA_DEL: category: established IKE SA flags: 0: Aug 26 18:35:56.282649: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Aug 26 18:35:56.282651: | CHILDSA_DEL: category: informational flags: 0: Aug 26 18:35:56.282662: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 Aug 26 18:35:56.282952: | Hard-wiring algorithms Aug 26 18:35:56.282955: | adding AES_CCM_16 to kernel algorithm db Aug 26 18:35:56.282958: | adding AES_CCM_12 to kernel algorithm db Aug 26 18:35:56.282960: | adding AES_CCM_8 to kernel algorithm db Aug 26 18:35:56.282962: | adding 3DES_CBC to kernel algorithm db Aug 26 18:35:56.282963: | adding CAMELLIA_CBC to kernel algorithm db Aug 26 18:35:56.282965: | adding AES_GCM_16 to kernel algorithm db Aug 26 18:35:56.282967: | adding AES_GCM_12 to kernel algorithm db Aug 26 18:35:56.282968: | adding AES_GCM_8 to kernel algorithm db Aug 26 18:35:56.282970: | adding AES_CTR to kernel algorithm db Aug 26 18:35:56.282972: | adding AES_CBC to kernel algorithm db Aug 26 18:35:56.282974: | adding SERPENT_CBC to kernel algorithm db Aug 26 18:35:56.282975: | adding TWOFISH_CBC to kernel algorithm db Aug 26 18:35:56.282977: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Aug 26 18:35:56.282979: | adding NULL to kernel algorithm db Aug 26 18:35:56.282981: | adding CHACHA20_POLY1305 to kernel algorithm db Aug 26 18:35:56.282983: | adding HMAC_MD5_96 to kernel algorithm db Aug 26 18:35:56.282984: | adding HMAC_SHA1_96 to kernel algorithm db Aug 26 18:35:56.282986: | adding HMAC_SHA2_512_256 to kernel algorithm db Aug 26 18:35:56.282988: | adding HMAC_SHA2_384_192 to kernel algorithm db Aug 26 18:35:56.282989: | adding HMAC_SHA2_256_128 to kernel algorithm db Aug 26 18:35:56.282991: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Aug 26 18:35:56.282993: | adding AES_XCBC_96 to kernel algorithm db Aug 26 18:35:56.282994: | adding AES_CMAC_96 to kernel algorithm db Aug 26 18:35:56.282996: | adding NONE to kernel algorithm db Aug 26 18:35:56.283011: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Aug 26 18:35:56.283017: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Aug 26 18:35:56.283018: | setup kernel fd callback Aug 26 18:35:56.283023: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x55b20a5d01e8 Aug 26 18:35:56.283026: | libevent_malloc: new ptr-libevent@0x55b20a5ce9f8 size 128 Aug 26 18:35:56.283028: | libevent_malloc: new ptr-libevent@0x55b20a5d5be8 size 16 Aug 26 18:35:56.283033: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x55b20a5d5f58 Aug 26 18:35:56.283035: | libevent_malloc: new ptr-libevent@0x55b20a5a4318 size 128 Aug 26 18:35:56.283037: | libevent_malloc: new ptr-libevent@0x55b20a5d6508 size 16 Aug 26 18:35:56.283216: | global one-shot timer EVENT_CHECK_CRLS initialized Aug 26 18:35:56.283225: selinux support is enabled. Aug 26 18:35:56.283704: | unbound context created - setting debug level to 5 Aug 26 18:35:56.283728: | /etc/hosts lookups activated Aug 26 18:35:56.283741: | /etc/resolv.conf usage activated Aug 26 18:35:56.283777: | outgoing-port-avoid set 0-65535 Aug 26 18:35:56.283795: | outgoing-port-permit set 32768-60999 Aug 26 18:35:56.283797: | Loading dnssec root key from:/var/lib/unbound/root.key Aug 26 18:35:56.283799: | No additional dnssec trust anchors defined via dnssec-trusted= option Aug 26 18:35:56.283802: | Setting up events, loop start Aug 26 18:35:56.283804: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x55b20a5d63f8 Aug 26 18:35:56.283806: | libevent_malloc: new ptr-libevent@0x55b20a5e1ee8 size 128 Aug 26 18:35:56.283808: | libevent_malloc: new ptr-libevent@0x55b20a5ed1b8 size 16 Aug 26 18:35:56.283813: | libevent_realloc: new ptr-libevent@0x55b20a5ed1f8 size 256 Aug 26 18:35:56.283815: | libevent_malloc: new ptr-libevent@0x55b20a5ed328 size 8 Aug 26 18:35:56.283817: | libevent_realloc: new ptr-libevent@0x55b20a5ed368 size 144 Aug 26 18:35:56.283819: | libevent_malloc: new ptr-libevent@0x55b20a529108 size 152 Aug 26 18:35:56.283822: | libevent_malloc: new ptr-libevent@0x55b20a5ed428 size 16 Aug 26 18:35:56.283825: | signal event handler PLUTO_SIGCHLD installed Aug 26 18:35:56.283827: | libevent_malloc: new ptr-libevent@0x55b20a5ed468 size 8 Aug 26 18:35:56.283829: | libevent_malloc: new ptr-libevent@0x55b20a5348a8 size 152 Aug 26 18:35:56.283831: | signal event handler PLUTO_SIGTERM installed Aug 26 18:35:56.283833: | libevent_malloc: new ptr-libevent@0x55b20a5ed4a8 size 8 Aug 26 18:35:56.283836: | libevent_malloc: new ptr-libevent@0x55b20a52c6d8 size 152 Aug 26 18:35:56.283838: | signal event handler PLUTO_SIGHUP installed Aug 26 18:35:56.283840: | libevent_malloc: new ptr-libevent@0x55b20a5ed4e8 size 8 Aug 26 18:35:56.283841: | libevent_realloc: release ptr-libevent@0x55b20a5ed368 Aug 26 18:35:56.283843: | libevent_realloc: new ptr-libevent@0x55b20a5ed528 size 256 Aug 26 18:35:56.283845: | libevent_malloc: new ptr-libevent@0x55b20a5ed658 size 152 Aug 26 18:35:56.283847: | signal event handler PLUTO_SIGSYS installed Aug 26 18:35:56.284108: | created addconn helper (pid:25247) using fork+execve Aug 26 18:35:56.284120: | forked child 25247 Aug 26 18:35:56.284155: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:35:56.284169: listening for IKE messages Aug 26 18:35:56.284229: | Inspecting interface lo Aug 26 18:35:56.284236: | found lo with address 127.0.0.1 Aug 26 18:35:56.284238: | Inspecting interface eth0 Aug 26 18:35:56.284241: | found eth0 with address 192.1.3.209 Aug 26 18:35:56.284332: | starting up helper thread 1 Aug 26 18:35:56.284346: | status value returned by setting the priority of this thread (crypto helper 1) 22 Aug 26 18:35:56.284353: | crypto helper 1 waiting (nothing to do) Aug 26 18:35:56.284363: Kernel supports NIC esp-hw-offload Aug 26 18:35:56.284387: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.209:500 Aug 26 18:35:56.284449: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 18:35:56.284456: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 18:35:56.284461: adding interface eth0/eth0 192.1.3.209:4500 Aug 26 18:35:56.284496: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Aug 26 18:35:56.284533: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 18:35:56.284539: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 18:35:56.284543: adding interface lo/lo 127.0.0.1:4500 Aug 26 18:35:56.284616: | no interfaces to sort Aug 26 18:35:56.284622: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 18:35:56.284631: | add_fd_read_event_handler: new ethX-pe@0x55b20a5ed9c8 Aug 26 18:35:56.284635: | libevent_malloc: new ptr-libevent@0x55b20a5e1e38 size 128 Aug 26 18:35:56.284639: | libevent_malloc: new ptr-libevent@0x55b20a5eda38 size 16 Aug 26 18:35:56.284646: | setup callback for interface lo 127.0.0.1:4500 fd 20 Aug 26 18:35:56.284649: | add_fd_read_event_handler: new ethX-pe@0x55b20a5eda78 Aug 26 18:35:56.284657: | libevent_malloc: new ptr-libevent@0x55b20a5a43c8 size 128 Aug 26 18:35:56.284661: | libevent_malloc: new ptr-libevent@0x55b20a5edae8 size 16 Aug 26 18:35:56.284666: | setup callback for interface lo 127.0.0.1:500 fd 19 Aug 26 18:35:56.284669: | add_fd_read_event_handler: new ethX-pe@0x55b20a5edb28 Aug 26 18:35:56.284675: | libevent_malloc: new ptr-libevent@0x55b20a5a55f8 size 128 Aug 26 18:35:56.284678: | libevent_malloc: new ptr-libevent@0x55b20a5edb98 size 16 Aug 26 18:35:56.284683: | setup callback for interface eth0 192.1.3.209:4500 fd 18 Aug 26 18:35:56.284686: | add_fd_read_event_handler: new ethX-pe@0x55b20a5edbd8 Aug 26 18:35:56.284694: | libevent_malloc: new ptr-libevent@0x55b20a59eff8 size 128 Aug 26 18:35:56.284697: | libevent_malloc: new ptr-libevent@0x55b20a5edc48 size 16 Aug 26 18:35:56.284702: | setup callback for interface eth0 192.1.3.209:500 fd 17 Aug 26 18:35:56.284707: | certs and keys locked by 'free_preshared_secrets' Aug 26 18:35:56.284710: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 18:35:56.284740: loading secrets from "/etc/ipsec.secrets" Aug 26 18:35:56.284769: | saving Modulus Aug 26 18:35:56.284777: | saving PublicExponent Aug 26 18:35:56.284813: | computed rsa CKAID 1a 15 cc e8 92 73 43 9c 2b f4 20 2a c1 06 6e f2 Aug 26 18:35:56.284817: | computed rsa CKAID 59 b0 ef 45 Aug 26 18:35:56.284821: loaded private key for keyid: PKK_RSA:AQPHFfpyJ Aug 26 18:35:56.284829: | certs and keys locked by 'process_secret' Aug 26 18:35:56.284832: | certs and keys unlocked by 'process_secret' Aug 26 18:35:56.284843: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:35:56.284852: | spent 0.661 milliseconds in whack Aug 26 18:35:56.311377: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:35:56.311403: listening for IKE messages Aug 26 18:35:56.329736: | Inspecting interface lo Aug 26 18:35:56.329757: | found lo with address 127.0.0.1 Aug 26 18:35:56.329761: | Inspecting interface eth0 Aug 26 18:35:56.329766: | found eth0 with address 192.1.3.209 Aug 26 18:35:56.329911: | no interfaces to sort Aug 26 18:35:56.329925: | libevent_free: release ptr-libevent@0x55b20a5e1e38 Aug 26 18:35:56.329929: | free_event_entry: release EVENT_NULL-pe@0x55b20a5ed9c8 Aug 26 18:35:56.329932: | add_fd_read_event_handler: new ethX-pe@0x55b20a5ed9c8 Aug 26 18:35:56.329936: | libevent_malloc: new ptr-libevent@0x55b20a5e1e38 size 128 Aug 26 18:35:56.329945: | setup callback for interface lo 127.0.0.1:4500 fd 20 Aug 26 18:35:56.329949: | libevent_free: release ptr-libevent@0x55b20a5a43c8 Aug 26 18:35:56.329952: | free_event_entry: release EVENT_NULL-pe@0x55b20a5eda78 Aug 26 18:35:56.329955: | add_fd_read_event_handler: new ethX-pe@0x55b20a5eda78 Aug 26 18:35:56.329958: | libevent_malloc: new ptr-libevent@0x55b20a5a43c8 size 128 Aug 26 18:35:56.329964: | setup callback for interface lo 127.0.0.1:500 fd 19 Aug 26 18:35:56.329968: | libevent_free: release ptr-libevent@0x55b20a5a55f8 Aug 26 18:35:56.329971: | free_event_entry: release EVENT_NULL-pe@0x55b20a5edb28 Aug 26 18:35:56.329974: | add_fd_read_event_handler: new ethX-pe@0x55b20a5edb28 Aug 26 18:35:56.329977: | libevent_malloc: new ptr-libevent@0x55b20a5a55f8 size 128 Aug 26 18:35:56.329988: | setup callback for interface eth0 192.1.3.209:4500 fd 18 Aug 26 18:35:56.329993: | libevent_free: release ptr-libevent@0x55b20a59eff8 Aug 26 18:35:56.329996: | free_event_entry: release EVENT_NULL-pe@0x55b20a5edbd8 Aug 26 18:35:56.329999: | add_fd_read_event_handler: new ethX-pe@0x55b20a5edbd8 Aug 26 18:35:56.330002: | libevent_malloc: new ptr-libevent@0x55b20a59eff8 size 128 Aug 26 18:35:56.330007: | setup callback for interface eth0 192.1.3.209:500 fd 17 Aug 26 18:35:56.330011: | certs and keys locked by 'free_preshared_secrets' Aug 26 18:35:56.330032: forgetting secrets Aug 26 18:35:56.330047: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 18:35:56.330064: loading secrets from "/etc/ipsec.secrets" Aug 26 18:35:56.330080: | saving Modulus Aug 26 18:35:56.330083: | saving PublicExponent Aug 26 18:35:56.330108: | computed rsa CKAID 1a 15 cc e8 92 73 43 9c 2b f4 20 2a c1 06 6e f2 Aug 26 18:35:56.330112: | computed rsa CKAID 59 b0 ef 45 Aug 26 18:35:56.330115: loaded private key for keyid: PKK_RSA:AQPHFfpyJ Aug 26 18:35:56.330120: | certs and keys locked by 'process_secret' Aug 26 18:35:56.330123: | certs and keys unlocked by 'process_secret' Aug 26 18:35:56.330133: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:35:56.330142: | spent 0.474 milliseconds in whack Aug 26 18:35:56.330766: | processing signal PLUTO_SIGCHLD Aug 26 18:35:56.330796: | waitpid returned pid 25247 (exited with status 0) Aug 26 18:35:56.330800: | reaped addconn helper child (status 0) Aug 26 18:35:56.330803: | waitpid returned ECHILD (no child processes left) Aug 26 18:35:56.330807: | spent 0.0302 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 18:35:56.367494: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:35:56.367515: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:35:56.367518: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 18:35:56.367520: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:35:56.367521: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 18:35:56.367524: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:35:56.367530: | Added new connection xauth-road-eastnet with policy ENCRYPT+TUNNEL+PFS+XAUTH+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 18:35:56.367534: | No AUTH policy was set - defaulting to RSASIG Aug 26 18:35:56.367539: | counting wild cards for @road is 0 Aug 26 18:35:56.367542: | counting wild cards for @east is 0 Aug 26 18:35:56.367553: | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@(nil): none Aug 26 18:35:56.367557: | new hp@0x55b20a5eed08 Aug 26 18:35:56.367562: added connection description "xauth-road-eastnet" Aug 26 18:35:56.367572: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+XAUTH+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 18:35:56.367585: | 192.1.3.209[@road,+XC+S=C]---192.1.3.254...192.1.2.23<192.1.2.23>[@east,+XS+S=C]===192.0.2.0/24 Aug 26 18:35:56.367594: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:35:56.367603: | spent 0.115 milliseconds in whack Aug 26 18:35:56.367626: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:35:56.367636: add keyid @road Aug 26 18:35:56.367641: | add pubkey 01 03 c7 15 fa 72 27 70 a4 e1 f3 0a 70 21 f9 0c Aug 26 18:35:56.367644: | add pubkey 3f e2 65 12 87 d9 fd 12 cb af d4 e0 c2 e3 dd 77 Aug 26 18:35:56.367659: | add pubkey a0 ef aa c7 d6 a2 b2 30 f2 64 b0 c5 e6 c7 a7 27 Aug 26 18:35:56.367661: | add pubkey 17 54 7a 8e 32 c9 ac fd bf 8f b3 33 b9 74 74 73 Aug 26 18:35:56.367664: | add pubkey dd 23 83 11 53 d6 d4 91 0e 36 7e 67 fc 89 1e 48 Aug 26 18:35:56.367666: | add pubkey ac e9 da 2e 66 9d 6e 4f e2 98 a7 dc 41 b3 a4 37 Aug 26 18:35:56.367669: | add pubkey f5 07 a9 9c 23 69 83 54 87 7b ea 00 a7 5b ab 2d Aug 26 18:35:56.367671: | add pubkey 41 34 d1 a3 17 1e a7 64 2d 7f ff 45 7a 5d 85 5c Aug 26 18:35:56.367679: | add pubkey 73 dd 63 e7 40 ad eb 71 e6 5f 21 43 80 f5 23 4c Aug 26 18:35:56.367682: | add pubkey 3d 4a 11 2c ca 9a d6 79 c5 c2 51 6e af c3 6e 99 Aug 26 18:35:56.367684: | add pubkey f5 26 1c 67 ee 8a 3e 30 4b c1 93 a7 92 34 36 8c Aug 26 18:35:56.367687: | add pubkey bf e6 d0 d3 fe 78 0b 0a 64 04 44 ca 8c 83 fd f1 Aug 26 18:35:56.367689: | add pubkey 2e b5 00 76 61 a6 de f1 59 67 2b 6d c2 57 e0 f2 Aug 26 18:35:56.367692: | add pubkey 7d 6b 9f d3 46 41 8c 31 c2 fd c4 60 72 08 3b bb Aug 26 18:35:56.367695: | add pubkey 56 fb 01 fc 1d 57 4e cf 7c 0f c4 6f 72 6f 2a 0e Aug 26 18:35:56.367697: | add pubkey f3 30 db a0 80 f9 70 cc bb 07 a9 f9 d7 76 99 63 Aug 26 18:35:56.367700: | add pubkey 4b 6a 0f 1a 37 95 cb 9b ea 17 f7 55 62 6b 8a 83 Aug 26 18:35:56.367703: | add pubkey 05 ff 43 78 57 dd bd 08 85 9c f1 62 35 6e 69 c7 Aug 26 18:35:56.367705: | add pubkey 04 0b 4b c4 1b d2 38 89 8c de 56 d0 c8 2c 51 54 Aug 26 18:35:56.367708: | add pubkey 32 1b 7d 27 dc cd 37 7a 4e cb 1a ec d2 ce 48 ed Aug 26 18:35:56.367710: | add pubkey 43 48 9c 8a fc 30 9f b1 57 1c a9 98 e5 84 93 6c Aug 26 18:35:56.367713: | add pubkey da 4d cc 95 e3 f5 f2 a5 b3 9d 70 ae 24 8d 08 3b Aug 26 18:35:56.367716: | add pubkey 0f 8c e9 5a a5 f0 4d 9c 3c 2f 7f bc 10 95 34 1c Aug 26 18:35:56.367719: | add pubkey 96 74 29 fc ab fb 8f 4b 71 aa 0b 26 b5 f0 32 98 Aug 26 18:35:56.367721: | add pubkey 90 6a fd 31 f5 ab Aug 26 18:35:56.367743: | computed rsa CKAID 1a 15 cc e8 92 73 43 9c 2b f4 20 2a c1 06 6e f2 Aug 26 18:35:56.367747: | computed rsa CKAID 59 b0 ef 45 Aug 26 18:35:56.367759: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:35:56.367765: | spent 0.144 milliseconds in whack Aug 26 18:35:56.367781: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:35:56.367789: add keyid @east Aug 26 18:35:56.367794: | add pubkey 01 03 bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b Aug 26 18:35:56.367797: | add pubkey e5 16 c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 Aug 26 18:35:56.367799: | add pubkey 85 7a e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c Aug 26 18:35:56.367801: | add pubkey 78 ca 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 Aug 26 18:35:56.367803: | add pubkey 21 c9 f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d Aug 26 18:35:56.367806: | add pubkey d2 67 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 Aug 26 18:35:56.367808: | add pubkey 62 cd 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce Aug 26 18:35:56.367811: | add pubkey 62 b5 af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e Aug 26 18:35:56.367813: | add pubkey bb 23 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d Aug 26 18:35:56.367816: | add pubkey ac 47 f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce Aug 26 18:35:56.367818: | add pubkey e0 98 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a Aug 26 18:35:56.367821: | add pubkey 92 b8 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 Aug 26 18:35:56.367824: | add pubkey 4d 58 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 Aug 26 18:35:56.367826: | add pubkey 5f 56 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 Aug 26 18:35:56.367829: | add pubkey d5 f1 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c Aug 26 18:35:56.367832: | add pubkey 47 cc 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 Aug 26 18:35:56.367834: | add pubkey 07 8f 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 Aug 26 18:35:56.367837: | add pubkey 51 51 48 ef Aug 26 18:35:56.367848: | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Aug 26 18:35:56.367851: | computed rsa CKAID 8a 82 25 f1 Aug 26 18:35:56.367861: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:35:56.367866: | spent 0.0884 milliseconds in whack Aug 26 18:35:56.529871: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 18:35:56.530220: | dup_any(fd@16) -> fd@21 (in whack_process() at rcv_whack.c:590) Aug 26 18:35:56.530237: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 18:35:56.530244: | start processing: connection "xauth-road-eastnet" (in initiate_a_connection() at initiate.c:186) Aug 26 18:35:56.530249: | empty esp_info, returning defaults for ENCRYPT Aug 26 18:35:56.530255: | connection 'xauth-road-eastnet' +POLICY_UP Aug 26 18:35:56.530259: | dup_any(fd@21) -> fd@22 (in initiate_a_connection() at initiate.c:342) Aug 26 18:35:56.530262: | FOR_EACH_STATE_... in find_phase1_state Aug 26 18:35:56.530310: | creating state object #1 at 0x55b20a5ef698 Aug 26 18:35:56.530321: | State DB: adding IKEv1 state #1 in UNDEFINED Aug 26 18:35:56.530335: | pstats #1 ikev1.isakmp started Aug 26 18:35:56.530346: | suspend processing: connection "xauth-road-eastnet" (in main_outI1() at ikev1_main.c:118) Aug 26 18:35:56.530355: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118) Aug 26 18:35:56.530361: | parent state #1: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA) Aug 26 18:35:56.530368: | dup_any(fd@22) -> fd@23 (in main_outI1() at ikev1_main.c:123) Aug 26 18:35:56.530376: | Queuing pending IPsec SA negotiating with 192.1.2.23 "xauth-road-eastnet" IKE SA #1 "xauth-road-eastnet" Aug 26 18:35:56.530383: "xauth-road-eastnet" #1: initiating Main Mode Aug 26 18:35:56.530441: | **emit ISAKMP Message: Aug 26 18:35:56.530448: | initiator cookie: Aug 26 18:35:56.530453: | 0f 74 b2 29 fd 07 8f d4 Aug 26 18:35:56.530457: | responder cookie: Aug 26 18:35:56.530461: | 00 00 00 00 00 00 00 00 Aug 26 18:35:56.530466: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:35:56.530471: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:35:56.530475: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:35:56.530480: | flags: none (0x0) Aug 26 18:35:56.530484: | Message ID: 0 (0x0) Aug 26 18:35:56.530489: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:35:56.530495: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 18:35:56.530500: | no specific IKE algorithms specified - using defaults Aug 26 18:35:56.530541: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0 Aug 26 18:35:56.530553: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0 Aug 26 18:35:56.530563: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0 Aug 26 18:35:56.530573: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0 Aug 26 18:35:56.530583: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0 Aug 26 18:35:56.530594: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0 Aug 26 18:35:56.530608: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0 Aug 26 18:35:56.530620: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0 Aug 26 18:35:56.530631: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0 Aug 26 18:35:56.530642: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0 Aug 26 18:35:56.530651: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0 Aug 26 18:35:56.530661: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0 Aug 26 18:35:56.530670: | oakley_alg_makedb() returning 0x55b20a5f2528 Aug 26 18:35:56.530681: | ***emit ISAKMP Security Association Payload: Aug 26 18:35:56.530686: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:35:56.530691: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:35:56.530697: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:35:56.530704: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 18:35:56.530716: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 18:35:56.530722: | ****emit IPsec DOI SIT: Aug 26 18:35:56.530729: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:35:56.530734: | ikev1_out_sa pcn: 0 has 1 valid proposals Aug 26 18:35:56.530739: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18 Aug 26 18:35:56.530744: | ****emit ISAKMP Proposal Payload: Aug 26 18:35:56.530749: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.530753: | proposal number: 0 (0x0) Aug 26 18:35:56.530757: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:35:56.530762: | SPI size: 0 (0x0) Aug 26 18:35:56.530765: | number of transforms: 18 (0x12) Aug 26 18:35:56.530768: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' Aug 26 18:35:56.530772: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.530775: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.530777: | ISAKMP transform number: 0 (0x0) Aug 26 18:35:56.530780: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.530783: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.530787: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530790: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.530793: | length/value: 1 (0x1) Aug 26 18:35:56.530797: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.530800: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530803: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.530805: | length/value: 3600 (0xe10) Aug 26 18:35:56.530808: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530811: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.530814: | length/value: 7 (0x7) Aug 26 18:35:56.530817: | [7 is OAKLEY_AES_CBC] Aug 26 18:35:56.530820: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530824: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.530827: | length/value: 4 (0x4) Aug 26 18:35:56.530830: | [4 is OAKLEY_SHA2_256] Aug 26 18:35:56.530832: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530835: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.530838: | length/value: 65005 (0xfded) Aug 26 18:35:56.530841: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.530844: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530846: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.530849: | length/value: 14 (0xe) Aug 26 18:35:56.530852: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 18:35:56.530855: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530857: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 18:35:56.530860: | length/value: 256 (0x100) Aug 26 18:35:56.530863: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 18:35:56.530866: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.530869: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.530871: | ISAKMP transform number: 1 (0x1) Aug 26 18:35:56.530874: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.530878: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.530881: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.530884: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530886: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.530889: | length/value: 1 (0x1) Aug 26 18:35:56.530892: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.530894: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530897: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.530900: | length/value: 3600 (0xe10) Aug 26 18:35:56.530903: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530905: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.530912: | length/value: 7 (0x7) Aug 26 18:35:56.530915: | [7 is OAKLEY_AES_CBC] Aug 26 18:35:56.530917: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530920: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.530923: | length/value: 4 (0x4) Aug 26 18:35:56.530925: | [4 is OAKLEY_SHA2_256] Aug 26 18:35:56.530928: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530931: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.530933: | length/value: 65005 (0xfded) Aug 26 18:35:56.530936: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.530939: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530941: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.530944: | length/value: 14 (0xe) Aug 26 18:35:56.530947: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 18:35:56.530949: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530952: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 18:35:56.530955: | length/value: 128 (0x80) Aug 26 18:35:56.530957: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 18:35:56.530960: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.530963: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.530966: | ISAKMP transform number: 2 (0x2) Aug 26 18:35:56.530968: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.530971: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.530975: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.530977: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530980: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.530983: | length/value: 1 (0x1) Aug 26 18:35:56.530986: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.530988: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530991: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.530994: | length/value: 3600 (0xe10) Aug 26 18:35:56.530996: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.530999: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.531002: | length/value: 7 (0x7) Aug 26 18:35:56.531004: | [7 is OAKLEY_AES_CBC] Aug 26 18:35:56.531007: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531010: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.531012: | length/value: 6 (0x6) Aug 26 18:35:56.531015: | [6 is OAKLEY_SHA2_512] Aug 26 18:35:56.531017: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531020: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.531023: | length/value: 65005 (0xfded) Aug 26 18:35:56.531026: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.531028: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531031: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.531033: | length/value: 14 (0xe) Aug 26 18:35:56.531036: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 18:35:56.531039: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531042: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 18:35:56.531044: | length/value: 256 (0x100) Aug 26 18:35:56.531047: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 18:35:56.531050: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.531052: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531055: | ISAKMP transform number: 3 (0x3) Aug 26 18:35:56.531058: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.531061: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531064: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.531067: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531070: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.531074: | length/value: 1 (0x1) Aug 26 18:35:56.531077: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.531079: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531082: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.531085: | length/value: 3600 (0xe10) Aug 26 18:35:56.531088: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531090: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.531093: | length/value: 7 (0x7) Aug 26 18:35:56.531096: | [7 is OAKLEY_AES_CBC] Aug 26 18:35:56.531098: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531101: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.531104: | length/value: 6 (0x6) Aug 26 18:35:56.531106: | [6 is OAKLEY_SHA2_512] Aug 26 18:35:56.531109: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531112: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.531114: | length/value: 65005 (0xfded) Aug 26 18:35:56.531117: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.531119: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531122: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.531125: | length/value: 14 (0xe) Aug 26 18:35:56.531127: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 18:35:56.531130: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531133: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 18:35:56.531135: | length/value: 128 (0x80) Aug 26 18:35:56.531138: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 18:35:56.531141: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.531144: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531146: | ISAKMP transform number: 4 (0x4) Aug 26 18:35:56.531149: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.531152: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531155: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.531158: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531161: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.531163: | length/value: 1 (0x1) Aug 26 18:35:56.531166: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.531169: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531172: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.531174: | length/value: 3600 (0xe10) Aug 26 18:35:56.531177: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531180: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.531182: | length/value: 7 (0x7) Aug 26 18:35:56.531185: | [7 is OAKLEY_AES_CBC] Aug 26 18:35:56.531187: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531190: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.531193: | length/value: 2 (0x2) Aug 26 18:35:56.531195: | [2 is OAKLEY_SHA1] Aug 26 18:35:56.531198: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531201: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.531203: | length/value: 65005 (0xfded) Aug 26 18:35:56.531206: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.531209: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531211: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.531214: | length/value: 14 (0xe) Aug 26 18:35:56.531216: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 18:35:56.531219: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531222: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 18:35:56.531224: | length/value: 256 (0x100) Aug 26 18:35:56.531227: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 18:35:56.531230: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.531233: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531235: | ISAKMP transform number: 5 (0x5) Aug 26 18:35:56.531238: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.531243: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531246: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.531249: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531252: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.531254: | length/value: 1 (0x1) Aug 26 18:35:56.531257: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.531260: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531262: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.531265: | length/value: 3600 (0xe10) Aug 26 18:35:56.531268: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531271: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.531273: | length/value: 7 (0x7) Aug 26 18:35:56.531276: | [7 is OAKLEY_AES_CBC] Aug 26 18:35:56.531279: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531281: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.531284: | length/value: 2 (0x2) Aug 26 18:35:56.531287: | [2 is OAKLEY_SHA1] Aug 26 18:35:56.531295: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531298: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.531301: | length/value: 65005 (0xfded) Aug 26 18:35:56.531304: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.531306: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531309: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.531312: | length/value: 14 (0xe) Aug 26 18:35:56.531314: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 18:35:56.531320: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531323: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 18:35:56.531326: | length/value: 128 (0x80) Aug 26 18:35:56.531328: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 18:35:56.531331: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.531334: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531337: | ISAKMP transform number: 6 (0x6) Aug 26 18:35:56.531339: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.531342: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531346: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.531348: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531351: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.531354: | length/value: 1 (0x1) Aug 26 18:35:56.531357: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.531359: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531362: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.531365: | length/value: 3600 (0xe10) Aug 26 18:35:56.531367: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531370: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.531373: | length/value: 7 (0x7) Aug 26 18:35:56.531375: | [7 is OAKLEY_AES_CBC] Aug 26 18:35:56.531378: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531381: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.531383: | length/value: 4 (0x4) Aug 26 18:35:56.531386: | [4 is OAKLEY_SHA2_256] Aug 26 18:35:56.531389: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531391: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.531394: | length/value: 65005 (0xfded) Aug 26 18:35:56.531397: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.531399: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531402: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.531405: | length/value: 5 (0x5) Aug 26 18:35:56.531408: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 18:35:56.531410: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531413: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 18:35:56.531418: | length/value: 256 (0x100) Aug 26 18:35:56.531421: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 18:35:56.531423: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.531426: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531429: | ISAKMP transform number: 7 (0x7) Aug 26 18:35:56.531431: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.531434: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531438: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.531440: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531443: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.531446: | length/value: 1 (0x1) Aug 26 18:35:56.531448: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.531451: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531454: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.531457: | length/value: 3600 (0xe10) Aug 26 18:35:56.531459: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531462: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.531465: | length/value: 7 (0x7) Aug 26 18:35:56.531467: | [7 is OAKLEY_AES_CBC] Aug 26 18:35:56.531470: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531473: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.531475: | length/value: 4 (0x4) Aug 26 18:35:56.531478: | [4 is OAKLEY_SHA2_256] Aug 26 18:35:56.531481: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531483: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.531486: | length/value: 65005 (0xfded) Aug 26 18:35:56.531489: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.531491: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531494: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.531496: | length/value: 5 (0x5) Aug 26 18:35:56.531499: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 18:35:56.531502: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531504: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 18:35:56.531507: | length/value: 128 (0x80) Aug 26 18:35:56.531510: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 18:35:56.531513: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.531515: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531518: | ISAKMP transform number: 8 (0x8) Aug 26 18:35:56.531521: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.531524: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531527: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.531530: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531532: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.531535: | length/value: 1 (0x1) Aug 26 18:35:56.531538: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.531540: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531543: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.531546: | length/value: 3600 (0xe10) Aug 26 18:35:56.531548: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531551: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.531554: | length/value: 7 (0x7) Aug 26 18:35:56.531556: | [7 is OAKLEY_AES_CBC] Aug 26 18:35:56.531559: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531562: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.531564: | length/value: 6 (0x6) Aug 26 18:35:56.531567: | [6 is OAKLEY_SHA2_512] Aug 26 18:35:56.531569: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531572: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.531575: | length/value: 65005 (0xfded) Aug 26 18:35:56.531582: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.531585: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531587: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.531590: | length/value: 5 (0x5) Aug 26 18:35:56.531593: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 18:35:56.531595: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531598: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 18:35:56.531601: | length/value: 256 (0x100) Aug 26 18:35:56.531603: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 18:35:56.531606: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.531609: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531611: | ISAKMP transform number: 9 (0x9) Aug 26 18:35:56.531614: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.531617: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531620: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.531623: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531626: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.531629: | length/value: 1 (0x1) Aug 26 18:35:56.531631: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.531634: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531637: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.531639: | length/value: 3600 (0xe10) Aug 26 18:35:56.531642: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531645: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.531647: | length/value: 7 (0x7) Aug 26 18:35:56.531650: | [7 is OAKLEY_AES_CBC] Aug 26 18:35:56.531653: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531655: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.531658: | length/value: 6 (0x6) Aug 26 18:35:56.531660: | [6 is OAKLEY_SHA2_512] Aug 26 18:35:56.531663: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531666: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.531668: | length/value: 65005 (0xfded) Aug 26 18:35:56.531671: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.531674: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531676: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.531679: | length/value: 5 (0x5) Aug 26 18:35:56.531682: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 18:35:56.531684: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531687: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 18:35:56.531690: | length/value: 128 (0x80) Aug 26 18:35:56.531693: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 18:35:56.531695: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.531698: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531701: | ISAKMP transform number: 10 (0xa) Aug 26 18:35:56.531703: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.531706: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531710: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.531712: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531715: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.531718: | length/value: 1 (0x1) Aug 26 18:35:56.531720: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.531723: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531726: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.531729: | length/value: 3600 (0xe10) Aug 26 18:35:56.531731: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531734: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.531737: | length/value: 7 (0x7) Aug 26 18:35:56.531739: | [7 is OAKLEY_AES_CBC] Aug 26 18:35:56.531743: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531746: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.531749: | length/value: 2 (0x2) Aug 26 18:35:56.531751: | [2 is OAKLEY_SHA1] Aug 26 18:35:56.531754: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531757: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.531759: | length/value: 65005 (0xfded) Aug 26 18:35:56.531762: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.531764: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531767: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.531770: | length/value: 5 (0x5) Aug 26 18:35:56.531772: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 18:35:56.531775: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531778: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 18:35:56.531780: | length/value: 256 (0x100) Aug 26 18:35:56.531783: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 18:35:56.531786: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.531789: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531791: | ISAKMP transform number: 11 (0xb) Aug 26 18:35:56.531794: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.531797: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531800: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.531803: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531806: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.531808: | length/value: 1 (0x1) Aug 26 18:35:56.531811: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.531814: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531816: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.531819: | length/value: 3600 (0xe10) Aug 26 18:35:56.531822: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531825: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.531827: | length/value: 7 (0x7) Aug 26 18:35:56.531830: | [7 is OAKLEY_AES_CBC] Aug 26 18:35:56.531832: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531835: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.531838: | length/value: 2 (0x2) Aug 26 18:35:56.531840: | [2 is OAKLEY_SHA1] Aug 26 18:35:56.531843: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531846: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.531848: | length/value: 65005 (0xfded) Aug 26 18:35:56.531851: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.531854: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531856: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.531859: | length/value: 5 (0x5) Aug 26 18:35:56.531862: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 18:35:56.531864: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531867: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 18:35:56.531870: | length/value: 128 (0x80) Aug 26 18:35:56.531872: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 18:35:56.531875: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.531878: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531880: | ISAKMP transform number: 12 (0xc) Aug 26 18:35:56.531883: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.531886: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531889: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.531892: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531895: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.531898: | length/value: 1 (0x1) Aug 26 18:35:56.531900: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.531904: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531907: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.531910: | length/value: 3600 (0xe10) Aug 26 18:35:56.531912: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531915: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.531918: | length/value: 5 (0x5) Aug 26 18:35:56.531920: | [5 is OAKLEY_3DES_CBC] Aug 26 18:35:56.531923: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531926: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.531928: | length/value: 4 (0x4) Aug 26 18:35:56.531931: | [4 is OAKLEY_SHA2_256] Aug 26 18:35:56.531934: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531936: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.531939: | length/value: 65005 (0xfded) Aug 26 18:35:56.531942: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.531944: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531947: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.531950: | length/value: 14 (0xe) Aug 26 18:35:56.531952: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 18:35:56.531955: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 18:35:56.531958: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.531960: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531963: | ISAKMP transform number: 13 (0xd) Aug 26 18:35:56.531966: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.531969: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.531972: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.531975: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531978: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.531980: | length/value: 1 (0x1) Aug 26 18:35:56.531983: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.531985: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531988: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.531991: | length/value: 3600 (0xe10) Aug 26 18:35:56.531994: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.531996: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.531999: | length/value: 5 (0x5) Aug 26 18:35:56.532002: | [5 is OAKLEY_3DES_CBC] Aug 26 18:35:56.532004: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532007: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.532010: | length/value: 6 (0x6) Aug 26 18:35:56.532012: | [6 is OAKLEY_SHA2_512] Aug 26 18:35:56.532015: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532017: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.532020: | length/value: 65005 (0xfded) Aug 26 18:35:56.532023: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.532025: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532028: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.532031: | length/value: 14 (0xe) Aug 26 18:35:56.532033: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 18:35:56.532036: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 18:35:56.532039: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.532042: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.532044: | ISAKMP transform number: 14 (0xe) Aug 26 18:35:56.532047: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.532050: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.532053: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.532056: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532059: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.532061: | length/value: 1 (0x1) Aug 26 18:35:56.532065: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.532068: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532071: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.532073: | length/value: 3600 (0xe10) Aug 26 18:35:56.532076: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532079: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.532081: | length/value: 5 (0x5) Aug 26 18:35:56.532084: | [5 is OAKLEY_3DES_CBC] Aug 26 18:35:56.532087: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532089: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.532092: | length/value: 2 (0x2) Aug 26 18:35:56.532095: | [2 is OAKLEY_SHA1] Aug 26 18:35:56.532097: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532100: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.532103: | length/value: 65005 (0xfded) Aug 26 18:35:56.532105: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.532108: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532111: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.532113: | length/value: 14 (0xe) Aug 26 18:35:56.532116: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 18:35:56.532119: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 18:35:56.532121: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.532124: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.532127: | ISAKMP transform number: 15 (0xf) Aug 26 18:35:56.532129: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.532132: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.532136: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.532138: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532141: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.532144: | length/value: 1 (0x1) Aug 26 18:35:56.532146: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.532149: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532152: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.532154: | length/value: 3600 (0xe10) Aug 26 18:35:56.532157: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532160: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.532162: | length/value: 5 (0x5) Aug 26 18:35:56.532165: | [5 is OAKLEY_3DES_CBC] Aug 26 18:35:56.532168: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532170: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.532173: | length/value: 4 (0x4) Aug 26 18:35:56.532175: | [4 is OAKLEY_SHA2_256] Aug 26 18:35:56.532178: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532181: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.532183: | length/value: 65005 (0xfded) Aug 26 18:35:56.532186: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.532189: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532191: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.532194: | length/value: 5 (0x5) Aug 26 18:35:56.532197: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 18:35:56.532199: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 18:35:56.532202: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.532205: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.532207: | ISAKMP transform number: 16 (0x10) Aug 26 18:35:56.532210: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.532213: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.532216: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.532219: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532222: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.532226: | length/value: 1 (0x1) Aug 26 18:35:56.532229: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.532231: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532234: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.532237: | length/value: 3600 (0xe10) Aug 26 18:35:56.532239: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532242: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.532245: | length/value: 5 (0x5) Aug 26 18:35:56.532247: | [5 is OAKLEY_3DES_CBC] Aug 26 18:35:56.532250: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532253: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.532255: | length/value: 6 (0x6) Aug 26 18:35:56.532258: | [6 is OAKLEY_SHA2_512] Aug 26 18:35:56.532260: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532263: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.532266: | length/value: 65005 (0xfded) Aug 26 18:35:56.532268: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.532271: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532274: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.532276: | length/value: 5 (0x5) Aug 26 18:35:56.532279: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 18:35:56.532282: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 18:35:56.532284: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.532287: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.532310: | ISAKMP transform number: 17 (0x11) Aug 26 18:35:56.532315: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.532319: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 18:35:56.532327: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 18:35:56.532332: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532336: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.532340: | length/value: 1 (0x1) Aug 26 18:35:56.532345: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.532349: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532355: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.532359: | length/value: 3600 (0xe10) Aug 26 18:35:56.532363: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532368: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.532372: | length/value: 5 (0x5) Aug 26 18:35:56.532377: | [5 is OAKLEY_3DES_CBC] Aug 26 18:35:56.532381: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532386: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.532390: | length/value: 2 (0x2) Aug 26 18:35:56.532394: | [2 is OAKLEY_SHA1] Aug 26 18:35:56.532398: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532403: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.532408: | length/value: 65005 (0xfded) Aug 26 18:35:56.532413: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.532417: | ******emit ISAKMP Oakley attribute: Aug 26 18:35:56.532421: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.532426: | length/value: 5 (0x5) Aug 26 18:35:56.532430: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 18:35:56.532435: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 18:35:56.532439: | emitting length of ISAKMP Proposal Payload: 632 Aug 26 18:35:56.532444: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0 Aug 26 18:35:56.532449: | emitting length of ISAKMP Security Association Payload: 644 Aug 26 18:35:56.532454: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 Aug 26 18:35:56.532462: | out_vid(): sending [FRAGMENTATION] Aug 26 18:35:56.532468: | ***emit ISAKMP Vendor ID Payload: Aug 26 18:35:56.532474: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:35:56.532483: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:35:56.532490: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 18:35:56.532496: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 18:35:56.532503: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 18:35:56.532508: | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 Aug 26 18:35:56.532512: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 18:35:56.532516: | out_vid(): sending [XAUTH] Aug 26 18:35:56.532520: | ***emit ISAKMP Vendor ID Payload: Aug 26 18:35:56.532525: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:35:56.532530: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:35:56.532535: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 18:35:56.532540: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 18:35:56.532545: | emitting 8 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 18:35:56.532548: | V_ID 09 00 26 89 df d6 b7 12 Aug 26 18:35:56.532551: | emitting length of ISAKMP Vendor ID Payload: 12 Aug 26 18:35:56.532554: | out_vid(): sending [Dead Peer Detection] Aug 26 18:35:56.532557: | ***emit ISAKMP Vendor ID Payload: Aug 26 18:35:56.532560: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.532563: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 18:35:56.532566: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 18:35:56.532569: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 18:35:56.532572: | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 Aug 26 18:35:56.532574: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 18:35:56.532577: | nat add vid Aug 26 18:35:56.532580: | sending draft and RFC NATT VIDs Aug 26 18:35:56.532582: | out_vid(): sending [RFC 3947] Aug 26 18:35:56.532585: | ***emit ISAKMP Vendor ID Payload: Aug 26 18:35:56.532588: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:35:56.532591: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:35:56.532594: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 18:35:56.532597: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 18:35:56.532600: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 18:35:56.532603: | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f Aug 26 18:35:56.532606: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 18:35:56.532608: | skipping VID_NATT_RFC Aug 26 18:35:56.532611: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03] Aug 26 18:35:56.532613: | ***emit ISAKMP Vendor ID Payload: Aug 26 18:35:56.532616: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:35:56.532619: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:35:56.532622: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 18:35:56.532625: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 18:35:56.532628: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 18:35:56.532631: | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 18:35:56.532634: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 18:35:56.532641: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n] Aug 26 18:35:56.532644: | ***emit ISAKMP Vendor ID Payload: Aug 26 18:35:56.532647: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:35:56.532650: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 18:35:56.532653: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 18:35:56.532656: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 18:35:56.532659: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 18:35:56.532662: | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f Aug 26 18:35:56.532664: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 18:35:56.532667: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02] Aug 26 18:35:56.532670: | ***emit ISAKMP Vendor ID Payload: Aug 26 18:35:56.532673: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.532676: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 18:35:56.532679: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 18:35:56.532682: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 18:35:56.532684: | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 Aug 26 18:35:56.532687: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 18:35:56.532690: | no IKEv1 message padding required Aug 26 18:35:56.532693: | emitting length of ISAKMP Message: 804 Aug 26 18:35:56.532711: | sending 804 bytes for reply packet for main_outI1 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 18:35:56.532714: | 0f 74 b2 29 fd 07 8f d4 00 00 00 00 00 00 00 00 Aug 26 18:35:56.532717: | 01 10 02 00 00 00 00 00 00 00 03 24 0d 00 02 84 Aug 26 18:35:56.532719: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Aug 26 18:35:56.532722: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 18:35:56.532724: | 80 01 00 07 80 02 00 04 80 03 fd ed 80 04 00 0e Aug 26 18:35:56.532727: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Aug 26 18:35:56.532730: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 fd ed Aug 26 18:35:56.532732: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Aug 26 18:35:56.532735: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Aug 26 18:35:56.532737: | 80 03 fd ed 80 04 00 0e 80 0e 01 00 03 00 00 24 Aug 26 18:35:56.532740: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 18:35:56.532742: | 80 02 00 06 80 03 fd ed 80 04 00 0e 80 0e 00 80 Aug 26 18:35:56.532745: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 18:35:56.532747: | 80 01 00 07 80 02 00 02 80 03 fd ed 80 04 00 0e Aug 26 18:35:56.532750: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Aug 26 18:35:56.532752: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 fd ed Aug 26 18:35:56.532755: | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 Aug 26 18:35:56.532758: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Aug 26 18:35:56.532760: | 80 03 fd ed 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 18:35:56.532763: | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 18:35:56.532765: | 80 02 00 04 80 03 fd ed 80 04 00 05 80 0e 00 80 Aug 26 18:35:56.532768: | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 18:35:56.532770: | 80 01 00 07 80 02 00 06 80 03 fd ed 80 04 00 05 Aug 26 18:35:56.532773: | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 Aug 26 18:35:56.532775: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 fd ed Aug 26 18:35:56.532778: | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 Aug 26 18:35:56.532780: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Aug 26 18:35:56.532783: | 80 03 fd ed 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 18:35:56.532787: | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 18:35:56.532790: | 80 02 00 02 80 03 fd ed 80 04 00 05 80 0e 00 80 Aug 26 18:35:56.532792: | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 18:35:56.532795: | 80 01 00 05 80 02 00 04 80 03 fd ed 80 04 00 0e Aug 26 18:35:56.532797: | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 18:35:56.532800: | 80 01 00 05 80 02 00 06 80 03 fd ed 80 04 00 0e Aug 26 18:35:56.532803: | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 18:35:56.532805: | 80 01 00 05 80 02 00 02 80 03 fd ed 80 04 00 0e Aug 26 18:35:56.532808: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 18:35:56.532810: | 80 01 00 05 80 02 00 04 80 03 fd ed 80 04 00 05 Aug 26 18:35:56.532813: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 18:35:56.532815: | 80 01 00 05 80 02 00 06 80 03 fd ed 80 04 00 05 Aug 26 18:35:56.532818: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 18:35:56.532821: | 80 01 00 05 80 02 00 02 80 03 fd ed 80 04 00 05 Aug 26 18:35:56.532823: | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f Aug 26 18:35:56.532826: | 00 d6 c2 d3 0d 00 00 0c 09 00 26 89 df d6 b7 12 Aug 26 18:35:56.532828: | 0d 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc Aug 26 18:35:56.532831: | 77 57 01 00 0d 00 00 14 4a 13 1c 81 07 03 58 45 Aug 26 18:35:56.532833: | 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 7d 94 19 a6 Aug 26 18:35:56.532836: | 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 0d 00 00 14 Aug 26 18:35:56.532838: | 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f Aug 26 18:35:56.532841: | 00 00 00 14 cd 60 46 43 35 df 21 f8 7c fd b2 fc Aug 26 18:35:56.532844: | 68 b6 a4 48 Aug 26 18:35:56.533242: | event_schedule: new EVENT_RETRANSMIT-pe@0x55b20a5eede8 Aug 26 18:35:56.533249: | inserting event EVENT_RETRANSMIT, timeout in 25 seconds for #1 Aug 26 18:35:56.533254: | libevent_malloc: new ptr-libevent@0x55b20a5eee58 size 128 Aug 26 18:35:56.533261: | #1 STATE_MAIN_I1: retransmits: first event in 25 seconds; timeout in 107 seconds; limit of 12 retransmits; current time is 29842.275706 Aug 26 18:35:56.533277: | #1 spent 2.93 milliseconds in main_outI1() Aug 26 18:35:56.533284: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in main_outI1() at ikev1_main.c:228) Aug 26 18:35:56.533294: | resume processing: connection "xauth-road-eastnet" (in main_outI1() at ikev1_main.c:228) Aug 26 18:35:56.533300: | stop processing: connection "xauth-road-eastnet" (in initiate_a_connection() at initiate.c:349) Aug 26 18:35:56.533304: | close_any(fd@21) (in initiate_connection() at initiate.c:372) Aug 26 18:35:56.533311: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 18:35:56.533317: | spent 3.35 milliseconds in whack Aug 26 18:35:56.534978: | spent 0.00356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:35:56.535015: | *received 156 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) Aug 26 18:35:56.535020: | 0f 74 b2 29 fd 07 8f d4 d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.535023: | 01 10 02 00 00 00 00 00 00 00 00 9c 0d 00 00 38 Aug 26 18:35:56.535026: | 00 00 00 01 00 00 00 01 00 00 00 2c 00 01 00 01 Aug 26 18:35:56.535028: | 00 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 18:35:56.535031: | 80 01 00 07 80 02 00 04 80 03 fd ed 80 04 00 0e Aug 26 18:35:56.535033: | 80 0e 01 00 0d 00 00 14 40 48 b7 d5 6e bc e8 85 Aug 26 18:35:56.535036: | 25 e7 de 7f 00 d6 c2 d3 0d 00 00 0c 09 00 26 89 Aug 26 18:35:56.535038: | df d6 b7 12 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Aug 26 18:35:56.535041: | 6b 86 96 fc 77 57 01 00 00 00 00 14 4a 13 1c 81 Aug 26 18:35:56.535043: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f Aug 26 18:35:56.535048: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 18:35:56.535052: | **parse ISAKMP Message: Aug 26 18:35:56.535055: | initiator cookie: Aug 26 18:35:56.535058: | 0f 74 b2 29 fd 07 8f d4 Aug 26 18:35:56.535064: | responder cookie: Aug 26 18:35:56.535066: | d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.535070: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 18:35:56.535073: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:35:56.535076: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:35:56.535079: | flags: none (0x0) Aug 26 18:35:56.535081: | Message ID: 0 (0x0) Aug 26 18:35:56.535084: | length: 156 (0x9c) Aug 26 18:35:56.535087: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:35:56.535091: | State DB: IKEv1 state not found (find_state_ikev1) Aug 26 18:35:56.535095: | State DB: found IKEv1 state #1 in MAIN_I1 (find_state_ikev1_init) Aug 26 18:35:56.535101: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) Aug 26 18:35:56.535104: | #1 is idle Aug 26 18:35:56.535106: | #1 idle Aug 26 18:35:56.535110: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 18:35:56.535114: | ***parse ISAKMP Security Association Payload: Aug 26 18:35:56.535117: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:35:56.535119: | length: 56 (0x38) Aug 26 18:35:56.535122: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 18:35:56.535125: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Aug 26 18:35:56.535128: | ***parse ISAKMP Vendor ID Payload: Aug 26 18:35:56.535131: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:35:56.535134: | length: 20 (0x14) Aug 26 18:35:56.535136: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Aug 26 18:35:56.535139: | ***parse ISAKMP Vendor ID Payload: Aug 26 18:35:56.535142: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:35:56.535144: | length: 12 (0xc) Aug 26 18:35:56.535147: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Aug 26 18:35:56.535150: | ***parse ISAKMP Vendor ID Payload: Aug 26 18:35:56.535152: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 18:35:56.535155: | length: 20 (0x14) Aug 26 18:35:56.535158: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Aug 26 18:35:56.535160: | ***parse ISAKMP Vendor ID Payload: Aug 26 18:35:56.535163: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.535166: | length: 20 (0x14) Aug 26 18:35:56.535169: | message 'main_inR1_outI2' HASH payload not checked early Aug 26 18:35:56.535174: | received Vendor ID payload [FRAGMENTATION] Aug 26 18:35:56.535177: | received Vendor ID payload [XAUTH] Aug 26 18:35:56.535181: | received Vendor ID payload [Dead Peer Detection] Aug 26 18:35:56.535184: | quirks.qnat_traversal_vid set to=117 [RFC 3947] Aug 26 18:35:56.535187: | received Vendor ID payload [RFC 3947] Aug 26 18:35:56.535191: | ****parse IPsec DOI SIT: Aug 26 18:35:56.535195: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 18:35:56.535198: | ****parse ISAKMP Proposal Payload: Aug 26 18:35:56.535200: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.535203: | length: 44 (0x2c) Aug 26 18:35:56.535206: | proposal number: 0 (0x0) Aug 26 18:35:56.535209: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 18:35:56.535211: | SPI size: 0 (0x0) Aug 26 18:35:56.535214: | number of transforms: 1 (0x1) Aug 26 18:35:56.535217: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 18:35:56.535220: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.535222: | length: 36 (0x24) Aug 26 18:35:56.535225: | ISAKMP transform number: 0 (0x0) Aug 26 18:35:56.535227: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 18:35:56.535230: | ******parse ISAKMP Oakley attribute: Aug 26 18:35:56.535233: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 18:35:56.535236: | length/value: 1 (0x1) Aug 26 18:35:56.535239: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 18:35:56.535242: | ******parse ISAKMP Oakley attribute: Aug 26 18:35:56.535245: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 18:35:56.535248: | length/value: 3600 (0xe10) Aug 26 18:35:56.535252: | ******parse ISAKMP Oakley attribute: Aug 26 18:35:56.535255: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 18:35:56.535258: | length/value: 7 (0x7) Aug 26 18:35:56.535260: | [7 is OAKLEY_AES_CBC] Aug 26 18:35:56.535264: | ******parse ISAKMP Oakley attribute: Aug 26 18:35:56.535266: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 18:35:56.535269: | length/value: 4 (0x4) Aug 26 18:35:56.535272: | [4 is OAKLEY_SHA2_256] Aug 26 18:35:56.535275: | ******parse ISAKMP Oakley attribute: Aug 26 18:35:56.535278: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 18:35:56.535280: | length/value: 65005 (0xfded) Aug 26 18:35:56.535283: | [65005 is XAUTHInitRSA] Aug 26 18:35:56.535286: | ******parse ISAKMP Oakley attribute: Aug 26 18:35:56.535313: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 18:35:56.535318: | length/value: 14 (0xe) Aug 26 18:35:56.535321: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 18:35:56.535324: | ******parse ISAKMP Oakley attribute: Aug 26 18:35:56.535327: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 18:35:56.535330: | length/value: 256 (0x100) Aug 26 18:35:56.535333: | OAKLEY proposal verified unconditionally; no alg_info to check against Aug 26 18:35:56.535336: | Oakley Transform 0 accepted Aug 26 18:35:56.535339: | sender checking NAT-T: enabled; VID 117 Aug 26 18:35:56.535342: | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC Aug 26 18:35:56.535345: | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) Aug 26 18:35:56.535349: | adding outI2 KE work-order 1 for state #1 Aug 26 18:35:56.535353: | state #1 requesting EVENT_RETRANSMIT to be deleted Aug 26 18:35:56.535356: | #1 STATE_MAIN_I1: retransmits: cleared Aug 26 18:35:56.535360: | libevent_free: release ptr-libevent@0x55b20a5eee58 Aug 26 18:35:56.535364: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55b20a5eede8 Aug 26 18:35:56.535367: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55b20a5eede8 Aug 26 18:35:56.535371: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 18:35:56.535375: | libevent_malloc: new ptr-libevent@0x55b20a5eee58 size 128 Aug 26 18:35:56.535388: | complete v1 state transition with STF_SUSPEND Aug 26 18:35:56.535393: | [RE]START processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) Aug 26 18:35:56.535397: | suspending state #1 and saving MD Aug 26 18:35:56.535399: | #1 is busy; has a suspended MD Aug 26 18:35:56.535405: | #1 spent 0.19 milliseconds in process_packet_tail() Aug 26 18:35:56.535410: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:35:56.535415: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 18:35:56.535418: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:35:56.535423: | spent 0.406 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:35:56.535426: | crypto helper 0 resuming Aug 26 18:35:56.535440: | crypto helper 0 starting work-order 1 for state #1 Aug 26 18:35:56.535446: | crypto helper 0 doing build KE and nonce (outI2 KE); request ID 1 Aug 26 18:35:56.536378: | crypto helper 0 finished build KE and nonce (outI2 KE); request ID 1 time elapsed 0.000932 seconds Aug 26 18:35:56.536393: | (#1) spent 0.941 milliseconds in crypto helper computing work-order 1: outI2 KE (pcr) Aug 26 18:35:56.536397: | crypto helper 0 sending results from work-order 1 for state #1 to event queue Aug 26 18:35:56.536401: | scheduling resume sending helper answer for #1 Aug 26 18:35:56.536405: | libevent_malloc: new ptr-libevent@0x7fa210002888 size 128 Aug 26 18:35:56.536415: | crypto helper 0 waiting (nothing to do) Aug 26 18:35:56.536456: | processing resume sending helper answer for #1 Aug 26 18:35:56.536471: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 18:35:56.536477: | crypto helper 0 replies to request ID 1 Aug 26 18:35:56.536488: | calling continuation function 0x55b20a34bb50 Aug 26 18:35:56.536491: | main_inR1_outI2_continue for #1: calculated ke+nonce, sending I2 Aug 26 18:35:56.536498: | **emit ISAKMP Message: Aug 26 18:35:56.536501: | initiator cookie: Aug 26 18:35:56.536504: | 0f 74 b2 29 fd 07 8f d4 Aug 26 18:35:56.536506: | responder cookie: Aug 26 18:35:56.536509: | d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.536512: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.536515: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:35:56.536518: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:35:56.536521: | flags: none (0x0) Aug 26 18:35:56.536524: | Message ID: 0 (0x0) Aug 26 18:35:56.536527: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:35:56.536531: | ***emit ISAKMP Key Exchange Payload: Aug 26 18:35:56.536534: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 18:35:56.536538: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE Aug 26 18:35:56.536541: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) Aug 26 18:35:56.536544: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' Aug 26 18:35:56.536548: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload Aug 26 18:35:56.536551: | keyex value f1 b9 4e 69 75 d4 5b 75 34 b2 6c 7c f4 a9 52 8f Aug 26 18:35:56.536554: | keyex value b1 ae c3 4d 7b e7 f4 1f b2 43 36 89 96 b9 04 b6 Aug 26 18:35:56.536557: | keyex value 8b 74 63 cc 7e 47 f4 1b b8 ad c7 8e 94 2c 65 55 Aug 26 18:35:56.536560: | keyex value e3 03 c1 47 5b d2 0a 5a 8f b6 88 85 67 0d 80 c1 Aug 26 18:35:56.536562: | keyex value cb 1c 2a c4 36 17 36 a5 80 d2 45 38 4e f1 23 8a Aug 26 18:35:56.536565: | keyex value 3a c6 ac 19 2b 32 ce 80 43 ce 60 59 9d e5 e1 f8 Aug 26 18:35:56.536567: | keyex value 19 34 bc b3 42 f6 b6 e4 17 87 5d 28 37 e0 79 bd Aug 26 18:35:56.536570: | keyex value 1a 6b 9c 14 5e 57 d6 c4 5f 67 9e 47 8a 73 df d6 Aug 26 18:35:56.536573: | keyex value 61 2d 15 da 6b 1a 84 2c b1 39 1a db 25 45 b3 69 Aug 26 18:35:56.536575: | keyex value d3 80 87 f7 bd 25 43 38 84 3e 9b 84 95 a2 4c 4a Aug 26 18:35:56.536578: | keyex value 22 88 c1 2f f5 df 47 9b a9 7e af 4a 8a 12 81 f8 Aug 26 18:35:56.536581: | keyex value ad 24 7d 55 96 ef b3 a5 54 0c 8f 42 6e dc 44 47 Aug 26 18:35:56.536583: | keyex value b5 89 4f 83 6a 9a 63 23 5d f1 7e cb 18 b0 b1 f9 Aug 26 18:35:56.536586: | keyex value 43 47 8e bf 9a fc 7a 07 7b 81 0b e9 ab c5 dc e7 Aug 26 18:35:56.536589: | keyex value b4 4f 39 5e 27 85 b8 47 ed 4b 5e af 57 d6 31 47 Aug 26 18:35:56.536591: | keyex value 86 77 e1 3b fd e9 d7 d5 0a 3f e8 60 e5 3d 70 8b Aug 26 18:35:56.536594: | emitting length of ISAKMP Key Exchange Payload: 260 Aug 26 18:35:56.536597: | ***emit ISAKMP Nonce Payload: Aug 26 18:35:56.536600: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.536604: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) Aug 26 18:35:56.536607: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' Aug 26 18:35:56.536610: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload Aug 26 18:35:56.536613: | Ni af cc 62 23 0d 7d 9e 83 aa d4 57 17 c1 53 21 b4 Aug 26 18:35:56.536616: | Ni 08 4e ac 5d 3a b1 dc d9 48 43 5b 54 bb 50 fa 8a Aug 26 18:35:56.536619: | emitting length of ISAKMP Nonce Payload: 36 Aug 26 18:35:56.536621: | NAT-T checking st_nat_traversal Aug 26 18:35:56.536624: | NAT-T found (implies NAT_T_WITH_NATD) Aug 26 18:35:56.536627: | sending NAT-D payloads Aug 26 18:35:56.536640: | natd_hash: hasher=0x55b20a420ca0(32) Aug 26 18:35:56.536644: | natd_hash: icookie= 0f 74 b2 29 fd 07 8f d4 Aug 26 18:35:56.536646: | natd_hash: rcookie= d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.536651: | natd_hash: ip= c0 01 02 17 Aug 26 18:35:56.536654: | natd_hash: port=500 Aug 26 18:35:56.536657: | natd_hash: hash= 25 7e eb 9e 19 79 14 5a 14 be ef ff 20 34 07 9a Aug 26 18:35:56.536659: | natd_hash: hash= 34 fc fb c3 fa 3d 9c f7 36 89 9d 76 a0 f5 81 bf Aug 26 18:35:56.536662: | ***emit ISAKMP NAT-D Payload: Aug 26 18:35:56.536665: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Aug 26 18:35:56.536669: | next payload chain: ignoring supplied 'ISAKMP NAT-D Payload'.'next payload type' value 20:ISAKMP_NEXT_NATD_RFC Aug 26 18:35:56.536672: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) Aug 26 18:35:56.536675: | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' Aug 26 18:35:56.536678: | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload Aug 26 18:35:56.536681: | NAT-D 25 7e eb 9e 19 79 14 5a 14 be ef ff 20 34 07 9a Aug 26 18:35:56.536684: | NAT-D 34 fc fb c3 fa 3d 9c f7 36 89 9d 76 a0 f5 81 bf Aug 26 18:35:56.536687: | emitting length of ISAKMP NAT-D Payload: 36 Aug 26 18:35:56.536693: | natd_hash: hasher=0x55b20a420ca0(32) Aug 26 18:35:56.536696: | natd_hash: icookie= 0f 74 b2 29 fd 07 8f d4 Aug 26 18:35:56.536699: | natd_hash: rcookie= d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.536702: | natd_hash: ip= c0 01 03 d1 Aug 26 18:35:56.536704: | natd_hash: port=500 Aug 26 18:35:56.536707: | natd_hash: hash= a9 2f e5 fb 53 80 c3 37 73 bb d7 48 b3 79 83 38 Aug 26 18:35:56.536710: | natd_hash: hash= 92 1e 78 85 f7 60 85 27 4a 23 97 31 bf ab b5 1b Aug 26 18:35:56.536713: | ***emit ISAKMP NAT-D Payload: Aug 26 18:35:56.536715: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.536719: | next payload chain: setting previous 'ISAKMP NAT-D Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) Aug 26 18:35:56.536722: | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' Aug 26 18:35:56.536725: | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload Aug 26 18:35:56.536728: | NAT-D a9 2f e5 fb 53 80 c3 37 73 bb d7 48 b3 79 83 38 Aug 26 18:35:56.536730: | NAT-D 92 1e 78 85 f7 60 85 27 4a 23 97 31 bf ab b5 1b Aug 26 18:35:56.536733: | emitting length of ISAKMP NAT-D Payload: 36 Aug 26 18:35:56.536736: | no IKEv1 message padding required Aug 26 18:35:56.536739: | emitting length of ISAKMP Message: 396 Aug 26 18:35:56.536742: | State DB: re-hashing IKEv1 state #1 IKE SPIi and SPI[ir] Aug 26 18:35:56.536749: | complete v1 state transition with STF_OK Aug 26 18:35:56.536755: | [RE]START processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:35:56.536758: | #1 is idle Aug 26 18:35:56.536761: | doing_xauth:yes, t_xauth_client_done:no Aug 26 18:35:56.536763: | peer supports fragmentation Aug 26 18:35:56.536766: | peer supports DPD Aug 26 18:35:56.536769: | IKEv1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 Aug 26 18:35:56.536773: | parent state #1: MAIN_I1(half-open IKE SA) => MAIN_I2(open IKE SA) Aug 26 18:35:56.536776: | event_already_set, deleting event Aug 26 18:35:56.536779: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 18:35:56.536782: | libevent_free: release ptr-libevent@0x55b20a5eee58 Aug 26 18:35:56.536786: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55b20a5eede8 Aug 26 18:35:56.536792: | sending reply packet to 192.1.2.23:500 (from 192.1.3.209:500) Aug 26 18:35:56.536804: | sending 396 bytes for STATE_MAIN_I1 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 18:35:56.536807: | 0f 74 b2 29 fd 07 8f d4 d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.536810: | 04 10 02 00 00 00 00 00 00 00 01 8c 0a 00 01 04 Aug 26 18:35:56.536812: | f1 b9 4e 69 75 d4 5b 75 34 b2 6c 7c f4 a9 52 8f Aug 26 18:35:56.536815: | b1 ae c3 4d 7b e7 f4 1f b2 43 36 89 96 b9 04 b6 Aug 26 18:35:56.536819: | 8b 74 63 cc 7e 47 f4 1b b8 ad c7 8e 94 2c 65 55 Aug 26 18:35:56.536822: | e3 03 c1 47 5b d2 0a 5a 8f b6 88 85 67 0d 80 c1 Aug 26 18:35:56.536824: | cb 1c 2a c4 36 17 36 a5 80 d2 45 38 4e f1 23 8a Aug 26 18:35:56.536827: | 3a c6 ac 19 2b 32 ce 80 43 ce 60 59 9d e5 e1 f8 Aug 26 18:35:56.536830: | 19 34 bc b3 42 f6 b6 e4 17 87 5d 28 37 e0 79 bd Aug 26 18:35:56.536832: | 1a 6b 9c 14 5e 57 d6 c4 5f 67 9e 47 8a 73 df d6 Aug 26 18:35:56.536835: | 61 2d 15 da 6b 1a 84 2c b1 39 1a db 25 45 b3 69 Aug 26 18:35:56.536837: | d3 80 87 f7 bd 25 43 38 84 3e 9b 84 95 a2 4c 4a Aug 26 18:35:56.536840: | 22 88 c1 2f f5 df 47 9b a9 7e af 4a 8a 12 81 f8 Aug 26 18:35:56.536842: | ad 24 7d 55 96 ef b3 a5 54 0c 8f 42 6e dc 44 47 Aug 26 18:35:56.536845: | b5 89 4f 83 6a 9a 63 23 5d f1 7e cb 18 b0 b1 f9 Aug 26 18:35:56.536848: | 43 47 8e bf 9a fc 7a 07 7b 81 0b e9 ab c5 dc e7 Aug 26 18:35:56.536850: | b4 4f 39 5e 27 85 b8 47 ed 4b 5e af 57 d6 31 47 Aug 26 18:35:56.536853: | 86 77 e1 3b fd e9 d7 d5 0a 3f e8 60 e5 3d 70 8b Aug 26 18:35:56.536856: | 14 00 00 24 af cc 62 23 0d 7d 9e 83 aa d4 57 17 Aug 26 18:35:56.536858: | c1 53 21 b4 08 4e ac 5d 3a b1 dc d9 48 43 5b 54 Aug 26 18:35:56.536861: | bb 50 fa 8a 14 00 00 24 25 7e eb 9e 19 79 14 5a Aug 26 18:35:56.536863: | 14 be ef ff 20 34 07 9a 34 fc fb c3 fa 3d 9c f7 Aug 26 18:35:56.536866: | 36 89 9d 76 a0 f5 81 bf 00 00 00 24 a9 2f e5 fb Aug 26 18:35:56.536869: | 53 80 c3 37 73 bb d7 48 b3 79 83 38 92 1e 78 85 Aug 26 18:35:56.536871: | f7 60 85 27 4a 23 97 31 bf ab b5 1b Aug 26 18:35:56.536907: | !event_already_set at reschedule Aug 26 18:35:56.536914: | event_schedule: new EVENT_RETRANSMIT-pe@0x55b20a5eede8 Aug 26 18:35:56.536918: | inserting event EVENT_RETRANSMIT, timeout in 25 seconds for #1 Aug 26 18:35:56.536921: | libevent_malloc: new ptr-libevent@0x55b20a5f1c58 size 128 Aug 26 18:35:56.536927: | #1 STATE_MAIN_I2: retransmits: first event in 25 seconds; timeout in 107 seconds; limit of 12 retransmits; current time is 29842.279379 Aug 26 18:35:56.536931: "xauth-road-eastnet" #1: STATE_MAIN_I2: sent MI2, expecting MR2 Aug 26 18:35:56.536941: | XAUTH client is not yet authenticated Aug 26 18:35:56.536947: | resume sending helper answer for #1 suppresed complete_v1_state_transition() Aug 26 18:35:56.536957: | #1 spent 0.458 milliseconds in resume sending helper answer Aug 26 18:35:56.536965: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 18:35:56.536969: | libevent_free: release ptr-libevent@0x7fa210002888 Aug 26 18:35:56.538743: | spent 0.00367 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:35:56.538776: | *received 396 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) Aug 26 18:35:56.538783: | 0f 74 b2 29 fd 07 8f d4 d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.538788: | 04 10 02 00 00 00 00 00 00 00 01 8c 0a 00 01 04 Aug 26 18:35:56.538792: | 38 3f fb be 24 0b e1 d8 97 0f af 57 a9 90 bc 9c Aug 26 18:35:56.538796: | 9f 35 27 23 e5 fb f7 b4 05 5e 2f a2 cd 17 ec 37 Aug 26 18:35:56.538800: | a4 3a d3 1e 96 c7 12 99 76 05 56 c0 02 43 92 01 Aug 26 18:35:56.538805: | 9b f6 12 f0 80 67 99 13 98 57 4b 99 54 7c 2a dc Aug 26 18:35:56.538809: | f8 33 ae 41 05 a5 4a 54 a3 fc fd 23 71 97 16 1a Aug 26 18:35:56.538813: | 2f b0 a3 01 c8 9f 6a aa d4 78 ee d5 e3 50 da 09 Aug 26 18:35:56.538817: | 28 7f 64 06 f9 6c fc 85 a8 bf 54 c1 dd 77 e2 1e Aug 26 18:35:56.538821: | 41 f7 9a 94 fb 03 0b 62 de f7 2b 6c b3 9b 65 f3 Aug 26 18:35:56.538826: | cb 20 75 36 50 50 fa bb a2 8d f7 c4 8b ae f2 de Aug 26 18:35:56.538830: | a5 50 b5 89 0b 50 c4 13 c8 97 5f 9f de a1 71 4e Aug 26 18:35:56.538834: | e0 05 43 bd b9 a7 4f 30 29 f3 47 71 1a b2 08 8a Aug 26 18:35:56.538838: | ab 58 2c 91 b4 b5 cf 82 9e 65 2f 9a 05 f9 35 42 Aug 26 18:35:56.538842: | a1 2b cd 16 6a d6 a2 3f 99 2b 01 28 27 a0 16 21 Aug 26 18:35:56.538847: | 88 c9 95 c4 53 62 1e 19 04 9e 42 eb c8 0c 9e bf Aug 26 18:35:56.538855: | 4a e4 b1 ae d7 ef f8 96 27 a7 b2 d2 ef 73 71 5f Aug 26 18:35:56.538859: | 95 79 d7 52 16 3b 47 1f 48 1e af 31 fc 7c 68 a7 Aug 26 18:35:56.538863: | 14 00 00 24 e4 09 ec cd 3d 3e dd d6 98 15 a4 e0 Aug 26 18:35:56.538868: | a3 56 b2 47 37 cb b4 c8 b5 b1 43 be da b0 ce 5d Aug 26 18:35:56.538872: | 48 46 44 34 14 00 00 24 a9 2f e5 fb 53 80 c3 37 Aug 26 18:35:56.538876: | 73 bb d7 48 b3 79 83 38 92 1e 78 85 f7 60 85 27 Aug 26 18:35:56.538881: | 4a 23 97 31 bf ab b5 1b 00 00 00 24 25 7e eb 9e Aug 26 18:35:56.538885: | 19 79 14 5a 14 be ef ff 20 34 07 9a 34 fc fb c3 Aug 26 18:35:56.538889: | fa 3d 9c f7 36 89 9d 76 a0 f5 81 bf Aug 26 18:35:56.538897: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 18:35:56.538902: | **parse ISAKMP Message: Aug 26 18:35:56.538907: | initiator cookie: Aug 26 18:35:56.538911: | 0f 74 b2 29 fd 07 8f d4 Aug 26 18:35:56.538915: | responder cookie: Aug 26 18:35:56.538919: | d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.538924: | next payload type: ISAKMP_NEXT_KE (0x4) Aug 26 18:35:56.538929: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:35:56.538933: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:35:56.538938: | flags: none (0x0) Aug 26 18:35:56.538942: | Message ID: 0 (0x0) Aug 26 18:35:56.538947: | length: 396 (0x18c) Aug 26 18:35:56.538952: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:35:56.538958: | State DB: found IKEv1 state #1 in MAIN_I2 (find_state_ikev1) Aug 26 18:35:56.538966: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) Aug 26 18:35:56.538971: | #1 is idle Aug 26 18:35:56.538976: | #1 idle Aug 26 18:35:56.538981: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080 Aug 26 18:35:56.538986: | ***parse ISAKMP Key Exchange Payload: Aug 26 18:35:56.538991: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 18:35:56.538995: | length: 260 (0x104) Aug 26 18:35:56.539000: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080 Aug 26 18:35:56.539004: | ***parse ISAKMP Nonce Payload: Aug 26 18:35:56.539009: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Aug 26 18:35:56.539013: | length: 36 (0x24) Aug 26 18:35:56.539018: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 Aug 26 18:35:56.539022: | ***parse ISAKMP NAT-D Payload: Aug 26 18:35:56.539027: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Aug 26 18:35:56.539031: | length: 36 (0x24) Aug 26 18:35:56.539036: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 Aug 26 18:35:56.539040: | ***parse ISAKMP NAT-D Payload: Aug 26 18:35:56.539044: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.539048: | length: 36 (0x24) Aug 26 18:35:56.539053: | message 'main_inR2_outI3' HASH payload not checked early Aug 26 18:35:56.539062: | started looking for secret for @road->@east of kind PKK_PSK Aug 26 18:35:56.539067: | actually looking for secret for @road->@east of kind PKK_PSK Aug 26 18:35:56.539072: | line 1: key type PKK_PSK(@road) to type PKK_RSA Aug 26 18:35:56.539079: | concluding with best_match=000 best=(nil) (lineno=-1) Aug 26 18:35:56.539083: | no PreShared Key Found Aug 26 18:35:56.539090: | adding aggr outR1 DH work-order 2 for state #1 Aug 26 18:35:56.539094: | state #1 requesting EVENT_RETRANSMIT to be deleted Aug 26 18:35:56.539099: | #1 STATE_MAIN_I2: retransmits: cleared Aug 26 18:35:56.539105: | libevent_free: release ptr-libevent@0x55b20a5f1c58 Aug 26 18:35:56.539110: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55b20a5eede8 Aug 26 18:35:56.539115: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55b20a5eede8 Aug 26 18:35:56.539122: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 18:35:56.539127: | libevent_malloc: new ptr-libevent@0x7fa210002888 size 128 Aug 26 18:35:56.539140: | complete v1 state transition with STF_SUSPEND Aug 26 18:35:56.539151: | [RE]START processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) Aug 26 18:35:56.539153: | crypto helper 2 resuming Aug 26 18:35:56.539156: | suspending state #1 and saving MD Aug 26 18:35:56.539196: | crypto helper 2 starting work-order 2 for state #1 Aug 26 18:35:56.539199: | #1 is busy; has a suspended MD Aug 26 18:35:56.539211: | crypto helper 2 doing compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 Aug 26 18:35:56.539215: | #1 spent 0.126 milliseconds in process_packet_tail() Aug 26 18:35:56.539223: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:35:56.539231: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 18:35:56.539236: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:35:56.539242: | spent 0.452 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:35:56.541223: | crypto helper 2 finished compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 time elapsed 0.002011 seconds Aug 26 18:35:56.541250: | (#1) spent 2.02 milliseconds in crypto helper computing work-order 2: aggr outR1 DH (pcr) Aug 26 18:35:56.541258: | crypto helper 2 sending results from work-order 2 for state #1 to event queue Aug 26 18:35:56.541265: | scheduling resume sending helper answer for #1 Aug 26 18:35:56.541272: | libevent_malloc: new ptr-libevent@0x7fa208000f48 size 128 Aug 26 18:35:56.541294: | crypto helper 2 waiting (nothing to do) Aug 26 18:35:56.541317: | processing resume sending helper answer for #1 Aug 26 18:35:56.541336: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 18:35:56.541345: | crypto helper 2 replies to request ID 2 Aug 26 18:35:56.541351: | calling continuation function 0x55b20a34bb50 Aug 26 18:35:56.541356: | main_inR2_outI3_cryptotail for #1: calculated DH, sending R1 Aug 26 18:35:56.541366: | **emit ISAKMP Message: Aug 26 18:35:56.541371: | initiator cookie: Aug 26 18:35:56.541376: | 0f 74 b2 29 fd 07 8f d4 Aug 26 18:35:56.541380: | responder cookie: Aug 26 18:35:56.541385: | d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.541390: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 18:35:56.541395: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:35:56.541400: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:35:56.541405: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 18:35:56.541410: | Message ID: 0 (0x0) Aug 26 18:35:56.541416: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:35:56.541421: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 5:ISAKMP_NEXT_ID Aug 26 18:35:56.541428: | thinking about whether to send my certificate: Aug 26 18:35:56.541434: | I have RSA key: OAKLEY_RSA_SIG cert.type: 0?? Aug 26 18:35:56.541440: | sendcert: CERT_ALWAYSSEND and I did not get a certificate request Aug 26 18:35:56.541444: | so do not send cert. Aug 26 18:35:56.541448: | I did not send a certificate because I do not have one. Aug 26 18:35:56.541453: | I am not sending a certificate request Aug 26 18:35:56.541458: | I will NOT send an initial contact payload Aug 26 18:35:56.541463: | init checking NAT-T: enabled; RFC 3947 (NAT-Traversal) Aug 26 18:35:56.541483: | natd_hash: hasher=0x55b20a420ca0(32) Aug 26 18:35:56.541489: | natd_hash: icookie= 0f 74 b2 29 fd 07 8f d4 Aug 26 18:35:56.541493: | natd_hash: rcookie= d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.541498: | natd_hash: ip= c0 01 03 d1 Aug 26 18:35:56.541502: | natd_hash: port=500 Aug 26 18:35:56.541507: | natd_hash: hash= a9 2f e5 fb 53 80 c3 37 73 bb d7 48 b3 79 83 38 Aug 26 18:35:56.541512: | natd_hash: hash= 92 1e 78 85 f7 60 85 27 4a 23 97 31 bf ab b5 1b Aug 26 18:35:56.541525: | natd_hash: hasher=0x55b20a420ca0(32) Aug 26 18:35:56.541531: | natd_hash: icookie= 0f 74 b2 29 fd 07 8f d4 Aug 26 18:35:56.541540: | natd_hash: rcookie= d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.541545: | natd_hash: ip= c0 01 02 17 Aug 26 18:35:56.541549: | natd_hash: port=500 Aug 26 18:35:56.541554: | natd_hash: hash= 25 7e eb 9e 19 79 14 5a 14 be ef ff 20 34 07 9a Aug 26 18:35:56.541558: | natd_hash: hash= 34 fc fb c3 fa 3d 9c f7 36 89 9d 76 a0 f5 81 bf Aug 26 18:35:56.541562: | expected NAT-D(me): a9 2f e5 fb 53 80 c3 37 73 bb d7 48 b3 79 83 38 Aug 26 18:35:56.541567: | expected NAT-D(me): 92 1e 78 85 f7 60 85 27 4a 23 97 31 bf ab b5 1b Aug 26 18:35:56.541572: | expected NAT-D(him): Aug 26 18:35:56.541576: | 25 7e eb 9e 19 79 14 5a 14 be ef ff 20 34 07 9a Aug 26 18:35:56.541581: | 34 fc fb c3 fa 3d 9c f7 36 89 9d 76 a0 f5 81 bf Aug 26 18:35:56.541585: | received NAT-D: a9 2f e5 fb 53 80 c3 37 73 bb d7 48 b3 79 83 38 Aug 26 18:35:56.541590: | received NAT-D: 92 1e 78 85 f7 60 85 27 4a 23 97 31 bf ab b5 1b Aug 26 18:35:56.541595: | received NAT-D: 25 7e eb 9e 19 79 14 5a 14 be ef ff 20 34 07 9a Aug 26 18:35:56.541600: | received NAT-D: 34 fc fb c3 fa 3d 9c f7 36 89 9d 76 a0 f5 81 bf Aug 26 18:35:56.541605: | NAT_TRAVERSAL encaps using auto-detect Aug 26 18:35:56.541610: | NAT_TRAVERSAL this end is NOT behind NAT Aug 26 18:35:56.541614: | NAT_TRAVERSAL that end is NOT behind NAT Aug 26 18:35:56.541620: | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 Aug 26 18:35:56.541626: | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected Aug 26 18:35:56.541630: | NAT_T_WITH_KA detected Aug 26 18:35:56.541636: | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds Aug 26 18:35:56.541643: | ***emit ISAKMP Identification Payload (IPsec DOI): Aug 26 18:35:56.541649: | next payload type: ISAKMP_NEXT_SIG (0x9) Aug 26 18:35:56.541653: | ID type: ID_FQDN (0x2) Aug 26 18:35:56.541658: | Protocol ID: 0 (0x0) Aug 26 18:35:56.541662: | port: 0 (0x0) Aug 26 18:35:56.541668: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 9:ISAKMP_NEXT_SIG Aug 26 18:35:56.541674: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) Aug 26 18:35:56.541680: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' Aug 26 18:35:56.541686: | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) Aug 26 18:35:56.541691: | my identity 72 6f 61 64 Aug 26 18:35:56.541696: | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 Aug 26 18:35:56.541752: | started looking for secret for @road->@east of kind PKK_RSA Aug 26 18:35:56.541760: | actually looking for secret for @road->@east of kind PKK_RSA Aug 26 18:35:56.541766: | line 1: key type PKK_RSA(@road) to type PKK_RSA Aug 26 18:35:56.541772: | 1: compared key (none) to @road / @east -> 002 Aug 26 18:35:56.541777: | 2: compared key (none) to @road / @east -> 002 Aug 26 18:35:56.541781: | line 1: match=002 Aug 26 18:35:56.541787: | match 002 beats previous best_match 000 match=0x55b20a4fbb58 (line=1) Aug 26 18:35:56.541792: | concluding with best_match=002 best=0x55b20a4fbb58 (lineno=1) Aug 26 18:35:56.552844: | ***emit ISAKMP Signature Payload: Aug 26 18:35:56.552867: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.552874: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Signature Payload (9:ISAKMP_NEXT_SIG) Aug 26 18:35:56.552880: | next payload chain: saving location 'ISAKMP Signature Payload'.'next payload type' in 'reply packet' Aug 26 18:35:56.552886: | emitting 388 raw bytes of SIG_I into ISAKMP Signature Payload Aug 26 18:35:56.552890: | SIG_I 26 63 ce c3 29 a5 aa ae 1e 7f d7 b0 77 e9 a3 de Aug 26 18:35:56.552895: | SIG_I 89 d4 a3 df f0 3a 17 cc 20 2c 25 f2 2d 1c 5c a6 Aug 26 18:35:56.552899: | SIG_I 8a 16 7b 72 c5 19 27 8a 7d ea 4a 5d fc d5 64 3c Aug 26 18:35:56.552903: | SIG_I 32 eb b4 2a 52 08 e6 20 50 2b 50 10 c7 0a fc 87 Aug 26 18:35:56.552913: | SIG_I 90 84 a2 b6 f0 b2 a1 03 5a f9 bb 3a fc a6 d6 11 Aug 26 18:35:56.552917: | SIG_I 1b 74 50 82 2b 35 11 3d 9b 3e 34 d4 c6 e6 81 1c Aug 26 18:35:56.552922: | SIG_I b3 7f c4 82 37 37 44 54 84 a3 14 26 a9 09 2f 47 Aug 26 18:35:56.552926: | SIG_I 64 50 95 c1 d8 13 01 8e 8a 53 b3 b7 0c f7 51 83 Aug 26 18:35:56.552930: | SIG_I cf 7e 11 7c 43 e9 5f 10 76 ab f5 8a 2a d1 f6 8c Aug 26 18:35:56.552934: | SIG_I 79 3f b7 9e 83 82 e2 32 b5 3d 3a 3e 1e 2b cb 5b Aug 26 18:35:56.552938: | SIG_I a6 81 f3 11 b2 8c 7a 40 4a a1 c6 d9 61 52 2b a7 Aug 26 18:35:56.552942: | SIG_I a8 c3 b5 5f 73 09 f1 89 63 c4 36 1f 31 ab 60 76 Aug 26 18:35:56.552946: | SIG_I 88 d7 7f 62 45 0c 72 03 ca ac bd e5 b4 68 a4 06 Aug 26 18:35:56.552950: | SIG_I 99 b2 f7 1a fd e7 18 a4 f4 43 23 e3 14 0a e0 3a Aug 26 18:35:56.552954: | SIG_I b1 86 1c c2 c9 1a cd 3d b0 29 b8 7f 87 cf 8e 24 Aug 26 18:35:56.552959: | SIG_I ac bb 6d 5a 73 cc d9 4d c4 4b d0 83 04 f6 ba 78 Aug 26 18:35:56.552963: | SIG_I 8f 78 7c 05 ad 5f ee dd d3 53 d3 24 70 0f 9d 40 Aug 26 18:35:56.552967: | SIG_I 24 a0 d7 5d 03 0c ac 37 fd 17 47 80 cc 9b e4 4b Aug 26 18:35:56.552971: | SIG_I 90 bf 06 b6 47 ed 3b a3 3e 23 c1 a5 54 0e 0e 6a Aug 26 18:35:56.552975: | SIG_I 6b d2 d7 97 43 91 fb b0 f5 bc 8e 93 04 07 10 0c Aug 26 18:35:56.552979: | SIG_I 1d 9d 8c cc 12 d0 cd a9 77 9e a8 85 d6 69 10 1e Aug 26 18:35:56.552983: | SIG_I 2c 4f 87 7e 67 5f f9 49 7b 62 ec 14 95 f3 43 98 Aug 26 18:35:56.552987: | SIG_I ad 0b aa 9d 06 a3 91 02 50 5a 27 a1 93 13 ca b0 Aug 26 18:35:56.552991: | SIG_I 98 c8 9a e8 2b 20 19 76 82 50 dc cd 25 89 d9 2c Aug 26 18:35:56.552995: | SIG_I 2b 46 ff 52 Aug 26 18:35:56.553000: | emitting length of ISAKMP Signature Payload: 392 Aug 26 18:35:56.553004: | Not sending INITIAL_CONTACT Aug 26 18:35:56.553009: | emitting 12 zero bytes of encryption padding into ISAKMP Message Aug 26 18:35:56.553014: | no IKEv1 message padding required Aug 26 18:35:56.553018: | emitting length of ISAKMP Message: 444 Aug 26 18:35:56.553040: | complete v1 state transition with STF_OK Aug 26 18:35:56.553052: | [RE]START processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:35:56.553057: | #1 is idle Aug 26 18:35:56.553061: | doing_xauth:yes, t_xauth_client_done:no Aug 26 18:35:56.553066: | IKEv1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 Aug 26 18:35:56.553072: | parent state #1: MAIN_I2(open IKE SA) => MAIN_I3(open IKE SA) Aug 26 18:35:56.553076: | event_already_set, deleting event Aug 26 18:35:56.553081: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 18:35:56.553089: | libevent_free: release ptr-libevent@0x7fa210002888 Aug 26 18:35:56.553095: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55b20a5eede8 Aug 26 18:35:56.553105: | sending reply packet to 192.1.2.23:500 (from 192.1.3.209:500) Aug 26 18:35:56.553117: | sending 444 bytes for STATE_MAIN_I2 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 18:35:56.553122: | 0f 74 b2 29 fd 07 8f d4 d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.553127: | 05 10 02 01 00 00 00 00 00 00 01 bc 38 6f 70 06 Aug 26 18:35:56.553131: | bd 75 c3 3d 3a 35 90 a3 cf dc b4 23 65 24 fa ba Aug 26 18:35:56.553134: | e6 95 19 6b 77 47 d2 d7 ac de 84 64 58 a8 e8 e7 Aug 26 18:35:56.553138: | cf a0 ae 4b 5d cb 34 e9 d3 9e fb ec b5 0d c3 3f Aug 26 18:35:56.553142: | 97 ed d4 f5 27 bc 4c b5 1e 94 d6 23 0b a0 bf 93 Aug 26 18:35:56.553146: | b3 e5 6f d3 37 dc 57 e7 8d cc 18 57 36 0b 34 93 Aug 26 18:35:56.553150: | ba ea 7e 03 8c 31 53 19 ba e3 0d b1 08 10 5f 9e Aug 26 18:35:56.553154: | 9f c3 d2 f2 e4 0e 7a 88 2d 8c ed f7 8e dc 39 cc Aug 26 18:35:56.553158: | d4 24 98 f5 08 44 2e f5 9a 68 c0 b9 7b ca eb b8 Aug 26 18:35:56.553162: | 4f 37 e3 22 2e 38 72 5d 78 69 30 31 30 3c e0 0c Aug 26 18:35:56.553166: | 6a fe 80 65 51 39 9a 18 cd ec 30 19 97 59 68 e4 Aug 26 18:35:56.553173: | 7d 1e 2d 0d 24 3c 77 36 6c 27 4f d5 94 0f 00 2b Aug 26 18:35:56.553177: | 9a fe 0e 21 03 99 3f 6e 43 e6 29 f0 ff ce 29 24 Aug 26 18:35:56.553181: | 46 31 ac fa ed ec 09 fd eb 3a 91 b5 3d c6 58 d3 Aug 26 18:35:56.553185: | 11 6b 67 61 48 47 3a ff 66 33 e2 03 da 92 e0 8a Aug 26 18:35:56.553189: | 53 af f4 9f 01 a3 10 3e e1 cf 1e cc 17 db a9 13 Aug 26 18:35:56.553194: | b4 cf 38 96 b9 47 dc 41 98 71 9e 72 25 cc 6e 08 Aug 26 18:35:56.553198: | 92 79 c0 71 fe 16 5e df 3b 73 b1 78 04 f8 7a 49 Aug 26 18:35:56.553202: | cf 6c 14 00 4f e4 f5 e9 3d 5e d1 09 87 89 fa f8 Aug 26 18:35:56.553206: | 42 cd d2 d2 19 92 e7 40 96 6e ea ec e0 7c 30 26 Aug 26 18:35:56.553210: | 82 e3 86 80 fe 43 56 2d 6a ab f5 34 0f 0d 2d c4 Aug 26 18:35:56.553214: | 5b a4 29 ef b1 14 72 05 19 b3 3a fb 71 cb 93 60 Aug 26 18:35:56.553218: | c7 bd 56 04 40 64 ed a4 c5 2d fb 98 de 3e 58 3b Aug 26 18:35:56.553222: | 56 86 53 da 75 7c 16 bc f7 64 03 52 6d 99 9c 30 Aug 26 18:35:56.553226: | 91 a7 f8 57 34 0d 22 d5 31 94 99 36 26 fe 1f 0e Aug 26 18:35:56.553230: | 43 39 f6 88 53 97 5c 53 a4 c7 ce d4 01 48 6f f2 Aug 26 18:35:56.553234: | 36 b6 18 52 74 21 47 fd 03 a6 86 87 Aug 26 18:35:56.553303: | !event_already_set at reschedule Aug 26 18:35:56.553312: | event_schedule: new EVENT_RETRANSMIT-pe@0x55b20a5eede8 Aug 26 18:35:56.553318: | inserting event EVENT_RETRANSMIT, timeout in 25 seconds for #1 Aug 26 18:35:56.553324: | libevent_malloc: new ptr-libevent@0x55b20a5eee58 size 128 Aug 26 18:35:56.553336: | #1 STATE_MAIN_I3: retransmits: first event in 25 seconds; timeout in 107 seconds; limit of 12 retransmits; current time is 29842.295777 Aug 26 18:35:56.553342: "xauth-road-eastnet" #1: STATE_MAIN_I3: sent MI3, expecting MR3 Aug 26 18:35:56.553355: | XAUTH client is not yet authenticated Aug 26 18:35:56.553362: | resume sending helper answer for #1 suppresed complete_v1_state_transition() Aug 26 18:35:56.553372: | #1 spent 11.9 milliseconds in resume sending helper answer Aug 26 18:35:56.553381: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 18:35:56.553386: | libevent_free: release ptr-libevent@0x7fa208000f48 Aug 26 18:35:56.560817: | spent 0.0054 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:35:56.560854: | *received 332 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) Aug 26 18:35:56.560861: | 0f 74 b2 29 fd 07 8f d4 d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.560866: | 05 10 02 01 00 00 00 00 00 00 01 4c 28 33 5f 62 Aug 26 18:35:56.560870: | 88 e0 fc 17 59 12 75 0f 1f 43 87 14 7a 98 09 ba Aug 26 18:35:56.560874: | d2 b9 b3 30 b6 04 ca 3b ee c9 6b f9 5b 49 77 3f Aug 26 18:35:56.560879: | ac 15 ff 77 0d 43 05 6f 45 3f b9 d8 d3 7d 10 22 Aug 26 18:35:56.560882: | f8 7e c9 db 55 f4 59 6e 2c 58 ab 7b ed 7a b4 86 Aug 26 18:35:56.560886: | 7b 34 98 c2 ee 6c c2 10 b0 53 8d db 27 af 95 28 Aug 26 18:35:56.560891: | 30 6c a2 8b 03 23 6d 29 b0 74 08 30 42 22 fc 54 Aug 26 18:35:56.560895: | 66 01 02 79 ba 30 f0 8f 3e 30 90 03 da 99 52 f2 Aug 26 18:35:56.560899: | 4d 98 ca 94 b5 f4 d2 cf 92 d3 32 55 da ca 8a ec Aug 26 18:35:56.560903: | d3 d9 bf e3 48 bd 2b 71 c7 ef 21 c6 9f 34 f5 8f Aug 26 18:35:56.560907: | ef 2c 26 d9 65 6d 78 25 de a2 80 51 e4 ae 6d ce Aug 26 18:35:56.560911: | c0 23 e8 fe bd c1 0e fe c0 50 e1 61 73 9a b6 4b Aug 26 18:35:56.560915: | b6 c9 72 47 80 6c 40 e4 5b c6 a1 79 e7 5e a4 79 Aug 26 18:35:56.560918: | 50 8f 5d 59 bb b7 c5 31 28 15 7b 35 7a 1a 0b 1d Aug 26 18:35:56.560922: | 51 3e 54 36 35 8f 58 56 db be 44 60 b6 6b 51 94 Aug 26 18:35:56.560926: | ee 9e b2 4e 4b 4e 77 7b 8d ec 7a cc f7 8c bf 22 Aug 26 18:35:56.560930: | 7c aa 55 3f e6 97 89 4b 80 8f db a6 75 bb a7 23 Aug 26 18:35:56.560934: | 1d f6 2a c2 14 92 6f 77 58 6d 65 ed 6f a5 59 7e Aug 26 18:35:56.560938: | 40 80 05 6f 25 44 ef e8 ed 03 f6 b0 8f b7 95 6a Aug 26 18:35:56.560946: | ac 3d 1f 8f 53 b4 79 d1 ce b8 b2 b8 Aug 26 18:35:56.560954: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 18:35:56.560961: | **parse ISAKMP Message: Aug 26 18:35:56.560966: | initiator cookie: Aug 26 18:35:56.560970: | 0f 74 b2 29 fd 07 8f d4 Aug 26 18:35:56.560974: | responder cookie: Aug 26 18:35:56.560978: | d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.560983: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 18:35:56.560988: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:35:56.560992: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 18:35:56.560997: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 18:35:56.561002: | Message ID: 0 (0x0) Aug 26 18:35:56.561006: | length: 332 (0x14c) Aug 26 18:35:56.561011: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 18:35:56.561018: | State DB: found IKEv1 state #1 in MAIN_I3 (find_state_ikev1) Aug 26 18:35:56.561027: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) Aug 26 18:35:56.561032: | #1 is idle Aug 26 18:35:56.561036: | #1 idle Aug 26 18:35:56.561042: | received encrypted packet from 192.1.2.23:500 Aug 26 18:35:56.561068: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x220 opt: 0x20c0 Aug 26 18:35:56.561074: | ***parse ISAKMP Identification Payload: Aug 26 18:35:56.561079: | next payload type: ISAKMP_NEXT_SIG (0x9) Aug 26 18:35:56.561084: | length: 12 (0xc) Aug 26 18:35:56.561089: | ID type: ID_FQDN (0x2) Aug 26 18:35:56.561093: | DOI specific A: 0 (0x0) Aug 26 18:35:56.561098: | DOI specific B: 0 (0x0) Aug 26 18:35:56.561102: | obj: 65 61 73 74 Aug 26 18:35:56.561108: | got payload 0x200 (ISAKMP_NEXT_SIG) needed: 0x200 opt: 0x20c0 Aug 26 18:35:56.561112: | ***parse ISAKMP Signature Payload: Aug 26 18:35:56.561117: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.561122: | length: 278 (0x116) Aug 26 18:35:56.561126: | removing 14 bytes of padding Aug 26 18:35:56.561132: | message 'main_inR3' HASH payload not checked early Aug 26 18:35:56.561141: "xauth-road-eastnet" #1: Peer ID is ID_FQDN: '@east' Aug 26 18:35:56.561156: | X509: no CERT payloads to process Aug 26 18:35:56.561215: | required RSA CA is '%any' Aug 26 18:35:56.561225: | checking RSA keyid '@east' for match with '@east' Aug 26 18:35:56.561231: | key issuer CA is '%any' Aug 26 18:35:56.561337: | an RSA Sig check passed with *AQO9bJbr3 [preloaded key] Aug 26 18:35:56.561355: | #1 spent 0.11 milliseconds in try_all_RSA_keys() trying a pubkey Aug 26 18:35:56.561361: "xauth-road-eastnet" #1: Authenticated using RSA Aug 26 18:35:56.561374: | FOR_EACH_CONNECTION_... in ISAKMP_SA_established Aug 26 18:35:56.561478: | complete v1 state transition with STF_OK Aug 26 18:35:56.561490: | [RE]START processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:35:56.561495: | #1 is idle Aug 26 18:35:56.561500: | doing_xauth:yes, t_xauth_client_done:no Aug 26 18:35:56.561505: | IKEv1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 Aug 26 18:35:56.561511: | parent state #1: MAIN_I3(open IKE SA) => MAIN_I4(established IKE SA) Aug 26 18:35:56.561515: | event_already_set, deleting event Aug 26 18:35:56.561520: | state #1 requesting EVENT_RETRANSMIT to be deleted Aug 26 18:35:56.561525: | #1 STATE_MAIN_I4: retransmits: cleared Aug 26 18:35:56.561531: | libevent_free: release ptr-libevent@0x55b20a5eee58 Aug 26 18:35:56.561536: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55b20a5eede8 Aug 26 18:35:56.561541: | !event_already_set at reschedule Aug 26 18:35:56.561548: | event_schedule: new EVENT_SA_REPLACE-pe@0x55b20a5eede8 Aug 26 18:35:56.561555: | inserting event EVENT_SA_REPLACE, timeout in 2607 seconds for #1 Aug 26 18:35:56.561561: | libevent_malloc: new ptr-libevent@0x7fa208000f48 size 128 Aug 26 18:35:56.561567: | pstats #1 ikev1.isakmp established Aug 26 18:35:56.561574: "xauth-road-eastnet" #1: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} Aug 26 18:35:56.561590: | DPD: dpd_init() called on ISAKMP SA Aug 26 18:35:56.561595: | DPD: Peer supports Dead Peer Detection Aug 26 18:35:56.561599: | DPD: not initializing DPD because DPD is disabled locally Aug 26 18:35:56.561603: | XAUTH client is not yet authenticated Aug 26 18:35:56.561612: | #1 spent 0.467 milliseconds in process_packet_tail() Aug 26 18:35:56.561620: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:35:56.561629: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 18:35:56.561634: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:35:56.561641: | spent 0.798 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:35:56.641213: | spent 0.0037 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 18:35:56.641245: | *received 92 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) Aug 26 18:35:56.641251: | 0f 74 b2 29 fd 07 8f d4 d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.641254: | 08 10 06 01 cd d3 02 5b 00 00 00 5c 0b 48 16 84 Aug 26 18:35:56.641257: | 11 a5 d0 dc c0 f6 24 10 da f8 28 74 fd 0f dc 8f Aug 26 18:35:56.641261: | 16 1f 5f 01 eb 69 99 aa 25 55 67 60 c3 ba b0 24 Aug 26 18:35:56.641264: | 7f 1b 17 7f f3 23 42 f6 04 36 ad 23 95 76 71 e8 Aug 26 18:35:56.641267: | dc d7 1b a6 24 bd c4 b7 11 bf 34 65 Aug 26 18:35:56.641273: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 18:35:56.641278: | **parse ISAKMP Message: Aug 26 18:35:56.641282: | initiator cookie: Aug 26 18:35:56.641285: | 0f 74 b2 29 fd 07 8f d4 Aug 26 18:35:56.641303: | responder cookie: Aug 26 18:35:56.641309: | d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.641312: | next payload type: ISAKMP_NEXT_HASH (0x8) Aug 26 18:35:56.641316: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:35:56.641320: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6) Aug 26 18:35:56.641324: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 18:35:56.641328: | Message ID: 3453157979 (0xcdd3025b) Aug 26 18:35:56.641331: | length: 92 (0x5c) Aug 26 18:35:56.641335: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_MODE_CFG (6) Aug 26 18:35:56.641341: | peer and cookies match on #1; msgid=cdd3025b st_msgid=00000000 st_msgid_phase15=00000000 Aug 26 18:35:56.641345: | State DB: IKEv1 state not found (find_v1_info_state) Aug 26 18:35:56.641349: | No appropriate Mode Config state yet. See if we have a Main Mode state Aug 26 18:35:56.641354: | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 Aug 26 18:35:56.641357: | p15 state object #1 found, in STATE_MAIN_I4 Aug 26 18:35:56.641361: | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) Aug 26 18:35:56.641368: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1678) Aug 26 18:35:56.641372: | processing received isakmp_xchg_type ISAKMP_XCHG_MODE_CFG. Aug 26 18:35:56.641376: | this is a xauthclient Aug 26 18:35:56.641379: | call init_phase2_iv Aug 26 18:35:56.641398: | set from_state to STATE_MAIN_I4 this is xauthclient and IS_PHASE1() is TRUE Aug 26 18:35:56.641403: | #1 is idle Aug 26 18:35:56.641407: | #1 idle Aug 26 18:35:56.641412: | received encrypted packet from 192.1.2.23:500 Aug 26 18:35:56.641425: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x4100 opt: 0x2000 Aug 26 18:35:56.641430: | ***parse ISAKMP Hash Payload: Aug 26 18:35:56.641434: | next payload type: ISAKMP_NEXT_MODECFG (0xe) Aug 26 18:35:56.641437: | length: 36 (0x24) Aug 26 18:35:56.641441: | got payload 0x4000 (ISAKMP_NEXT_MODECFG) needed: 0x4000 opt: 0x2000 Aug 26 18:35:56.641445: | ***parse ISAKMP Mode Attribute: Aug 26 18:35:56.641448: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.641452: | length: 16 (0x10) Aug 26 18:35:56.641455: | Attr Msg Type: ISAKMP_CFG_REQUEST (0x1) Aug 26 18:35:56.641462: | Identifier: 0 (0x0) Aug 26 18:35:56.641466: | removing 12 bytes of padding Aug 26 18:35:56.641493: | xauth_inI0 HASH(1): Aug 26 18:35:56.641499: | ac 80 ed a9 1f 20 dc 67 c0 5d 89 03 80 d4 7a 79 Aug 26 18:35:56.641503: | 3c df a2 8c 36 cd 4f cd b2 bd b6 89 5a 7e 2d 5a Aug 26 18:35:56.641506: | received 'xauth_inI0' message HASH(1) data ok Aug 26 18:35:56.641514: | **emit ISAKMP Message: Aug 26 18:35:56.641518: | initiator cookie: Aug 26 18:35:56.641521: | 0f 74 b2 29 fd 07 8f d4 Aug 26 18:35:56.641524: | responder cookie: Aug 26 18:35:56.641527: | d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.641530: | next payload type: ISAKMP_NEXT_HASH (0x8) Aug 26 18:35:56.641534: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 18:35:56.641537: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6) Aug 26 18:35:56.641541: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 18:35:56.641544: | Message ID: 3453157979 (0xcdd3025b) Aug 26 18:35:56.641548: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 18:35:56.641552: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 8:ISAKMP_NEXT_HASH Aug 26 18:35:56.641556: | arrived in xauth_inI0 Aug 26 18:35:56.641560: | ****parse ISAKMP ModeCfg attribute: Aug 26 18:35:56.641564: | ModeCfg attr type: XAUTH-USER-NAME (0x4089) Aug 26 18:35:56.641568: | length/value: 0 (0x0) Aug 26 18:35:56.641571: | Received Cisco XAUTH username Aug 26 18:35:56.641574: | ****parse ISAKMP ModeCfg attribute: Aug 26 18:35:56.641577: | ModeCfg attr type: XAUTH-USER-PASSWORD (0x408a) Aug 26 18:35:56.641581: | length/value: 0 (0x0) Aug 26 18:35:56.641584: | Received Cisco XAUTH password Aug 26 18:35:56.641587: | XAUTH: Username or password request received Aug 26 18:35:56.641591: | ***emit ISAKMP Hash Payload: Aug 26 18:35:56.641594: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.641599: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 18:35:56.641603: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' Aug 26 18:35:56.641607: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 18:35:56.641610: | emitting length of ISAKMP Hash Payload: 36 Aug 26 18:35:56.641614: | ***emit ISAKMP Mode Attribute: Aug 26 18:35:56.641618: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 18:35:56.641621: | Attr Msg Type: ISAKMP_CFG_REPLY (0x2) Aug 26 18:35:56.641624: | Identifier: 0 (0x0) Aug 26 18:35:56.641628: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Mode Attribute (14:ISAKMP_NEXT_MODECFG) Aug 26 18:35:56.641632: | next payload chain: saving location 'ISAKMP Mode Attribute'.'next payload type' in 'reply packet' Aug 26 18:35:56.641636: | ****emit ISAKMP ModeCfg attribute: Aug 26 18:35:56.641639: | ModeCfg attr type: XAUTH-USER-NAME (0x4089) Aug 26 18:35:56.641643: | prompting for Username: Aug 26 18:35:56.641732: | emitting 10 raw bytes of XAUTH username into ISAKMP ModeCfg attribute Aug 26 18:35:56.641742: | XAUTH username 67 6f 6f 64 75 73 65 72 39 30 Aug 26 18:35:56.641746: | emitting length of ISAKMP ModeCfg attribute: 10 Aug 26 18:35:56.641749: | ****emit ISAKMP ModeCfg attribute: Aug 26 18:35:56.641752: | ModeCfg attr type: XAUTH-USER-PASSWORD (0x408a) Aug 26 18:35:56.641756: | started looking for xauth secret for gooduser90 Aug 26 18:35:56.641760: | line 1: key type PKK_XAUTH(@gooduser90) to type PKK_RSA Aug 26 18:35:56.641764: | concluding with best_match=000 best=(nil) (lineno=-1) Aug 26 18:35:56.641767: | looked up username=gooduser90, got=(nil) Aug 26 18:35:56.641770: | prompting for Password: Aug 26 18:35:56.641803: | emitting 8 raw bytes of XAUTH password into ISAKMP ModeCfg attribute Aug 26 18:35:56.641808: | XAUTH password 75 73 65 31 70 61 73 73 Aug 26 18:35:56.641812: | emitting length of ISAKMP ModeCfg attribute: 8 Aug 26 18:35:56.641817: | emitting length of ISAKMP Mode Attribute: 34 Aug 26 18:35:56.641821: "xauth-road-eastnet" #1: XAUTH: Answering XAUTH challenge with user='gooduser90' Aug 26 18:35:56.641849: | XAUTH: client response HASH(1): Aug 26 18:35:56.641854: | a5 66 e5 b6 79 6d b2 4c 31 a9 59 61 0c a0 2f 2b Aug 26 18:35:56.641857: | e4 35 15 ed f8 38 81 3b 13 58 42 0c ac a4 fb 01 Aug 26 18:35:56.641861: | padding IKEv1 message with 2 bytes Aug 26 18:35:56.641865: | emitting 2 zero bytes of message padding into ISAKMP Message Aug 26 18:35:56.641868: | emitting length of ISAKMP Message: 100 Aug 26 18:35:56.641871: | emitting 8 zero bytes of encryption padding into ISAKMP Message Aug 26 18:35:56.641874: | no IKEv1 message padding required Aug 26 18:35:56.641876: | emitting length of ISAKMP Message: 108 Aug 26 18:35:56.641886: | xauth_inI0(STF_OK) Aug 26 18:35:56.641890: | complete v1 state transition with STF_OK Aug 26 18:35:56.641897: | [RE]START processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 18:35:56.641900: | #1 is idle Aug 26 18:35:56.641904: | doing_xauth:yes, t_xauth_client_done:no Aug 26 18:35:56.641907: | IKEv1: transition from state STATE_XAUTH_I0 to state STATE_XAUTH_I1 Aug 26 18:35:56.641911: | parent state #1: MAIN_I4(established IKE SA) => XAUTH_I1(established IKE SA) Aug 26 18:35:56.641914: | event_already_set, deleting event Aug 26 18:35:56.641917: | state #1 requesting EVENT_SA_REPLACE to be deleted Aug 26 18:35:56.641922: | libevent_free: release ptr-libevent@0x7fa208000f48 Aug 26 18:35:56.641926: | free_event_entry: release EVENT_SA_REPLACE-pe@0x55b20a5eede8 Aug 26 18:35:56.641933: | sending reply packet to 192.1.2.23:500 (from 192.1.3.209:500) Aug 26 18:35:56.641940: | sending 108 bytes for STATE_XAUTH_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 18:35:56.641942: | 0f 74 b2 29 fd 07 8f d4 d3 1e 6f 04 20 5a 79 93 Aug 26 18:35:56.641944: | 08 10 06 01 cd d3 02 5b 00 00 00 6c 7f d8 ff 17 Aug 26 18:35:56.641946: | b6 81 a5 ba 09 c9 62 47 03 d8 41 d8 14 26 80 de Aug 26 18:35:56.641948: | 11 9a ce ab 4f cc e7 c7 83 62 84 87 ba d3 ec f4 Aug 26 18:35:56.641950: | 11 81 8e 70 15 c4 0f ea 15 78 7b 07 83 d9 12 a4 Aug 26 18:35:56.641952: | 94 81 30 cb f7 ff 58 a9 f8 1c 1a 84 8a bd eb 1c Aug 26 18:35:56.641954: | 16 4b 4b 91 f2 9e 6b 25 ed 9d ba 3f Aug 26 18:35:56.641984: | !event_already_set at reschedule Aug 26 18:35:56.641991: | event_schedule: new EVENT_RETRANSMIT-pe@0x55b20a5eede8 Aug 26 18:35:56.641996: | inserting event EVENT_RETRANSMIT, timeout in 25 seconds for #1 Aug 26 18:35:56.642000: | libevent_malloc: new ptr-libevent@0x55b20a5eee58 size 128 Aug 26 18:35:56.642006: | #1 STATE_XAUTH_I1: retransmits: first event in 25 seconds; timeout in 107 seconds; limit of 12 retransmits; current time is 29842.384456 Aug 26 18:35:56.642010: | pstats #1 ikev1.isakmp established Aug 26 18:35:56.642017: "xauth-road-eastnet" #1: STATE_XAUTH_I1: XAUTH client - possibly awaiting CFG_set {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} Aug 26 18:35:56.642026: | DPD: dpd_init() called on ISAKMP SA Aug 26 18:35:56.642029: | DPD: Peer supports Dead Peer Detection Aug 26 18:35:56.642032: | DPD: not initializing DPD because DPD is disabled locally Aug 26 18:35:56.642036: | XAUTH client is not yet authenticated Aug 26 18:35:56.642043: | #1 spent 0.458 milliseconds in process_packet_tail() Aug 26 18:35:56.642050: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 18:35:56.642056: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 18:35:56.642061: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 18:35:56.642066: | spent 0.749 milliseconds in comm_handle_cb() reading and processing packet Aug 26 18:36:16.304309: | processing global timer EVENT_SHUNT_SCAN Aug 26 18:36:16.304334: | expiring aged bare shunts from shunt table Aug 26 18:36:16.304346: | spent 0.0104 milliseconds in global timer EVENT_SHUNT_SCAN Aug 26 18:36:16.542605: | processing global timer EVENT_NAT_T_KEEPALIVE Aug 26 18:36:16.542625: | FOR_EACH_STATE_... in nat_traversal_ka_event (for_each_state) Aug 26 18:36:16.542633: | start processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in for_each_state() at state.c:1575) Aug 26 18:36:16.542637: | not behind NAT: no NAT-T KEEP-ALIVE required for conn xauth-road-eastnet Aug 26 18:36:16.542641: | stop processing: state #1 connection "xauth-road-eastnet" from 192.1.2.23 (in for_each_state() at state.c:1577) Aug 26 18:36:16.542649: | spent 0.0214 milliseconds in global timer EVENT_NAT_T_KEEPALIVE