Sep 21 07:15:37.739029: FIPS Product: YES Sep 21 07:15:37.739073: FIPS Kernel: NO Sep 21 07:15:37.739076: FIPS Mode: NO Sep 21 07:15:37.739079: NSS DB directory: sql:/etc/ipsec.d Sep 21 07:15:37.739275: Initializing NSS Sep 21 07:15:37.739281: Opening NSS database "sql:/etc/ipsec.d" read-only Sep 21 07:15:37.797055: NSS initialized Sep 21 07:15:37.797071: NSS crypto library initialized Sep 21 07:15:37.797075: FIPS HMAC integrity support [enabled] Sep 21 07:15:37.797077: FIPS mode disabled for pluto daemon Sep 21 07:15:38.127674: FIPS HMAC integrity verification self-test FAILED Sep 21 07:15:38.127777: libcap-ng support [enabled] Sep 21 07:15:38.127789: Linux audit support [enabled] Sep 21 07:15:38.127821: Linux audit activated Sep 21 07:15:38.127829: Starting Pluto (Libreswan Version v3.28-827-gc9aa82b8a6-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC SYSTEMD_WATCHDOG FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:29150 Sep 21 07:15:38.127833: core dump dir: /tmp Sep 21 07:15:38.127835: secrets file: /etc/ipsec.secrets Sep 21 07:15:38.127838: leak-detective disabled Sep 21 07:15:38.127840: NSS crypto [enabled] Sep 21 07:15:38.127842: XAUTH PAM support [enabled] Sep 21 07:15:38.127914: | libevent is using pluto's memory allocator Sep 21 07:15:38.127921: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Sep 21 07:15:38.127938: | libevent_malloc: new ptr-libevent@0x56077c1ae4f0 size 40 Sep 21 07:15:38.127942: | libevent_malloc: new ptr-libevent@0x56077c1af7a0 size 40 Sep 21 07:15:38.127945: | libevent_malloc: new ptr-libevent@0x56077c1af7d0 size 40 Sep 21 07:15:38.127948: | creating event base Sep 21 07:15:38.127951: | libevent_malloc: new ptr-libevent@0x56077c1af760 size 56 Sep 21 07:15:38.127954: | libevent_malloc: new ptr-libevent@0x56077c1af800 size 664 Sep 21 07:15:38.127965: | libevent_malloc: new ptr-libevent@0x56077c1afaa0 size 24 Sep 21 07:15:38.127969: | libevent_malloc: new ptr-libevent@0x56077c1a1260 size 384 Sep 21 07:15:38.127978: | libevent_malloc: new ptr-libevent@0x56077c1afac0 size 16 Sep 21 07:15:38.127981: | libevent_malloc: new ptr-libevent@0x56077c1afae0 size 40 Sep 21 07:15:38.127983: | libevent_malloc: new ptr-libevent@0x56077c1afb10 size 48 Sep 21 07:15:38.127991: | libevent_realloc: new ptr-libevent@0x56077c133370 size 256 Sep 21 07:15:38.127994: | libevent_malloc: new ptr-libevent@0x56077c1afb50 size 16 Sep 21 07:15:38.127999: | libevent_free: release ptr-libevent@0x56077c1af760 Sep 21 07:15:38.128003: | libevent initialized Sep 21 07:15:38.128007: | libevent_realloc: new ptr-libevent@0x56077c1afb70 size 64 Sep 21 07:15:38.128013: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Sep 21 07:15:38.128027: | init_nat_traversal() initialized with keep_alive=0s Sep 21 07:15:38.128030: NAT-Traversal support [enabled] Sep 21 07:15:38.128032: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Sep 21 07:15:38.128038: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Sep 21 07:15:38.128042: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Sep 21 07:15:38.128073: | global one-shot timer EVENT_REVIVE_CONNS initialized Sep 21 07:15:38.128076: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Sep 21 07:15:38.128079: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Sep 21 07:15:38.128132: Encryption algorithms: Sep 21 07:15:38.128139: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Sep 21 07:15:38.128143: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Sep 21 07:15:38.128146: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Sep 21 07:15:38.128150: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Sep 21 07:15:38.128153: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Sep 21 07:15:38.128163: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Sep 21 07:15:38.128167: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Sep 21 07:15:38.128170: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Sep 21 07:15:38.128174: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Sep 21 07:15:38.128177: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Sep 21 07:15:38.128181: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Sep 21 07:15:38.128184: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Sep 21 07:15:38.128188: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Sep 21 07:15:38.128192: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Sep 21 07:15:38.128195: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Sep 21 07:15:38.128198: NULL IKEv1: ESP IKEv2: ESP [] Sep 21 07:15:38.128201: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Sep 21 07:15:38.128208: Hash algorithms: Sep 21 07:15:38.128211: MD5 IKEv1: IKE IKEv2: Sep 21 07:15:38.128214: SHA1 IKEv1: IKE IKEv2: FIPS sha Sep 21 07:15:38.128218: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Sep 21 07:15:38.128221: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Sep 21 07:15:38.128223: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Sep 21 07:15:38.128240: PRF algorithms: Sep 21 07:15:38.128243: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Sep 21 07:15:38.128246: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Sep 21 07:15:38.128250: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Sep 21 07:15:38.128253: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Sep 21 07:15:38.128256: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Sep 21 07:15:38.128259: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Sep 21 07:15:38.128284: Integrity algorithms: Sep 21 07:15:38.128288: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Sep 21 07:15:38.128291: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Sep 21 07:15:38.128295: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Sep 21 07:15:38.128299: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Sep 21 07:15:38.128303: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Sep 21 07:15:38.128306: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Sep 21 07:15:38.128310: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Sep 21 07:15:38.128313: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Sep 21 07:15:38.128316: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Sep 21 07:15:38.128327: DH algorithms: Sep 21 07:15:38.128331: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Sep 21 07:15:38.128334: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Sep 21 07:15:38.128337: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Sep 21 07:15:38.128342: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Sep 21 07:15:38.128345: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Sep 21 07:15:38.128348: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Sep 21 07:15:38.128350: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Sep 21 07:15:38.128353: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Sep 21 07:15:38.128357: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Sep 21 07:15:38.128360: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Sep 21 07:15:38.128362: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Sep 21 07:15:38.128365: testing CAMELLIA_CBC: Sep 21 07:15:38.128368: Camellia: 16 bytes with 128-bit key Sep 21 07:15:38.128484: Camellia: 16 bytes with 128-bit key Sep 21 07:15:38.128515: Camellia: 16 bytes with 256-bit key Sep 21 07:15:38.128547: Camellia: 16 bytes with 256-bit key Sep 21 07:15:38.128575: testing AES_GCM_16: Sep 21 07:15:38.128578: empty string Sep 21 07:15:38.128606: one block Sep 21 07:15:38.128631: two blocks Sep 21 07:15:38.128656: two blocks with associated data Sep 21 07:15:38.128683: testing AES_CTR: Sep 21 07:15:38.128686: Encrypting 16 octets using AES-CTR with 128-bit key Sep 21 07:15:38.128713: Encrypting 32 octets using AES-CTR with 128-bit key Sep 21 07:15:38.128741: Encrypting 36 octets using AES-CTR with 128-bit key Sep 21 07:15:38.128770: Encrypting 16 octets using AES-CTR with 192-bit key Sep 21 07:15:38.128801: Encrypting 32 octets using AES-CTR with 192-bit key Sep 21 07:15:38.128831: Encrypting 36 octets using AES-CTR with 192-bit key Sep 21 07:15:38.128861: Encrypting 16 octets using AES-CTR with 256-bit key Sep 21 07:15:38.128887: Encrypting 32 octets using AES-CTR with 256-bit key Sep 21 07:15:38.128915: Encrypting 36 octets using AES-CTR with 256-bit key Sep 21 07:15:38.128943: testing AES_CBC: Sep 21 07:15:38.128946: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Sep 21 07:15:38.128973: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Sep 21 07:15:38.129000: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Sep 21 07:15:38.129030: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Sep 21 07:15:38.129063: testing AES_XCBC: Sep 21 07:15:38.129066: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Sep 21 07:15:38.129186: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Sep 21 07:15:38.129317: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Sep 21 07:15:38.129441: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Sep 21 07:15:38.129572: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Sep 21 07:15:38.129705: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Sep 21 07:15:38.129847: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Sep 21 07:15:38.130148: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Sep 21 07:15:38.130279: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Sep 21 07:15:38.130420: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Sep 21 07:15:38.130662: testing HMAC_MD5: Sep 21 07:15:38.130666: RFC 2104: MD5_HMAC test 1 Sep 21 07:15:38.130846: RFC 2104: MD5_HMAC test 2 Sep 21 07:15:38.131007: RFC 2104: MD5_HMAC test 3 Sep 21 07:15:38.131190: 8 CPU cores online Sep 21 07:15:38.131194: starting up 7 crypto helpers Sep 21 07:15:38.131225: started thread for crypto helper 0 Sep 21 07:15:38.131243: started thread for crypto helper 1 Sep 21 07:15:38.131264: started thread for crypto helper 2 Sep 21 07:15:38.131284: started thread for crypto helper 3 Sep 21 07:15:38.131302: started thread for crypto helper 4 Sep 21 07:15:38.131320: started thread for crypto helper 5 Sep 21 07:15:38.131342: started thread for crypto helper 6 Sep 21 07:15:38.131350: | checking IKEv1 state table Sep 21 07:15:38.131348: | starting up helper thread 6 Sep 21 07:15:38.131360: | MAIN_R0: category: half-open IKE SA flags: 0: Sep 21 07:15:38.131372: | -> MAIN_R1 EVENT_SO_DISCARD Sep 21 07:15:38.131377: | MAIN_I1: category: half-open IKE SA flags: 0: Sep 21 07:15:38.131379: | -> MAIN_I2 EVENT_RETRANSMIT Sep 21 07:15:38.131382: | MAIN_R1: category: open IKE SA flags: 200: Sep 21 07:15:38.131384: | -> MAIN_R2 EVENT_RETRANSMIT Sep 21 07:15:38.131387: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:15:38.131389: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:15:38.131392: | MAIN_I2: category: open IKE SA flags: 0: Sep 21 07:15:38.131394: | -> MAIN_I3 EVENT_RETRANSMIT Sep 21 07:15:38.131397: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:15:38.131399: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:15:38.131402: | MAIN_R2: category: open IKE SA flags: 0: Sep 21 07:15:38.131404: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:15:38.131407: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:15:38.131409: | -> UNDEFINED EVENT_SA_REPLACE Sep 21 07:15:38.131412: | MAIN_I3: category: open IKE SA flags: 0: Sep 21 07:15:38.131414: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:15:38.131416: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:15:38.131418: | -> UNDEFINED EVENT_SA_REPLACE Sep 21 07:15:38.131421: | MAIN_R3: category: established IKE SA flags: 200: Sep 21 07:15:38.131424: | -> UNDEFINED EVENT_NULL Sep 21 07:15:38.131426: | MAIN_I4: category: established IKE SA flags: 0: Sep 21 07:15:38.131429: | -> UNDEFINED EVENT_NULL Sep 21 07:15:38.131431: | AGGR_R0: category: half-open IKE SA flags: 0: Sep 21 07:15:38.131434: | -> AGGR_R1 EVENT_SO_DISCARD Sep 21 07:15:38.131436: | AGGR_I1: category: half-open IKE SA flags: 0: Sep 21 07:15:38.131439: | -> AGGR_I2 EVENT_SA_REPLACE Sep 21 07:15:38.131441: | -> AGGR_I2 EVENT_SA_REPLACE Sep 21 07:15:38.131444: | AGGR_R1: category: open IKE SA flags: 200: Sep 21 07:15:38.131446: | -> AGGR_R2 EVENT_SA_REPLACE Sep 21 07:15:38.131448: | -> AGGR_R2 EVENT_SA_REPLACE Sep 21 07:15:38.131451: | AGGR_I2: category: established IKE SA flags: 200: Sep 21 07:15:38.131454: | -> UNDEFINED EVENT_NULL Sep 21 07:15:38.131456: | AGGR_R2: category: established IKE SA flags: 0: Sep 21 07:15:38.131459: | -> UNDEFINED EVENT_NULL Sep 21 07:15:38.131462: | QUICK_R0: category: established CHILD SA flags: 0: Sep 21 07:15:38.131464: | -> QUICK_R1 EVENT_RETRANSMIT Sep 21 07:15:38.131467: | QUICK_I1: category: established CHILD SA flags: 0: Sep 21 07:15:38.131469: | -> QUICK_I2 EVENT_SA_REPLACE Sep 21 07:15:38.131472: | QUICK_R1: category: established CHILD SA flags: 0: Sep 21 07:15:38.131474: | -> QUICK_R2 EVENT_SA_REPLACE Sep 21 07:15:38.131477: | QUICK_I2: category: established CHILD SA flags: 200: Sep 21 07:15:38.131479: | -> UNDEFINED EVENT_NULL Sep 21 07:15:38.131482: | QUICK_R2: category: established CHILD SA flags: 0: Sep 21 07:15:38.131484: | -> UNDEFINED EVENT_NULL Sep 21 07:15:38.131487: | INFO: category: informational flags: 0: Sep 21 07:15:38.131489: | -> UNDEFINED EVENT_NULL Sep 21 07:15:38.131492: | INFO_PROTECTED: category: informational flags: 0: Sep 21 07:15:38.131494: | -> UNDEFINED EVENT_NULL Sep 21 07:15:38.131497: | XAUTH_R0: category: established IKE SA flags: 0: Sep 21 07:15:38.131500: | -> XAUTH_R1 EVENT_NULL Sep 21 07:15:38.131502: | XAUTH_R1: category: established IKE SA flags: 0: Sep 21 07:15:38.131505: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:15:38.131508: | MODE_CFG_R0: category: informational flags: 0: Sep 21 07:15:38.131510: | -> MODE_CFG_R1 EVENT_SA_REPLACE Sep 21 07:15:38.131513: | MODE_CFG_R1: category: established IKE SA flags: 0: Sep 21 07:15:38.131515: | -> MODE_CFG_R2 EVENT_SA_REPLACE Sep 21 07:15:38.131518: | MODE_CFG_R2: category: established IKE SA flags: 0: Sep 21 07:15:38.131520: | -> UNDEFINED EVENT_NULL Sep 21 07:15:38.131526: | MODE_CFG_I1: category: established IKE SA flags: 0: Sep 21 07:15:38.131529: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:15:38.131531: | XAUTH_I0: category: established IKE SA flags: 0: Sep 21 07:15:38.131534: | -> XAUTH_I1 EVENT_RETRANSMIT Sep 21 07:15:38.131537: | XAUTH_I1: category: established IKE SA flags: 0: Sep 21 07:15:38.131539: | -> MAIN_I4 EVENT_RETRANSMIT Sep 21 07:15:38.131545: | checking IKEv2 state table Sep 21 07:15:38.131551: | PARENT_I0: category: ignore flags: 0: Sep 21 07:15:38.131554: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Sep 21 07:15:38.131557: | PARENT_I1: category: half-open IKE SA flags: 0: Sep 21 07:15:38.131560: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Sep 21 07:15:38.131563: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Sep 21 07:15:38.131566: | PARENT_I2: category: open IKE SA flags: 0: Sep 21 07:15:38.131569: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Sep 21 07:15:38.131572: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Sep 21 07:15:38.131574: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Sep 21 07:15:38.131577: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Sep 21 07:15:38.131580: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Sep 21 07:15:38.131583: | PARENT_I3: category: established IKE SA flags: 0: Sep 21 07:15:38.131585: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Sep 21 07:15:38.131588: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Sep 21 07:15:38.131590: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Sep 21 07:15:38.131593: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Sep 21 07:15:38.131596: | PARENT_R0: category: half-open IKE SA flags: 0: Sep 21 07:15:38.131598: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Sep 21 07:15:38.131601: | PARENT_R1: category: half-open IKE SA flags: 0: Sep 21 07:15:38.131604: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Sep 21 07:15:38.131607: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Sep 21 07:15:38.131610: | PARENT_R2: category: established IKE SA flags: 0: Sep 21 07:15:38.131613: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Sep 21 07:15:38.131615: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Sep 21 07:15:38.131618: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Sep 21 07:15:38.131620: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Sep 21 07:15:38.131623: | V2_CREATE_I0: category: established IKE SA flags: 0: Sep 21 07:15:38.131626: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Sep 21 07:15:38.131629: | V2_CREATE_I: category: established IKE SA flags: 0: Sep 21 07:15:38.131632: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Sep 21 07:15:38.131634: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Sep 21 07:15:38.131637: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Sep 21 07:15:38.131640: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Sep 21 07:15:38.131643: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Sep 21 07:15:38.131646: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Sep 21 07:15:38.131648: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Sep 21 07:15:38.131652: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Sep 21 07:15:38.131654: | V2_CREATE_R: category: established IKE SA flags: 0: Sep 21 07:15:38.131657: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Sep 21 07:15:38.131662: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Sep 21 07:15:38.131665: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Sep 21 07:15:38.131668: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Sep 21 07:15:38.131671: | V2_IPSEC_I: category: established CHILD SA flags: 0: Sep 21 07:15:38.131674: | V2_IPSEC_R: category: established CHILD SA flags: 0: Sep 21 07:15:38.131677: | IKESA_DEL: category: established IKE SA flags: 0: Sep 21 07:15:38.131679: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Sep 21 07:15:38.131682: | CHILDSA_DEL: category: informational flags: 0: Sep 21 07:15:38.131694: Using Linux XFRM/NETKEY IPsec interface code on 5.2.11+ Sep 21 07:15:38.131753: | Hard-wiring algorithms Sep 21 07:15:38.131757: | adding AES_CCM_16 to kernel algorithm db Sep 21 07:15:38.131761: | adding AES_CCM_12 to kernel algorithm db Sep 21 07:15:38.131763: | adding AES_CCM_8 to kernel algorithm db Sep 21 07:15:38.131766: | adding 3DES_CBC to kernel algorithm db Sep 21 07:15:38.131768: | adding CAMELLIA_CBC to kernel algorithm db Sep 21 07:15:38.131771: | adding AES_GCM_16 to kernel algorithm db Sep 21 07:15:38.131773: | adding AES_GCM_12 to kernel algorithm db Sep 21 07:15:38.131776: | adding AES_GCM_8 to kernel algorithm db Sep 21 07:15:38.131778: | adding AES_CTR to kernel algorithm db Sep 21 07:15:38.131781: | adding AES_CBC to kernel algorithm db Sep 21 07:15:38.131786: | adding SERPENT_CBC to kernel algorithm db Sep 21 07:15:38.131791: | adding TWOFISH_CBC to kernel algorithm db Sep 21 07:15:38.131794: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Sep 21 07:15:38.131797: | adding NULL to kernel algorithm db Sep 21 07:15:38.131799: | adding CHACHA20_POLY1305 to kernel algorithm db Sep 21 07:15:38.131802: | adding HMAC_MD5_96 to kernel algorithm db Sep 21 07:15:38.131804: | adding HMAC_SHA1_96 to kernel algorithm db Sep 21 07:15:38.131807: | adding HMAC_SHA2_512_256 to kernel algorithm db Sep 21 07:15:38.131809: | adding HMAC_SHA2_384_192 to kernel algorithm db Sep 21 07:15:38.131812: | adding HMAC_SHA2_256_128 to kernel algorithm db Sep 21 07:15:38.131815: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Sep 21 07:15:38.131817: | adding AES_XCBC_96 to kernel algorithm db Sep 21 07:15:38.131820: | adding AES_CMAC_96 to kernel algorithm db Sep 21 07:15:38.131822: | adding NONE to kernel algorithm db Sep 21 07:15:38.131851: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Sep 21 07:15:38.131857: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Sep 21 07:15:38.131860: | setup kernel fd callback Sep 21 07:15:38.131863: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x56077c1b9f20 Sep 21 07:15:38.131866: | libevent_malloc: new ptr-libevent@0x56077c1c13f0 size 128 Sep 21 07:15:38.131870: | libevent_malloc: new ptr-libevent@0x56077c1afcb0 size 16 Sep 21 07:15:38.131876: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x56077c1b47c0 Sep 21 07:15:38.131879: | libevent_malloc: new ptr-libevent@0x56077c1c1480 size 128 Sep 21 07:15:38.131881: | libevent_malloc: new ptr-libevent@0x56077c1b4710 size 16 Sep 21 07:15:38.132503: | global one-shot timer EVENT_CHECK_CRLS initialized Sep 21 07:15:38.132514: selinux support is enabled. Sep 21 07:15:38.132811: systemd watchdog not enabled - not sending watchdog keepalives Sep 21 07:15:38.132859: | starting up helper thread 4 Sep 21 07:15:38.132871: | status value returned by setting the priority of this thread (crypto helper 4) 22 Sep 21 07:15:38.132875: | crypto helper 4 waiting (nothing to do) Sep 21 07:15:38.132881: | starting up helper thread 5 Sep 21 07:15:38.132886: | status value returned by setting the priority of this thread (crypto helper 5) 22 Sep 21 07:15:38.132888: | crypto helper 5 waiting (nothing to do) Sep 21 07:15:38.133015: | unbound context created - setting debug level to 5 Sep 21 07:15:38.133046: | /etc/hosts lookups activated Sep 21 07:15:38.133064: | /etc/resolv.conf usage activated Sep 21 07:15:38.133123: | outgoing-port-avoid set 0-65535 Sep 21 07:15:38.133150: | outgoing-port-permit set 32768-60999 Sep 21 07:15:38.133154: | Loading dnssec root key from:/var/lib/unbound/root.key Sep 21 07:15:38.133157: | No additional dnssec trust anchors defined via dnssec-trusted= option Sep 21 07:15:38.133160: | Setting up events, loop start Sep 21 07:15:38.133163: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x56077c1b4510 Sep 21 07:15:38.133167: | libevent_malloc: new ptr-libevent@0x56077c1cb9f0 size 128 Sep 21 07:15:38.133170: | libevent_malloc: new ptr-libevent@0x56077c1cba80 size 16 Sep 21 07:15:38.133177: | libevent_realloc: new ptr-libevent@0x56077c1315b0 size 256 Sep 21 07:15:38.133180: | libevent_malloc: new ptr-libevent@0x56077c1cbaa0 size 8 Sep 21 07:15:38.133183: | libevent_realloc: new ptr-libevent@0x56077c1c06f0 size 144 Sep 21 07:15:38.133186: | libevent_malloc: new ptr-libevent@0x56077c1cbac0 size 152 Sep 21 07:15:38.133190: | libevent_malloc: new ptr-libevent@0x56077c1cbb60 size 16 Sep 21 07:15:38.133193: | signal event handler PLUTO_SIGCHLD installed Sep 21 07:15:38.133196: | libevent_malloc: new ptr-libevent@0x56077c1cbb80 size 8 Sep 21 07:15:38.133199: | libevent_malloc: new ptr-libevent@0x56077c1cbba0 size 152 Sep 21 07:15:38.133202: | signal event handler PLUTO_SIGTERM installed Sep 21 07:15:38.133205: | libevent_malloc: new ptr-libevent@0x56077c1cbc40 size 8 Sep 21 07:15:38.133208: | libevent_malloc: new ptr-libevent@0x56077c1cbc60 size 152 Sep 21 07:15:38.133211: | signal event handler PLUTO_SIGHUP installed Sep 21 07:15:38.133213: | libevent_malloc: new ptr-libevent@0x56077c1cbd00 size 8 Sep 21 07:15:38.133216: | libevent_realloc: release ptr-libevent@0x56077c1c06f0 Sep 21 07:15:38.133219: | libevent_realloc: new ptr-libevent@0x56077c1cbd20 size 256 Sep 21 07:15:38.133222: | libevent_malloc: new ptr-libevent@0x56077c1c06f0 size 152 Sep 21 07:15:38.133225: | signal event handler PLUTO_SIGSYS installed Sep 21 07:15:38.133597: | created addconn helper (pid:29507) using fork+execve Sep 21 07:15:38.133612: | forked child 29507 Sep 21 07:15:38.133649: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:15:38.133668: | pluto_sd: executing action action: reloading(4), status 0 Sep 21 07:15:38.133676: listening for IKE messages Sep 21 07:15:38.133726: | Inspecting interface lo Sep 21 07:15:38.133733: | found lo with address 127.0.0.1 Sep 21 07:15:38.133736: | Inspecting interface eth0 Sep 21 07:15:38.133741: | found eth0 with address 192.0.2.254 Sep 21 07:15:38.133743: | Inspecting interface eth1 Sep 21 07:15:38.133747: | found eth1 with address 192.1.2.23 Sep 21 07:15:38.133805: Kernel supports NIC esp-hw-offload Sep 21 07:15:38.133826: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.23:500 Sep 21 07:15:38.133855: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:15:38.133860: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:15:38.133864: adding interface eth1/eth1 192.1.2.23:4500 Sep 21 07:15:38.133895: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.2.254:500 Sep 21 07:15:38.133923: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:15:38.133927: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:15:38.133931: adding interface eth0/eth0 192.0.2.254:4500 Sep 21 07:15:38.133962: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Sep 21 07:15:38.133990: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:15:38.133994: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:15:38.133998: adding interface lo/lo 127.0.0.1:4500 Sep 21 07:15:38.134049: | no interfaces to sort Sep 21 07:15:38.134054: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Sep 21 07:15:38.134063: | add_fd_read_event_handler: new ethX-pe@0x56077c1b5290 Sep 21 07:15:38.134070: | libevent_malloc: new ptr-libevent@0x56077c1cc090 size 128 Sep 21 07:15:38.134073: | libevent_malloc: new ptr-libevent@0x56077c1cc120 size 16 Sep 21 07:15:38.134081: | setup callback for interface lo 127.0.0.1:4500 fd 22 Sep 21 07:15:38.134084: | add_fd_read_event_handler: new ethX-pe@0x56077c1cc140 Sep 21 07:15:38.134086: | libevent_malloc: new ptr-libevent@0x56077c1cc180 size 128 Sep 21 07:15:38.134089: | libevent_malloc: new ptr-libevent@0x56077c1cc210 size 16 Sep 21 07:15:38.134175: | setup callback for interface lo 127.0.0.1:500 fd 21 Sep 21 07:15:38.134182: | add_fd_read_event_handler: new ethX-pe@0x56077c1cc230 Sep 21 07:15:38.134185: | libevent_malloc: new ptr-libevent@0x56077c1cc270 size 128 Sep 21 07:15:38.134189: | libevent_malloc: new ptr-libevent@0x56077c1cc300 size 16 Sep 21 07:15:38.134194: | setup callback for interface eth0 192.0.2.254:4500 fd 20 Sep 21 07:15:38.134197: | add_fd_read_event_handler: new ethX-pe@0x56077c1cc320 Sep 21 07:15:38.134200: | libevent_malloc: new ptr-libevent@0x56077c1cc360 size 128 Sep 21 07:15:38.134203: | libevent_malloc: new ptr-libevent@0x56077c1cc3f0 size 16 Sep 21 07:15:38.134208: | setup callback for interface eth0 192.0.2.254:500 fd 19 Sep 21 07:15:38.134211: | add_fd_read_event_handler: new ethX-pe@0x56077c1cc410 Sep 21 07:15:38.134213: | libevent_malloc: new ptr-libevent@0x56077c1cc450 size 128 Sep 21 07:15:38.134216: | libevent_malloc: new ptr-libevent@0x56077c1cc4e0 size 16 Sep 21 07:15:38.134221: | setup callback for interface eth1 192.1.2.23:4500 fd 18 Sep 21 07:15:38.134224: | add_fd_read_event_handler: new ethX-pe@0x56077c1cc500 Sep 21 07:15:38.134227: | libevent_malloc: new ptr-libevent@0x56077c1cc540 size 128 Sep 21 07:15:38.134230: | libevent_malloc: new ptr-libevent@0x56077c1cc5d0 size 16 Sep 21 07:15:38.134235: | setup callback for interface eth1 192.1.2.23:500 fd 17 Sep 21 07:15:38.134241: | certs and keys locked by 'free_preshared_secrets' Sep 21 07:15:38.134244: | certs and keys unlocked by 'free_preshared_secrets' Sep 21 07:15:38.134265: loading secrets from "/etc/ipsec.secrets" Sep 21 07:15:38.134286: | Processing PSK at line 1: passed Sep 21 07:15:38.134291: | certs and keys locked by 'process_secret' Sep 21 07:15:38.134295: | certs and keys unlocked by 'process_secret' Sep 21 07:15:38.134301: | pluto_sd: executing action action: ready(5), status 0 Sep 21 07:15:38.134976: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:15:38.134989: | spent 0.553 milliseconds in whack Sep 21 07:15:38.135005: | status value returned by setting the priority of this thread (crypto helper 6) 22 Sep 21 07:15:38.135012: | crypto helper 6 waiting (nothing to do) Sep 21 07:15:38.135658: | starting up helper thread 0 Sep 21 07:15:38.135668: | status value returned by setting the priority of this thread (crypto helper 0) 22 Sep 21 07:15:38.135671: | crypto helper 0 waiting (nothing to do) Sep 21 07:15:38.135681: | starting up helper thread 1 Sep 21 07:15:38.135686: | status value returned by setting the priority of this thread (crypto helper 1) 22 Sep 21 07:15:38.135688: | crypto helper 1 waiting (nothing to do) Sep 21 07:15:38.135697: | starting up helper thread 2 Sep 21 07:15:38.135702: | status value returned by setting the priority of this thread (crypto helper 2) 22 Sep 21 07:15:38.135704: | crypto helper 2 waiting (nothing to do) Sep 21 07:15:38.135712: | starting up helper thread 3 Sep 21 07:15:38.135717: | status value returned by setting the priority of this thread (crypto helper 3) 22 Sep 21 07:15:38.135719: | crypto helper 3 waiting (nothing to do) Sep 21 07:15:38.256084: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:15:38.256488: | pluto_sd: executing action action: reloading(4), status 0 Sep 21 07:15:38.256497: listening for IKE messages Sep 21 07:15:38.256535: | Inspecting interface lo Sep 21 07:15:38.256542: | found lo with address 127.0.0.1 Sep 21 07:15:38.256545: | Inspecting interface eth0 Sep 21 07:15:38.256550: | found eth0 with address 192.0.2.254 Sep 21 07:15:38.256556: | Inspecting interface eth1 Sep 21 07:15:38.256560: | found eth1 with address 192.1.2.23 Sep 21 07:15:38.256618: | no interfaces to sort Sep 21 07:15:38.256628: | libevent_free: release ptr-libevent@0x56077c1cc090 Sep 21 07:15:38.256632: | free_event_entry: release EVENT_NULL-pe@0x56077c1b5290 Sep 21 07:15:38.256635: | add_fd_read_event_handler: new ethX-pe@0x56077c1b5290 Sep 21 07:15:38.256639: | libevent_malloc: new ptr-libevent@0x56077c1cc090 size 128 Sep 21 07:15:38.256646: | setup callback for interface lo 127.0.0.1:4500 fd 22 Sep 21 07:15:38.256650: | libevent_free: release ptr-libevent@0x56077c1cc180 Sep 21 07:15:38.256653: | free_event_entry: release EVENT_NULL-pe@0x56077c1cc140 Sep 21 07:15:38.256656: | add_fd_read_event_handler: new ethX-pe@0x56077c1cc140 Sep 21 07:15:38.256658: | libevent_malloc: new ptr-libevent@0x56077c1cc180 size 128 Sep 21 07:15:38.256663: | setup callback for interface lo 127.0.0.1:500 fd 21 Sep 21 07:15:38.256667: | libevent_free: release ptr-libevent@0x56077c1cc270 Sep 21 07:15:38.256670: | free_event_entry: release EVENT_NULL-pe@0x56077c1cc230 Sep 21 07:15:38.256672: | add_fd_read_event_handler: new ethX-pe@0x56077c1cc230 Sep 21 07:15:38.256675: | libevent_malloc: new ptr-libevent@0x56077c1cc270 size 128 Sep 21 07:15:38.256680: | setup callback for interface eth0 192.0.2.254:4500 fd 20 Sep 21 07:15:38.256684: | libevent_free: release ptr-libevent@0x56077c1cc360 Sep 21 07:15:38.256687: | free_event_entry: release EVENT_NULL-pe@0x56077c1cc320 Sep 21 07:15:38.256689: | add_fd_read_event_handler: new ethX-pe@0x56077c1cc320 Sep 21 07:15:38.256692: | libevent_malloc: new ptr-libevent@0x56077c1cc360 size 128 Sep 21 07:15:38.256697: | setup callback for interface eth0 192.0.2.254:500 fd 19 Sep 21 07:15:38.256701: | libevent_free: release ptr-libevent@0x56077c1cc450 Sep 21 07:15:38.256703: | free_event_entry: release EVENT_NULL-pe@0x56077c1cc410 Sep 21 07:15:38.256706: | add_fd_read_event_handler: new ethX-pe@0x56077c1cc410 Sep 21 07:15:38.256709: | libevent_malloc: new ptr-libevent@0x56077c1cc450 size 128 Sep 21 07:15:38.256714: | setup callback for interface eth1 192.1.2.23:4500 fd 18 Sep 21 07:15:38.256717: | libevent_free: release ptr-libevent@0x56077c1cc540 Sep 21 07:15:38.256720: | free_event_entry: release EVENT_NULL-pe@0x56077c1cc500 Sep 21 07:15:38.256722: | add_fd_read_event_handler: new ethX-pe@0x56077c1cc500 Sep 21 07:15:38.256725: | libevent_malloc: new ptr-libevent@0x56077c1cc540 size 128 Sep 21 07:15:38.256730: | setup callback for interface eth1 192.1.2.23:500 fd 17 Sep 21 07:15:38.256733: | certs and keys locked by 'free_preshared_secrets' Sep 21 07:15:38.256736: forgetting secrets Sep 21 07:15:38.256741: | certs and keys unlocked by 'free_preshared_secrets' Sep 21 07:15:38.256755: loading secrets from "/etc/ipsec.secrets" Sep 21 07:15:38.256762: | Processing PSK at line 1: passed Sep 21 07:15:38.256765: | certs and keys locked by 'process_secret' Sep 21 07:15:38.256768: | certs and keys unlocked by 'process_secret' Sep 21 07:15:38.256772: | pluto_sd: executing action action: ready(5), status 0 Sep 21 07:15:38.256779: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:15:38.256790: | spent 0.332 milliseconds in whack Sep 21 07:15:38.259514: | processing signal PLUTO_SIGCHLD Sep 21 07:15:38.259537: | waitpid returned pid 29507 (exited with status 0) Sep 21 07:15:38.259542: | reaped addconn helper child (status 0) Sep 21 07:15:38.259547: | waitpid returned ECHILD (no child processes left) Sep 21 07:15:38.259554: | spent 0.023 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:15:38.275038: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:15:38.275062: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:15:38.275066: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Sep 21 07:15:38.275068: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:15:38.275071: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Sep 21 07:15:38.275074: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:15:38.275085: | Added new connection test with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Sep 21 07:15:38.275088: | from whack: got --esp=aes256-sha1,aes-sha1 Sep 21 07:15:38.275112: | ESP/AH string values: AES_CBC_256-HMAC_SHA1_96, AES_CBC-HMAC_SHA1_96 Sep 21 07:15:38.275118: | counting wild cards for 192.1.2.23 is 0 Sep 21 07:15:38.275122: | counting wild cards for 192.1.2.45 is 0 Sep 21 07:15:38.275132: | connect_to_host_pair: 192.1.2.23:500 192.1.2.45:500 -> hp@(nil): none Sep 21 07:15:38.275136: | new hp@0x56077c198a20 Sep 21 07:15:38.275140: added connection description "test" Sep 21 07:15:38.275147: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Sep 21 07:15:38.275159: | 192.1.2.23/32===192.1.2.23<192.1.2.23>...192.1.2.45<192.1.2.45>===10.1.1.0/29 Sep 21 07:15:38.275165: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:15:38.275172: | spent 0.136 milliseconds in whack Sep 21 07:15:39.598233: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:39.598272: | *received 92 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:39.598277: | 58 b3 d3 6b 40 e8 9d 83 00 00 00 00 00 00 00 00 Sep 21 07:15:39.598279: | 01 10 02 00 00 00 00 00 00 00 00 5c 00 00 00 40 Sep 21 07:15:39.598282: | 00 00 00 01 00 00 00 01 00 00 00 34 01 01 00 02 Sep 21 07:15:39.598284: | 03 00 00 1c 01 01 00 00 80 01 00 07 80 0e 00 80 Sep 21 07:15:39.598286: | 80 02 00 01 80 03 00 01 80 04 00 04 00 00 00 10 Sep 21 07:15:39.598288: | 02 01 00 00 80 03 00 01 80 04 00 04 Sep 21 07:15:39.598295: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:39.598299: | **parse ISAKMP Message: Sep 21 07:15:39.598302: | initiator cookie: Sep 21 07:15:39.598304: | 58 b3 d3 6b 40 e8 9d 83 Sep 21 07:15:39.598306: | responder cookie: Sep 21 07:15:39.598309: | 00 00 00 00 00 00 00 00 Sep 21 07:15:39.598312: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:39.598315: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:39.598317: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:39.598320: | flags: none (0x0) Sep 21 07:15:39.598323: | Message ID: 0 (0x0) Sep 21 07:15:39.598325: | length: 92 (0x5c) Sep 21 07:15:39.598328: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:39.598332: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:39.598335: | #null state always idle Sep 21 07:15:39.598339: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:39.598343: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:39.598346: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.598348: | length: 64 (0x40) Sep 21 07:15:39.598351: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:39.598354: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:39.598357: | in statetime_start() with no state Sep 21 07:15:39.598363: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:39.598369: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:39.598373: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:39.598377: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:39.598380: | find_next_host_connection returns test Sep 21 07:15:39.598383: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:39.598386: | find_next_host_connection returns empty Sep 21 07:15:39.598420: | creating state object #1 at 0x56077c1ceac0 Sep 21 07:15:39.598424: | State DB: adding IKEv1 state #1 in UNDEFINED Sep 21 07:15:39.598433: | pstats #1 ikev1.isakmp started Sep 21 07:15:39.598438: | #1 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:39.598451: | start processing: state #1 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:39.598455: | parent state #1: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:39.598458: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:39.598461: | ICOOKIE-DUMP: 58 b3 d3 6b 40 e8 9d 83 Sep 21 07:15:39.598465: "test" #1: responding to Main Mode Sep 21 07:15:39.598501: | **emit ISAKMP Message: Sep 21 07:15:39.598504: | initiator cookie: Sep 21 07:15:39.598506: | 58 b3 d3 6b 40 e8 9d 83 Sep 21 07:15:39.598509: | responder cookie: Sep 21 07:15:39.598512: | 8e a0 30 b2 a7 39 59 d6 Sep 21 07:15:39.598514: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:39.598517: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:39.598520: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:39.598522: | flags: none (0x0) Sep 21 07:15:39.598525: | Message ID: 0 (0x0) Sep 21 07:15:39.598528: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:39.598531: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:39.598534: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:39.598537: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:39.598540: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:39.598543: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:39.598546: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:39.598549: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:39.598552: | ****parse IPsec DOI SIT: Sep 21 07:15:39.598555: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:39.598558: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:39.598561: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.598563: | length: 52 (0x34) Sep 21 07:15:39.598565: | proposal number: 1 (0x1) Sep 21 07:15:39.598568: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:39.598571: | SPI size: 0 (0x0) Sep 21 07:15:39.598573: | number of transforms: 2 (0x2) Sep 21 07:15:39.598576: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:39.598578: | next payload type: ISAKMP_NEXT_T (0x3) Sep 21 07:15:39.598580: | length: 28 (0x1c) Sep 21 07:15:39.598583: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:39.598585: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:39.598588: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:39.598592: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:39.598594: | length/value: 7 (0x7) Sep 21 07:15:39.598597: | [7 is OAKLEY_AES_CBC] Sep 21 07:15:39.598600: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:39.598603: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Sep 21 07:15:39.598605: | length/value: 128 (0x80) Sep 21 07:15:39.598608: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:39.598611: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:15:39.598613: | length/value: 1 (0x1) Sep 21 07:15:39.598616: | [1 is OAKLEY_MD5] Sep 21 07:15:39.598619: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:39.598621: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Sep 21 07:15:39.598624: | length/value: 1 (0x1) Sep 21 07:15:39.598626: | [1 is OAKLEY_PRESHARED_KEY] Sep 21 07:15:39.598632: | started looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Sep 21 07:15:39.598637: | actually looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Sep 21 07:15:39.598641: | line 1: key type PKK_PSK(192.1.2.23) to type PKK_PSK Sep 21 07:15:39.598646: | 1: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Sep 21 07:15:39.598651: | 2: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Sep 21 07:15:39.598656: | line 1: match=002 Sep 21 07:15:39.598660: | match 002 beats previous best_match 000 match=0x56077c1c15d0 (line=1) Sep 21 07:15:39.598663: | concluding with best_match=002 best=0x56077c1c15d0 (lineno=1) Sep 21 07:15:39.598666: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:39.598669: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Sep 21 07:15:39.598671: | length/value: 4 (0x4) Sep 21 07:15:39.598674: | [4 is OAKLEY_GROUP_GP185(UNUSED)] Sep 21 07:15:39.598679: "test" #1: OAKLEY_GROUP 4 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Sep 21 07:15:39.598682: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:39.598685: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.598687: | length: 16 (0x10) Sep 21 07:15:39.598690: | ISAKMP transform number: 2 (0x2) Sep 21 07:15:39.598693: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:39.598695: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:39.598698: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Sep 21 07:15:39.598701: | length/value: 1 (0x1) Sep 21 07:15:39.598703: | [1 is OAKLEY_PRESHARED_KEY] Sep 21 07:15:39.598708: | started looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Sep 21 07:15:39.598712: | actually looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Sep 21 07:15:39.598716: | line 1: key type PKK_PSK(192.1.2.23) to type PKK_PSK Sep 21 07:15:39.598721: | 1: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Sep 21 07:15:39.598725: | 2: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Sep 21 07:15:39.598728: | line 1: match=002 Sep 21 07:15:39.598731: | match 002 beats previous best_match 000 match=0x56077c1c15d0 (line=1) Sep 21 07:15:39.598734: | concluding with best_match=002 best=0x56077c1c15d0 (lineno=1) Sep 21 07:15:39.598736: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:39.598739: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Sep 21 07:15:39.598741: | length/value: 4 (0x4) Sep 21 07:15:39.598744: | [4 is OAKLEY_GROUP_GP185(UNUSED)] Sep 21 07:15:39.598747: "test" #1: OAKLEY_GROUP 4 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Sep 21 07:15:39.598750: "test" #1: no acceptable Oakley Transform Sep 21 07:15:39.598754: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:39.598759: | [RE]START processing: state #1 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:39.598762: | #1 is idle Sep 21 07:15:39.598868: "test" #1: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:39.598877: | **emit ISAKMP Message: Sep 21 07:15:39.598879: | initiator cookie: Sep 21 07:15:39.598882: | 58 b3 d3 6b 40 e8 9d 83 Sep 21 07:15:39.598884: | responder cookie: Sep 21 07:15:39.598886: | 8e a0 30 b2 a7 39 59 d6 Sep 21 07:15:39.598889: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.598891: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:39.598894: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:39.598896: | flags: none (0x0) Sep 21 07:15:39.598899: | Message ID: 0 (0x0) Sep 21 07:15:39.598901: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:39.598904: | ***emit ISAKMP Notification Payload: Sep 21 07:15:39.598907: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.598909: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:39.598911: | protocol ID: 1 (0x1) Sep 21 07:15:39.598913: | SPI size: 0 (0x0) Sep 21 07:15:39.598916: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:39.598919: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:39.598922: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:39.598925: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:39.598927: | emitting length of ISAKMP Message: 40 Sep 21 07:15:39.598935: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1) Sep 21 07:15:39.598941: | 58 b3 d3 6b 40 e8 9d 83 8e a0 30 b2 a7 39 59 d6 Sep 21 07:15:39.598944: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:39.598946: | 00 00 00 01 01 00 00 0e Sep 21 07:15:39.598971: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:39.598977: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:39.598982: | stop processing: state #1 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:39.598985: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:39.598990: | spent 0.719 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:39.779603: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:39.779633: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:39.779636: | 89 3d 8e 46 ce b0 6d 97 00 00 00 00 00 00 00 00 Sep 21 07:15:39.779639: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:15:39.779641: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:15:39.779643: | 00 00 00 18 01 01 00 00 80 01 00 09 80 02 00 06 Sep 21 07:15:39.779645: | 80 03 00 1b 80 04 00 14 Sep 21 07:15:39.779649: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:39.779653: | **parse ISAKMP Message: Sep 21 07:15:39.779656: | initiator cookie: Sep 21 07:15:39.779658: | 89 3d 8e 46 ce b0 6d 97 Sep 21 07:15:39.779660: | responder cookie: Sep 21 07:15:39.779662: | 00 00 00 00 00 00 00 00 Sep 21 07:15:39.779665: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:39.779668: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:39.779671: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:39.779673: | flags: none (0x0) Sep 21 07:15:39.779675: | Message ID: 0 (0x0) Sep 21 07:15:39.779678: | length: 72 (0x48) Sep 21 07:15:39.779680: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:39.779684: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:39.779687: | #null state always idle Sep 21 07:15:39.779690: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:39.779693: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:39.779695: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.779698: | length: 44 (0x2c) Sep 21 07:15:39.779700: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:39.779703: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:39.779706: | in statetime_start() with no state Sep 21 07:15:39.779711: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:39.779717: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:39.779720: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:39.779724: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:39.779726: | find_next_host_connection returns test Sep 21 07:15:39.779729: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:39.779731: | find_next_host_connection returns empty Sep 21 07:15:39.779759: | creating state object #2 at 0x56077c1cf580 Sep 21 07:15:39.779764: | State DB: adding IKEv1 state #2 in UNDEFINED Sep 21 07:15:39.779769: | pstats #2 ikev1.isakmp started Sep 21 07:15:39.779775: | #2 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:39.779781: | start processing: state #2 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:39.779792: | parent state #2: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:39.779795: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:39.779797: | ICOOKIE-DUMP: 89 3d 8e 46 ce b0 6d 97 Sep 21 07:15:39.779805: "test" #2: responding to Main Mode Sep 21 07:15:39.779810: | **emit ISAKMP Message: Sep 21 07:15:39.779813: | initiator cookie: Sep 21 07:15:39.779815: | 89 3d 8e 46 ce b0 6d 97 Sep 21 07:15:39.779817: | responder cookie: Sep 21 07:15:39.779819: | 6b 7e 9c 10 a4 dd b8 2c Sep 21 07:15:39.779822: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:39.779824: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:39.779827: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:39.779829: | flags: none (0x0) Sep 21 07:15:39.779831: | Message ID: 0 (0x0) Sep 21 07:15:39.779834: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:39.779837: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:39.779840: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:39.779842: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:39.779845: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:39.779848: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:39.779851: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:39.779854: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:39.779857: | ****parse IPsec DOI SIT: Sep 21 07:15:39.779860: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:39.779864: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:39.779866: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.779869: | length: 32 (0x20) Sep 21 07:15:39.779872: | proposal number: 1 (0x1) Sep 21 07:15:39.779875: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:39.779878: | SPI size: 0 (0x0) Sep 21 07:15:39.779880: | number of transforms: 1 (0x1) Sep 21 07:15:39.779883: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:39.779885: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.779888: | length: 24 (0x18) Sep 21 07:15:39.779890: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:39.779893: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:39.779896: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:39.779899: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:39.779902: | length/value: 9 (0x9) Sep 21 07:15:39.779905: | [9 is UNUSED_9] Sep 21 07:15:39.779910: "test" #2: UNUSED_9 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:39.779914: "test" #2: no acceptable Oakley Transform Sep 21 07:15:39.779917: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:39.779923: | [RE]START processing: state #2 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:39.779926: | #2 is idle Sep 21 07:15:39.780038: "test" #2: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:39.780043: | **emit ISAKMP Message: Sep 21 07:15:39.780046: | initiator cookie: Sep 21 07:15:39.780049: | 89 3d 8e 46 ce b0 6d 97 Sep 21 07:15:39.780051: | responder cookie: Sep 21 07:15:39.780053: | 6b 7e 9c 10 a4 dd b8 2c Sep 21 07:15:39.780056: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.780059: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:39.780062: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:39.780064: | flags: none (0x0) Sep 21 07:15:39.780067: | Message ID: 0 (0x0) Sep 21 07:15:39.780070: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:39.780074: | ***emit ISAKMP Notification Payload: Sep 21 07:15:39.780077: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.780079: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:39.780082: | protocol ID: 1 (0x1) Sep 21 07:15:39.780084: | SPI size: 0 (0x0) Sep 21 07:15:39.780090: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:39.780094: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:39.780098: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:39.780101: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:39.780104: | emitting length of ISAKMP Message: 40 Sep 21 07:15:39.780111: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #2) Sep 21 07:15:39.780114: | 89 3d 8e 46 ce b0 6d 97 6b 7e 9c 10 a4 dd b8 2c Sep 21 07:15:39.780116: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:39.780119: | 00 00 00 01 01 00 00 0e Sep 21 07:15:39.780143: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:39.780149: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:39.780155: | stop processing: state #2 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:39.780161: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:39.780169: | spent 0.529 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:39.836974: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:39.837000: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:39.837004: | dd c7 9d ac b3 d8 c3 b2 00 00 00 00 00 00 00 00 Sep 21 07:15:39.837007: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:39.837009: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:39.837011: | 00 00 00 14 01 01 00 00 80 02 00 06 80 03 00 1b Sep 21 07:15:39.837013: | 80 04 00 14 Sep 21 07:15:39.837018: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:39.837022: | **parse ISAKMP Message: Sep 21 07:15:39.837025: | initiator cookie: Sep 21 07:15:39.837027: | dd c7 9d ac b3 d8 c3 b2 Sep 21 07:15:39.837030: | responder cookie: Sep 21 07:15:39.837032: | 00 00 00 00 00 00 00 00 Sep 21 07:15:39.837035: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:39.837038: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:39.837040: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:39.837043: | flags: none (0x0) Sep 21 07:15:39.837046: | Message ID: 0 (0x0) Sep 21 07:15:39.837048: | length: 68 (0x44) Sep 21 07:15:39.837051: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:39.837055: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:39.837058: | #null state always idle Sep 21 07:15:39.837061: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:39.837064: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:39.837066: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.837069: | length: 40 (0x28) Sep 21 07:15:39.837071: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:39.837074: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:39.837077: | in statetime_start() with no state Sep 21 07:15:39.837082: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:39.837088: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:39.837091: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:39.837095: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:39.837097: | find_next_host_connection returns test Sep 21 07:15:39.837100: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:39.837102: | find_next_host_connection returns empty Sep 21 07:15:39.837125: | creating state object #3 at 0x56077c1d0040 Sep 21 07:15:39.837129: | State DB: adding IKEv1 state #3 in UNDEFINED Sep 21 07:15:39.837139: | pstats #3 ikev1.isakmp started Sep 21 07:15:39.837144: | #3 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:39.837150: | start processing: state #3 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:39.837154: | parent state #3: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:39.837157: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:39.837160: | ICOOKIE-DUMP: dd c7 9d ac b3 d8 c3 b2 Sep 21 07:15:39.837163: "test" #3: responding to Main Mode Sep 21 07:15:39.837167: | **emit ISAKMP Message: Sep 21 07:15:39.837170: | initiator cookie: Sep 21 07:15:39.837172: | dd c7 9d ac b3 d8 c3 b2 Sep 21 07:15:39.837174: | responder cookie: Sep 21 07:15:39.837176: | ca e4 e2 f7 2b 83 ab 1e Sep 21 07:15:39.837179: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:39.837181: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:39.837184: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:39.837186: | flags: none (0x0) Sep 21 07:15:39.837189: | Message ID: 0 (0x0) Sep 21 07:15:39.837191: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:39.837194: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:39.837197: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:39.837200: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:39.837202: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:39.837205: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:39.837208: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:39.837211: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:39.837214: | ****parse IPsec DOI SIT: Sep 21 07:15:39.837217: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:39.837219: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:39.837222: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.837224: | length: 28 (0x1c) Sep 21 07:15:39.837227: | proposal number: 1 (0x1) Sep 21 07:15:39.837229: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:39.837231: | SPI size: 0 (0x0) Sep 21 07:15:39.837234: | number of transforms: 1 (0x1) Sep 21 07:15:39.837237: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:39.837239: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.837241: | length: 20 (0x14) Sep 21 07:15:39.837244: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:39.837246: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:39.837249: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:39.837252: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:15:39.837254: | length/value: 6 (0x6) Sep 21 07:15:39.837257: | [6 is OAKLEY_SHA2_512] Sep 21 07:15:39.837260: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:39.837263: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Sep 21 07:15:39.837265: | length/value: 27 (0x1b) Sep 21 07:15:39.837269: "test" #3: Pluto does not support 27?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Sep 21 07:15:39.837271: "test" #3: no acceptable Oakley Transform Sep 21 07:15:39.837274: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:39.837279: | [RE]START processing: state #3 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:39.837282: | #3 is idle Sep 21 07:15:39.837360: "test" #3: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:39.837364: | **emit ISAKMP Message: Sep 21 07:15:39.837367: | initiator cookie: Sep 21 07:15:39.837369: | dd c7 9d ac b3 d8 c3 b2 Sep 21 07:15:39.837372: | responder cookie: Sep 21 07:15:39.837374: | ca e4 e2 f7 2b 83 ab 1e Sep 21 07:15:39.837381: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.837384: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:39.837386: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:39.837389: | flags: none (0x0) Sep 21 07:15:39.837391: | Message ID: 0 (0x0) Sep 21 07:15:39.837394: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:39.837397: | ***emit ISAKMP Notification Payload: Sep 21 07:15:39.837399: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.837402: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:39.837404: | protocol ID: 1 (0x1) Sep 21 07:15:39.837406: | SPI size: 0 (0x0) Sep 21 07:15:39.837409: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:39.837412: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:39.837414: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:39.837417: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:39.837420: | emitting length of ISAKMP Message: 40 Sep 21 07:15:39.837426: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3) Sep 21 07:15:39.837429: | dd c7 9d ac b3 d8 c3 b2 ca e4 e2 f7 2b 83 ab 1e Sep 21 07:15:39.837431: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:39.837433: | 00 00 00 01 01 00 00 0e Sep 21 07:15:39.837454: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:39.837459: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:39.837464: | stop processing: state #3 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:39.837467: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:39.837472: | spent 0.468 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:39.915166: | spent 0.00316 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:39.915189: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:39.915193: | cb f6 04 61 12 72 fe 18 00 00 00 00 00 00 00 00 Sep 21 07:15:39.915196: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:39.915198: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:39.915200: | 00 00 00 14 01 01 00 00 80 01 00 09 80 03 00 1b Sep 21 07:15:39.915203: | 80 04 00 14 Sep 21 07:15:39.915208: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:39.915212: | **parse ISAKMP Message: Sep 21 07:15:39.915215: | initiator cookie: Sep 21 07:15:39.915218: | cb f6 04 61 12 72 fe 18 Sep 21 07:15:39.915220: | responder cookie: Sep 21 07:15:39.915222: | 00 00 00 00 00 00 00 00 Sep 21 07:15:39.915225: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:39.915228: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:39.915231: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:39.915234: | flags: none (0x0) Sep 21 07:15:39.915236: | Message ID: 0 (0x0) Sep 21 07:15:39.915239: | length: 68 (0x44) Sep 21 07:15:39.915242: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:39.915245: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:39.915248: | #null state always idle Sep 21 07:15:39.915251: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:39.915255: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:39.915257: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.915260: | length: 40 (0x28) Sep 21 07:15:39.915262: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:39.915265: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:39.915267: | in statetime_start() with no state Sep 21 07:15:39.915273: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:39.915282: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:39.915285: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:39.915289: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:39.915292: | find_next_host_connection returns test Sep 21 07:15:39.915294: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:39.915297: | find_next_host_connection returns empty Sep 21 07:15:39.915323: | creating state object #4 at 0x56077c1d0b00 Sep 21 07:15:39.915327: | State DB: adding IKEv1 state #4 in UNDEFINED Sep 21 07:15:39.915332: | pstats #4 ikev1.isakmp started Sep 21 07:15:39.915337: | #4 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:39.915343: | start processing: state #4 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:39.915346: | parent state #4: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:39.915350: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:39.915352: | ICOOKIE-DUMP: cb f6 04 61 12 72 fe 18 Sep 21 07:15:39.915355: "test" #4: responding to Main Mode Sep 21 07:15:39.915360: | **emit ISAKMP Message: Sep 21 07:15:39.915362: | initiator cookie: Sep 21 07:15:39.915364: | cb f6 04 61 12 72 fe 18 Sep 21 07:15:39.915367: | responder cookie: Sep 21 07:15:39.915369: | 79 21 e6 3e 24 f2 c0 54 Sep 21 07:15:39.915372: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:39.915374: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:39.915377: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:39.915379: | flags: none (0x0) Sep 21 07:15:39.915381: | Message ID: 0 (0x0) Sep 21 07:15:39.915384: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:39.915387: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:39.915390: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:39.915393: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:39.915395: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:39.915398: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:39.915401: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:39.915404: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:39.915407: | ****parse IPsec DOI SIT: Sep 21 07:15:39.915409: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:39.915412: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:39.915415: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.915417: | length: 28 (0x1c) Sep 21 07:15:39.915419: | proposal number: 1 (0x1) Sep 21 07:15:39.915422: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:39.915424: | SPI size: 0 (0x0) Sep 21 07:15:39.915426: | number of transforms: 1 (0x1) Sep 21 07:15:39.915429: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:39.915432: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.915434: | length: 20 (0x14) Sep 21 07:15:39.915436: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:39.915439: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:39.915442: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:39.915445: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:39.915447: | length/value: 9 (0x9) Sep 21 07:15:39.915450: | [9 is UNUSED_9] Sep 21 07:15:39.915454: "test" #4: UNUSED_9 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:39.915456: "test" #4: no acceptable Oakley Transform Sep 21 07:15:39.915459: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:39.915466: | [RE]START processing: state #4 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:39.915468: | #4 is idle Sep 21 07:15:39.915529: "test" #4: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:39.915533: | **emit ISAKMP Message: Sep 21 07:15:39.915536: | initiator cookie: Sep 21 07:15:39.915538: | cb f6 04 61 12 72 fe 18 Sep 21 07:15:39.915540: | responder cookie: Sep 21 07:15:39.915542: | 79 21 e6 3e 24 f2 c0 54 Sep 21 07:15:39.915545: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.915548: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:39.915550: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:39.915553: | flags: none (0x0) Sep 21 07:15:39.915555: | Message ID: 0 (0x0) Sep 21 07:15:39.915558: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:39.915561: | ***emit ISAKMP Notification Payload: Sep 21 07:15:39.915563: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:39.915566: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:39.915568: | protocol ID: 1 (0x1) Sep 21 07:15:39.915570: | SPI size: 0 (0x0) Sep 21 07:15:39.915573: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:39.915576: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:39.915579: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:39.915581: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:39.915584: | emitting length of ISAKMP Message: 40 Sep 21 07:15:39.915590: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #4) Sep 21 07:15:39.915592: | cb f6 04 61 12 72 fe 18 79 21 e6 3e 24 f2 c0 54 Sep 21 07:15:39.915595: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:39.915597: | 00 00 00 01 01 00 00 0e Sep 21 07:15:39.915617: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:39.915623: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:39.915628: | stop processing: state #4 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:39.915631: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:39.915636: | spent 0.448 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:40.039061: | spent 0.00284 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:40.039085: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:40.039088: | af 32 ac d5 20 ab 79 62 00 00 00 00 00 00 00 00 Sep 21 07:15:40.039091: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:40.039093: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:40.039096: | 00 00 00 14 01 01 00 00 80 01 00 09 80 02 00 06 Sep 21 07:15:40.039098: | 80 04 00 14 Sep 21 07:15:40.039103: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:40.039107: | **parse ISAKMP Message: Sep 21 07:15:40.039109: | initiator cookie: Sep 21 07:15:40.039112: | af 32 ac d5 20 ab 79 62 Sep 21 07:15:40.039114: | responder cookie: Sep 21 07:15:40.039116: | 00 00 00 00 00 00 00 00 Sep 21 07:15:40.039119: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.039122: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.039124: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.039127: | flags: none (0x0) Sep 21 07:15:40.039129: | Message ID: 0 (0x0) Sep 21 07:15:40.039132: | length: 68 (0x44) Sep 21 07:15:40.039135: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:40.039138: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:40.039141: | #null state always idle Sep 21 07:15:40.039148: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:40.039151: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:40.039154: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.039156: | length: 40 (0x28) Sep 21 07:15:40.039159: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.039162: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:40.039164: | in statetime_start() with no state Sep 21 07:15:40.039170: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:40.039175: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:40.039178: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.039183: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:40.039185: | find_next_host_connection returns test Sep 21 07:15:40.039188: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.039190: | find_next_host_connection returns empty Sep 21 07:15:40.039213: | creating state object #5 at 0x56077c1d15c0 Sep 21 07:15:40.039216: | State DB: adding IKEv1 state #5 in UNDEFINED Sep 21 07:15:40.039223: | pstats #5 ikev1.isakmp started Sep 21 07:15:40.039228: | #5 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:40.039234: | start processing: state #5 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:40.039238: | parent state #5: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:40.039241: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:40.039243: | ICOOKIE-DUMP: af 32 ac d5 20 ab 79 62 Sep 21 07:15:40.039246: "test" #5: responding to Main Mode Sep 21 07:15:40.039251: | **emit ISAKMP Message: Sep 21 07:15:40.039254: | initiator cookie: Sep 21 07:15:40.039256: | af 32 ac d5 20 ab 79 62 Sep 21 07:15:40.039259: | responder cookie: Sep 21 07:15:40.039261: | 0c 0a 19 55 fb eb 1d c4 Sep 21 07:15:40.039263: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.039266: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.039269: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.039271: | flags: none (0x0) Sep 21 07:15:40.039273: | Message ID: 0 (0x0) Sep 21 07:15:40.039276: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.039279: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:40.039282: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:40.039285: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:40.039287: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.039290: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:40.039293: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:40.039296: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:40.039299: | ****parse IPsec DOI SIT: Sep 21 07:15:40.039301: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:40.039304: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:40.039307: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.039309: | length: 28 (0x1c) Sep 21 07:15:40.039311: | proposal number: 1 (0x1) Sep 21 07:15:40.039314: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:40.039316: | SPI size: 0 (0x0) Sep 21 07:15:40.039319: | number of transforms: 1 (0x1) Sep 21 07:15:40.039321: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:40.039324: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.039326: | length: 20 (0x14) Sep 21 07:15:40.039329: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:40.039332: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:40.039335: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:40.039338: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:40.039340: | length/value: 9 (0x9) Sep 21 07:15:40.039343: | [9 is UNUSED_9] Sep 21 07:15:40.039347: "test" #5: UNUSED_9 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:40.039350: "test" #5: no acceptable Oakley Transform Sep 21 07:15:40.039353: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:40.039357: | [RE]START processing: state #5 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:40.039360: | #5 is idle Sep 21 07:15:40.039436: "test" #5: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:40.039440: | **emit ISAKMP Message: Sep 21 07:15:40.039442: | initiator cookie: Sep 21 07:15:40.039444: | af 32 ac d5 20 ab 79 62 Sep 21 07:15:40.039447: | responder cookie: Sep 21 07:15:40.039449: | 0c 0a 19 55 fb eb 1d c4 Sep 21 07:15:40.039452: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.039454: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.039457: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:40.039460: | flags: none (0x0) Sep 21 07:15:40.039462: | Message ID: 0 (0x0) Sep 21 07:15:40.039465: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.039468: | ***emit ISAKMP Notification Payload: Sep 21 07:15:40.039470: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.039473: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.039475: | protocol ID: 1 (0x1) Sep 21 07:15:40.039477: | SPI size: 0 (0x0) Sep 21 07:15:40.039480: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:40.039483: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:40.039486: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:40.039489: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:40.039491: | emitting length of ISAKMP Message: 40 Sep 21 07:15:40.039498: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #5) Sep 21 07:15:40.039500: | af 32 ac d5 20 ab 79 62 0c 0a 19 55 fb eb 1d c4 Sep 21 07:15:40.039503: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:40.039505: | 00 00 00 01 01 00 00 0e Sep 21 07:15:40.039530: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:40.039536: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:40.039541: | stop processing: state #5 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:40.039544: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:40.039549: | spent 0.458 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:40.088874: | spent 0.00336 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:40.088901: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:40.088904: | e1 04 4f 90 68 e8 e6 95 00 00 00 00 00 00 00 00 Sep 21 07:15:40.088907: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:40.088909: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:40.088912: | 00 00 00 14 01 01 00 00 80 01 00 09 80 02 00 06 Sep 21 07:15:40.088914: | 80 03 00 1b Sep 21 07:15:40.088919: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:40.088922: | **parse ISAKMP Message: Sep 21 07:15:40.088925: | initiator cookie: Sep 21 07:15:40.088928: | e1 04 4f 90 68 e8 e6 95 Sep 21 07:15:40.088930: | responder cookie: Sep 21 07:15:40.088932: | 00 00 00 00 00 00 00 00 Sep 21 07:15:40.088935: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.088941: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.088944: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.088947: | flags: none (0x0) Sep 21 07:15:40.088949: | Message ID: 0 (0x0) Sep 21 07:15:40.088952: | length: 68 (0x44) Sep 21 07:15:40.088954: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:40.088958: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:40.088961: | #null state always idle Sep 21 07:15:40.088964: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:40.088967: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:40.088970: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.088972: | length: 40 (0x28) Sep 21 07:15:40.088975: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.088978: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:40.088981: | in statetime_start() with no state Sep 21 07:15:40.088986: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:40.088992: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:40.088995: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.088999: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:40.089001: | find_next_host_connection returns test Sep 21 07:15:40.089004: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.089006: | find_next_host_connection returns empty Sep 21 07:15:40.089031: | creating state object #6 at 0x56077c1d2080 Sep 21 07:15:40.089035: | State DB: adding IKEv1 state #6 in UNDEFINED Sep 21 07:15:40.089041: | pstats #6 ikev1.isakmp started Sep 21 07:15:40.089046: | #6 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:40.089052: | start processing: state #6 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:40.089055: | parent state #6: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:40.089058: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:40.089061: | ICOOKIE-DUMP: e1 04 4f 90 68 e8 e6 95 Sep 21 07:15:40.089064: "test" #6: responding to Main Mode Sep 21 07:15:40.089069: | **emit ISAKMP Message: Sep 21 07:15:40.089071: | initiator cookie: Sep 21 07:15:40.089073: | e1 04 4f 90 68 e8 e6 95 Sep 21 07:15:40.089076: | responder cookie: Sep 21 07:15:40.089078: | 6a b4 3c 73 7a 48 77 ff Sep 21 07:15:40.089080: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.089083: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.089086: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.089088: | flags: none (0x0) Sep 21 07:15:40.089090: | Message ID: 0 (0x0) Sep 21 07:15:40.089093: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.089096: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:40.089099: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:40.089102: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:40.089104: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.089107: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:40.089110: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:40.089113: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:40.089116: | ****parse IPsec DOI SIT: Sep 21 07:15:40.089119: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:40.089121: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:40.089124: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.089128: | length: 28 (0x1c) Sep 21 07:15:40.089130: | proposal number: 1 (0x1) Sep 21 07:15:40.089133: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:40.089135: | SPI size: 0 (0x0) Sep 21 07:15:40.089138: | number of transforms: 1 (0x1) Sep 21 07:15:40.089140: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:40.089143: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.089145: | length: 20 (0x14) Sep 21 07:15:40.089147: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:40.089150: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:40.089153: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:40.089155: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:40.089158: | length/value: 9 (0x9) Sep 21 07:15:40.089161: | [9 is UNUSED_9] Sep 21 07:15:40.089165: "test" #6: UNUSED_9 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:40.089167: "test" #6: no acceptable Oakley Transform Sep 21 07:15:40.089170: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:40.089175: | [RE]START processing: state #6 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:40.089177: | #6 is idle Sep 21 07:15:40.089248: "test" #6: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:40.089252: | **emit ISAKMP Message: Sep 21 07:15:40.089255: | initiator cookie: Sep 21 07:15:40.089257: | e1 04 4f 90 68 e8 e6 95 Sep 21 07:15:40.089260: | responder cookie: Sep 21 07:15:40.089262: | 6a b4 3c 73 7a 48 77 ff Sep 21 07:15:40.089264: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.089267: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.089269: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:40.089272: | flags: none (0x0) Sep 21 07:15:40.089274: | Message ID: 0 (0x0) Sep 21 07:15:40.089277: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.089280: | ***emit ISAKMP Notification Payload: Sep 21 07:15:40.089282: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.089285: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.089287: | protocol ID: 1 (0x1) Sep 21 07:15:40.089289: | SPI size: 0 (0x0) Sep 21 07:15:40.089292: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:40.089295: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:40.089298: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:40.089301: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:40.089303: | emitting length of ISAKMP Message: 40 Sep 21 07:15:40.089309: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #6) Sep 21 07:15:40.089312: | e1 04 4f 90 68 e8 e6 95 6a b4 3c 73 7a 48 77 ff Sep 21 07:15:40.089314: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:40.089316: | 00 00 00 01 01 00 00 0e Sep 21 07:15:40.089341: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:40.089346: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:40.089352: | stop processing: state #6 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:40.089354: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:40.089359: | spent 0.458 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:40.150039: | spent 0.00323 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:40.150059: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:40.150061: | 4d e0 2c 85 43 a9 5b ec 00 00 00 00 00 00 00 00 Sep 21 07:15:40.150063: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:15:40.150064: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:15:40.150070: | 00 00 00 18 01 01 00 00 80 01 00 1b 80 02 00 08 Sep 21 07:15:40.150071: | 80 03 00 18 80 04 00 0d Sep 21 07:15:40.150074: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:40.150077: | **parse ISAKMP Message: Sep 21 07:15:40.150079: | initiator cookie: Sep 21 07:15:40.150081: | 4d e0 2c 85 43 a9 5b ec Sep 21 07:15:40.150082: | responder cookie: Sep 21 07:15:40.150083: | 00 00 00 00 00 00 00 00 Sep 21 07:15:40.150085: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.150087: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.150089: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.150091: | flags: none (0x0) Sep 21 07:15:40.150099: | Message ID: 0 (0x0) Sep 21 07:15:40.150104: | length: 72 (0x48) Sep 21 07:15:40.150113: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:40.150118: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:40.150121: | #null state always idle Sep 21 07:15:40.150124: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:40.150127: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:40.150130: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.150132: | length: 44 (0x2c) Sep 21 07:15:40.150135: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.150138: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:40.150143: | in statetime_start() with no state Sep 21 07:15:40.150151: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:40.150157: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:40.150161: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.150164: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:40.150166: | find_next_host_connection returns test Sep 21 07:15:40.150168: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.150170: | find_next_host_connection returns empty Sep 21 07:15:40.150192: | creating state object #7 at 0x56077c1d2b40 Sep 21 07:15:40.150194: | State DB: adding IKEv1 state #7 in UNDEFINED Sep 21 07:15:40.150198: | pstats #7 ikev1.isakmp started Sep 21 07:15:40.150201: | #7 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:40.150205: | start processing: state #7 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:40.150208: | parent state #7: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:40.150210: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:40.150212: | ICOOKIE-DUMP: 4d e0 2c 85 43 a9 5b ec Sep 21 07:15:40.150214: "test" #7: responding to Main Mode Sep 21 07:15:40.150218: | **emit ISAKMP Message: Sep 21 07:15:40.150220: | initiator cookie: Sep 21 07:15:40.150221: | 4d e0 2c 85 43 a9 5b ec Sep 21 07:15:40.150223: | responder cookie: Sep 21 07:15:40.150224: | b5 1f 02 58 1f f8 e0 b0 Sep 21 07:15:40.150226: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.150227: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.150229: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.150231: | flags: none (0x0) Sep 21 07:15:40.150232: | Message ID: 0 (0x0) Sep 21 07:15:40.150234: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.150236: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:40.150238: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:40.150240: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:40.150241: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.150243: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:40.150248: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:40.150251: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:40.150253: | ****parse IPsec DOI SIT: Sep 21 07:15:40.150255: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:40.150257: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:40.150258: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.150260: | length: 32 (0x20) Sep 21 07:15:40.150261: | proposal number: 1 (0x1) Sep 21 07:15:40.150263: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:40.150265: | SPI size: 0 (0x0) Sep 21 07:15:40.150266: | number of transforms: 1 (0x1) Sep 21 07:15:40.150268: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:40.150270: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.150275: | length: 24 (0x18) Sep 21 07:15:40.150279: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:40.150281: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:40.150284: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:40.150287: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:40.150289: | length/value: 27 (0x1b) Sep 21 07:15:40.150292: | [27 is OAKLEY_CAMELLIA_CCM_C] Sep 21 07:15:40.150297: "test" #7: OAKLEY_CAMELLIA_CCM_C is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:40.150300: "test" #7: no acceptable Oakley Transform Sep 21 07:15:40.150302: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:40.150308: | [RE]START processing: state #7 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:40.150310: | #7 is idle Sep 21 07:15:40.150461: "test" #7: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:40.150467: | **emit ISAKMP Message: Sep 21 07:15:40.150470: | initiator cookie: Sep 21 07:15:40.150473: | 4d e0 2c 85 43 a9 5b ec Sep 21 07:15:40.150476: | responder cookie: Sep 21 07:15:40.150478: | b5 1f 02 58 1f f8 e0 b0 Sep 21 07:15:40.150481: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.150484: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.150486: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:40.150489: | flags: none (0x0) Sep 21 07:15:40.150492: | Message ID: 0 (0x0) Sep 21 07:15:40.150495: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.150498: | ***emit ISAKMP Notification Payload: Sep 21 07:15:40.150501: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.150507: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.150510: | protocol ID: 1 (0x1) Sep 21 07:15:40.150513: | SPI size: 0 (0x0) Sep 21 07:15:40.150515: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:40.150518: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:40.150521: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:40.150524: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:40.150527: | emitting length of ISAKMP Message: 40 Sep 21 07:15:40.150534: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #7) Sep 21 07:15:40.150537: | 4d e0 2c 85 43 a9 5b ec b5 1f 02 58 1f f8 e0 b0 Sep 21 07:15:40.150539: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:40.150541: | 00 00 00 01 01 00 00 0e Sep 21 07:15:40.150571: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:40.150578: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:40.150583: | stop processing: state #7 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:40.150587: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:40.150595: | spent 0.442 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:40.221579: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:40.221602: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:40.221606: | 62 bb 16 7c 04 52 24 4b 00 00 00 00 00 00 00 00 Sep 21 07:15:40.221608: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:40.221611: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:40.221613: | 00 00 00 14 01 01 00 00 80 02 00 08 80 03 00 18 Sep 21 07:15:40.221615: | 80 04 00 0d Sep 21 07:15:40.221620: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:40.221624: | **parse ISAKMP Message: Sep 21 07:15:40.221626: | initiator cookie: Sep 21 07:15:40.221629: | 62 bb 16 7c 04 52 24 4b Sep 21 07:15:40.221631: | responder cookie: Sep 21 07:15:40.221633: | 00 00 00 00 00 00 00 00 Sep 21 07:15:40.221636: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.221639: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.221641: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.221643: | flags: none (0x0) Sep 21 07:15:40.221646: | Message ID: 0 (0x0) Sep 21 07:15:40.221648: | length: 68 (0x44) Sep 21 07:15:40.221651: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:40.221654: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:40.221657: | #null state always idle Sep 21 07:15:40.221660: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:40.221663: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:40.221666: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.221669: | length: 40 (0x28) Sep 21 07:15:40.221671: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.221674: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:40.221676: | in statetime_start() with no state Sep 21 07:15:40.221682: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:40.221687: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:40.221690: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.221694: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:40.221696: | find_next_host_connection returns test Sep 21 07:15:40.221699: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.221701: | find_next_host_connection returns empty Sep 21 07:15:40.221725: | creating state object #8 at 0x56077c1d3600 Sep 21 07:15:40.221729: | State DB: adding IKEv1 state #8 in UNDEFINED Sep 21 07:15:40.221733: | pstats #8 ikev1.isakmp started Sep 21 07:15:40.221738: | #8 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:40.221744: | start processing: state #8 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:40.221748: | parent state #8: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:40.221751: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:40.221754: | ICOOKIE-DUMP: 62 bb 16 7c 04 52 24 4b Sep 21 07:15:40.221757: "test" #8: responding to Main Mode Sep 21 07:15:40.221762: | **emit ISAKMP Message: Sep 21 07:15:40.221764: | initiator cookie: Sep 21 07:15:40.221767: | 62 bb 16 7c 04 52 24 4b Sep 21 07:15:40.221769: | responder cookie: Sep 21 07:15:40.221771: | d3 ec eb 91 d3 20 20 ab Sep 21 07:15:40.221774: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.221776: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.221779: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.221781: | flags: none (0x0) Sep 21 07:15:40.221789: | Message ID: 0 (0x0) Sep 21 07:15:40.221792: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.221798: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:40.221801: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:40.221804: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:40.221806: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.221809: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:40.221812: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:40.221815: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:40.221818: | ****parse IPsec DOI SIT: Sep 21 07:15:40.221821: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:40.221824: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:40.221826: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.221828: | length: 28 (0x1c) Sep 21 07:15:40.221831: | proposal number: 1 (0x1) Sep 21 07:15:40.221833: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:40.221835: | SPI size: 0 (0x0) Sep 21 07:15:40.221838: | number of transforms: 1 (0x1) Sep 21 07:15:40.221840: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:40.221843: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.221845: | length: 20 (0x14) Sep 21 07:15:40.221847: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:40.221850: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:40.221852: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:40.221855: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:15:40.221858: | length/value: 8 (0x8) Sep 21 07:15:40.221862: "test" #8: 8?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:15:40.221865: "test" #8: no acceptable Oakley Transform Sep 21 07:15:40.221868: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:40.221873: | [RE]START processing: state #8 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:40.221875: | #8 is idle Sep 21 07:15:40.221959: "test" #8: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:40.221964: | **emit ISAKMP Message: Sep 21 07:15:40.221966: | initiator cookie: Sep 21 07:15:40.221969: | 62 bb 16 7c 04 52 24 4b Sep 21 07:15:40.221971: | responder cookie: Sep 21 07:15:40.221973: | d3 ec eb 91 d3 20 20 ab Sep 21 07:15:40.221976: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.221978: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.221981: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:40.221983: | flags: none (0x0) Sep 21 07:15:40.221985: | Message ID: 0 (0x0) Sep 21 07:15:40.221988: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.221991: | ***emit ISAKMP Notification Payload: Sep 21 07:15:40.221993: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.221995: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.221997: | protocol ID: 1 (0x1) Sep 21 07:15:40.222000: | SPI size: 0 (0x0) Sep 21 07:15:40.222002: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:40.222006: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:40.222008: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:40.222011: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:40.222014: | emitting length of ISAKMP Message: 40 Sep 21 07:15:40.222019: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #8) Sep 21 07:15:40.222022: | 62 bb 16 7c 04 52 24 4b d3 ec eb 91 d3 20 20 ab Sep 21 07:15:40.222024: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:40.222029: | 00 00 00 01 01 00 00 0e Sep 21 07:15:40.222052: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:40.222058: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:40.222062: | stop processing: state #8 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:40.222065: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:40.222070: | spent 0.454 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:40.278098: | spent 0.00202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:40.278124: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:40.278128: | d7 1d 57 8e 0d 54 fd 27 00 00 00 00 00 00 00 00 Sep 21 07:15:40.278131: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:40.278133: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:40.278136: | 00 00 00 14 01 01 00 00 80 01 00 1b 80 03 00 18 Sep 21 07:15:40.278138: | 80 04 00 0d Sep 21 07:15:40.278143: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:40.278146: | **parse ISAKMP Message: Sep 21 07:15:40.278149: | initiator cookie: Sep 21 07:15:40.278151: | d7 1d 57 8e 0d 54 fd 27 Sep 21 07:15:40.278154: | responder cookie: Sep 21 07:15:40.278156: | 00 00 00 00 00 00 00 00 Sep 21 07:15:40.278159: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.278162: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.278164: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.278167: | flags: none (0x0) Sep 21 07:15:40.278169: | Message ID: 0 (0x0) Sep 21 07:15:40.278172: | length: 68 (0x44) Sep 21 07:15:40.278175: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:40.278178: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:40.278181: | #null state always idle Sep 21 07:15:40.278184: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:40.278187: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:40.278190: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.278192: | length: 40 (0x28) Sep 21 07:15:40.278195: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.278198: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:40.278200: | in statetime_start() with no state Sep 21 07:15:40.278206: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:40.278211: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:40.278214: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.278219: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:40.278221: | find_next_host_connection returns test Sep 21 07:15:40.278224: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.278226: | find_next_host_connection returns empty Sep 21 07:15:40.278251: | creating state object #9 at 0x56077c1d40c0 Sep 21 07:15:40.278255: | State DB: adding IKEv1 state #9 in UNDEFINED Sep 21 07:15:40.278259: | pstats #9 ikev1.isakmp started Sep 21 07:15:40.278264: | #9 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:40.278270: | start processing: state #9 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:40.278273: | parent state #9: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:40.278276: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:40.278279: | ICOOKIE-DUMP: d7 1d 57 8e 0d 54 fd 27 Sep 21 07:15:40.278281: "test" #9: responding to Main Mode Sep 21 07:15:40.278286: | **emit ISAKMP Message: Sep 21 07:15:40.278289: | initiator cookie: Sep 21 07:15:40.278291: | d7 1d 57 8e 0d 54 fd 27 Sep 21 07:15:40.278297: | responder cookie: Sep 21 07:15:40.278300: | 92 f6 ae 96 59 58 9d ad Sep 21 07:15:40.278302: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.278305: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.278308: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.278310: | flags: none (0x0) Sep 21 07:15:40.278312: | Message ID: 0 (0x0) Sep 21 07:15:40.278315: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.278318: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:40.278321: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:40.278324: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:40.278326: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.278329: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:40.278332: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:40.278335: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:40.278338: | ****parse IPsec DOI SIT: Sep 21 07:15:40.278341: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:40.278344: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:40.278346: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.278348: | length: 28 (0x1c) Sep 21 07:15:40.278351: | proposal number: 1 (0x1) Sep 21 07:15:40.278354: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:40.278356: | SPI size: 0 (0x0) Sep 21 07:15:40.278358: | number of transforms: 1 (0x1) Sep 21 07:15:40.278361: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:40.278363: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.278366: | length: 20 (0x14) Sep 21 07:15:40.278368: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:40.278371: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:40.278374: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:40.278376: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:40.278379: | length/value: 27 (0x1b) Sep 21 07:15:40.278382: | [27 is OAKLEY_CAMELLIA_CCM_C] Sep 21 07:15:40.278386: "test" #9: OAKLEY_CAMELLIA_CCM_C is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:40.278388: "test" #9: no acceptable Oakley Transform Sep 21 07:15:40.278391: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:40.278396: | [RE]START processing: state #9 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:40.278398: | #9 is idle Sep 21 07:15:40.279142: "test" #9: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:40.279152: | **emit ISAKMP Message: Sep 21 07:15:40.279155: | initiator cookie: Sep 21 07:15:40.279157: | d7 1d 57 8e 0d 54 fd 27 Sep 21 07:15:40.279160: | responder cookie: Sep 21 07:15:40.279162: | 92 f6 ae 96 59 58 9d ad Sep 21 07:15:40.279165: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.279167: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.279170: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:40.279172: | flags: none (0x0) Sep 21 07:15:40.279175: | Message ID: 0 (0x0) Sep 21 07:15:40.279178: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.279181: | ***emit ISAKMP Notification Payload: Sep 21 07:15:40.279183: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.279186: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.279188: | protocol ID: 1 (0x1) Sep 21 07:15:40.279190: | SPI size: 0 (0x0) Sep 21 07:15:40.279193: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:40.279196: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:40.279202: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:40.279205: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:40.279207: | emitting length of ISAKMP Message: 40 Sep 21 07:15:40.279214: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #9) Sep 21 07:15:40.279216: | d7 1d 57 8e 0d 54 fd 27 92 f6 ae 96 59 58 9d ad Sep 21 07:15:40.279219: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:40.279221: | 00 00 00 01 01 00 00 0e Sep 21 07:15:40.279246: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:40.279252: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:40.279258: | stop processing: state #9 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:40.279261: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:40.279267: | spent 0.471 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:40.356087: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:40.356117: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:40.356120: | 09 b0 21 e3 a5 5a 97 ac 00 00 00 00 00 00 00 00 Sep 21 07:15:40.356123: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:40.356125: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:40.356127: | 00 00 00 14 01 01 00 00 80 01 00 1b 80 02 00 08 Sep 21 07:15:40.356130: | 80 04 00 0d Sep 21 07:15:40.356135: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:40.356139: | **parse ISAKMP Message: Sep 21 07:15:40.356142: | initiator cookie: Sep 21 07:15:40.356144: | 09 b0 21 e3 a5 5a 97 ac Sep 21 07:15:40.356146: | responder cookie: Sep 21 07:15:40.356149: | 00 00 00 00 00 00 00 00 Sep 21 07:15:40.356152: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.356154: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.356157: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.356160: | flags: none (0x0) Sep 21 07:15:40.356163: | Message ID: 0 (0x0) Sep 21 07:15:40.356165: | length: 68 (0x44) Sep 21 07:15:40.356168: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:40.356172: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:40.356174: | #null state always idle Sep 21 07:15:40.356178: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:40.356181: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:40.356184: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.356186: | length: 40 (0x28) Sep 21 07:15:40.356189: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.356191: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:40.356194: | in statetime_start() with no state Sep 21 07:15:40.356204: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:40.356210: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:40.356215: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.356219: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:40.356222: | find_next_host_connection returns test Sep 21 07:15:40.356224: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.356227: | find_next_host_connection returns empty Sep 21 07:15:40.356253: | creating state object #10 at 0x56077c1d4b80 Sep 21 07:15:40.356257: | State DB: adding IKEv1 state #10 in UNDEFINED Sep 21 07:15:40.356263: | pstats #10 ikev1.isakmp started Sep 21 07:15:40.356267: | #10 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:40.356277: | start processing: state #10 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:40.356281: | parent state #10: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:40.356284: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:40.356287: | ICOOKIE-DUMP: 09 b0 21 e3 a5 5a 97 ac Sep 21 07:15:40.356290: "test" #10: responding to Main Mode Sep 21 07:15:40.356294: | **emit ISAKMP Message: Sep 21 07:15:40.356297: | initiator cookie: Sep 21 07:15:40.356299: | 09 b0 21 e3 a5 5a 97 ac Sep 21 07:15:40.356301: | responder cookie: Sep 21 07:15:40.356304: | 96 ec aa a2 71 6b 4a 6f Sep 21 07:15:40.356306: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.356309: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.356311: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.356314: | flags: none (0x0) Sep 21 07:15:40.356316: | Message ID: 0 (0x0) Sep 21 07:15:40.356319: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.356322: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:40.356325: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:40.356327: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:40.356330: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.356333: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:40.356336: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:40.356339: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:40.356342: | ****parse IPsec DOI SIT: Sep 21 07:15:40.356344: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:40.356347: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:40.356350: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.356352: | length: 28 (0x1c) Sep 21 07:15:40.356354: | proposal number: 1 (0x1) Sep 21 07:15:40.356357: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:40.356359: | SPI size: 0 (0x0) Sep 21 07:15:40.356362: | number of transforms: 1 (0x1) Sep 21 07:15:40.356364: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:40.356367: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.356369: | length: 20 (0x14) Sep 21 07:15:40.356372: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:40.356374: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:40.356377: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:40.356380: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:40.356382: | length/value: 27 (0x1b) Sep 21 07:15:40.356385: | [27 is OAKLEY_CAMELLIA_CCM_C] Sep 21 07:15:40.356389: "test" #10: OAKLEY_CAMELLIA_CCM_C is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:40.356392: "test" #10: no acceptable Oakley Transform Sep 21 07:15:40.356394: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:40.356399: | [RE]START processing: state #10 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:40.356402: | #10 is idle Sep 21 07:15:40.357008: "test" #10: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:40.357021: | **emit ISAKMP Message: Sep 21 07:15:40.357026: | initiator cookie: Sep 21 07:15:40.357029: | 09 b0 21 e3 a5 5a 97 ac Sep 21 07:15:40.357032: | responder cookie: Sep 21 07:15:40.357034: | 96 ec aa a2 71 6b 4a 6f Sep 21 07:15:40.357037: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.357041: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.357044: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:40.357047: | flags: none (0x0) Sep 21 07:15:40.357050: | Message ID: 0 (0x0) Sep 21 07:15:40.357054: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.357060: | ***emit ISAKMP Notification Payload: Sep 21 07:15:40.357064: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.357067: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.357070: | protocol ID: 1 (0x1) Sep 21 07:15:40.357073: | SPI size: 0 (0x0) Sep 21 07:15:40.357076: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:40.357080: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:40.357083: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:40.357087: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:40.357090: | emitting length of ISAKMP Message: 40 Sep 21 07:15:40.357098: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #10) Sep 21 07:15:40.357101: | 09 b0 21 e3 a5 5a 97 ac 96 ec aa a2 71 6b 4a 6f Sep 21 07:15:40.357104: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:40.357106: | 00 00 00 01 01 00 00 0e Sep 21 07:15:40.357142: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:40.357148: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:40.357155: | stop processing: state #10 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:40.357158: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:40.357164: | spent 0.508 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:40.449873: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:40.449897: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:40.449900: | b3 d8 aa c0 1b b5 a9 3c 00 00 00 00 00 00 00 00 Sep 21 07:15:40.449903: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:40.449905: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:40.449907: | 00 00 00 14 01 01 00 00 80 01 00 1b 80 02 00 08 Sep 21 07:15:40.449910: | 80 03 00 18 Sep 21 07:15:40.449915: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:40.449918: | **parse ISAKMP Message: Sep 21 07:15:40.449921: | initiator cookie: Sep 21 07:15:40.449924: | b3 d8 aa c0 1b b5 a9 3c Sep 21 07:15:40.449926: | responder cookie: Sep 21 07:15:40.449928: | 00 00 00 00 00 00 00 00 Sep 21 07:15:40.449931: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.449934: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.449936: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.449939: | flags: none (0x0) Sep 21 07:15:40.449941: | Message ID: 0 (0x0) Sep 21 07:15:40.449944: | length: 68 (0x44) Sep 21 07:15:40.449947: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:40.449950: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:40.449953: | #null state always idle Sep 21 07:15:40.449956: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:40.449959: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:40.449962: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.449964: | length: 40 (0x28) Sep 21 07:15:40.449967: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.449969: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:40.449972: | in statetime_start() with no state Sep 21 07:15:40.449978: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:40.449983: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:40.449986: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.449990: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:40.449996: | find_next_host_connection returns test Sep 21 07:15:40.449999: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.450001: | find_next_host_connection returns empty Sep 21 07:15:40.450025: | creating state object #11 at 0x56077c1d5640 Sep 21 07:15:40.450028: | State DB: adding IKEv1 state #11 in UNDEFINED Sep 21 07:15:40.450033: | pstats #11 ikev1.isakmp started Sep 21 07:15:40.450037: | #11 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:40.450043: | start processing: state #11 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:40.450047: | parent state #11: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:40.450050: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:40.450053: | ICOOKIE-DUMP: b3 d8 aa c0 1b b5 a9 3c Sep 21 07:15:40.450056: "test" #11: responding to Main Mode Sep 21 07:15:40.450060: | **emit ISAKMP Message: Sep 21 07:15:40.450063: | initiator cookie: Sep 21 07:15:40.450065: | b3 d8 aa c0 1b b5 a9 3c Sep 21 07:15:40.450067: | responder cookie: Sep 21 07:15:40.450070: | 4b 4e b6 02 43 cc e5 e7 Sep 21 07:15:40.450072: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.450075: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.450077: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.450079: | flags: none (0x0) Sep 21 07:15:40.450082: | Message ID: 0 (0x0) Sep 21 07:15:40.450085: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.450087: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:40.450090: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:40.450093: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:40.450095: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.450098: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:40.450101: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:40.450104: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:40.450107: | ****parse IPsec DOI SIT: Sep 21 07:15:40.450110: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:40.450113: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:40.450115: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.450117: | length: 28 (0x1c) Sep 21 07:15:40.450120: | proposal number: 1 (0x1) Sep 21 07:15:40.450122: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:40.450125: | SPI size: 0 (0x0) Sep 21 07:15:40.450127: | number of transforms: 1 (0x1) Sep 21 07:15:40.450130: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:40.450132: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.450135: | length: 20 (0x14) Sep 21 07:15:40.450137: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:40.450139: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:40.450142: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:40.450145: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:40.450147: | length/value: 27 (0x1b) Sep 21 07:15:40.450150: | [27 is OAKLEY_CAMELLIA_CCM_C] Sep 21 07:15:40.450154: "test" #11: OAKLEY_CAMELLIA_CCM_C is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:40.450156: "test" #11: no acceptable Oakley Transform Sep 21 07:15:40.450160: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:40.450165: | [RE]START processing: state #11 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:40.450167: | #11 is idle Sep 21 07:15:40.450256: "test" #11: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:40.450260: | **emit ISAKMP Message: Sep 21 07:15:40.450265: | initiator cookie: Sep 21 07:15:40.450267: | b3 d8 aa c0 1b b5 a9 3c Sep 21 07:15:40.450270: | responder cookie: Sep 21 07:15:40.450272: | 4b 4e b6 02 43 cc e5 e7 Sep 21 07:15:40.450274: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.450277: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.450279: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:40.450282: | flags: none (0x0) Sep 21 07:15:40.450284: | Message ID: 0 (0x0) Sep 21 07:15:40.450287: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.450290: | ***emit ISAKMP Notification Payload: Sep 21 07:15:40.450292: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.450295: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.450297: | protocol ID: 1 (0x1) Sep 21 07:15:40.450299: | SPI size: 0 (0x0) Sep 21 07:15:40.450302: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:40.450305: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:40.450308: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:40.450310: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:40.450313: | emitting length of ISAKMP Message: 40 Sep 21 07:15:40.450319: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #11) Sep 21 07:15:40.450321: | b3 d8 aa c0 1b b5 a9 3c 4b 4e b6 02 43 cc e5 e7 Sep 21 07:15:40.450324: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:40.450326: | 00 00 00 01 01 00 00 0e Sep 21 07:15:40.450348: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:40.450353: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:40.450358: | stop processing: state #11 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:40.450361: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:40.450366: | spent 0.453 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:40.568759: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:40.568786: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:40.568792: | ee a9 92 f3 9c c5 13 39 00 00 00 00 00 00 00 00 Sep 21 07:15:40.568796: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:15:40.568800: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:15:40.568802: | 00 00 00 18 01 01 00 00 80 01 00 1a 80 02 00 09 Sep 21 07:15:40.568804: | 80 03 00 1c 80 04 00 17 Sep 21 07:15:40.568809: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:40.568813: | **parse ISAKMP Message: Sep 21 07:15:40.568815: | initiator cookie: Sep 21 07:15:40.568817: | ee a9 92 f3 9c c5 13 39 Sep 21 07:15:40.568819: | responder cookie: Sep 21 07:15:40.568821: | 00 00 00 00 00 00 00 00 Sep 21 07:15:40.568824: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.568826: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.568829: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.568831: | flags: none (0x0) Sep 21 07:15:40.568834: | Message ID: 0 (0x0) Sep 21 07:15:40.568836: | length: 72 (0x48) Sep 21 07:15:40.568839: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:40.568843: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:40.568845: | #null state always idle Sep 21 07:15:40.568848: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:40.568851: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:40.568854: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.568856: | length: 44 (0x2c) Sep 21 07:15:40.568859: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.568865: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:40.568868: | in statetime_start() with no state Sep 21 07:15:40.568873: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:40.568879: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:40.568882: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.568886: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:40.568888: | find_next_host_connection returns test Sep 21 07:15:40.568891: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.568893: | find_next_host_connection returns empty Sep 21 07:15:40.568918: | creating state object #12 at 0x56077c1d6100 Sep 21 07:15:40.568922: | State DB: adding IKEv1 state #12 in UNDEFINED Sep 21 07:15:40.568926: | pstats #12 ikev1.isakmp started Sep 21 07:15:40.568930: | #12 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:40.568936: | start processing: state #12 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:40.568939: | parent state #12: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:40.568943: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:40.568945: | ICOOKIE-DUMP: ee a9 92 f3 9c c5 13 39 Sep 21 07:15:40.568948: "test" #12: responding to Main Mode Sep 21 07:15:40.568953: | **emit ISAKMP Message: Sep 21 07:15:40.568959: | initiator cookie: Sep 21 07:15:40.568962: | ee a9 92 f3 9c c5 13 39 Sep 21 07:15:40.568965: | responder cookie: Sep 21 07:15:40.568968: | fb ff d6 26 85 22 84 82 Sep 21 07:15:40.568971: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.568974: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.568977: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.568980: | flags: none (0x0) Sep 21 07:15:40.568983: | Message ID: 0 (0x0) Sep 21 07:15:40.568986: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.568990: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:40.568994: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:40.568997: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:40.569000: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.569004: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:40.569008: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:40.569012: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:40.569016: | ****parse IPsec DOI SIT: Sep 21 07:15:40.569019: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:40.569022: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:40.569025: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.569028: | length: 32 (0x20) Sep 21 07:15:40.569031: | proposal number: 1 (0x1) Sep 21 07:15:40.569034: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:40.569036: | SPI size: 0 (0x0) Sep 21 07:15:40.569040: | number of transforms: 1 (0x1) Sep 21 07:15:40.569043: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:40.569046: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.569049: | length: 24 (0x18) Sep 21 07:15:40.569052: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:40.569055: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:40.569058: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:40.569062: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:40.569064: | length/value: 26 (0x1a) Sep 21 07:15:40.569068: | [26 is OAKLEY_CAMELLIA_CCM_B] Sep 21 07:15:40.569076: "test" #12: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:40.569079: "test" #12: no acceptable Oakley Transform Sep 21 07:15:40.569083: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:40.569089: | [RE]START processing: state #12 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:40.569092: | #12 is idle Sep 21 07:15:40.569193: "test" #12: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:40.569198: | **emit ISAKMP Message: Sep 21 07:15:40.569201: | initiator cookie: Sep 21 07:15:40.569204: | ee a9 92 f3 9c c5 13 39 Sep 21 07:15:40.569206: | responder cookie: Sep 21 07:15:40.569209: | fb ff d6 26 85 22 84 82 Sep 21 07:15:40.569212: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.569215: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.569219: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:40.569221: | flags: none (0x0) Sep 21 07:15:40.569224: | Message ID: 0 (0x0) Sep 21 07:15:40.569228: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.569231: | ***emit ISAKMP Notification Payload: Sep 21 07:15:40.569234: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.569237: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.569240: | protocol ID: 1 (0x1) Sep 21 07:15:40.569242: | SPI size: 0 (0x0) Sep 21 07:15:40.569245: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:40.569249: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:40.569253: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:40.569257: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:40.569259: | emitting length of ISAKMP Message: 40 Sep 21 07:15:40.569267: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #12) Sep 21 07:15:40.569270: | ee a9 92 f3 9c c5 13 39 fb ff d6 26 85 22 84 82 Sep 21 07:15:40.569273: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:40.569276: | 00 00 00 01 01 00 00 0e Sep 21 07:15:40.569300: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:40.569307: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:40.569313: | stop processing: state #12 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:40.569317: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:40.569323: | spent 0.528 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:40.625151: | spent 0.00335 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:40.625176: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:40.625179: | 50 2a 32 6b c4 37 4e fc 00 00 00 00 00 00 00 00 Sep 21 07:15:40.625182: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:40.625184: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:40.625186: | 00 00 00 14 01 01 00 00 80 02 00 09 80 03 00 1c Sep 21 07:15:40.625188: | 80 04 00 17 Sep 21 07:15:40.625193: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:40.625198: | **parse ISAKMP Message: Sep 21 07:15:40.625200: | initiator cookie: Sep 21 07:15:40.625203: | 50 2a 32 6b c4 37 4e fc Sep 21 07:15:40.625205: | responder cookie: Sep 21 07:15:40.625207: | 00 00 00 00 00 00 00 00 Sep 21 07:15:40.625210: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.625213: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.625215: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.625218: | flags: none (0x0) Sep 21 07:15:40.625220: | Message ID: 0 (0x0) Sep 21 07:15:40.625226: | length: 68 (0x44) Sep 21 07:15:40.625229: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:40.625233: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:40.625235: | #null state always idle Sep 21 07:15:40.625239: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:40.625242: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:40.625244: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.625247: | length: 40 (0x28) Sep 21 07:15:40.625249: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.625252: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:40.625255: | in statetime_start() with no state Sep 21 07:15:40.625260: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:40.625266: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:40.625269: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.625272: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:40.625275: | find_next_host_connection returns test Sep 21 07:15:40.625278: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.625280: | find_next_host_connection returns empty Sep 21 07:15:40.625307: | creating state object #13 at 0x56077c1d6bc0 Sep 21 07:15:40.625310: | State DB: adding IKEv1 state #13 in UNDEFINED Sep 21 07:15:40.625314: | pstats #13 ikev1.isakmp started Sep 21 07:15:40.625319: | #13 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:40.625325: | start processing: state #13 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:40.625328: | parent state #13: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:40.625331: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:40.625334: | ICOOKIE-DUMP: 50 2a 32 6b c4 37 4e fc Sep 21 07:15:40.625337: "test" #13: responding to Main Mode Sep 21 07:15:40.625342: | **emit ISAKMP Message: Sep 21 07:15:40.625344: | initiator cookie: Sep 21 07:15:40.625347: | 50 2a 32 6b c4 37 4e fc Sep 21 07:15:40.625349: | responder cookie: Sep 21 07:15:40.625351: | b9 63 32 bf 8f 43 42 e9 Sep 21 07:15:40.625354: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.625356: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.625359: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.625361: | flags: none (0x0) Sep 21 07:15:40.625364: | Message ID: 0 (0x0) Sep 21 07:15:40.625366: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.625369: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:40.625372: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:40.625375: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:40.625377: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.625380: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:40.625383: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:40.625386: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:40.625389: | ****parse IPsec DOI SIT: Sep 21 07:15:40.625391: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:40.625394: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:40.625396: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.625399: | length: 28 (0x1c) Sep 21 07:15:40.625401: | proposal number: 1 (0x1) Sep 21 07:15:40.625404: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:40.625406: | SPI size: 0 (0x0) Sep 21 07:15:40.625408: | number of transforms: 1 (0x1) Sep 21 07:15:40.625413: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:40.625415: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.625418: | length: 20 (0x14) Sep 21 07:15:40.625420: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:40.625422: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:40.625425: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:40.625428: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:15:40.625430: | length/value: 9 (0x9) Sep 21 07:15:40.625434: "test" #13: 9?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:15:40.625437: "test" #13: no acceptable Oakley Transform Sep 21 07:15:40.625440: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:40.625445: | [RE]START processing: state #13 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:40.625447: | #13 is idle Sep 21 07:15:40.625521: "test" #13: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:40.625526: | **emit ISAKMP Message: Sep 21 07:15:40.625528: | initiator cookie: Sep 21 07:15:40.625531: | 50 2a 32 6b c4 37 4e fc Sep 21 07:15:40.625533: | responder cookie: Sep 21 07:15:40.625535: | b9 63 32 bf 8f 43 42 e9 Sep 21 07:15:40.625538: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.625540: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.625543: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:40.625545: | flags: none (0x0) Sep 21 07:15:40.625548: | Message ID: 0 (0x0) Sep 21 07:15:40.625550: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.625553: | ***emit ISAKMP Notification Payload: Sep 21 07:15:40.625555: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.625558: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.625560: | protocol ID: 1 (0x1) Sep 21 07:15:40.625563: | SPI size: 0 (0x0) Sep 21 07:15:40.625565: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:40.625568: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:40.625571: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:40.625573: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:40.625576: | emitting length of ISAKMP Message: 40 Sep 21 07:15:40.625582: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #13) Sep 21 07:15:40.625585: | 50 2a 32 6b c4 37 4e fc b9 63 32 bf 8f 43 42 e9 Sep 21 07:15:40.625587: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:40.625589: | 00 00 00 01 01 00 00 0e Sep 21 07:15:40.625617: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:40.625624: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:40.625629: | stop processing: state #13 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:40.625632: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:40.625636: | spent 0.453 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:40.685197: | spent 0.00341 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:40.685232: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:40.685236: | 19 66 5b 4b 51 39 d0 e1 00 00 00 00 00 00 00 00 Sep 21 07:15:40.685238: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:40.685241: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:40.685243: | 00 00 00 14 01 01 00 00 80 01 00 1a 80 03 00 1c Sep 21 07:15:40.685245: | 80 04 00 17 Sep 21 07:15:40.685250: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:40.685254: | **parse ISAKMP Message: Sep 21 07:15:40.685256: | initiator cookie: Sep 21 07:15:40.685264: | 19 66 5b 4b 51 39 d0 e1 Sep 21 07:15:40.685267: | responder cookie: Sep 21 07:15:40.685269: | 00 00 00 00 00 00 00 00 Sep 21 07:15:40.685272: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.685275: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.685277: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.685280: | flags: none (0x0) Sep 21 07:15:40.685282: | Message ID: 0 (0x0) Sep 21 07:15:40.685285: | length: 68 (0x44) Sep 21 07:15:40.685287: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:40.685291: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:40.685293: | #null state always idle Sep 21 07:15:40.685297: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:40.685300: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:40.685302: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.685305: | length: 40 (0x28) Sep 21 07:15:40.685307: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.685310: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:40.685312: | in statetime_start() with no state Sep 21 07:15:40.685318: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:40.685324: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:40.685327: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.685331: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:40.685333: | find_next_host_connection returns test Sep 21 07:15:40.685336: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.685338: | find_next_host_connection returns empty Sep 21 07:15:40.685367: | creating state object #14 at 0x56077c1d7680 Sep 21 07:15:40.685371: | State DB: adding IKEv1 state #14 in UNDEFINED Sep 21 07:15:40.685375: | pstats #14 ikev1.isakmp started Sep 21 07:15:40.685380: | #14 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:40.685386: | start processing: state #14 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:40.685390: | parent state #14: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:40.685393: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:40.685396: | ICOOKIE-DUMP: 19 66 5b 4b 51 39 d0 e1 Sep 21 07:15:40.685399: "test" #14: responding to Main Mode Sep 21 07:15:40.685404: | **emit ISAKMP Message: Sep 21 07:15:40.685406: | initiator cookie: Sep 21 07:15:40.685408: | 19 66 5b 4b 51 39 d0 e1 Sep 21 07:15:40.685411: | responder cookie: Sep 21 07:15:40.685413: | ce 65 8c dc 14 a7 da 73 Sep 21 07:15:40.685415: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.685418: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.685420: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.685423: | flags: none (0x0) Sep 21 07:15:40.685425: | Message ID: 0 (0x0) Sep 21 07:15:40.685428: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.685431: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:40.685434: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:40.685437: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:40.685439: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.685442: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:40.685445: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:40.685448: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:40.685451: | ****parse IPsec DOI SIT: Sep 21 07:15:40.685455: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:40.685458: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:40.685461: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.685463: | length: 28 (0x1c) Sep 21 07:15:40.685465: | proposal number: 1 (0x1) Sep 21 07:15:40.685468: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:40.685470: | SPI size: 0 (0x0) Sep 21 07:15:40.685473: | number of transforms: 1 (0x1) Sep 21 07:15:40.685475: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:40.685478: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.685480: | length: 20 (0x14) Sep 21 07:15:40.685482: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:40.685485: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:40.685487: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:40.685491: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:40.685493: | length/value: 26 (0x1a) Sep 21 07:15:40.685496: | [26 is OAKLEY_CAMELLIA_CCM_B] Sep 21 07:15:40.685500: "test" #14: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:40.685503: "test" #14: no acceptable Oakley Transform Sep 21 07:15:40.685505: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:40.685510: | [RE]START processing: state #14 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:40.685512: | #14 is idle Sep 21 07:15:40.685598: "test" #14: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:40.685602: | **emit ISAKMP Message: Sep 21 07:15:40.685605: | initiator cookie: Sep 21 07:15:40.685607: | 19 66 5b 4b 51 39 d0 e1 Sep 21 07:15:40.685610: | responder cookie: Sep 21 07:15:40.685612: | ce 65 8c dc 14 a7 da 73 Sep 21 07:15:40.685614: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.685617: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.685620: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:40.685622: | flags: none (0x0) Sep 21 07:15:40.685624: | Message ID: 0 (0x0) Sep 21 07:15:40.685627: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.685630: | ***emit ISAKMP Notification Payload: Sep 21 07:15:40.685632: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.685635: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.685637: | protocol ID: 1 (0x1) Sep 21 07:15:40.685640: | SPI size: 0 (0x0) Sep 21 07:15:40.685642: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:40.685645: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:40.685648: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:40.685650: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:40.685653: | emitting length of ISAKMP Message: 40 Sep 21 07:15:40.685660: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #14) Sep 21 07:15:40.685662: | 19 66 5b 4b 51 39 d0 e1 ce 65 8c dc 14 a7 da 73 Sep 21 07:15:40.685665: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:40.685667: | 00 00 00 01 01 00 00 0e Sep 21 07:15:40.685696: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:40.685702: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:40.685707: | stop processing: state #14 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:40.685710: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:40.685715: | spent 0.475 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:40.789950: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:40.789985: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:40.789995: | 46 dd 25 d7 fa 92 95 c6 00 00 00 00 00 00 00 00 Sep 21 07:15:40.789998: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:40.790002: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:40.790005: | 00 00 00 14 01 01 00 00 80 01 00 1a 80 02 00 09 Sep 21 07:15:40.790008: | 80 04 00 17 Sep 21 07:15:40.790015: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:40.790021: | **parse ISAKMP Message: Sep 21 07:15:40.790024: | initiator cookie: Sep 21 07:15:40.790028: | 46 dd 25 d7 fa 92 95 c6 Sep 21 07:15:40.790031: | responder cookie: Sep 21 07:15:40.790034: | 00 00 00 00 00 00 00 00 Sep 21 07:15:40.790038: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.790042: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.790046: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.790050: | flags: none (0x0) Sep 21 07:15:40.790053: | Message ID: 0 (0x0) Sep 21 07:15:40.790056: | length: 68 (0x44) Sep 21 07:15:40.790060: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:40.790066: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:40.790070: | #null state always idle Sep 21 07:15:40.790075: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:40.790079: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:40.790083: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.790086: | length: 40 (0x28) Sep 21 07:15:40.790089: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.790093: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:40.790097: | in statetime_start() with no state Sep 21 07:15:40.790104: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:40.790113: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:40.790117: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.790123: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:40.790127: | find_next_host_connection returns test Sep 21 07:15:40.790130: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.790134: | find_next_host_connection returns empty Sep 21 07:15:40.790166: | creating state object #15 at 0x56077c1d8140 Sep 21 07:15:40.790171: | State DB: adding IKEv1 state #15 in UNDEFINED Sep 21 07:15:40.790178: | pstats #15 ikev1.isakmp started Sep 21 07:15:40.790184: | #15 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:40.790193: | start processing: state #15 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:40.790198: | parent state #15: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:40.790203: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:40.790207: | ICOOKIE-DUMP: 46 dd 25 d7 fa 92 95 c6 Sep 21 07:15:40.790211: "test" #15: responding to Main Mode Sep 21 07:15:40.790220: | **emit ISAKMP Message: Sep 21 07:15:40.790224: | initiator cookie: Sep 21 07:15:40.790227: | 46 dd 25 d7 fa 92 95 c6 Sep 21 07:15:40.790230: | responder cookie: Sep 21 07:15:40.790233: | de 91 f2 d5 6a 32 bd 14 Sep 21 07:15:40.790237: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.790240: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.790244: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.790247: | flags: none (0x0) Sep 21 07:15:40.790250: | Message ID: 0 (0x0) Sep 21 07:15:40.790254: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.790258: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:40.790263: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:40.790266: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:40.790279: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.790283: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:40.790288: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:40.790292: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:40.790296: | ****parse IPsec DOI SIT: Sep 21 07:15:40.790300: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:40.790304: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:40.790307: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.790311: | length: 28 (0x1c) Sep 21 07:15:40.790314: | proposal number: 1 (0x1) Sep 21 07:15:40.790318: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:40.790321: | SPI size: 0 (0x0) Sep 21 07:15:40.790324: | number of transforms: 1 (0x1) Sep 21 07:15:40.790328: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:40.790332: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.790335: | length: 20 (0x14) Sep 21 07:15:40.790338: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:40.790342: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:40.790346: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:40.790350: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:40.790353: | length/value: 26 (0x1a) Sep 21 07:15:40.790357: | [26 is OAKLEY_CAMELLIA_CCM_B] Sep 21 07:15:40.790363: "test" #15: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:40.790367: "test" #15: no acceptable Oakley Transform Sep 21 07:15:40.790371: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:40.790378: | [RE]START processing: state #15 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:40.790381: | #15 is idle Sep 21 07:15:40.790488: "test" #15: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:40.790494: | **emit ISAKMP Message: Sep 21 07:15:40.790498: | initiator cookie: Sep 21 07:15:40.790501: | 46 dd 25 d7 fa 92 95 c6 Sep 21 07:15:40.790504: | responder cookie: Sep 21 07:15:40.790507: | de 91 f2 d5 6a 32 bd 14 Sep 21 07:15:40.790511: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.790515: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.790518: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:40.790522: | flags: none (0x0) Sep 21 07:15:40.790525: | Message ID: 0 (0x0) Sep 21 07:15:40.790529: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.790533: | ***emit ISAKMP Notification Payload: Sep 21 07:15:40.790536: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.790539: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.790543: | protocol ID: 1 (0x1) Sep 21 07:15:40.790546: | SPI size: 0 (0x0) Sep 21 07:15:40.790549: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:40.790554: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:40.790558: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:40.790562: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:40.790565: | emitting length of ISAKMP Message: 40 Sep 21 07:15:40.790574: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #15) Sep 21 07:15:40.790578: | 46 dd 25 d7 fa 92 95 c6 de 91 f2 d5 6a 32 bd 14 Sep 21 07:15:40.790581: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:40.790584: | 00 00 00 01 01 00 00 0e Sep 21 07:15:40.790616: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:40.790624: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:40.790634: | stop processing: state #15 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:40.790639: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:40.790646: | spent 0.657 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:40.889251: | spent 0.00365 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:40.889274: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:40.889278: | eb 13 29 4e 3d c0 00 19 00 00 00 00 00 00 00 00 Sep 21 07:15:40.889281: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:40.889283: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:40.889285: | 00 00 00 14 01 01 00 00 80 01 00 1a 80 02 00 09 Sep 21 07:15:40.889287: | 80 03 00 1c Sep 21 07:15:40.889292: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:40.889296: | **parse ISAKMP Message: Sep 21 07:15:40.889299: | initiator cookie: Sep 21 07:15:40.889301: | eb 13 29 4e 3d c0 00 19 Sep 21 07:15:40.889303: | responder cookie: Sep 21 07:15:40.889306: | 00 00 00 00 00 00 00 00 Sep 21 07:15:40.889309: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.889311: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.889314: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.889316: | flags: none (0x0) Sep 21 07:15:40.889319: | Message ID: 0 (0x0) Sep 21 07:15:40.889321: | length: 68 (0x44) Sep 21 07:15:40.889324: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:40.889328: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:40.889331: | #null state always idle Sep 21 07:15:40.889334: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:40.889337: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:40.889340: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.889342: | length: 40 (0x28) Sep 21 07:15:40.889345: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.889347: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:40.889350: | in statetime_start() with no state Sep 21 07:15:40.889356: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:40.889361: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:40.889365: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.889368: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:40.889371: | find_next_host_connection returns test Sep 21 07:15:40.889373: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:40.889376: | find_next_host_connection returns empty Sep 21 07:15:40.889403: | creating state object #16 at 0x56077c1d8c00 Sep 21 07:15:40.889406: | State DB: adding IKEv1 state #16 in UNDEFINED Sep 21 07:15:40.889410: | pstats #16 ikev1.isakmp started Sep 21 07:15:40.889415: | #16 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:40.889421: | start processing: state #16 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:40.889424: | parent state #16: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:40.889427: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:40.889430: | ICOOKIE-DUMP: eb 13 29 4e 3d c0 00 19 Sep 21 07:15:40.889433: "test" #16: responding to Main Mode Sep 21 07:15:40.889437: | **emit ISAKMP Message: Sep 21 07:15:40.889440: | initiator cookie: Sep 21 07:15:40.889442: | eb 13 29 4e 3d c0 00 19 Sep 21 07:15:40.889445: | responder cookie: Sep 21 07:15:40.889447: | 7a 68 55 31 ea 54 26 04 Sep 21 07:15:40.889449: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:40.889452: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.889457: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:40.889460: | flags: none (0x0) Sep 21 07:15:40.889462: | Message ID: 0 (0x0) Sep 21 07:15:40.889465: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.889468: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:40.889471: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:40.889473: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:40.889476: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.889479: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:40.889482: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:40.889485: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:40.889487: | ****parse IPsec DOI SIT: Sep 21 07:15:40.889490: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:40.889493: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:40.889495: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.889498: | length: 28 (0x1c) Sep 21 07:15:40.889500: | proposal number: 1 (0x1) Sep 21 07:15:40.889503: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:40.889505: | SPI size: 0 (0x0) Sep 21 07:15:40.889508: | number of transforms: 1 (0x1) Sep 21 07:15:40.889510: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:40.889513: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.889515: | length: 20 (0x14) Sep 21 07:15:40.889518: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:40.889520: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:40.889523: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:40.889525: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:40.889528: | length/value: 26 (0x1a) Sep 21 07:15:40.889531: | [26 is OAKLEY_CAMELLIA_CCM_B] Sep 21 07:15:40.889535: "test" #16: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:40.889538: "test" #16: no acceptable Oakley Transform Sep 21 07:15:40.889541: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:40.889545: | [RE]START processing: state #16 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:40.889548: | #16 is idle Sep 21 07:15:40.889838: "test" #16: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:40.889847: | **emit ISAKMP Message: Sep 21 07:15:40.889850: | initiator cookie: Sep 21 07:15:40.889852: | eb 13 29 4e 3d c0 00 19 Sep 21 07:15:40.889855: | responder cookie: Sep 21 07:15:40.889857: | 7a 68 55 31 ea 54 26 04 Sep 21 07:15:40.889859: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.889862: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:40.889865: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:40.889867: | flags: none (0x0) Sep 21 07:15:40.889870: | Message ID: 0 (0x0) Sep 21 07:15:40.889873: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:40.889876: | ***emit ISAKMP Notification Payload: Sep 21 07:15:40.889879: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:40.889881: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:40.889883: | protocol ID: 1 (0x1) Sep 21 07:15:40.889886: | SPI size: 0 (0x0) Sep 21 07:15:40.889889: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:40.889892: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:40.889895: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:40.889898: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:40.889903: | emitting length of ISAKMP Message: 40 Sep 21 07:15:40.889909: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #16) Sep 21 07:15:40.889912: | eb 13 29 4e 3d c0 00 19 7a 68 55 31 ea 54 26 04 Sep 21 07:15:40.889914: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:40.889916: | 00 00 00 01 01 00 00 0e Sep 21 07:15:40.889941: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:40.889947: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:40.889952: | stop processing: state #16 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:40.889956: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:40.889961: | spent 0.477 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:41.133109: | spent 0.00375 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:41.133138: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:41.133141: | d2 37 9b 08 60 77 41 6d 00 00 00 00 00 00 00 00 Sep 21 07:15:41.133144: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:15:41.133146: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:15:41.133149: | 00 00 00 18 01 01 00 00 80 01 00 19 80 02 00 0f Sep 21 07:15:41.133151: | 80 03 00 0b 80 04 00 19 Sep 21 07:15:41.133156: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:41.133160: | **parse ISAKMP Message: Sep 21 07:15:41.133162: | initiator cookie: Sep 21 07:15:41.133164: | d2 37 9b 08 60 77 41 6d Sep 21 07:15:41.133167: | responder cookie: Sep 21 07:15:41.133169: | 00 00 00 00 00 00 00 00 Sep 21 07:15:41.133172: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.133175: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.133178: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.133180: | flags: none (0x0) Sep 21 07:15:41.133183: | Message ID: 0 (0x0) Sep 21 07:15:41.133185: | length: 72 (0x48) Sep 21 07:15:41.133188: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:41.133192: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:41.133195: | #null state always idle Sep 21 07:15:41.133198: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:41.133201: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:41.133204: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.133206: | length: 44 (0x2c) Sep 21 07:15:41.133209: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.133211: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:41.133214: | in statetime_start() with no state Sep 21 07:15:41.133219: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:41.133225: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:41.133228: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.133232: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:41.133235: | find_next_host_connection returns test Sep 21 07:15:41.133238: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.133240: | find_next_host_connection returns empty Sep 21 07:15:41.133266: | creating state object #17 at 0x56077c1d96c0 Sep 21 07:15:41.133270: | State DB: adding IKEv1 state #17 in UNDEFINED Sep 21 07:15:41.133275: | pstats #17 ikev1.isakmp started Sep 21 07:15:41.133279: | #17 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:41.133285: | start processing: state #17 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:41.133289: | parent state #17: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:41.133296: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:41.133299: | ICOOKIE-DUMP: d2 37 9b 08 60 77 41 6d Sep 21 07:15:41.133302: "test" #17: responding to Main Mode Sep 21 07:15:41.133306: | **emit ISAKMP Message: Sep 21 07:15:41.133309: | initiator cookie: Sep 21 07:15:41.133311: | d2 37 9b 08 60 77 41 6d Sep 21 07:15:41.133313: | responder cookie: Sep 21 07:15:41.133316: | c8 ff 49 74 be b3 c5 3b Sep 21 07:15:41.133318: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.133321: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.133323: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.133325: | flags: none (0x0) Sep 21 07:15:41.133328: | Message ID: 0 (0x0) Sep 21 07:15:41.133331: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.133334: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:41.133336: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:41.133339: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:41.133341: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.133344: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:41.133347: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:41.133350: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:41.133353: | ****parse IPsec DOI SIT: Sep 21 07:15:41.133356: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:41.133359: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:41.133361: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.133363: | length: 32 (0x20) Sep 21 07:15:41.133366: | proposal number: 1 (0x1) Sep 21 07:15:41.133368: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:41.133371: | SPI size: 0 (0x0) Sep 21 07:15:41.133373: | number of transforms: 1 (0x1) Sep 21 07:15:41.133376: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:41.133378: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.133380: | length: 24 (0x18) Sep 21 07:15:41.133383: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:41.133385: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:41.133388: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:41.133391: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:41.133393: | length/value: 25 (0x19) Sep 21 07:15:41.133396: | [25 is OAKLEY_CAMELLIA_CCM_A] Sep 21 07:15:41.133400: "test" #17: OAKLEY_CAMELLIA_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:41.133402: "test" #17: no acceptable Oakley Transform Sep 21 07:15:41.133406: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:41.133411: | [RE]START processing: state #17 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:41.133413: | #17 is idle Sep 21 07:15:41.146240: "test" #17: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:41.146258: | **emit ISAKMP Message: Sep 21 07:15:41.146261: | initiator cookie: Sep 21 07:15:41.146264: | d2 37 9b 08 60 77 41 6d Sep 21 07:15:41.146266: | responder cookie: Sep 21 07:15:41.146268: | c8 ff 49 74 be b3 c5 3b Sep 21 07:15:41.146271: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.146274: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.146277: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:41.146279: | flags: none (0x0) Sep 21 07:15:41.146282: | Message ID: 0 (0x0) Sep 21 07:15:41.146285: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.146289: | ***emit ISAKMP Notification Payload: Sep 21 07:15:41.146291: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.146298: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.146300: | protocol ID: 1 (0x1) Sep 21 07:15:41.146303: | SPI size: 0 (0x0) Sep 21 07:15:41.146305: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:41.146308: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:41.146311: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:41.146314: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:41.146316: | emitting length of ISAKMP Message: 40 Sep 21 07:15:41.146323: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #17) Sep 21 07:15:41.146326: | d2 37 9b 08 60 77 41 6d c8 ff 49 74 be b3 c5 3b Sep 21 07:15:41.146328: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:41.146330: | 00 00 00 01 01 00 00 0e Sep 21 07:15:41.146372: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:41.146379: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:41.146385: | stop processing: state #17 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:41.146388: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:41.146396: | spent 0.904 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:41.278303: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:41.278326: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:41.278329: | 14 57 12 04 12 73 b6 1b 00 00 00 00 00 00 00 00 Sep 21 07:15:41.278332: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:41.278334: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:41.278336: | 00 00 00 14 01 01 00 00 80 02 00 0f 80 03 00 0b Sep 21 07:15:41.278339: | 80 04 00 19 Sep 21 07:15:41.278343: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:41.278347: | **parse ISAKMP Message: Sep 21 07:15:41.278350: | initiator cookie: Sep 21 07:15:41.278352: | 14 57 12 04 12 73 b6 1b Sep 21 07:15:41.278354: | responder cookie: Sep 21 07:15:41.278357: | 00 00 00 00 00 00 00 00 Sep 21 07:15:41.278359: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.278362: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.278365: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.278367: | flags: none (0x0) Sep 21 07:15:41.278370: | Message ID: 0 (0x0) Sep 21 07:15:41.278372: | length: 68 (0x44) Sep 21 07:15:41.278375: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:41.278379: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:41.278382: | #null state always idle Sep 21 07:15:41.278385: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:41.278388: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:41.278391: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.278393: | length: 40 (0x28) Sep 21 07:15:41.278395: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.278398: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:41.278401: | in statetime_start() with no state Sep 21 07:15:41.278406: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:41.278412: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:41.278415: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.278419: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:41.278421: | find_next_host_connection returns test Sep 21 07:15:41.278424: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.278426: | find_next_host_connection returns empty Sep 21 07:15:41.278452: | creating state object #18 at 0x56077c1da180 Sep 21 07:15:41.278455: | State DB: adding IKEv1 state #18 in UNDEFINED Sep 21 07:15:41.278460: | pstats #18 ikev1.isakmp started Sep 21 07:15:41.278465: | #18 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:41.278471: | start processing: state #18 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:41.278474: | parent state #18: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:41.278477: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:41.278480: | ICOOKIE-DUMP: 14 57 12 04 12 73 b6 1b Sep 21 07:15:41.278483: "test" #18: responding to Main Mode Sep 21 07:15:41.278487: | **emit ISAKMP Message: Sep 21 07:15:41.278490: | initiator cookie: Sep 21 07:15:41.278492: | 14 57 12 04 12 73 b6 1b Sep 21 07:15:41.278494: | responder cookie: Sep 21 07:15:41.278497: | 12 f1 8e 3a da 4a 41 d1 Sep 21 07:15:41.278499: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.278501: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.278504: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.278506: | flags: none (0x0) Sep 21 07:15:41.278508: | Message ID: 0 (0x0) Sep 21 07:15:41.278511: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.278514: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:41.278517: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:41.278519: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:41.278522: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.278524: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:41.278528: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:41.278530: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:41.278533: | ****parse IPsec DOI SIT: Sep 21 07:15:41.278536: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:41.278538: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:41.278541: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.278543: | length: 28 (0x1c) Sep 21 07:15:41.278546: | proposal number: 1 (0x1) Sep 21 07:15:41.278548: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:41.278550: | SPI size: 0 (0x0) Sep 21 07:15:41.278553: | number of transforms: 1 (0x1) Sep 21 07:15:41.278556: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:41.278558: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.278561: | length: 20 (0x14) Sep 21 07:15:41.278563: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:41.278565: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:41.278568: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:41.278571: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:15:41.278573: | length/value: 15 (0xf) Sep 21 07:15:41.278578: "test" #18: 15?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:15:41.278581: "test" #18: no acceptable Oakley Transform Sep 21 07:15:41.278583: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:41.278588: | [RE]START processing: state #18 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:41.278590: | #18 is idle Sep 21 07:15:41.278658: "test" #18: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:41.278662: | **emit ISAKMP Message: Sep 21 07:15:41.278665: | initiator cookie: Sep 21 07:15:41.278667: | 14 57 12 04 12 73 b6 1b Sep 21 07:15:41.278670: | responder cookie: Sep 21 07:15:41.278672: | 12 f1 8e 3a da 4a 41 d1 Sep 21 07:15:41.278674: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.278683: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.278685: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:41.278688: | flags: none (0x0) Sep 21 07:15:41.278690: | Message ID: 0 (0x0) Sep 21 07:15:41.278693: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.278696: | ***emit ISAKMP Notification Payload: Sep 21 07:15:41.278698: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.278701: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.278703: | protocol ID: 1 (0x1) Sep 21 07:15:41.278705: | SPI size: 0 (0x0) Sep 21 07:15:41.278708: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:41.278711: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:41.278714: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:41.278716: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:41.278719: | emitting length of ISAKMP Message: 40 Sep 21 07:15:41.278725: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #18) Sep 21 07:15:41.278728: | 14 57 12 04 12 73 b6 1b 12 f1 8e 3a da 4a 41 d1 Sep 21 07:15:41.278730: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:41.278732: | 00 00 00 01 01 00 00 0e Sep 21 07:15:41.278752: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:41.278757: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:41.278762: | stop processing: state #18 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:41.278765: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:41.278770: | spent 0.443 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:41.338711: | spent 0.00344 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:41.338743: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:41.338747: | 0d 2d 04 12 bd 75 d5 be 00 00 00 00 00 00 00 00 Sep 21 07:15:41.338750: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:41.338752: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:41.338754: | 00 00 00 14 01 01 00 00 80 01 00 19 80 03 00 0b Sep 21 07:15:41.338756: | 80 04 00 19 Sep 21 07:15:41.338761: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:41.338765: | **parse ISAKMP Message: Sep 21 07:15:41.338768: | initiator cookie: Sep 21 07:15:41.338770: | 0d 2d 04 12 bd 75 d5 be Sep 21 07:15:41.338772: | responder cookie: Sep 21 07:15:41.338774: | 00 00 00 00 00 00 00 00 Sep 21 07:15:41.338777: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.338780: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.338787: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.338792: | flags: none (0x0) Sep 21 07:15:41.338794: | Message ID: 0 (0x0) Sep 21 07:15:41.338796: | length: 68 (0x44) Sep 21 07:15:41.338799: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:41.338804: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:41.338806: | #null state always idle Sep 21 07:15:41.338810: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:41.338813: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:41.338815: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.338817: | length: 40 (0x28) Sep 21 07:15:41.338820: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.338823: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:41.338825: | in statetime_start() with no state Sep 21 07:15:41.338831: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:41.338840: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:41.338844: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.338847: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:41.338850: | find_next_host_connection returns test Sep 21 07:15:41.338852: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.338855: | find_next_host_connection returns empty Sep 21 07:15:41.338879: | creating state object #19 at 0x56077c1dac40 Sep 21 07:15:41.338883: | State DB: adding IKEv1 state #19 in UNDEFINED Sep 21 07:15:41.338887: | pstats #19 ikev1.isakmp started Sep 21 07:15:41.338892: | #19 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:41.338898: | start processing: state #19 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:41.338902: | parent state #19: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:41.338905: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:41.338908: | ICOOKIE-DUMP: 0d 2d 04 12 bd 75 d5 be Sep 21 07:15:41.338911: "test" #19: responding to Main Mode Sep 21 07:15:41.338916: | **emit ISAKMP Message: Sep 21 07:15:41.338919: | initiator cookie: Sep 21 07:15:41.338922: | 0d 2d 04 12 bd 75 d5 be Sep 21 07:15:41.338924: | responder cookie: Sep 21 07:15:41.338926: | 03 b7 39 b1 23 7b 80 6d Sep 21 07:15:41.338929: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.338931: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.338934: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.338936: | flags: none (0x0) Sep 21 07:15:41.338939: | Message ID: 0 (0x0) Sep 21 07:15:41.338942: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.338945: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:41.338948: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:41.338950: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:41.338952: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.338955: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:41.338958: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:41.338961: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:41.338964: | ****parse IPsec DOI SIT: Sep 21 07:15:41.338967: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:41.338969: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:41.338972: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.338974: | length: 28 (0x1c) Sep 21 07:15:41.338976: | proposal number: 1 (0x1) Sep 21 07:15:41.338979: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:41.338981: | SPI size: 0 (0x0) Sep 21 07:15:41.338983: | number of transforms: 1 (0x1) Sep 21 07:15:41.338986: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:41.338988: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.338991: | length: 20 (0x14) Sep 21 07:15:41.338993: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:41.338995: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:41.338998: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:41.339001: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:41.339003: | length/value: 25 (0x19) Sep 21 07:15:41.339006: | [25 is OAKLEY_CAMELLIA_CCM_A] Sep 21 07:15:41.339010: "test" #19: OAKLEY_CAMELLIA_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:41.339012: "test" #19: no acceptable Oakley Transform Sep 21 07:15:41.339015: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:41.339020: | [RE]START processing: state #19 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:41.339024: | #19 is idle Sep 21 07:15:41.339103: "test" #19: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:41.339107: | **emit ISAKMP Message: Sep 21 07:15:41.339109: | initiator cookie: Sep 21 07:15:41.339112: | 0d 2d 04 12 bd 75 d5 be Sep 21 07:15:41.339114: | responder cookie: Sep 21 07:15:41.339116: | 03 b7 39 b1 23 7b 80 6d Sep 21 07:15:41.339118: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.339121: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.339123: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:41.339126: | flags: none (0x0) Sep 21 07:15:41.339128: | Message ID: 0 (0x0) Sep 21 07:15:41.339131: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.339133: | ***emit ISAKMP Notification Payload: Sep 21 07:15:41.339136: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.339138: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.339140: | protocol ID: 1 (0x1) Sep 21 07:15:41.339143: | SPI size: 0 (0x0) Sep 21 07:15:41.339145: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:41.339148: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:41.339151: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:41.339154: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:41.339156: | emitting length of ISAKMP Message: 40 Sep 21 07:15:41.339162: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #19) Sep 21 07:15:41.339165: | 0d 2d 04 12 bd 75 d5 be 03 b7 39 b1 23 7b 80 6d Sep 21 07:15:41.339167: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:41.339169: | 00 00 00 01 01 00 00 0e Sep 21 07:15:41.339198: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:41.339203: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:41.339208: | stop processing: state #19 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:41.339211: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:41.339216: | spent 0.462 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:41.468546: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:41.468571: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:41.468575: | 3f 50 ba 0a 05 d3 79 e1 00 00 00 00 00 00 00 00 Sep 21 07:15:41.468577: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:41.468579: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:41.468582: | 00 00 00 14 01 01 00 00 80 01 00 19 80 02 00 0f Sep 21 07:15:41.468584: | 80 04 00 19 Sep 21 07:15:41.468589: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:41.468593: | **parse ISAKMP Message: Sep 21 07:15:41.468596: | initiator cookie: Sep 21 07:15:41.468598: | 3f 50 ba 0a 05 d3 79 e1 Sep 21 07:15:41.468601: | responder cookie: Sep 21 07:15:41.468603: | 00 00 00 00 00 00 00 00 Sep 21 07:15:41.468606: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.468608: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.468611: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.468614: | flags: none (0x0) Sep 21 07:15:41.468616: | Message ID: 0 (0x0) Sep 21 07:15:41.468618: | length: 68 (0x44) Sep 21 07:15:41.468621: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:41.468625: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:41.468628: | #null state always idle Sep 21 07:15:41.468631: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:41.468638: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:41.468641: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.468643: | length: 40 (0x28) Sep 21 07:15:41.468645: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.468648: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:41.468651: | in statetime_start() with no state Sep 21 07:15:41.468656: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:41.468662: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:41.468665: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.468669: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:41.468672: | find_next_host_connection returns test Sep 21 07:15:41.468674: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.468677: | find_next_host_connection returns empty Sep 21 07:15:41.468701: | creating state object #20 at 0x56077c1db700 Sep 21 07:15:41.468705: | State DB: adding IKEv1 state #20 in UNDEFINED Sep 21 07:15:41.468709: | pstats #20 ikev1.isakmp started Sep 21 07:15:41.468714: | #20 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:41.468720: | start processing: state #20 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:41.468723: | parent state #20: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:41.468726: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:41.468729: | ICOOKIE-DUMP: 3f 50 ba 0a 05 d3 79 e1 Sep 21 07:15:41.468732: "test" #20: responding to Main Mode Sep 21 07:15:41.468736: | **emit ISAKMP Message: Sep 21 07:15:41.468739: | initiator cookie: Sep 21 07:15:41.468741: | 3f 50 ba 0a 05 d3 79 e1 Sep 21 07:15:41.468744: | responder cookie: Sep 21 07:15:41.468746: | 55 e7 75 90 79 6b 5b 0c Sep 21 07:15:41.468748: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.468751: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.468753: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.468756: | flags: none (0x0) Sep 21 07:15:41.468758: | Message ID: 0 (0x0) Sep 21 07:15:41.468761: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.468764: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:41.468767: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:41.468769: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:41.468772: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.468774: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:41.468778: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:41.468780: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:41.468788: | ****parse IPsec DOI SIT: Sep 21 07:15:41.468792: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:41.468795: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:41.468798: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.468800: | length: 28 (0x1c) Sep 21 07:15:41.468802: | proposal number: 1 (0x1) Sep 21 07:15:41.468805: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:41.468807: | SPI size: 0 (0x0) Sep 21 07:15:41.468810: | number of transforms: 1 (0x1) Sep 21 07:15:41.468812: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:41.468815: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.468817: | length: 20 (0x14) Sep 21 07:15:41.468820: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:41.468822: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:41.468827: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:41.468829: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:41.468832: | length/value: 25 (0x19) Sep 21 07:15:41.468835: | [25 is OAKLEY_CAMELLIA_CCM_A] Sep 21 07:15:41.468839: "test" #20: OAKLEY_CAMELLIA_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:41.468841: "test" #20: no acceptable Oakley Transform Sep 21 07:15:41.468844: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:41.468849: | [RE]START processing: state #20 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:41.468851: | #20 is idle Sep 21 07:15:41.469078: "test" #20: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:41.469083: | **emit ISAKMP Message: Sep 21 07:15:41.469086: | initiator cookie: Sep 21 07:15:41.469089: | 3f 50 ba 0a 05 d3 79 e1 Sep 21 07:15:41.469091: | responder cookie: Sep 21 07:15:41.469093: | 55 e7 75 90 79 6b 5b 0c Sep 21 07:15:41.469096: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.469099: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.469102: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:41.469104: | flags: none (0x0) Sep 21 07:15:41.469107: | Message ID: 0 (0x0) Sep 21 07:15:41.469109: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.469112: | ***emit ISAKMP Notification Payload: Sep 21 07:15:41.469115: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.469118: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.469120: | protocol ID: 1 (0x1) Sep 21 07:15:41.469122: | SPI size: 0 (0x0) Sep 21 07:15:41.469125: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:41.469128: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:41.469131: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:41.469134: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:41.469136: | emitting length of ISAKMP Message: 40 Sep 21 07:15:41.469143: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #20) Sep 21 07:15:41.469145: | 3f 50 ba 0a 05 d3 79 e1 55 e7 75 90 79 6b 5b 0c Sep 21 07:15:41.469148: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:41.469150: | 00 00 00 01 01 00 00 0e Sep 21 07:15:41.469175: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:41.469181: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:41.469186: | stop processing: state #20 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:41.469189: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:41.469195: | spent 0.467 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:41.538378: | spent 0.00323 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:41.538403: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:41.538407: | 71 ed 86 f2 d8 e0 c6 25 00 00 00 00 00 00 00 00 Sep 21 07:15:41.538409: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:41.538412: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:41.538414: | 00 00 00 14 01 01 00 00 80 01 00 19 80 02 00 0f Sep 21 07:15:41.538416: | 80 03 00 0b Sep 21 07:15:41.538422: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:41.538426: | **parse ISAKMP Message: Sep 21 07:15:41.538428: | initiator cookie: Sep 21 07:15:41.538431: | 71 ed 86 f2 d8 e0 c6 25 Sep 21 07:15:41.538433: | responder cookie: Sep 21 07:15:41.538435: | 00 00 00 00 00 00 00 00 Sep 21 07:15:41.538439: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.538445: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.538448: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.538450: | flags: none (0x0) Sep 21 07:15:41.538453: | Message ID: 0 (0x0) Sep 21 07:15:41.538455: | length: 68 (0x44) Sep 21 07:15:41.538458: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:41.538462: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:41.538465: | #null state always idle Sep 21 07:15:41.538468: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:41.538471: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:41.538474: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.538476: | length: 40 (0x28) Sep 21 07:15:41.538479: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.538482: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:41.538484: | in statetime_start() with no state Sep 21 07:15:41.538489: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:41.538495: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:41.538498: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.538503: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:41.538506: | find_next_host_connection returns test Sep 21 07:15:41.538508: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.538511: | find_next_host_connection returns empty Sep 21 07:15:41.538535: | creating state object #21 at 0x56077c1dc1c0 Sep 21 07:15:41.538538: | State DB: adding IKEv1 state #21 in UNDEFINED Sep 21 07:15:41.538543: | pstats #21 ikev1.isakmp started Sep 21 07:15:41.538547: | #21 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:41.538554: | start processing: state #21 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:41.538558: | parent state #21: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:41.538561: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:41.538563: | ICOOKIE-DUMP: 71 ed 86 f2 d8 e0 c6 25 Sep 21 07:15:41.538567: "test" #21: responding to Main Mode Sep 21 07:15:41.538571: | **emit ISAKMP Message: Sep 21 07:15:41.538574: | initiator cookie: Sep 21 07:15:41.538576: | 71 ed 86 f2 d8 e0 c6 25 Sep 21 07:15:41.538578: | responder cookie: Sep 21 07:15:41.538581: | 10 36 f2 94 d3 d0 b4 cf Sep 21 07:15:41.538584: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.538587: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.538589: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.538591: | flags: none (0x0) Sep 21 07:15:41.538594: | Message ID: 0 (0x0) Sep 21 07:15:41.538597: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.538600: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:41.538603: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:41.538605: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:41.538608: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.538611: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:41.538614: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:41.538617: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:41.538620: | ****parse IPsec DOI SIT: Sep 21 07:15:41.538623: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:41.538625: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:41.538628: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.538632: | length: 28 (0x1c) Sep 21 07:15:41.538635: | proposal number: 1 (0x1) Sep 21 07:15:41.538638: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:41.538640: | SPI size: 0 (0x0) Sep 21 07:15:41.538642: | number of transforms: 1 (0x1) Sep 21 07:15:41.538645: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:41.538647: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.538649: | length: 20 (0x14) Sep 21 07:15:41.538652: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:41.538654: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:41.538657: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:41.538660: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:41.538662: | length/value: 25 (0x19) Sep 21 07:15:41.538665: | [25 is OAKLEY_CAMELLIA_CCM_A] Sep 21 07:15:41.538669: "test" #21: OAKLEY_CAMELLIA_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:41.538672: "test" #21: no acceptable Oakley Transform Sep 21 07:15:41.538675: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:41.538680: | [RE]START processing: state #21 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:41.538682: | #21 is idle Sep 21 07:15:41.538841: "test" #21: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:41.538849: | **emit ISAKMP Message: Sep 21 07:15:41.538852: | initiator cookie: Sep 21 07:15:41.538854: | 71 ed 86 f2 d8 e0 c6 25 Sep 21 07:15:41.538856: | responder cookie: Sep 21 07:15:41.538858: | 10 36 f2 94 d3 d0 b4 cf Sep 21 07:15:41.538861: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.538864: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.538867: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:41.538869: | flags: none (0x0) Sep 21 07:15:41.538872: | Message ID: 0 (0x0) Sep 21 07:15:41.538875: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.538878: | ***emit ISAKMP Notification Payload: Sep 21 07:15:41.538881: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.538883: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.538885: | protocol ID: 1 (0x1) Sep 21 07:15:41.538887: | SPI size: 0 (0x0) Sep 21 07:15:41.538890: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:41.538893: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:41.538896: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:41.538899: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:41.538901: | emitting length of ISAKMP Message: 40 Sep 21 07:15:41.538908: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #21) Sep 21 07:15:41.538910: | 71 ed 86 f2 d8 e0 c6 25 10 36 f2 94 d3 d0 b4 cf Sep 21 07:15:41.538913: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:41.538915: | 00 00 00 01 01 00 00 0e Sep 21 07:15:41.538947: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:41.538952: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:41.538957: | stop processing: state #21 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:41.538960: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:41.538966: | spent 0.476 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:41.598087: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:41.598115: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:41.598118: | f5 ef 2a cb fb 8b b7 4a 00 00 00 00 00 00 00 00 Sep 21 07:15:41.598121: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:15:41.598123: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:15:41.598129: | 00 00 00 18 01 01 00 00 80 01 00 06 80 02 00 0d Sep 21 07:15:41.598131: | 80 03 00 0f 80 04 00 14 Sep 21 07:15:41.598137: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:41.598141: | **parse ISAKMP Message: Sep 21 07:15:41.598143: | initiator cookie: Sep 21 07:15:41.598146: | f5 ef 2a cb fb 8b b7 4a Sep 21 07:15:41.598148: | responder cookie: Sep 21 07:15:41.598150: | 00 00 00 00 00 00 00 00 Sep 21 07:15:41.598153: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.598156: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.598158: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.598161: | flags: none (0x0) Sep 21 07:15:41.598163: | Message ID: 0 (0x0) Sep 21 07:15:41.598166: | length: 72 (0x48) Sep 21 07:15:41.598169: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:41.598172: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:41.598175: | #null state always idle Sep 21 07:15:41.598178: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:41.598181: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:41.598184: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.598186: | length: 44 (0x2c) Sep 21 07:15:41.598188: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.598191: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:41.598194: | in statetime_start() with no state Sep 21 07:15:41.598200: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:41.598205: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:41.598209: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.598212: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:41.598215: | find_next_host_connection returns test Sep 21 07:15:41.598218: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.598220: | find_next_host_connection returns empty Sep 21 07:15:41.598247: | creating state object #22 at 0x56077c1dcc80 Sep 21 07:15:41.598250: | State DB: adding IKEv1 state #22 in UNDEFINED Sep 21 07:15:41.598255: | pstats #22 ikev1.isakmp started Sep 21 07:15:41.598259: | #22 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:41.598264: | start processing: state #22 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:41.598268: | parent state #22: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:41.598272: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:41.598274: | ICOOKIE-DUMP: f5 ef 2a cb fb 8b b7 4a Sep 21 07:15:41.598277: "test" #22: responding to Main Mode Sep 21 07:15:41.598282: | **emit ISAKMP Message: Sep 21 07:15:41.598285: | initiator cookie: Sep 21 07:15:41.598287: | f5 ef 2a cb fb 8b b7 4a Sep 21 07:15:41.598289: | responder cookie: Sep 21 07:15:41.598291: | 9f ae 29 fc f4 ba f1 ba Sep 21 07:15:41.598293: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.598296: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.598298: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.598300: | flags: none (0x0) Sep 21 07:15:41.598303: | Message ID: 0 (0x0) Sep 21 07:15:41.598306: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.598308: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:41.598311: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:41.598314: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:41.598316: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.598319: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:41.598324: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:41.598328: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:41.598331: | ****parse IPsec DOI SIT: Sep 21 07:15:41.598334: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:41.598337: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:41.598339: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.598342: | length: 32 (0x20) Sep 21 07:15:41.598344: | proposal number: 1 (0x1) Sep 21 07:15:41.598347: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:41.598349: | SPI size: 0 (0x0) Sep 21 07:15:41.598352: | number of transforms: 1 (0x1) Sep 21 07:15:41.598355: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:41.598357: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.598359: | length: 24 (0x18) Sep 21 07:15:41.598362: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:41.598365: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:41.598368: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:41.598370: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:41.598373: | length/value: 6 (0x6) Sep 21 07:15:41.598375: | [6 is OAKLEY_CAST_CBC] Sep 21 07:15:41.598380: "test" #22: OAKLEY_CAST_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:41.598383: "test" #22: no acceptable Oakley Transform Sep 21 07:15:41.598387: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:41.598393: | [RE]START processing: state #22 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:41.598396: | #22 is idle Sep 21 07:15:41.598473: "test" #22: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:41.598478: | **emit ISAKMP Message: Sep 21 07:15:41.598480: | initiator cookie: Sep 21 07:15:41.598483: | f5 ef 2a cb fb 8b b7 4a Sep 21 07:15:41.598485: | responder cookie: Sep 21 07:15:41.598488: | 9f ae 29 fc f4 ba f1 ba Sep 21 07:15:41.598490: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.598493: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.598495: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:41.598498: | flags: none (0x0) Sep 21 07:15:41.598501: | Message ID: 0 (0x0) Sep 21 07:15:41.598504: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.598507: | ***emit ISAKMP Notification Payload: Sep 21 07:15:41.598509: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.598512: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.598514: | protocol ID: 1 (0x1) Sep 21 07:15:41.598516: | SPI size: 0 (0x0) Sep 21 07:15:41.598519: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:41.598522: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:41.598525: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:41.598527: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:41.598530: | emitting length of ISAKMP Message: 40 Sep 21 07:15:41.598536: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #22) Sep 21 07:15:41.598539: | f5 ef 2a cb fb 8b b7 4a 9f ae 29 fc f4 ba f1 ba Sep 21 07:15:41.598541: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:41.598544: | 00 00 00 01 01 00 00 0e Sep 21 07:15:41.598569: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:41.598575: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:41.598580: | stop processing: state #22 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:41.598583: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:41.598590: | spent 0.471 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:41.670350: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:41.670377: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:41.670381: | a0 84 ff d9 a8 f0 f9 9c 00 00 00 00 00 00 00 00 Sep 21 07:15:41.670384: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:41.670386: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:41.670388: | 00 00 00 14 01 01 00 00 80 02 00 0d 80 03 00 0f Sep 21 07:15:41.670390: | 80 04 00 14 Sep 21 07:15:41.670395: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:41.670399: | **parse ISAKMP Message: Sep 21 07:15:41.670402: | initiator cookie: Sep 21 07:15:41.670404: | a0 84 ff d9 a8 f0 f9 9c Sep 21 07:15:41.670407: | responder cookie: Sep 21 07:15:41.670409: | 00 00 00 00 00 00 00 00 Sep 21 07:15:41.670412: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.670415: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.670418: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.670420: | flags: none (0x0) Sep 21 07:15:41.670423: | Message ID: 0 (0x0) Sep 21 07:15:41.670425: | length: 68 (0x44) Sep 21 07:15:41.670428: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:41.670432: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:41.670434: | #null state always idle Sep 21 07:15:41.670438: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:41.670441: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:41.670443: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.670446: | length: 40 (0x28) Sep 21 07:15:41.670448: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.670451: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:41.670453: | in statetime_start() with no state Sep 21 07:15:41.670459: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:41.670465: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:41.670468: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.670472: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:41.670474: | find_next_host_connection returns test Sep 21 07:15:41.670477: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.670479: | find_next_host_connection returns empty Sep 21 07:15:41.670504: | creating state object #23 at 0x56077c1dd740 Sep 21 07:15:41.670508: | State DB: adding IKEv1 state #23 in UNDEFINED Sep 21 07:15:41.670513: | pstats #23 ikev1.isakmp started Sep 21 07:15:41.670517: | #23 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:41.670524: | start processing: state #23 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:41.670527: | parent state #23: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:41.670530: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:41.670533: | ICOOKIE-DUMP: a0 84 ff d9 a8 f0 f9 9c Sep 21 07:15:41.670536: "test" #23: responding to Main Mode Sep 21 07:15:41.670540: | **emit ISAKMP Message: Sep 21 07:15:41.670543: | initiator cookie: Sep 21 07:15:41.670545: | a0 84 ff d9 a8 f0 f9 9c Sep 21 07:15:41.670547: | responder cookie: Sep 21 07:15:41.670549: | 1d ea 39 17 13 b7 75 d9 Sep 21 07:15:41.670552: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.670555: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.670557: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.670559: | flags: none (0x0) Sep 21 07:15:41.670562: | Message ID: 0 (0x0) Sep 21 07:15:41.670568: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.670571: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:41.670574: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:41.670577: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:41.670579: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.670582: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:41.670585: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:41.670588: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:41.670592: | ****parse IPsec DOI SIT: Sep 21 07:15:41.670594: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:41.670597: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:41.670600: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.670602: | length: 28 (0x1c) Sep 21 07:15:41.670605: | proposal number: 1 (0x1) Sep 21 07:15:41.670607: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:41.670610: | SPI size: 0 (0x0) Sep 21 07:15:41.670612: | number of transforms: 1 (0x1) Sep 21 07:15:41.670615: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:41.670617: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.670620: | length: 20 (0x14) Sep 21 07:15:41.670622: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:41.670624: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:41.670627: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:41.670630: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:15:41.670633: | length/value: 13 (0xd) Sep 21 07:15:41.670637: "test" #23: 13?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:15:41.670640: "test" #23: no acceptable Oakley Transform Sep 21 07:15:41.670643: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:41.670648: | [RE]START processing: state #23 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:41.670650: | #23 is idle Sep 21 07:15:41.670730: "test" #23: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:41.670735: | **emit ISAKMP Message: Sep 21 07:15:41.670738: | initiator cookie: Sep 21 07:15:41.670740: | a0 84 ff d9 a8 f0 f9 9c Sep 21 07:15:41.670743: | responder cookie: Sep 21 07:15:41.670745: | 1d ea 39 17 13 b7 75 d9 Sep 21 07:15:41.670747: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.670750: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.670753: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:41.670755: | flags: none (0x0) Sep 21 07:15:41.670757: | Message ID: 0 (0x0) Sep 21 07:15:41.670760: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.670763: | ***emit ISAKMP Notification Payload: Sep 21 07:15:41.670765: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.670768: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.670770: | protocol ID: 1 (0x1) Sep 21 07:15:41.670772: | SPI size: 0 (0x0) Sep 21 07:15:41.670775: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:41.670778: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:41.670781: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:41.670821: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:41.670827: | emitting length of ISAKMP Message: 40 Sep 21 07:15:41.670833: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #23) Sep 21 07:15:41.670836: | a0 84 ff d9 a8 f0 f9 9c 1d ea 39 17 13 b7 75 d9 Sep 21 07:15:41.670840: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:41.670843: | 00 00 00 01 01 00 00 0e Sep 21 07:15:41.670867: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:41.670873: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:41.670878: | stop processing: state #23 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:41.670880: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:41.670886: | spent 0.47 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:41.762498: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:41.762526: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:41.762530: | ec 36 4a c0 17 ce d2 a4 00 00 00 00 00 00 00 00 Sep 21 07:15:41.762532: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:41.762534: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:41.762537: | 00 00 00 14 01 01 00 00 80 01 00 06 80 03 00 0f Sep 21 07:15:41.762539: | 80 04 00 14 Sep 21 07:15:41.762544: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:41.762548: | **parse ISAKMP Message: Sep 21 07:15:41.762551: | initiator cookie: Sep 21 07:15:41.762553: | ec 36 4a c0 17 ce d2 a4 Sep 21 07:15:41.762555: | responder cookie: Sep 21 07:15:41.762557: | 00 00 00 00 00 00 00 00 Sep 21 07:15:41.762560: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.762563: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.762566: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.762568: | flags: none (0x0) Sep 21 07:15:41.762571: | Message ID: 0 (0x0) Sep 21 07:15:41.762573: | length: 68 (0x44) Sep 21 07:15:41.762576: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:41.762580: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:41.762583: | #null state always idle Sep 21 07:15:41.762586: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:41.762590: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:41.762592: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.762595: | length: 40 (0x28) Sep 21 07:15:41.762597: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.762600: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:41.762602: | in statetime_start() with no state Sep 21 07:15:41.762608: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:41.762613: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:41.762616: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.762620: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:41.762623: | find_next_host_connection returns test Sep 21 07:15:41.762625: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.762628: | find_next_host_connection returns empty Sep 21 07:15:41.762651: | creating state object #24 at 0x56077c1de200 Sep 21 07:15:41.762654: | State DB: adding IKEv1 state #24 in UNDEFINED Sep 21 07:15:41.762660: | pstats #24 ikev1.isakmp started Sep 21 07:15:41.762664: | #24 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:41.762671: | start processing: state #24 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:41.762697: | parent state #24: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:41.762700: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:41.762703: | ICOOKIE-DUMP: ec 36 4a c0 17 ce d2 a4 Sep 21 07:15:41.762706: "test" #24: responding to Main Mode Sep 21 07:15:41.762711: | **emit ISAKMP Message: Sep 21 07:15:41.762713: | initiator cookie: Sep 21 07:15:41.762719: | ec 36 4a c0 17 ce d2 a4 Sep 21 07:15:41.762722: | responder cookie: Sep 21 07:15:41.762724: | 34 71 52 79 2d b6 fa 71 Sep 21 07:15:41.762727: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.762729: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.762732: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.762734: | flags: none (0x0) Sep 21 07:15:41.762736: | Message ID: 0 (0x0) Sep 21 07:15:41.762739: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.762742: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:41.762745: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:41.762747: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:41.762750: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.762753: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:41.762756: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:41.762759: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:41.762762: | ****parse IPsec DOI SIT: Sep 21 07:15:41.762764: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:41.762767: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:41.762770: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.762772: | length: 28 (0x1c) Sep 21 07:15:41.762774: | proposal number: 1 (0x1) Sep 21 07:15:41.762777: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:41.762779: | SPI size: 0 (0x0) Sep 21 07:15:41.762782: | number of transforms: 1 (0x1) Sep 21 07:15:41.762791: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:41.762794: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.762796: | length: 20 (0x14) Sep 21 07:15:41.762799: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:41.762801: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:41.762804: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:41.762807: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:41.762809: | length/value: 6 (0x6) Sep 21 07:15:41.762812: | [6 is OAKLEY_CAST_CBC] Sep 21 07:15:41.762816: "test" #24: OAKLEY_CAST_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:41.762818: "test" #24: no acceptable Oakley Transform Sep 21 07:15:41.762821: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:41.762826: | [RE]START processing: state #24 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:41.762829: | #24 is idle Sep 21 07:15:41.762908: "test" #24: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:41.762912: | **emit ISAKMP Message: Sep 21 07:15:41.762915: | initiator cookie: Sep 21 07:15:41.762917: | ec 36 4a c0 17 ce d2 a4 Sep 21 07:15:41.762920: | responder cookie: Sep 21 07:15:41.762922: | 34 71 52 79 2d b6 fa 71 Sep 21 07:15:41.762924: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.762927: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.762929: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:41.762932: | flags: none (0x0) Sep 21 07:15:41.762934: | Message ID: 0 (0x0) Sep 21 07:15:41.762937: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.762939: | ***emit ISAKMP Notification Payload: Sep 21 07:15:41.762942: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.762944: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.762947: | protocol ID: 1 (0x1) Sep 21 07:15:41.762949: | SPI size: 0 (0x0) Sep 21 07:15:41.762951: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:41.762955: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:41.762959: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:41.762962: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:41.762965: | emitting length of ISAKMP Message: 40 Sep 21 07:15:41.762971: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #24) Sep 21 07:15:41.762974: | ec 36 4a c0 17 ce d2 a4 34 71 52 79 2d b6 fa 71 Sep 21 07:15:41.762976: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:41.762978: | 00 00 00 01 01 00 00 0e Sep 21 07:15:41.763002: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:41.763007: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:41.763012: | stop processing: state #24 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:41.763015: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:41.763021: | spent 0.45 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:41.825197: | spent 0.0027 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:41.825220: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:41.825224: | 90 da 74 61 bf 73 ac 4d 00 00 00 00 00 00 00 00 Sep 21 07:15:41.825227: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:41.825229: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:41.825231: | 00 00 00 14 01 01 00 00 80 01 00 06 80 02 00 0d Sep 21 07:15:41.825233: | 80 04 00 14 Sep 21 07:15:41.825239: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:41.825242: | **parse ISAKMP Message: Sep 21 07:15:41.825245: | initiator cookie: Sep 21 07:15:41.825247: | 90 da 74 61 bf 73 ac 4d Sep 21 07:15:41.825250: | responder cookie: Sep 21 07:15:41.825252: | 00 00 00 00 00 00 00 00 Sep 21 07:15:41.825255: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.825257: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.825260: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.825262: | flags: none (0x0) Sep 21 07:15:41.825265: | Message ID: 0 (0x0) Sep 21 07:15:41.825267: | length: 68 (0x44) Sep 21 07:15:41.825270: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:41.825274: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:41.825276: | #null state always idle Sep 21 07:15:41.825280: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:41.825283: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:41.825285: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.825288: | length: 40 (0x28) Sep 21 07:15:41.825290: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.825293: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:41.825296: | in statetime_start() with no state Sep 21 07:15:41.825301: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:41.825307: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:41.825310: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.825313: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:41.825316: | find_next_host_connection returns test Sep 21 07:15:41.825318: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.825321: | find_next_host_connection returns empty Sep 21 07:15:41.825348: | creating state object #25 at 0x56077c1decc0 Sep 21 07:15:41.825352: | State DB: adding IKEv1 state #25 in UNDEFINED Sep 21 07:15:41.825356: | pstats #25 ikev1.isakmp started Sep 21 07:15:41.825360: | #25 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:41.825370: | start processing: state #25 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:41.825373: | parent state #25: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:41.825377: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:41.825379: | ICOOKIE-DUMP: 90 da 74 61 bf 73 ac 4d Sep 21 07:15:41.825382: "test" #25: responding to Main Mode Sep 21 07:15:41.825387: | **emit ISAKMP Message: Sep 21 07:15:41.825390: | initiator cookie: Sep 21 07:15:41.825392: | 90 da 74 61 bf 73 ac 4d Sep 21 07:15:41.825394: | responder cookie: Sep 21 07:15:41.825397: | 25 e0 6f 3d c9 be 6b 57 Sep 21 07:15:41.825399: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.825402: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.825404: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.825407: | flags: none (0x0) Sep 21 07:15:41.825409: | Message ID: 0 (0x0) Sep 21 07:15:41.825412: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.825415: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:41.825417: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:41.825420: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:41.825422: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.825425: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:41.825428: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:41.825431: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:41.825434: | ****parse IPsec DOI SIT: Sep 21 07:15:41.825437: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:41.825440: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:41.825442: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.825444: | length: 28 (0x1c) Sep 21 07:15:41.825447: | proposal number: 1 (0x1) Sep 21 07:15:41.825449: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:41.825452: | SPI size: 0 (0x0) Sep 21 07:15:41.825454: | number of transforms: 1 (0x1) Sep 21 07:15:41.825457: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:41.825459: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.825462: | length: 20 (0x14) Sep 21 07:15:41.825464: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:41.825467: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:41.825469: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:41.825472: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:41.825474: | length/value: 6 (0x6) Sep 21 07:15:41.825477: | [6 is OAKLEY_CAST_CBC] Sep 21 07:15:41.825481: "test" #25: OAKLEY_CAST_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:41.825484: "test" #25: no acceptable Oakley Transform Sep 21 07:15:41.825487: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:41.825491: | [RE]START processing: state #25 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:41.825494: | #25 is idle Sep 21 07:15:41.825579: "test" #25: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:41.825584: | **emit ISAKMP Message: Sep 21 07:15:41.825586: | initiator cookie: Sep 21 07:15:41.825588: | 90 da 74 61 bf 73 ac 4d Sep 21 07:15:41.825591: | responder cookie: Sep 21 07:15:41.825593: | 25 e0 6f 3d c9 be 6b 57 Sep 21 07:15:41.825595: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.825598: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.825600: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:41.825603: | flags: none (0x0) Sep 21 07:15:41.825605: | Message ID: 0 (0x0) Sep 21 07:15:41.825608: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.825612: | ***emit ISAKMP Notification Payload: Sep 21 07:15:41.825615: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.825617: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.825620: | protocol ID: 1 (0x1) Sep 21 07:15:41.825622: | SPI size: 0 (0x0) Sep 21 07:15:41.825624: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:41.825628: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:41.825631: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:41.825633: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:41.825636: | emitting length of ISAKMP Message: 40 Sep 21 07:15:41.825642: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #25) Sep 21 07:15:41.825644: | 90 da 74 61 bf 73 ac 4d 25 e0 6f 3d c9 be 6b 57 Sep 21 07:15:41.825647: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:41.825649: | 00 00 00 01 01 00 00 0e Sep 21 07:15:41.825674: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:41.825680: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:41.825685: | stop processing: state #25 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:41.825688: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:41.825693: | spent 0.467 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:41.910245: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:41.910270: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:41.910274: | e4 c5 a7 e0 8e b5 db de 00 00 00 00 00 00 00 00 Sep 21 07:15:41.910276: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:41.910279: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:41.910281: | 00 00 00 14 01 01 00 00 80 01 00 06 80 02 00 0d Sep 21 07:15:41.910283: | 80 03 00 0f Sep 21 07:15:41.910288: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:41.910292: | **parse ISAKMP Message: Sep 21 07:15:41.910295: | initiator cookie: Sep 21 07:15:41.910297: | e4 c5 a7 e0 8e b5 db de Sep 21 07:15:41.910299: | responder cookie: Sep 21 07:15:41.910302: | 00 00 00 00 00 00 00 00 Sep 21 07:15:41.910304: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.910307: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.910310: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.910312: | flags: none (0x0) Sep 21 07:15:41.910315: | Message ID: 0 (0x0) Sep 21 07:15:41.910317: | length: 68 (0x44) Sep 21 07:15:41.910320: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:41.910324: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:41.910326: | #null state always idle Sep 21 07:15:41.910330: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:41.910333: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:41.910335: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.910338: | length: 40 (0x28) Sep 21 07:15:41.910340: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.910343: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:41.910346: | in statetime_start() with no state Sep 21 07:15:41.910351: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:41.910356: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:41.910360: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.910363: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:41.910369: | find_next_host_connection returns test Sep 21 07:15:41.910372: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.910374: | find_next_host_connection returns empty Sep 21 07:15:41.910403: | creating state object #26 at 0x56077c1df780 Sep 21 07:15:41.910407: | State DB: adding IKEv1 state #26 in UNDEFINED Sep 21 07:15:41.910411: | pstats #26 ikev1.isakmp started Sep 21 07:15:41.910416: | #26 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:41.910422: | start processing: state #26 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:41.910425: | parent state #26: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:41.910429: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:41.910431: | ICOOKIE-DUMP: e4 c5 a7 e0 8e b5 db de Sep 21 07:15:41.910434: "test" #26: responding to Main Mode Sep 21 07:15:41.910439: | **emit ISAKMP Message: Sep 21 07:15:41.910442: | initiator cookie: Sep 21 07:15:41.910444: | e4 c5 a7 e0 8e b5 db de Sep 21 07:15:41.910446: | responder cookie: Sep 21 07:15:41.910448: | 7e 2f f2 cc 31 1c 26 6d Sep 21 07:15:41.910451: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.910453: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.910456: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.910458: | flags: none (0x0) Sep 21 07:15:41.910461: | Message ID: 0 (0x0) Sep 21 07:15:41.910463: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.910466: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:41.910469: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:41.910472: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:41.910474: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.910477: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:41.910480: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:41.910483: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:41.910486: | ****parse IPsec DOI SIT: Sep 21 07:15:41.910488: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:41.910491: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:41.910494: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.910496: | length: 28 (0x1c) Sep 21 07:15:41.910498: | proposal number: 1 (0x1) Sep 21 07:15:41.910501: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:41.910503: | SPI size: 0 (0x0) Sep 21 07:15:41.910505: | number of transforms: 1 (0x1) Sep 21 07:15:41.910508: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:41.910511: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.910513: | length: 20 (0x14) Sep 21 07:15:41.910515: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:41.910518: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:41.910521: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:41.910523: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:41.910526: | length/value: 6 (0x6) Sep 21 07:15:41.910528: | [6 is OAKLEY_CAST_CBC] Sep 21 07:15:41.910532: "test" #26: OAKLEY_CAST_CBC is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:41.910535: "test" #26: no acceptable Oakley Transform Sep 21 07:15:41.910538: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:41.910543: | [RE]START processing: state #26 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:41.910545: | #26 is idle Sep 21 07:15:41.910626: "test" #26: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:41.910630: | **emit ISAKMP Message: Sep 21 07:15:41.910634: | initiator cookie: Sep 21 07:15:41.910637: | e4 c5 a7 e0 8e b5 db de Sep 21 07:15:41.910639: | responder cookie: Sep 21 07:15:41.910641: | 7e 2f f2 cc 31 1c 26 6d Sep 21 07:15:41.910644: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.910646: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.910649: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:41.910651: | flags: none (0x0) Sep 21 07:15:41.910654: | Message ID: 0 (0x0) Sep 21 07:15:41.910656: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.910659: | ***emit ISAKMP Notification Payload: Sep 21 07:15:41.910662: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.910664: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.910667: | protocol ID: 1 (0x1) Sep 21 07:15:41.910669: | SPI size: 0 (0x0) Sep 21 07:15:41.910671: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:41.910675: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:41.910677: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:41.910680: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:41.910682: | emitting length of ISAKMP Message: 40 Sep 21 07:15:41.910688: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #26) Sep 21 07:15:41.910691: | e4 c5 a7 e0 8e b5 db de 7e 2f f2 cc 31 1c 26 6d Sep 21 07:15:41.910693: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:41.910696: | 00 00 00 01 01 00 00 0e Sep 21 07:15:41.910719: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:41.910724: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:41.910729: | stop processing: state #26 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:41.910732: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:41.910737: | spent 0.463 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:41.968049: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:41.968073: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:41.968077: | 45 f4 7d a8 d4 42 cd 30 00 00 00 00 00 00 00 00 Sep 21 07:15:41.968080: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:15:41.968082: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:15:41.968084: | 00 00 00 18 01 01 00 00 80 01 00 0a 80 02 00 15 Sep 21 07:15:41.968086: | 80 03 00 09 80 04 00 12 Sep 21 07:15:41.968092: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:41.968096: | **parse ISAKMP Message: Sep 21 07:15:41.968098: | initiator cookie: Sep 21 07:15:41.968101: | 45 f4 7d a8 d4 42 cd 30 Sep 21 07:15:41.968103: | responder cookie: Sep 21 07:15:41.968105: | 00 00 00 00 00 00 00 00 Sep 21 07:15:41.968108: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.968111: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.968113: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.968116: | flags: none (0x0) Sep 21 07:15:41.968119: | Message ID: 0 (0x0) Sep 21 07:15:41.968121: | length: 72 (0x48) Sep 21 07:15:41.968124: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:41.968127: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:41.968130: | #null state always idle Sep 21 07:15:41.968134: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:41.968137: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:41.968139: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.968142: | length: 44 (0x2c) Sep 21 07:15:41.968144: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.968151: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:41.968153: | in statetime_start() with no state Sep 21 07:15:41.968159: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:41.968165: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:41.968168: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.968171: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:41.968174: | find_next_host_connection returns test Sep 21 07:15:41.968177: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:41.968179: | find_next_host_connection returns empty Sep 21 07:15:41.968202: | creating state object #27 at 0x56077c1e0240 Sep 21 07:15:41.968205: | State DB: adding IKEv1 state #27 in UNDEFINED Sep 21 07:15:41.968210: | pstats #27 ikev1.isakmp started Sep 21 07:15:41.968214: | #27 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:41.968221: | start processing: state #27 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:41.968224: | parent state #27: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:41.968228: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:41.968230: | ICOOKIE-DUMP: 45 f4 7d a8 d4 42 cd 30 Sep 21 07:15:41.968233: "test" #27: responding to Main Mode Sep 21 07:15:41.968238: | **emit ISAKMP Message: Sep 21 07:15:41.968240: | initiator cookie: Sep 21 07:15:41.968242: | 45 f4 7d a8 d4 42 cd 30 Sep 21 07:15:41.968245: | responder cookie: Sep 21 07:15:41.968247: | ca 63 6a 6e 72 32 bc 7e Sep 21 07:15:41.968249: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:41.968252: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.968254: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:41.968257: | flags: none (0x0) Sep 21 07:15:41.968259: | Message ID: 0 (0x0) Sep 21 07:15:41.968262: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.968265: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:41.968268: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:41.968270: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:41.968272: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.968275: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:41.968278: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:41.968281: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:41.968284: | ****parse IPsec DOI SIT: Sep 21 07:15:41.968287: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:41.968290: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:41.968292: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.968295: | length: 32 (0x20) Sep 21 07:15:41.968297: | proposal number: 1 (0x1) Sep 21 07:15:41.968299: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:41.968302: | SPI size: 0 (0x0) Sep 21 07:15:41.968304: | number of transforms: 1 (0x1) Sep 21 07:15:41.968307: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:41.968309: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.968312: | length: 24 (0x18) Sep 21 07:15:41.968314: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:41.968316: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:41.968319: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:41.968322: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:41.968324: | length/value: 10 (0xa) Sep 21 07:15:41.968327: | [10 is UNUSED_10] Sep 21 07:15:41.968332: "test" #27: UNUSED_10 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:41.968335: "test" #27: no acceptable Oakley Transform Sep 21 07:15:41.968338: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:41.968343: | [RE]START processing: state #27 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:41.968345: | #27 is idle Sep 21 07:15:41.968428: "test" #27: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:41.968433: | **emit ISAKMP Message: Sep 21 07:15:41.968435: | initiator cookie: Sep 21 07:15:41.968437: | 45 f4 7d a8 d4 42 cd 30 Sep 21 07:15:41.968440: | responder cookie: Sep 21 07:15:41.968442: | ca 63 6a 6e 72 32 bc 7e Sep 21 07:15:41.968444: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.968447: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:41.968450: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:41.968452: | flags: none (0x0) Sep 21 07:15:41.968454: | Message ID: 0 (0x0) Sep 21 07:15:41.968457: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:41.968460: | ***emit ISAKMP Notification Payload: Sep 21 07:15:41.968462: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:41.968464: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:41.968467: | protocol ID: 1 (0x1) Sep 21 07:15:41.968469: | SPI size: 0 (0x0) Sep 21 07:15:41.968472: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:41.968475: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:41.968477: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:41.968480: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:41.968483: | emitting length of ISAKMP Message: 40 Sep 21 07:15:41.968489: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #27) Sep 21 07:15:41.968491: | 45 f4 7d a8 d4 42 cd 30 ca 63 6a 6e 72 32 bc 7e Sep 21 07:15:41.968494: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:41.968496: | 00 00 00 01 01 00 00 0e Sep 21 07:15:41.968519: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:41.968524: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:41.968529: | stop processing: state #27 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:41.968532: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:41.968537: | spent 0.457 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:42.034042: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:42.034065: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:42.034068: | 51 0f 26 f9 9c 72 84 48 00 00 00 00 00 00 00 00 Sep 21 07:15:42.034071: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:42.034073: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:42.034075: | 00 00 00 14 01 01 00 00 80 02 00 15 80 03 00 09 Sep 21 07:15:42.034077: | 80 04 00 12 Sep 21 07:15:42.034082: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:42.034085: | **parse ISAKMP Message: Sep 21 07:15:42.034088: | initiator cookie: Sep 21 07:15:42.034090: | 51 0f 26 f9 9c 72 84 48 Sep 21 07:15:42.034092: | responder cookie: Sep 21 07:15:42.034094: | 00 00 00 00 00 00 00 00 Sep 21 07:15:42.034097: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.034100: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.034102: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.034105: | flags: none (0x0) Sep 21 07:15:42.034107: | Message ID: 0 (0x0) Sep 21 07:15:42.034109: | length: 68 (0x44) Sep 21 07:15:42.034115: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:42.034119: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:42.034121: | #null state always idle Sep 21 07:15:42.034124: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:42.034127: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:42.034130: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.034132: | length: 40 (0x28) Sep 21 07:15:42.034134: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.034137: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:42.034139: | in statetime_start() with no state Sep 21 07:15:42.034144: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:42.034149: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:42.034152: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.034156: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:42.034158: | find_next_host_connection returns test Sep 21 07:15:42.034161: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.034163: | find_next_host_connection returns empty Sep 21 07:15:42.034188: | creating state object #28 at 0x56077c1e0d00 Sep 21 07:15:42.034191: | State DB: adding IKEv1 state #28 in UNDEFINED Sep 21 07:15:42.034196: | pstats #28 ikev1.isakmp started Sep 21 07:15:42.034200: | #28 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:42.034206: | start processing: state #28 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:42.034209: | parent state #28: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:42.034213: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:42.034215: | ICOOKIE-DUMP: 51 0f 26 f9 9c 72 84 48 Sep 21 07:15:42.034218: "test" #28: responding to Main Mode Sep 21 07:15:42.034223: | **emit ISAKMP Message: Sep 21 07:15:42.034225: | initiator cookie: Sep 21 07:15:42.034227: | 51 0f 26 f9 9c 72 84 48 Sep 21 07:15:42.034230: | responder cookie: Sep 21 07:15:42.034232: | 47 5b 93 6b 07 8c ad 7c Sep 21 07:15:42.034234: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.034236: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.034239: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.034241: | flags: none (0x0) Sep 21 07:15:42.034243: | Message ID: 0 (0x0) Sep 21 07:15:42.034246: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.034248: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:42.034251: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:42.034254: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:42.034256: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.034259: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:42.034262: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:42.034264: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:42.034268: | ****parse IPsec DOI SIT: Sep 21 07:15:42.034270: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:42.034273: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:42.034275: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.034277: | length: 28 (0x1c) Sep 21 07:15:42.034279: | proposal number: 1 (0x1) Sep 21 07:15:42.034282: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:42.034284: | SPI size: 0 (0x0) Sep 21 07:15:42.034286: | number of transforms: 1 (0x1) Sep 21 07:15:42.034289: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:42.034292: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.034295: | length: 20 (0x14) Sep 21 07:15:42.034297: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:42.034299: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:42.034302: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:42.034305: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:15:42.034307: | length/value: 21 (0x15) Sep 21 07:15:42.034311: "test" #28: 21?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:15:42.034314: "test" #28: no acceptable Oakley Transform Sep 21 07:15:42.034317: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:42.034321: | [RE]START processing: state #28 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:42.034323: | #28 is idle Sep 21 07:15:42.034402: "test" #28: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:42.034406: | **emit ISAKMP Message: Sep 21 07:15:42.034409: | initiator cookie: Sep 21 07:15:42.034411: | 51 0f 26 f9 9c 72 84 48 Sep 21 07:15:42.034413: | responder cookie: Sep 21 07:15:42.034415: | 47 5b 93 6b 07 8c ad 7c Sep 21 07:15:42.034418: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.034420: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.034423: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:42.034425: | flags: none (0x0) Sep 21 07:15:42.034427: | Message ID: 0 (0x0) Sep 21 07:15:42.034430: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.034432: | ***emit ISAKMP Notification Payload: Sep 21 07:15:42.034435: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.034437: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.034439: | protocol ID: 1 (0x1) Sep 21 07:15:42.034441: | SPI size: 0 (0x0) Sep 21 07:15:42.034444: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:42.034447: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:42.034450: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:42.034453: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:42.034455: | emitting length of ISAKMP Message: 40 Sep 21 07:15:42.034461: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #28) Sep 21 07:15:42.034464: | 51 0f 26 f9 9c 72 84 48 47 5b 93 6b 07 8c ad 7c Sep 21 07:15:42.034466: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:42.034468: | 00 00 00 01 01 00 00 0e Sep 21 07:15:42.034492: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:42.034497: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:42.034502: | stop processing: state #28 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:42.034505: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:42.034510: | spent 0.437 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:42.113399: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:42.113430: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:42.113434: | 02 99 77 96 de 5b 43 32 00 00 00 00 00 00 00 00 Sep 21 07:15:42.113437: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:42.113440: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:42.113442: | 00 00 00 14 01 01 00 00 80 01 00 0a 80 03 00 09 Sep 21 07:15:42.113444: | 80 04 00 12 Sep 21 07:15:42.113449: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:42.113454: | **parse ISAKMP Message: Sep 21 07:15:42.113456: | initiator cookie: Sep 21 07:15:42.113459: | 02 99 77 96 de 5b 43 32 Sep 21 07:15:42.113465: | responder cookie: Sep 21 07:15:42.113467: | 00 00 00 00 00 00 00 00 Sep 21 07:15:42.113470: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.113473: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.113475: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.113478: | flags: none (0x0) Sep 21 07:15:42.113480: | Message ID: 0 (0x0) Sep 21 07:15:42.113482: | length: 68 (0x44) Sep 21 07:15:42.113485: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:42.113489: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:42.113492: | #null state always idle Sep 21 07:15:42.113495: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:42.113498: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:42.113500: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.113502: | length: 40 (0x28) Sep 21 07:15:42.113505: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.113507: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:42.113510: | in statetime_start() with no state Sep 21 07:15:42.113515: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:42.113521: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:42.113525: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.113529: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:42.113532: | find_next_host_connection returns test Sep 21 07:15:42.113534: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.113537: | find_next_host_connection returns empty Sep 21 07:15:42.113562: | creating state object #29 at 0x56077c1e17c0 Sep 21 07:15:42.113565: | State DB: adding IKEv1 state #29 in UNDEFINED Sep 21 07:15:42.113572: | pstats #29 ikev1.isakmp started Sep 21 07:15:42.113576: | #29 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:42.113582: | start processing: state #29 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:42.113586: | parent state #29: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:42.113589: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:42.113592: | ICOOKIE-DUMP: 02 99 77 96 de 5b 43 32 Sep 21 07:15:42.113595: "test" #29: responding to Main Mode Sep 21 07:15:42.113600: | **emit ISAKMP Message: Sep 21 07:15:42.113602: | initiator cookie: Sep 21 07:15:42.113605: | 02 99 77 96 de 5b 43 32 Sep 21 07:15:42.113607: | responder cookie: Sep 21 07:15:42.113609: | d8 a2 e8 f6 48 99 e8 c1 Sep 21 07:15:42.113612: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.113614: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.113617: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.113619: | flags: none (0x0) Sep 21 07:15:42.113621: | Message ID: 0 (0x0) Sep 21 07:15:42.113625: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.113627: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:42.113630: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:42.113633: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:42.113635: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.113638: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:42.113641: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:42.113644: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:42.113647: | ****parse IPsec DOI SIT: Sep 21 07:15:42.113650: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:42.113655: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:42.113658: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.113660: | length: 28 (0x1c) Sep 21 07:15:42.113662: | proposal number: 1 (0x1) Sep 21 07:15:42.113665: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:42.113667: | SPI size: 0 (0x0) Sep 21 07:15:42.113670: | number of transforms: 1 (0x1) Sep 21 07:15:42.113673: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:42.113675: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.113677: | length: 20 (0x14) Sep 21 07:15:42.113680: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:42.113682: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:42.113685: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:42.113688: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:42.113690: | length/value: 10 (0xa) Sep 21 07:15:42.113693: | [10 is UNUSED_10] Sep 21 07:15:42.113696: "test" #29: UNUSED_10 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:42.113699: "test" #29: no acceptable Oakley Transform Sep 21 07:15:42.113702: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:42.113707: | [RE]START processing: state #29 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:42.113709: | #29 is idle Sep 21 07:15:42.113801: "test" #29: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:42.113808: | **emit ISAKMP Message: Sep 21 07:15:42.113811: | initiator cookie: Sep 21 07:15:42.113813: | 02 99 77 96 de 5b 43 32 Sep 21 07:15:42.113815: | responder cookie: Sep 21 07:15:42.113818: | d8 a2 e8 f6 48 99 e8 c1 Sep 21 07:15:42.113820: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.113823: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.113825: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:42.113828: | flags: none (0x0) Sep 21 07:15:42.113830: | Message ID: 0 (0x0) Sep 21 07:15:42.113833: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.113836: | ***emit ISAKMP Notification Payload: Sep 21 07:15:42.113838: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.113841: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.113843: | protocol ID: 1 (0x1) Sep 21 07:15:42.113845: | SPI size: 0 (0x0) Sep 21 07:15:42.113848: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:42.113851: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:42.113854: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:42.113857: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:42.113859: | emitting length of ISAKMP Message: 40 Sep 21 07:15:42.113865: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #29) Sep 21 07:15:42.113868: | 02 99 77 96 de 5b 43 32 d8 a2 e8 f6 48 99 e8 c1 Sep 21 07:15:42.113870: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:42.113872: | 00 00 00 01 01 00 00 0e Sep 21 07:15:42.113896: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:42.113902: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:42.113907: | stop processing: state #29 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:42.113910: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:42.113915: | spent 0.468 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:42.233704: | spent 0.00356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:42.233728: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:42.233732: | 6f 83 cb d7 18 79 08 df 00 00 00 00 00 00 00 00 Sep 21 07:15:42.233738: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:42.233740: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:42.233742: | 00 00 00 14 01 01 00 00 80 01 00 0a 80 02 00 15 Sep 21 07:15:42.233745: | 80 04 00 12 Sep 21 07:15:42.233750: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:42.233753: | **parse ISAKMP Message: Sep 21 07:15:42.233756: | initiator cookie: Sep 21 07:15:42.233758: | 6f 83 cb d7 18 79 08 df Sep 21 07:15:42.233760: | responder cookie: Sep 21 07:15:42.233762: | 00 00 00 00 00 00 00 00 Sep 21 07:15:42.233765: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.233768: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.233771: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.233773: | flags: none (0x0) Sep 21 07:15:42.233776: | Message ID: 0 (0x0) Sep 21 07:15:42.233778: | length: 68 (0x44) Sep 21 07:15:42.233781: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:42.233789: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:42.233794: | #null state always idle Sep 21 07:15:42.233798: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:42.233800: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:42.233803: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.233805: | length: 40 (0x28) Sep 21 07:15:42.233807: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.233810: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:42.233813: | in statetime_start() with no state Sep 21 07:15:42.233818: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:42.233823: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:42.233826: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.233829: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:42.233832: | find_next_host_connection returns test Sep 21 07:15:42.233834: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.233836: | find_next_host_connection returns empty Sep 21 07:15:42.233862: | creating state object #30 at 0x56077c1e2280 Sep 21 07:15:42.233865: | State DB: adding IKEv1 state #30 in UNDEFINED Sep 21 07:15:42.233869: | pstats #30 ikev1.isakmp started Sep 21 07:15:42.233874: | #30 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:42.233880: | start processing: state #30 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:42.233884: | parent state #30: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:42.233886: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:42.233889: | ICOOKIE-DUMP: 6f 83 cb d7 18 79 08 df Sep 21 07:15:42.233892: "test" #30: responding to Main Mode Sep 21 07:15:42.233896: | **emit ISAKMP Message: Sep 21 07:15:42.233898: | initiator cookie: Sep 21 07:15:42.233900: | 6f 83 cb d7 18 79 08 df Sep 21 07:15:42.233903: | responder cookie: Sep 21 07:15:42.233905: | 0f a7 33 f2 ce c8 23 2d Sep 21 07:15:42.233907: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.233909: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.233911: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.233914: | flags: none (0x0) Sep 21 07:15:42.233916: | Message ID: 0 (0x0) Sep 21 07:15:42.233918: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.233921: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:42.233923: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:42.233926: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:42.233928: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.233932: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:42.233935: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:42.233938: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:42.233941: | ****parse IPsec DOI SIT: Sep 21 07:15:42.233943: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:42.233946: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:42.233948: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.233951: | length: 28 (0x1c) Sep 21 07:15:42.233953: | proposal number: 1 (0x1) Sep 21 07:15:42.233955: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:42.233957: | SPI size: 0 (0x0) Sep 21 07:15:42.233959: | number of transforms: 1 (0x1) Sep 21 07:15:42.233962: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:42.233964: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.233966: | length: 20 (0x14) Sep 21 07:15:42.233968: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:42.233970: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:42.233973: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:42.233975: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:42.233977: | length/value: 10 (0xa) Sep 21 07:15:42.233980: | [10 is UNUSED_10] Sep 21 07:15:42.233984: "test" #30: UNUSED_10 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:42.233986: "test" #30: no acceptable Oakley Transform Sep 21 07:15:42.233989: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:42.233993: | [RE]START processing: state #30 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:42.233995: | #30 is idle Sep 21 07:15:42.234058: "test" #30: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:42.234063: | **emit ISAKMP Message: Sep 21 07:15:42.234065: | initiator cookie: Sep 21 07:15:42.234067: | 6f 83 cb d7 18 79 08 df Sep 21 07:15:42.234069: | responder cookie: Sep 21 07:15:42.234071: | 0f a7 33 f2 ce c8 23 2d Sep 21 07:15:42.234074: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.234076: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.234079: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:42.234081: | flags: none (0x0) Sep 21 07:15:42.234083: | Message ID: 0 (0x0) Sep 21 07:15:42.234086: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.234089: | ***emit ISAKMP Notification Payload: Sep 21 07:15:42.234092: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.234094: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.234096: | protocol ID: 1 (0x1) Sep 21 07:15:42.234099: | SPI size: 0 (0x0) Sep 21 07:15:42.234101: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:42.234104: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:42.234107: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:42.234110: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:42.234112: | emitting length of ISAKMP Message: 40 Sep 21 07:15:42.234118: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #30) Sep 21 07:15:42.234121: | 6f 83 cb d7 18 79 08 df 0f a7 33 f2 ce c8 23 2d Sep 21 07:15:42.234123: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:42.234125: | 00 00 00 01 01 00 00 0e Sep 21 07:15:42.234150: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:42.234156: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:42.234165: | stop processing: state #30 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:42.234169: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:42.234174: | spent 0.441 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:42.372867: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:42.372890: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:42.372894: | 8b fd 29 dd 11 2b 11 83 00 00 00 00 00 00 00 00 Sep 21 07:15:42.372896: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:42.372899: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:42.372901: | 00 00 00 14 01 01 00 00 80 01 00 0a 80 02 00 15 Sep 21 07:15:42.372903: | 80 03 00 09 Sep 21 07:15:42.372908: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:42.372912: | **parse ISAKMP Message: Sep 21 07:15:42.372915: | initiator cookie: Sep 21 07:15:42.372917: | 8b fd 29 dd 11 2b 11 83 Sep 21 07:15:42.372920: | responder cookie: Sep 21 07:15:42.372922: | 00 00 00 00 00 00 00 00 Sep 21 07:15:42.372924: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.372927: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.372930: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.372932: | flags: none (0x0) Sep 21 07:15:42.372935: | Message ID: 0 (0x0) Sep 21 07:15:42.372937: | length: 68 (0x44) Sep 21 07:15:42.372940: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:42.372944: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:42.372947: | #null state always idle Sep 21 07:15:42.372950: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:42.372953: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:42.372956: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.372958: | length: 40 (0x28) Sep 21 07:15:42.372960: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.372963: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:42.372966: | in statetime_start() with no state Sep 21 07:15:42.372972: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:42.372977: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:42.372981: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.372984: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:42.372987: | find_next_host_connection returns test Sep 21 07:15:42.372990: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.372992: | find_next_host_connection returns empty Sep 21 07:15:42.373018: | creating state object #31 at 0x56077c1e2d40 Sep 21 07:15:42.373021: | State DB: adding IKEv1 state #31 in UNDEFINED Sep 21 07:15:42.373026: | pstats #31 ikev1.isakmp started Sep 21 07:15:42.373030: | #31 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:42.373036: | start processing: state #31 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:42.373040: | parent state #31: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:42.373043: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:42.373046: | ICOOKIE-DUMP: 8b fd 29 dd 11 2b 11 83 Sep 21 07:15:42.373049: "test" #31: responding to Main Mode Sep 21 07:15:42.373054: | **emit ISAKMP Message: Sep 21 07:15:42.373056: | initiator cookie: Sep 21 07:15:42.373058: | 8b fd 29 dd 11 2b 11 83 Sep 21 07:15:42.373061: | responder cookie: Sep 21 07:15:42.373063: | 8e 3f 1b 86 e5 ed fa 7a Sep 21 07:15:42.373065: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.373068: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.373070: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.373075: | flags: none (0x0) Sep 21 07:15:42.373077: | Message ID: 0 (0x0) Sep 21 07:15:42.373080: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.373083: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:42.373086: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:42.373089: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:42.373091: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.373094: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:42.373097: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:42.373100: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:42.373103: | ****parse IPsec DOI SIT: Sep 21 07:15:42.373105: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:42.373108: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:42.373111: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.373113: | length: 28 (0x1c) Sep 21 07:15:42.373116: | proposal number: 1 (0x1) Sep 21 07:15:42.373118: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:42.373120: | SPI size: 0 (0x0) Sep 21 07:15:42.373123: | number of transforms: 1 (0x1) Sep 21 07:15:42.373126: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:42.373128: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.373130: | length: 20 (0x14) Sep 21 07:15:42.373133: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:42.373135: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:42.373138: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:42.373141: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:42.373143: | length/value: 10 (0xa) Sep 21 07:15:42.373146: | [10 is UNUSED_10] Sep 21 07:15:42.373149: "test" #31: UNUSED_10 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:42.373152: "test" #31: no acceptable Oakley Transform Sep 21 07:15:42.373155: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:42.373159: | [RE]START processing: state #31 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:42.373162: | #31 is idle Sep 21 07:15:42.373247: "test" #31: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:42.373253: | **emit ISAKMP Message: Sep 21 07:15:42.373256: | initiator cookie: Sep 21 07:15:42.373258: | 8b fd 29 dd 11 2b 11 83 Sep 21 07:15:42.373261: | responder cookie: Sep 21 07:15:42.373263: | 8e 3f 1b 86 e5 ed fa 7a Sep 21 07:15:42.373266: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.373270: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.373272: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:42.373275: | flags: none (0x0) Sep 21 07:15:42.373278: | Message ID: 0 (0x0) Sep 21 07:15:42.373282: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.373285: | ***emit ISAKMP Notification Payload: Sep 21 07:15:42.373288: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.373291: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.373293: | protocol ID: 1 (0x1) Sep 21 07:15:42.373296: | SPI size: 0 (0x0) Sep 21 07:15:42.373299: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:42.373303: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:42.373307: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:42.373312: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:42.373316: | emitting length of ISAKMP Message: 40 Sep 21 07:15:42.373323: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #31) Sep 21 07:15:42.373328: | 8b fd 29 dd 11 2b 11 83 8e 3f 1b 86 e5 ed fa 7a Sep 21 07:15:42.373330: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:42.373333: | 00 00 00 01 01 00 00 0e Sep 21 07:15:42.373357: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:42.373363: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:42.373368: | stop processing: state #31 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:42.373372: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:42.373377: | spent 0.481 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:42.542615: | spent 0.00321 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:42.542643: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:42.542646: | 67 c1 43 73 a5 7d ff 31 00 00 00 00 00 00 00 00 Sep 21 07:15:42.542649: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:15:42.542651: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:15:42.542653: | 00 00 00 18 01 01 00 00 80 01 00 03 80 02 00 12 Sep 21 07:15:42.542656: | 80 03 00 19 80 04 00 1d Sep 21 07:15:42.542661: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:42.542664: | **parse ISAKMP Message: Sep 21 07:15:42.542667: | initiator cookie: Sep 21 07:15:42.542669: | 67 c1 43 73 a5 7d ff 31 Sep 21 07:15:42.542672: | responder cookie: Sep 21 07:15:42.542674: | 00 00 00 00 00 00 00 00 Sep 21 07:15:42.542677: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.542679: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.542682: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.542685: | flags: none (0x0) Sep 21 07:15:42.542687: | Message ID: 0 (0x0) Sep 21 07:15:42.542690: | length: 72 (0x48) Sep 21 07:15:42.542693: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:42.542696: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:42.542699: | #null state always idle Sep 21 07:15:42.542702: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:42.542705: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:42.542708: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.542711: | length: 44 (0x2c) Sep 21 07:15:42.542713: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.542716: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:42.542719: | in statetime_start() with no state Sep 21 07:15:42.542724: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:42.542730: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:42.542733: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.542737: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:42.542739: | find_next_host_connection returns test Sep 21 07:15:42.542742: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.542744: | find_next_host_connection returns empty Sep 21 07:15:42.542773: | creating state object #32 at 0x56077c1e3800 Sep 21 07:15:42.542777: | State DB: adding IKEv1 state #32 in UNDEFINED Sep 21 07:15:42.542781: | pstats #32 ikev1.isakmp started Sep 21 07:15:42.542791: | #32 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:42.542797: | start processing: state #32 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:42.542801: | parent state #32: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:42.542804: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:42.542810: | ICOOKIE-DUMP: 67 c1 43 73 a5 7d ff 31 Sep 21 07:15:42.542813: "test" #32: responding to Main Mode Sep 21 07:15:42.542818: | **emit ISAKMP Message: Sep 21 07:15:42.542820: | initiator cookie: Sep 21 07:15:42.542823: | 67 c1 43 73 a5 7d ff 31 Sep 21 07:15:42.542825: | responder cookie: Sep 21 07:15:42.542827: | 48 dd 45 ba 7c a7 e1 5d Sep 21 07:15:42.542830: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.542832: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.542835: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.542837: | flags: none (0x0) Sep 21 07:15:42.542840: | Message ID: 0 (0x0) Sep 21 07:15:42.542842: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.542845: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:42.542848: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:42.542851: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:42.542853: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.542856: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:42.542859: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:42.542862: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:42.542865: | ****parse IPsec DOI SIT: Sep 21 07:15:42.542867: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:42.542870: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:42.542873: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.542875: | length: 32 (0x20) Sep 21 07:15:42.542877: | proposal number: 1 (0x1) Sep 21 07:15:42.542880: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:42.542882: | SPI size: 0 (0x0) Sep 21 07:15:42.542885: | number of transforms: 1 (0x1) Sep 21 07:15:42.542888: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:42.542890: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.542892: | length: 24 (0x18) Sep 21 07:15:42.542895: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:42.542897: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:42.542900: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:42.542903: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:42.542905: | length/value: 3 (0x3) Sep 21 07:15:42.542908: | [3 is OAKLEY_BLOWFISH_CBC(UNUSED)] Sep 21 07:15:42.542912: "test" #32: OAKLEY_BLOWFISH_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:42.542914: "test" #32: no acceptable Oakley Transform Sep 21 07:15:42.542917: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:42.542922: | [RE]START processing: state #32 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:42.542925: | #32 is idle Sep 21 07:15:42.543001: "test" #32: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:42.543005: | **emit ISAKMP Message: Sep 21 07:15:42.543008: | initiator cookie: Sep 21 07:15:42.543010: | 67 c1 43 73 a5 7d ff 31 Sep 21 07:15:42.543013: | responder cookie: Sep 21 07:15:42.543015: | 48 dd 45 ba 7c a7 e1 5d Sep 21 07:15:42.543017: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.543020: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.543022: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:42.543025: | flags: none (0x0) Sep 21 07:15:42.543027: | Message ID: 0 (0x0) Sep 21 07:15:42.543030: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.543033: | ***emit ISAKMP Notification Payload: Sep 21 07:15:42.543035: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.543038: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.543040: | protocol ID: 1 (0x1) Sep 21 07:15:42.543044: | SPI size: 0 (0x0) Sep 21 07:15:42.543047: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:42.543050: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:42.543053: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:42.543056: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:42.543058: | emitting length of ISAKMP Message: 40 Sep 21 07:15:42.543064: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #32) Sep 21 07:15:42.543066: | 67 c1 43 73 a5 7d ff 31 48 dd 45 ba 7c a7 e1 5d Sep 21 07:15:42.543069: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:42.543071: | 00 00 00 01 01 00 00 0e Sep 21 07:15:42.543097: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:42.543103: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:42.543108: | stop processing: state #32 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:42.543111: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:42.543116: | spent 0.461 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:42.667133: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:42.667156: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:42.667160: | c8 75 c6 1c 31 45 9d 9a 00 00 00 00 00 00 00 00 Sep 21 07:15:42.667162: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:42.667164: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:42.667167: | 00 00 00 14 01 01 00 00 80 02 00 12 80 03 00 19 Sep 21 07:15:42.667169: | 80 04 00 1d Sep 21 07:15:42.667174: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:42.667177: | **parse ISAKMP Message: Sep 21 07:15:42.667180: | initiator cookie: Sep 21 07:15:42.667183: | c8 75 c6 1c 31 45 9d 9a Sep 21 07:15:42.667185: | responder cookie: Sep 21 07:15:42.667187: | 00 00 00 00 00 00 00 00 Sep 21 07:15:42.667190: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.667193: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.667196: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.667198: | flags: none (0x0) Sep 21 07:15:42.667201: | Message ID: 0 (0x0) Sep 21 07:15:42.667203: | length: 68 (0x44) Sep 21 07:15:42.667206: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:42.667210: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:42.667213: | #null state always idle Sep 21 07:15:42.667216: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:42.667219: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:42.667222: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.667224: | length: 40 (0x28) Sep 21 07:15:42.667226: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.667230: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:42.667232: | in statetime_start() with no state Sep 21 07:15:42.667238: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:42.667243: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:42.667247: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.667250: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:42.667253: | find_next_host_connection returns test Sep 21 07:15:42.667256: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.667258: | find_next_host_connection returns empty Sep 21 07:15:42.667281: | creating state object #33 at 0x56077c1e42c0 Sep 21 07:15:42.667289: | State DB: adding IKEv1 state #33 in UNDEFINED Sep 21 07:15:42.667293: | pstats #33 ikev1.isakmp started Sep 21 07:15:42.667298: | #33 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:42.667304: | start processing: state #33 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:42.667308: | parent state #33: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:42.667311: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:42.667313: | ICOOKIE-DUMP: c8 75 c6 1c 31 45 9d 9a Sep 21 07:15:42.667316: "test" #33: responding to Main Mode Sep 21 07:15:42.667321: | **emit ISAKMP Message: Sep 21 07:15:42.667323: | initiator cookie: Sep 21 07:15:42.667326: | c8 75 c6 1c 31 45 9d 9a Sep 21 07:15:42.667328: | responder cookie: Sep 21 07:15:42.667330: | 73 8f 0b 2d 7e 4e 94 08 Sep 21 07:15:42.667333: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.667335: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.667338: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.667340: | flags: none (0x0) Sep 21 07:15:42.667343: | Message ID: 0 (0x0) Sep 21 07:15:42.667346: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.667348: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:42.667351: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:42.667354: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:42.667356: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.667359: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:42.667362: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:42.667365: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:42.667368: | ****parse IPsec DOI SIT: Sep 21 07:15:42.667371: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:42.667374: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:42.667376: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.667378: | length: 28 (0x1c) Sep 21 07:15:42.667381: | proposal number: 1 (0x1) Sep 21 07:15:42.667383: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:42.667386: | SPI size: 0 (0x0) Sep 21 07:15:42.667388: | number of transforms: 1 (0x1) Sep 21 07:15:42.667391: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:42.667394: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.667396: | length: 20 (0x14) Sep 21 07:15:42.667398: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:42.667401: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:42.667403: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:42.667406: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:15:42.667409: | length/value: 18 (0x12) Sep 21 07:15:42.667413: "test" #33: 18?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:15:42.667416: "test" #33: no acceptable Oakley Transform Sep 21 07:15:42.667419: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:42.667424: | [RE]START processing: state #33 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:42.667426: | #33 is idle Sep 21 07:15:42.667634: "test" #33: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:42.667640: | **emit ISAKMP Message: Sep 21 07:15:42.667643: | initiator cookie: Sep 21 07:15:42.667646: | c8 75 c6 1c 31 45 9d 9a Sep 21 07:15:42.667648: | responder cookie: Sep 21 07:15:42.667650: | 73 8f 0b 2d 7e 4e 94 08 Sep 21 07:15:42.667653: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.667656: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.667658: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:42.667664: | flags: none (0x0) Sep 21 07:15:42.667666: | Message ID: 0 (0x0) Sep 21 07:15:42.667669: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.667672: | ***emit ISAKMP Notification Payload: Sep 21 07:15:42.667675: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.667677: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.667680: | protocol ID: 1 (0x1) Sep 21 07:15:42.667682: | SPI size: 0 (0x0) Sep 21 07:15:42.667685: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:42.667688: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:42.667691: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:42.667694: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:42.667696: | emitting length of ISAKMP Message: 40 Sep 21 07:15:42.667703: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #33) Sep 21 07:15:42.667705: | c8 75 c6 1c 31 45 9d 9a 73 8f 0b 2d 7e 4e 94 08 Sep 21 07:15:42.667708: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:42.667710: | 00 00 00 01 01 00 00 0e Sep 21 07:15:42.667733: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:42.667739: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:42.667744: | stop processing: state #33 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:42.667747: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:42.667753: | spent 0.468 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:42.785802: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:42.785827: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:42.785831: | 31 d0 1d 13 21 d8 e8 50 00 00 00 00 00 00 00 00 Sep 21 07:15:42.785834: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:42.785837: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:42.785839: | 00 00 00 14 01 01 00 00 80 01 00 03 80 03 00 19 Sep 21 07:15:42.785842: | 80 04 00 1d Sep 21 07:15:42.785847: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:42.785852: | **parse ISAKMP Message: Sep 21 07:15:42.785854: | initiator cookie: Sep 21 07:15:42.785857: | 31 d0 1d 13 21 d8 e8 50 Sep 21 07:15:42.785859: | responder cookie: Sep 21 07:15:42.785862: | 00 00 00 00 00 00 00 00 Sep 21 07:15:42.785865: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.785868: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.785871: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.785874: | flags: none (0x0) Sep 21 07:15:42.785877: | Message ID: 0 (0x0) Sep 21 07:15:42.785879: | length: 68 (0x44) Sep 21 07:15:42.785882: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:42.785887: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:42.785890: | #null state always idle Sep 21 07:15:42.785893: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:42.785897: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:42.785899: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.785902: | length: 40 (0x28) Sep 21 07:15:42.785904: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.785907: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:42.785909: | in statetime_start() with no state Sep 21 07:15:42.785915: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:42.785921: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:42.785928: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.785932: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:42.785935: | find_next_host_connection returns test Sep 21 07:15:42.785938: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.785940: | find_next_host_connection returns empty Sep 21 07:15:42.785965: | creating state object #34 at 0x56077c1e4d80 Sep 21 07:15:42.785968: | State DB: adding IKEv1 state #34 in UNDEFINED Sep 21 07:15:42.785973: | pstats #34 ikev1.isakmp started Sep 21 07:15:42.785978: | #34 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:42.785984: | start processing: state #34 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:42.785988: | parent state #34: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:42.785991: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:42.785994: | ICOOKIE-DUMP: 31 d0 1d 13 21 d8 e8 50 Sep 21 07:15:42.785997: "test" #34: responding to Main Mode Sep 21 07:15:42.786003: | **emit ISAKMP Message: Sep 21 07:15:42.786006: | initiator cookie: Sep 21 07:15:42.786008: | 31 d0 1d 13 21 d8 e8 50 Sep 21 07:15:42.786011: | responder cookie: Sep 21 07:15:42.786013: | 42 a6 95 65 ff 75 35 2b Sep 21 07:15:42.786015: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.786018: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.786021: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.786023: | flags: none (0x0) Sep 21 07:15:42.786026: | Message ID: 0 (0x0) Sep 21 07:15:42.786029: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.786032: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:42.786035: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:42.786037: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:42.786040: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.786043: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:42.786046: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:42.786049: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:42.786052: | ****parse IPsec DOI SIT: Sep 21 07:15:42.786055: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:42.786058: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:42.786061: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.786063: | length: 28 (0x1c) Sep 21 07:15:42.786066: | proposal number: 1 (0x1) Sep 21 07:15:42.786068: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:42.786071: | SPI size: 0 (0x0) Sep 21 07:15:42.786073: | number of transforms: 1 (0x1) Sep 21 07:15:42.786076: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:42.786079: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.786081: | length: 20 (0x14) Sep 21 07:15:42.786084: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:42.786086: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:42.786089: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:42.786092: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:42.786094: | length/value: 3 (0x3) Sep 21 07:15:42.786097: | [3 is OAKLEY_BLOWFISH_CBC(UNUSED)] Sep 21 07:15:42.786101: "test" #34: OAKLEY_BLOWFISH_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:42.786103: "test" #34: no acceptable Oakley Transform Sep 21 07:15:42.786106: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:42.786110: | [RE]START processing: state #34 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:42.786114: | #34 is idle Sep 21 07:15:42.786196: "test" #34: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:42.786201: | **emit ISAKMP Message: Sep 21 07:15:42.786204: | initiator cookie: Sep 21 07:15:42.786206: | 31 d0 1d 13 21 d8 e8 50 Sep 21 07:15:42.786208: | responder cookie: Sep 21 07:15:42.786210: | 42 a6 95 65 ff 75 35 2b Sep 21 07:15:42.786213: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.786215: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.786218: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:42.786220: | flags: none (0x0) Sep 21 07:15:42.786222: | Message ID: 0 (0x0) Sep 21 07:15:42.786225: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.786228: | ***emit ISAKMP Notification Payload: Sep 21 07:15:42.786231: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.786233: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.786235: | protocol ID: 1 (0x1) Sep 21 07:15:42.786237: | SPI size: 0 (0x0) Sep 21 07:15:42.786240: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:42.786243: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:42.786246: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:42.786249: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:42.786251: | emitting length of ISAKMP Message: 40 Sep 21 07:15:42.786259: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #34) Sep 21 07:15:42.786262: | 31 d0 1d 13 21 d8 e8 50 42 a6 95 65 ff 75 35 2b Sep 21 07:15:42.786264: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:42.786266: | 00 00 00 01 01 00 00 0e Sep 21 07:15:42.786293: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:42.786300: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:42.786305: | stop processing: state #34 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:42.786309: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:42.786315: | spent 0.482 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:42.986669: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:42.986692: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:42.986696: | 8b 81 7e 0c ab 23 ce ff 00 00 00 00 00 00 00 00 Sep 21 07:15:42.986699: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:42.986702: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:42.986704: | 00 00 00 14 01 01 00 00 80 01 00 03 80 02 00 12 Sep 21 07:15:42.986707: | 80 04 00 1d Sep 21 07:15:42.986712: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:42.986715: | **parse ISAKMP Message: Sep 21 07:15:42.986718: | initiator cookie: Sep 21 07:15:42.986721: | 8b 81 7e 0c ab 23 ce ff Sep 21 07:15:42.986724: | responder cookie: Sep 21 07:15:42.986726: | 00 00 00 00 00 00 00 00 Sep 21 07:15:42.986729: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.986733: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.986736: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.986739: | flags: none (0x0) Sep 21 07:15:42.986741: | Message ID: 0 (0x0) Sep 21 07:15:42.986744: | length: 68 (0x44) Sep 21 07:15:42.986748: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:42.986752: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:42.986755: | #null state always idle Sep 21 07:15:42.986758: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:42.986762: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:42.986769: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.986772: | length: 40 (0x28) Sep 21 07:15:42.986775: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.986778: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:42.986781: | in statetime_start() with no state Sep 21 07:15:42.986791: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:42.986798: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:42.986802: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.986807: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:42.986810: | find_next_host_connection returns test Sep 21 07:15:42.986813: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:42.986816: | find_next_host_connection returns empty Sep 21 07:15:42.986836: | creating state object #35 at 0x56077c1e5840 Sep 21 07:15:42.986840: | State DB: adding IKEv1 state #35 in UNDEFINED Sep 21 07:15:42.986845: | pstats #35 ikev1.isakmp started Sep 21 07:15:42.986850: | #35 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:42.986857: | start processing: state #35 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:42.986861: | parent state #35: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:42.986864: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:42.986867: | ICOOKIE-DUMP: 8b 81 7e 0c ab 23 ce ff Sep 21 07:15:42.986870: "test" #35: responding to Main Mode Sep 21 07:15:42.986875: | **emit ISAKMP Message: Sep 21 07:15:42.986878: | initiator cookie: Sep 21 07:15:42.986880: | 8b 81 7e 0c ab 23 ce ff Sep 21 07:15:42.986883: | responder cookie: Sep 21 07:15:42.986885: | 13 2f c0 5a 86 66 d1 59 Sep 21 07:15:42.986888: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:42.986891: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.986894: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:42.986897: | flags: none (0x0) Sep 21 07:15:42.986900: | Message ID: 0 (0x0) Sep 21 07:15:42.986903: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.986907: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:42.986910: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:42.986913: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:42.986915: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.986919: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:42.986923: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:42.986927: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:42.986931: | ****parse IPsec DOI SIT: Sep 21 07:15:42.986934: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:42.986937: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:42.986940: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.986943: | length: 28 (0x1c) Sep 21 07:15:42.986946: | proposal number: 1 (0x1) Sep 21 07:15:42.986948: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:42.986951: | SPI size: 0 (0x0) Sep 21 07:15:42.986954: | number of transforms: 1 (0x1) Sep 21 07:15:42.986957: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:42.986960: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.986962: | length: 20 (0x14) Sep 21 07:15:42.986965: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:42.986968: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:42.986971: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:42.986976: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:42.986979: | length/value: 3 (0x3) Sep 21 07:15:42.986982: | [3 is OAKLEY_BLOWFISH_CBC(UNUSED)] Sep 21 07:15:42.986986: "test" #35: OAKLEY_BLOWFISH_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:42.986988: "test" #35: no acceptable Oakley Transform Sep 21 07:15:42.986992: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:42.986998: | [RE]START processing: state #35 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:42.987000: | #35 is idle Sep 21 07:15:42.987079: "test" #35: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:42.987083: | **emit ISAKMP Message: Sep 21 07:15:42.987086: | initiator cookie: Sep 21 07:15:42.987089: | 8b 81 7e 0c ab 23 ce ff Sep 21 07:15:42.987091: | responder cookie: Sep 21 07:15:42.987094: | 13 2f c0 5a 86 66 d1 59 Sep 21 07:15:42.987097: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.987100: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:42.987102: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:42.987105: | flags: none (0x0) Sep 21 07:15:42.987108: | Message ID: 0 (0x0) Sep 21 07:15:42.987111: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:42.987114: | ***emit ISAKMP Notification Payload: Sep 21 07:15:42.987117: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:42.987120: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:42.987123: | protocol ID: 1 (0x1) Sep 21 07:15:42.987125: | SPI size: 0 (0x0) Sep 21 07:15:42.987128: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:42.987132: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:42.987136: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:42.987139: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:42.987142: | emitting length of ISAKMP Message: 40 Sep 21 07:15:42.987148: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #35) Sep 21 07:15:42.987152: | 8b 81 7e 0c ab 23 ce ff 13 2f c0 5a 86 66 d1 59 Sep 21 07:15:42.987154: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:42.987157: | 00 00 00 01 01 00 00 0e Sep 21 07:15:42.987178: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:42.987184: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:42.987190: | stop processing: state #35 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:42.987194: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:42.987200: | spent 0.504 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:43.049876: | spent 0.00358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:43.049908: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:43.049913: | 8a f4 11 a9 d4 30 2b e0 00 00 00 00 00 00 00 00 Sep 21 07:15:43.049916: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:43.049918: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:43.049921: | 00 00 00 14 01 01 00 00 80 01 00 03 80 02 00 12 Sep 21 07:15:43.049923: | 80 03 00 19 Sep 21 07:15:43.049928: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:43.049933: | **parse ISAKMP Message: Sep 21 07:15:43.049936: | initiator cookie: Sep 21 07:15:43.049938: | 8a f4 11 a9 d4 30 2b e0 Sep 21 07:15:43.049941: | responder cookie: Sep 21 07:15:43.049943: | 00 00 00 00 00 00 00 00 Sep 21 07:15:43.049945: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.049948: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.049955: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.049958: | flags: none (0x0) Sep 21 07:15:43.049961: | Message ID: 0 (0x0) Sep 21 07:15:43.049963: | length: 68 (0x44) Sep 21 07:15:43.049966: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:43.049970: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:43.049973: | #null state always idle Sep 21 07:15:43.049977: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:43.049980: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:43.049983: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.049985: | length: 40 (0x28) Sep 21 07:15:43.049988: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.049991: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:43.049993: | in statetime_start() with no state Sep 21 07:15:43.050000: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:43.050006: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:43.050009: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.050013: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:43.050016: | find_next_host_connection returns test Sep 21 07:15:43.050018: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.050020: | find_next_host_connection returns empty Sep 21 07:15:43.050037: | creating state object #36 at 0x56077c1e6300 Sep 21 07:15:43.050041: | State DB: adding IKEv1 state #36 in UNDEFINED Sep 21 07:15:43.050045: | pstats #36 ikev1.isakmp started Sep 21 07:15:43.050049: | #36 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:43.050055: | start processing: state #36 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:43.050059: | parent state #36: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:43.050062: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:43.050064: | ICOOKIE-DUMP: 8a f4 11 a9 d4 30 2b e0 Sep 21 07:15:43.050067: "test" #36: responding to Main Mode Sep 21 07:15:43.050072: | **emit ISAKMP Message: Sep 21 07:15:43.050074: | initiator cookie: Sep 21 07:15:43.050077: | 8a f4 11 a9 d4 30 2b e0 Sep 21 07:15:43.050079: | responder cookie: Sep 21 07:15:43.050081: | e8 20 4c 25 ec 6b c1 12 Sep 21 07:15:43.050083: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.050086: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.050088: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.050090: | flags: none (0x0) Sep 21 07:15:43.050093: | Message ID: 0 (0x0) Sep 21 07:15:43.050095: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.050098: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:43.050101: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:43.050103: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:43.050106: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.050109: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:43.050112: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:43.050115: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:43.050118: | ****parse IPsec DOI SIT: Sep 21 07:15:43.050121: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:43.050124: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:43.050126: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.050129: | length: 28 (0x1c) Sep 21 07:15:43.050131: | proposal number: 1 (0x1) Sep 21 07:15:43.050136: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:43.050138: | SPI size: 0 (0x0) Sep 21 07:15:43.050141: | number of transforms: 1 (0x1) Sep 21 07:15:43.050144: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:43.050146: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.050148: | length: 20 (0x14) Sep 21 07:15:43.050151: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:43.050153: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:43.050156: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:43.050159: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:43.050161: | length/value: 3 (0x3) Sep 21 07:15:43.050164: | [3 is OAKLEY_BLOWFISH_CBC(UNUSED)] Sep 21 07:15:43.050168: "test" #36: OAKLEY_BLOWFISH_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:43.050170: "test" #36: no acceptable Oakley Transform Sep 21 07:15:43.050173: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:43.050179: | [RE]START processing: state #36 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:43.050181: | #36 is idle Sep 21 07:15:43.050316: "test" #36: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:43.050321: | **emit ISAKMP Message: Sep 21 07:15:43.050324: | initiator cookie: Sep 21 07:15:43.050326: | 8a f4 11 a9 d4 30 2b e0 Sep 21 07:15:43.050328: | responder cookie: Sep 21 07:15:43.050330: | e8 20 4c 25 ec 6b c1 12 Sep 21 07:15:43.050333: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.050336: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.050338: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:43.050341: | flags: none (0x0) Sep 21 07:15:43.050343: | Message ID: 0 (0x0) Sep 21 07:15:43.050346: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.050349: | ***emit ISAKMP Notification Payload: Sep 21 07:15:43.050351: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.050354: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.050356: | protocol ID: 1 (0x1) Sep 21 07:15:43.050358: | SPI size: 0 (0x0) Sep 21 07:15:43.050361: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:43.050364: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:43.050367: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:43.050370: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:43.050372: | emitting length of ISAKMP Message: 40 Sep 21 07:15:43.050379: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #36) Sep 21 07:15:43.050381: | 8a f4 11 a9 d4 30 2b e0 e8 20 4c 25 ec 6b c1 12 Sep 21 07:15:43.050384: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:43.050386: | 00 00 00 01 01 00 00 0e Sep 21 07:15:43.050422: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:43.050428: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:43.050432: | stop processing: state #36 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:43.050435: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:43.050441: | spent 0.467 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:43.107230: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:43.107259: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:43.107263: | 88 3b 90 07 6a c1 b1 75 00 00 00 00 00 00 00 00 Sep 21 07:15:43.107266: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:15:43.107268: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:15:43.107271: | 00 00 00 18 01 01 00 00 80 01 00 04 80 02 00 1c Sep 21 07:15:43.107278: | 80 03 00 1f 80 04 00 13 Sep 21 07:15:43.107284: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:43.107288: | **parse ISAKMP Message: Sep 21 07:15:43.107291: | initiator cookie: Sep 21 07:15:43.107294: | 88 3b 90 07 6a c1 b1 75 Sep 21 07:15:43.107296: | responder cookie: Sep 21 07:15:43.107299: | 00 00 00 00 00 00 00 00 Sep 21 07:15:43.107302: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.107305: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.107308: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.107311: | flags: none (0x0) Sep 21 07:15:43.107314: | Message ID: 0 (0x0) Sep 21 07:15:43.107316: | length: 72 (0x48) Sep 21 07:15:43.107320: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:43.107324: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:43.107327: | #null state always idle Sep 21 07:15:43.107331: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:43.107334: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:43.107337: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.107340: | length: 44 (0x2c) Sep 21 07:15:43.107342: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.107346: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:43.107349: | in statetime_start() with no state Sep 21 07:15:43.107355: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:43.107362: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:43.107365: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.107370: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:43.107373: | find_next_host_connection returns test Sep 21 07:15:43.107376: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.107378: | find_next_host_connection returns empty Sep 21 07:15:43.107406: | creating state object #37 at 0x56077c1e6dc0 Sep 21 07:15:43.107410: | State DB: adding IKEv1 state #37 in UNDEFINED Sep 21 07:15:43.107415: | pstats #37 ikev1.isakmp started Sep 21 07:15:43.107420: | #37 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:43.107427: | start processing: state #37 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:43.107431: | parent state #37: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:43.107435: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:43.107438: | ICOOKIE-DUMP: 88 3b 90 07 6a c1 b1 75 Sep 21 07:15:43.107442: "test" #37: responding to Main Mode Sep 21 07:15:43.107447: | **emit ISAKMP Message: Sep 21 07:15:43.107450: | initiator cookie: Sep 21 07:15:43.107452: | 88 3b 90 07 6a c1 b1 75 Sep 21 07:15:43.107455: | responder cookie: Sep 21 07:15:43.107457: | b1 ea 54 66 1a b8 8e 44 Sep 21 07:15:43.107460: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.107463: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.107466: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.107469: | flags: none (0x0) Sep 21 07:15:43.107471: | Message ID: 0 (0x0) Sep 21 07:15:43.107475: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.107478: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:43.107482: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:43.107485: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:43.107487: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.107491: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:43.107495: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:43.107501: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:43.107504: | ****parse IPsec DOI SIT: Sep 21 07:15:43.107507: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:43.107510: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:43.107513: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.107516: | length: 32 (0x20) Sep 21 07:15:43.107519: | proposal number: 1 (0x1) Sep 21 07:15:43.107522: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:43.107524: | SPI size: 0 (0x0) Sep 21 07:15:43.107527: | number of transforms: 1 (0x1) Sep 21 07:15:43.107530: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:43.107533: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.107535: | length: 24 (0x18) Sep 21 07:15:43.107538: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:43.107541: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:43.107544: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:43.107547: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:43.107550: | length/value: 4 (0x4) Sep 21 07:15:43.107553: | [4 is OAKLEY_RC5_R16_B64_CBC(UNUSED)] Sep 21 07:15:43.107557: "test" #37: OAKLEY_RC5_R16_B64_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:43.107560: "test" #37: no acceptable Oakley Transform Sep 21 07:15:43.107563: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:43.107569: | [RE]START processing: state #37 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:43.107572: | #37 is idle Sep 21 07:15:43.107647: "test" #37: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:43.107652: | **emit ISAKMP Message: Sep 21 07:15:43.107655: | initiator cookie: Sep 21 07:15:43.107657: | 88 3b 90 07 6a c1 b1 75 Sep 21 07:15:43.107660: | responder cookie: Sep 21 07:15:43.107662: | b1 ea 54 66 1a b8 8e 44 Sep 21 07:15:43.107665: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.107668: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.107671: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:43.107673: | flags: none (0x0) Sep 21 07:15:43.107676: | Message ID: 0 (0x0) Sep 21 07:15:43.107679: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.107682: | ***emit ISAKMP Notification Payload: Sep 21 07:15:43.107685: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.107688: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.107691: | protocol ID: 1 (0x1) Sep 21 07:15:43.107693: | SPI size: 0 (0x0) Sep 21 07:15:43.107696: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:43.107700: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:43.107704: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:43.107708: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:43.107710: | emitting length of ISAKMP Message: 40 Sep 21 07:15:43.107718: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #37) Sep 21 07:15:43.107721: | 88 3b 90 07 6a c1 b1 75 b1 ea 54 66 1a b8 8e 44 Sep 21 07:15:43.107724: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:43.107726: | 00 00 00 01 01 00 00 0e Sep 21 07:15:43.107751: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:43.107757: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:43.107763: | stop processing: state #37 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:43.107767: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:43.107775: | spent 0.509 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:43.201389: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:43.201420: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:43.201424: | 59 0e ca a6 a0 2b d3 54 00 00 00 00 00 00 00 00 Sep 21 07:15:43.201427: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:43.201429: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:43.201432: | 00 00 00 14 01 01 00 00 80 02 00 1c 80 03 00 1f Sep 21 07:15:43.201434: | 80 04 00 13 Sep 21 07:15:43.201439: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:43.201444: | **parse ISAKMP Message: Sep 21 07:15:43.201447: | initiator cookie: Sep 21 07:15:43.201449: | 59 0e ca a6 a0 2b d3 54 Sep 21 07:15:43.201451: | responder cookie: Sep 21 07:15:43.201454: | 00 00 00 00 00 00 00 00 Sep 21 07:15:43.201457: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.201459: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.201462: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.201465: | flags: none (0x0) Sep 21 07:15:43.201467: | Message ID: 0 (0x0) Sep 21 07:15:43.201470: | length: 68 (0x44) Sep 21 07:15:43.201473: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:43.201477: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:43.201480: | #null state always idle Sep 21 07:15:43.201484: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:43.201487: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:43.201490: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.201492: | length: 40 (0x28) Sep 21 07:15:43.201495: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.201498: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:43.201501: | in statetime_start() with no state Sep 21 07:15:43.201507: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:43.201512: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:43.201515: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.201519: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:43.201522: | find_next_host_connection returns test Sep 21 07:15:43.201525: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.201527: | find_next_host_connection returns empty Sep 21 07:15:43.201556: | creating state object #38 at 0x56077c1e7880 Sep 21 07:15:43.201560: | State DB: adding IKEv1 state #38 in UNDEFINED Sep 21 07:15:43.201565: | pstats #38 ikev1.isakmp started Sep 21 07:15:43.201570: | #38 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:43.201577: | start processing: state #38 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:43.201580: | parent state #38: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:43.201584: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:43.201587: | ICOOKIE-DUMP: 59 0e ca a6 a0 2b d3 54 Sep 21 07:15:43.201590: "test" #38: responding to Main Mode Sep 21 07:15:43.201595: | **emit ISAKMP Message: Sep 21 07:15:43.201598: | initiator cookie: Sep 21 07:15:43.201600: | 59 0e ca a6 a0 2b d3 54 Sep 21 07:15:43.201603: | responder cookie: Sep 21 07:15:43.201605: | d4 03 3a 86 19 c0 8f f4 Sep 21 07:15:43.201608: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.201610: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.201613: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.201616: | flags: none (0x0) Sep 21 07:15:43.201618: | Message ID: 0 (0x0) Sep 21 07:15:43.201621: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.201629: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:43.201632: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:43.201635: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:43.201637: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.201641: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:43.201644: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:43.201647: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:43.201650: | ****parse IPsec DOI SIT: Sep 21 07:15:43.201653: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:43.201656: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:43.201659: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.201662: | length: 28 (0x1c) Sep 21 07:15:43.201664: | proposal number: 1 (0x1) Sep 21 07:15:43.201667: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:43.201669: | SPI size: 0 (0x0) Sep 21 07:15:43.201672: | number of transforms: 1 (0x1) Sep 21 07:15:43.201675: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:43.201677: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.201680: | length: 20 (0x14) Sep 21 07:15:43.201682: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:43.201684: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:43.201687: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:43.201690: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:15:43.201693: | length/value: 28 (0x1c) Sep 21 07:15:43.201697: "test" #38: 28?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:15:43.201699: "test" #38: no acceptable Oakley Transform Sep 21 07:15:43.201702: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:43.201707: | [RE]START processing: state #38 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:43.201710: | #38 is idle Sep 21 07:15:43.201773: "test" #38: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:43.201779: | **emit ISAKMP Message: Sep 21 07:15:43.201781: | initiator cookie: Sep 21 07:15:43.201792: | 59 0e ca a6 a0 2b d3 54 Sep 21 07:15:43.201795: | responder cookie: Sep 21 07:15:43.201797: | d4 03 3a 86 19 c0 8f f4 Sep 21 07:15:43.201799: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.201802: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.201804: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:43.201807: | flags: none (0x0) Sep 21 07:15:43.201809: | Message ID: 0 (0x0) Sep 21 07:15:43.201812: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.201815: | ***emit ISAKMP Notification Payload: Sep 21 07:15:43.201817: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.201820: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.201822: | protocol ID: 1 (0x1) Sep 21 07:15:43.201824: | SPI size: 0 (0x0) Sep 21 07:15:43.201827: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:43.201830: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:43.201832: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:43.201835: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:43.201837: | emitting length of ISAKMP Message: 40 Sep 21 07:15:43.201843: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #38) Sep 21 07:15:43.201846: | 59 0e ca a6 a0 2b d3 54 d4 03 3a 86 19 c0 8f f4 Sep 21 07:15:43.201849: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:43.201853: | 00 00 00 01 01 00 00 0e Sep 21 07:15:43.201877: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:43.201882: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:43.201887: | stop processing: state #38 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:43.201890: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:43.201896: | spent 0.475 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:43.260416: | spent 0.00357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:43.260447: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:43.260451: | 91 72 04 f3 86 4f 16 f1 00 00 00 00 00 00 00 00 Sep 21 07:15:43.260454: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:43.260456: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:43.260458: | 00 00 00 14 01 01 00 00 80 01 00 04 80 03 00 1f Sep 21 07:15:43.260460: | 80 04 00 13 Sep 21 07:15:43.260465: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:43.260470: | **parse ISAKMP Message: Sep 21 07:15:43.260472: | initiator cookie: Sep 21 07:15:43.260474: | 91 72 04 f3 86 4f 16 f1 Sep 21 07:15:43.260477: | responder cookie: Sep 21 07:15:43.260479: | 00 00 00 00 00 00 00 00 Sep 21 07:15:43.260481: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.260484: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.260487: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.260489: | flags: none (0x0) Sep 21 07:15:43.260492: | Message ID: 0 (0x0) Sep 21 07:15:43.260494: | length: 68 (0x44) Sep 21 07:15:43.260497: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:43.260502: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:43.260504: | #null state always idle Sep 21 07:15:43.260508: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:43.260511: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:43.260513: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.260515: | length: 40 (0x28) Sep 21 07:15:43.260518: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.260521: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:43.260523: | in statetime_start() with no state Sep 21 07:15:43.260529: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:43.260534: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:43.260538: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.260541: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:43.260544: | find_next_host_connection returns test Sep 21 07:15:43.260547: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.260549: | find_next_host_connection returns empty Sep 21 07:15:43.260574: | creating state object #39 at 0x56077c1e8340 Sep 21 07:15:43.260578: | State DB: adding IKEv1 state #39 in UNDEFINED Sep 21 07:15:43.260583: | pstats #39 ikev1.isakmp started Sep 21 07:15:43.260588: | #39 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:43.260595: | start processing: state #39 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:43.260599: | parent state #39: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:43.260602: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:43.260605: | ICOOKIE-DUMP: 91 72 04 f3 86 4f 16 f1 Sep 21 07:15:43.260608: "test" #39: responding to Main Mode Sep 21 07:15:43.260613: | **emit ISAKMP Message: Sep 21 07:15:43.260616: | initiator cookie: Sep 21 07:15:43.260618: | 91 72 04 f3 86 4f 16 f1 Sep 21 07:15:43.260625: | responder cookie: Sep 21 07:15:43.260627: | 48 01 31 dd b2 15 44 d3 Sep 21 07:15:43.260630: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.260633: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.260636: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.260638: | flags: none (0x0) Sep 21 07:15:43.260641: | Message ID: 0 (0x0) Sep 21 07:15:43.260644: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.260646: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:43.260650: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:43.260653: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:43.260655: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.260658: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:43.260662: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:43.260665: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:43.260668: | ****parse IPsec DOI SIT: Sep 21 07:15:43.260671: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:43.260674: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:43.260677: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.260679: | length: 28 (0x1c) Sep 21 07:15:43.260681: | proposal number: 1 (0x1) Sep 21 07:15:43.260684: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:43.260686: | SPI size: 0 (0x0) Sep 21 07:15:43.260689: | number of transforms: 1 (0x1) Sep 21 07:15:43.260691: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:43.260694: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.260696: | length: 20 (0x14) Sep 21 07:15:43.260699: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:43.260702: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:43.260704: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:43.260707: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:43.260710: | length/value: 4 (0x4) Sep 21 07:15:43.260713: | [4 is OAKLEY_RC5_R16_B64_CBC(UNUSED)] Sep 21 07:15:43.260717: "test" #39: OAKLEY_RC5_R16_B64_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:43.260720: "test" #39: no acceptable Oakley Transform Sep 21 07:15:43.260723: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:43.260728: | [RE]START processing: state #39 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:43.260731: | #39 is idle Sep 21 07:15:43.261066: "test" #39: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:43.261075: | **emit ISAKMP Message: Sep 21 07:15:43.261078: | initiator cookie: Sep 21 07:15:43.261080: | 91 72 04 f3 86 4f 16 f1 Sep 21 07:15:43.261082: | responder cookie: Sep 21 07:15:43.261085: | 48 01 31 dd b2 15 44 d3 Sep 21 07:15:43.261087: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.261090: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.261093: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:43.261095: | flags: none (0x0) Sep 21 07:15:43.261097: | Message ID: 0 (0x0) Sep 21 07:15:43.261100: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.261103: | ***emit ISAKMP Notification Payload: Sep 21 07:15:43.261106: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.261108: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.261110: | protocol ID: 1 (0x1) Sep 21 07:15:43.261113: | SPI size: 0 (0x0) Sep 21 07:15:43.261115: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:43.261119: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:43.261124: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:43.261127: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:43.261130: | emitting length of ISAKMP Message: 40 Sep 21 07:15:43.261137: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #39) Sep 21 07:15:43.261139: | 91 72 04 f3 86 4f 16 f1 48 01 31 dd b2 15 44 d3 Sep 21 07:15:43.261142: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:43.261144: | 00 00 00 01 01 00 00 0e Sep 21 07:15:43.261172: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:43.261178: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:43.261184: | stop processing: state #39 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:43.261187: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:43.261192: | spent 0.491 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:43.343586: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:43.343613: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:43.343617: | 99 9e 10 e5 c3 47 e7 51 00 00 00 00 00 00 00 00 Sep 21 07:15:43.343620: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:43.343622: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:43.343624: | 00 00 00 14 01 01 00 00 80 01 00 04 80 02 00 1c Sep 21 07:15:43.343626: | 80 04 00 13 Sep 21 07:15:43.343632: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:43.343636: | **parse ISAKMP Message: Sep 21 07:15:43.343639: | initiator cookie: Sep 21 07:15:43.343641: | 99 9e 10 e5 c3 47 e7 51 Sep 21 07:15:43.343643: | responder cookie: Sep 21 07:15:43.343645: | 00 00 00 00 00 00 00 00 Sep 21 07:15:43.343648: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.343651: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.343654: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.343657: | flags: none (0x0) Sep 21 07:15:43.343659: | Message ID: 0 (0x0) Sep 21 07:15:43.343662: | length: 68 (0x44) Sep 21 07:15:43.343664: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:43.343668: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:43.343671: | #null state always idle Sep 21 07:15:43.343675: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:43.343678: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:43.343681: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.343683: | length: 40 (0x28) Sep 21 07:15:43.343686: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.343688: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:43.343691: | in statetime_start() with no state Sep 21 07:15:43.343697: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:43.343702: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:43.343705: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.343710: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:43.343712: | find_next_host_connection returns test Sep 21 07:15:43.343715: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.343717: | find_next_host_connection returns empty Sep 21 07:15:43.343742: | creating state object #40 at 0x56077c1e8e00 Sep 21 07:15:43.343745: | State DB: adding IKEv1 state #40 in UNDEFINED Sep 21 07:15:43.343750: | pstats #40 ikev1.isakmp started Sep 21 07:15:43.343755: | #40 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:43.343764: | start processing: state #40 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:43.343769: | parent state #40: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:43.343772: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:43.343775: | ICOOKIE-DUMP: 99 9e 10 e5 c3 47 e7 51 Sep 21 07:15:43.343777: "test" #40: responding to Main Mode Sep 21 07:15:43.343782: | **emit ISAKMP Message: Sep 21 07:15:43.343792: | initiator cookie: Sep 21 07:15:43.343795: | 99 9e 10 e5 c3 47 e7 51 Sep 21 07:15:43.343797: | responder cookie: Sep 21 07:15:43.343799: | 41 18 8f 32 ba 8e dc 6b Sep 21 07:15:43.343802: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.343804: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.343806: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.343809: | flags: none (0x0) Sep 21 07:15:43.343811: | Message ID: 0 (0x0) Sep 21 07:15:43.343814: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.343816: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:43.343819: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:43.343822: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:43.343824: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.343827: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:43.343830: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:43.343833: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:43.343836: | ****parse IPsec DOI SIT: Sep 21 07:15:43.343838: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:43.343841: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:43.343843: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.343846: | length: 28 (0x1c) Sep 21 07:15:43.343848: | proposal number: 1 (0x1) Sep 21 07:15:43.343850: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:43.343852: | SPI size: 0 (0x0) Sep 21 07:15:43.343854: | number of transforms: 1 (0x1) Sep 21 07:15:43.343857: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:43.343859: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.343861: | length: 20 (0x14) Sep 21 07:15:43.343863: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:43.343866: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:43.343868: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:43.343871: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:43.343874: | length/value: 4 (0x4) Sep 21 07:15:43.343876: | [4 is OAKLEY_RC5_R16_B64_CBC(UNUSED)] Sep 21 07:15:43.343880: "test" #40: OAKLEY_RC5_R16_B64_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:43.343882: "test" #40: no acceptable Oakley Transform Sep 21 07:15:43.343885: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:43.343890: | [RE]START processing: state #40 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:43.343893: | #40 is idle Sep 21 07:15:43.343969: "test" #40: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:43.343974: | **emit ISAKMP Message: Sep 21 07:15:43.343977: | initiator cookie: Sep 21 07:15:43.343980: | 99 9e 10 e5 c3 47 e7 51 Sep 21 07:15:43.343982: | responder cookie: Sep 21 07:15:43.343985: | 41 18 8f 32 ba 8e dc 6b Sep 21 07:15:43.343987: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.343990: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.343992: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:43.343995: | flags: none (0x0) Sep 21 07:15:43.343997: | Message ID: 0 (0x0) Sep 21 07:15:43.344003: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.344006: | ***emit ISAKMP Notification Payload: Sep 21 07:15:43.344009: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.344012: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.344014: | protocol ID: 1 (0x1) Sep 21 07:15:43.344016: | SPI size: 0 (0x0) Sep 21 07:15:43.344019: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:43.344022: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:43.344025: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:43.344028: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:43.344031: | emitting length of ISAKMP Message: 40 Sep 21 07:15:43.344038: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #40) Sep 21 07:15:43.344041: | 99 9e 10 e5 c3 47 e7 51 41 18 8f 32 ba 8e dc 6b Sep 21 07:15:43.344044: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:43.344046: | 00 00 00 01 01 00 00 0e Sep 21 07:15:43.344077: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:43.344084: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:43.344089: | stop processing: state #40 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:43.344093: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:43.344100: | spent 0.471 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:43.397516: | spent 0.00324 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:43.397542: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:43.397545: | 0f 3a 34 d5 47 d9 a0 4a 00 00 00 00 00 00 00 00 Sep 21 07:15:43.397548: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:43.397550: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:43.397552: | 00 00 00 14 01 01 00 00 80 01 00 04 80 02 00 1c Sep 21 07:15:43.397555: | 80 03 00 1f Sep 21 07:15:43.397559: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:43.397563: | **parse ISAKMP Message: Sep 21 07:15:43.397566: | initiator cookie: Sep 21 07:15:43.397568: | 0f 3a 34 d5 47 d9 a0 4a Sep 21 07:15:43.397570: | responder cookie: Sep 21 07:15:43.397573: | 00 00 00 00 00 00 00 00 Sep 21 07:15:43.397575: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.397578: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.397581: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.397583: | flags: none (0x0) Sep 21 07:15:43.397586: | Message ID: 0 (0x0) Sep 21 07:15:43.397588: | length: 68 (0x44) Sep 21 07:15:43.397591: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:43.397595: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:43.397598: | #null state always idle Sep 21 07:15:43.397601: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:43.397604: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:43.397606: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.397609: | length: 40 (0x28) Sep 21 07:15:43.397611: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.397614: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:43.397617: | in statetime_start() with no state Sep 21 07:15:43.397622: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:43.397627: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:43.397631: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.397634: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:43.397641: | find_next_host_connection returns test Sep 21 07:15:43.397644: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.397646: | find_next_host_connection returns empty Sep 21 07:15:43.397672: | creating state object #41 at 0x56077c1e98c0 Sep 21 07:15:43.397675: | State DB: adding IKEv1 state #41 in UNDEFINED Sep 21 07:15:43.397679: | pstats #41 ikev1.isakmp started Sep 21 07:15:43.397684: | #41 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:43.397690: | start processing: state #41 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:43.397694: | parent state #41: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:43.397697: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:43.397700: | ICOOKIE-DUMP: 0f 3a 34 d5 47 d9 a0 4a Sep 21 07:15:43.397703: "test" #41: responding to Main Mode Sep 21 07:15:43.397708: | **emit ISAKMP Message: Sep 21 07:15:43.397710: | initiator cookie: Sep 21 07:15:43.397713: | 0f 3a 34 d5 47 d9 a0 4a Sep 21 07:15:43.397715: | responder cookie: Sep 21 07:15:43.397717: | a6 51 0b 64 34 6f f7 20 Sep 21 07:15:43.397720: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.397722: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.397725: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.397727: | flags: none (0x0) Sep 21 07:15:43.397729: | Message ID: 0 (0x0) Sep 21 07:15:43.397732: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.397735: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:43.397738: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:43.397740: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:43.397743: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.397746: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:43.397749: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:43.397752: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:43.397755: | ****parse IPsec DOI SIT: Sep 21 07:15:43.397758: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:43.397760: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:43.397763: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.397765: | length: 28 (0x1c) Sep 21 07:15:43.397768: | proposal number: 1 (0x1) Sep 21 07:15:43.397770: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:43.397773: | SPI size: 0 (0x0) Sep 21 07:15:43.397775: | number of transforms: 1 (0x1) Sep 21 07:15:43.397778: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:43.397780: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.397806: | length: 20 (0x14) Sep 21 07:15:43.397812: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:43.397815: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:43.397817: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:43.397820: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:43.397823: | length/value: 4 (0x4) Sep 21 07:15:43.397825: | [4 is OAKLEY_RC5_R16_B64_CBC(UNUSED)] Sep 21 07:15:43.397829: "test" #41: OAKLEY_RC5_R16_B64_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:43.397832: "test" #41: no acceptable Oakley Transform Sep 21 07:15:43.397835: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:43.397840: | [RE]START processing: state #41 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:43.397842: | #41 is idle Sep 21 07:15:43.397915: "test" #41: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:43.397921: | **emit ISAKMP Message: Sep 21 07:15:43.397924: | initiator cookie: Sep 21 07:15:43.397926: | 0f 3a 34 d5 47 d9 a0 4a Sep 21 07:15:43.397929: | responder cookie: Sep 21 07:15:43.397931: | a6 51 0b 64 34 6f f7 20 Sep 21 07:15:43.397933: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.397935: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.397937: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:43.397939: | flags: none (0x0) Sep 21 07:15:43.397942: | Message ID: 0 (0x0) Sep 21 07:15:43.397944: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.397947: | ***emit ISAKMP Notification Payload: Sep 21 07:15:43.397949: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.397952: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.397954: | protocol ID: 1 (0x1) Sep 21 07:15:43.397957: | SPI size: 0 (0x0) Sep 21 07:15:43.397959: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:43.397962: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:43.397965: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:43.397968: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:43.397970: | emitting length of ISAKMP Message: 40 Sep 21 07:15:43.397977: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #41) Sep 21 07:15:43.397979: | 0f 3a 34 d5 47 d9 a0 4a a6 51 0b 64 34 6f f7 20 Sep 21 07:15:43.397982: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:43.397984: | 00 00 00 01 01 00 00 0e Sep 21 07:15:43.398010: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:43.398016: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:43.398021: | stop processing: state #41 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:43.398025: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:43.398030: | spent 0.457 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:43.466660: | spent 0.00338 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:43.466682: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:43.466685: | c6 7b 95 8a 9b e7 08 f1 00 00 00 00 00 00 00 00 Sep 21 07:15:43.466688: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:15:43.466690: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:15:43.466692: | 00 00 00 18 01 01 00 00 80 01 00 03 80 02 00 10 Sep 21 07:15:43.466695: | 80 03 00 0d 80 04 00 07 Sep 21 07:15:43.466700: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:43.466707: | **parse ISAKMP Message: Sep 21 07:15:43.466710: | initiator cookie: Sep 21 07:15:43.466713: | c6 7b 95 8a 9b e7 08 f1 Sep 21 07:15:43.466715: | responder cookie: Sep 21 07:15:43.466717: | 00 00 00 00 00 00 00 00 Sep 21 07:15:43.466720: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.466723: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.466726: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.466728: | flags: none (0x0) Sep 21 07:15:43.466731: | Message ID: 0 (0x0) Sep 21 07:15:43.466733: | length: 72 (0x48) Sep 21 07:15:43.466736: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:43.466740: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:43.466742: | #null state always idle Sep 21 07:15:43.466746: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:43.466749: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:43.466752: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.466757: | length: 44 (0x2c) Sep 21 07:15:43.466759: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.466762: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:43.466765: | in statetime_start() with no state Sep 21 07:15:43.466770: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:43.466776: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:43.466779: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.468047: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:43.468061: | find_next_host_connection returns test Sep 21 07:15:43.468065: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.468068: | find_next_host_connection returns empty Sep 21 07:15:43.468093: | creating state object #42 at 0x56077c1ea380 Sep 21 07:15:43.468098: | State DB: adding IKEv1 state #42 in UNDEFINED Sep 21 07:15:43.468102: | pstats #42 ikev1.isakmp started Sep 21 07:15:43.468109: | #42 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:43.468116: | start processing: state #42 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:43.468120: | parent state #42: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:43.468124: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:43.468127: | ICOOKIE-DUMP: c6 7b 95 8a 9b e7 08 f1 Sep 21 07:15:43.468130: "test" #42: responding to Main Mode Sep 21 07:15:43.468136: | **emit ISAKMP Message: Sep 21 07:15:43.468139: | initiator cookie: Sep 21 07:15:43.468142: | c6 7b 95 8a 9b e7 08 f1 Sep 21 07:15:43.468145: | responder cookie: Sep 21 07:15:43.468147: | 19 bd 7d c9 b8 42 63 f4 Sep 21 07:15:43.468151: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.468154: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.468157: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.468160: | flags: none (0x0) Sep 21 07:15:43.468163: | Message ID: 0 (0x0) Sep 21 07:15:43.468166: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.468169: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:43.468173: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:43.468176: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:43.468179: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.468183: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:43.468186: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:43.468189: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:43.468193: | ****parse IPsec DOI SIT: Sep 21 07:15:43.468197: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:43.468200: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:43.468203: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.468206: | length: 32 (0x20) Sep 21 07:15:43.468209: | proposal number: 1 (0x1) Sep 21 07:15:43.468212: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:43.468215: | SPI size: 0 (0x0) Sep 21 07:15:43.468217: | number of transforms: 1 (0x1) Sep 21 07:15:43.468221: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:43.468223: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.468226: | length: 24 (0x18) Sep 21 07:15:43.468229: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:43.468231: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:43.468234: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:43.468237: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:43.468240: | length/value: 3 (0x3) Sep 21 07:15:43.468246: | [3 is OAKLEY_BLOWFISH_CBC(UNUSED)] Sep 21 07:15:43.468251: "test" #42: OAKLEY_BLOWFISH_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:43.468254: "test" #42: no acceptable Oakley Transform Sep 21 07:15:43.468258: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:43.468264: | [RE]START processing: state #42 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:43.468267: | #42 is idle Sep 21 07:15:43.468838: "test" #42: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:43.468849: | **emit ISAKMP Message: Sep 21 07:15:43.468853: | initiator cookie: Sep 21 07:15:43.468856: | c6 7b 95 8a 9b e7 08 f1 Sep 21 07:15:43.468858: | responder cookie: Sep 21 07:15:43.468861: | 19 bd 7d c9 b8 42 63 f4 Sep 21 07:15:43.468864: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.468867: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.468870: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:43.468873: | flags: none (0x0) Sep 21 07:15:43.468876: | Message ID: 0 (0x0) Sep 21 07:15:43.468880: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.468883: | ***emit ISAKMP Notification Payload: Sep 21 07:15:43.468886: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.468889: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.468891: | protocol ID: 1 (0x1) Sep 21 07:15:43.468894: | SPI size: 0 (0x0) Sep 21 07:15:43.468897: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:43.468901: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:43.468904: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:43.468907: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:43.468910: | emitting length of ISAKMP Message: 40 Sep 21 07:15:43.468916: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #42) Sep 21 07:15:43.468919: | c6 7b 95 8a 9b e7 08 f1 19 bd 7d c9 b8 42 63 f4 Sep 21 07:15:43.468921: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:43.468923: | 00 00 00 01 01 00 00 0e Sep 21 07:15:43.468969: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:43.468976: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:43.468982: | stop processing: state #42 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:43.468985: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:43.468991: | spent 0.603 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:43.725231: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:43.725258: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:43.725262: | 10 d6 bd ef 3f 10 29 a6 00 00 00 00 00 00 00 00 Sep 21 07:15:43.725265: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:43.725267: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:43.725269: | 00 00 00 14 01 01 00 00 80 02 00 10 80 03 00 0d Sep 21 07:15:43.725271: | 80 04 00 07 Sep 21 07:15:43.725276: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:43.725280: | **parse ISAKMP Message: Sep 21 07:15:43.725282: | initiator cookie: Sep 21 07:15:43.725285: | 10 d6 bd ef 3f 10 29 a6 Sep 21 07:15:43.725287: | responder cookie: Sep 21 07:15:43.725289: | 00 00 00 00 00 00 00 00 Sep 21 07:15:43.725292: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.725294: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.725297: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.725299: | flags: none (0x0) Sep 21 07:15:43.725306: | Message ID: 0 (0x0) Sep 21 07:15:43.725308: | length: 68 (0x44) Sep 21 07:15:43.725311: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:43.725315: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:43.725317: | #null state always idle Sep 21 07:15:43.725321: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:43.725323: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:43.725326: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.725328: | length: 40 (0x28) Sep 21 07:15:43.725330: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.725333: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:43.725335: | in statetime_start() with no state Sep 21 07:15:43.725340: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:43.725346: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:43.725349: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.725353: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:43.725355: | find_next_host_connection returns test Sep 21 07:15:43.725358: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.725360: | find_next_host_connection returns empty Sep 21 07:15:43.725384: | creating state object #43 at 0x56077c1eae40 Sep 21 07:15:43.725387: | State DB: adding IKEv1 state #43 in UNDEFINED Sep 21 07:15:43.725392: | pstats #43 ikev1.isakmp started Sep 21 07:15:43.725396: | #43 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:43.725402: | start processing: state #43 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:43.725405: | parent state #43: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:43.725408: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:43.725411: | ICOOKIE-DUMP: 10 d6 bd ef 3f 10 29 a6 Sep 21 07:15:43.725413: "test" #43: responding to Main Mode Sep 21 07:15:43.725418: | **emit ISAKMP Message: Sep 21 07:15:43.725421: | initiator cookie: Sep 21 07:15:43.725423: | 10 d6 bd ef 3f 10 29 a6 Sep 21 07:15:43.725425: | responder cookie: Sep 21 07:15:43.725427: | 1b b1 63 a8 f4 ce 33 04 Sep 21 07:15:43.725429: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.725431: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.725434: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.725436: | flags: none (0x0) Sep 21 07:15:43.725438: | Message ID: 0 (0x0) Sep 21 07:15:43.725441: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.725444: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:43.725446: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:43.725449: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:43.725451: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.725454: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:43.725457: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:43.725459: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:43.725462: | ****parse IPsec DOI SIT: Sep 21 07:15:43.725465: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:43.725467: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:43.725470: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.725472: | length: 28 (0x1c) Sep 21 07:15:43.725474: | proposal number: 1 (0x1) Sep 21 07:15:43.725477: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:43.725479: | SPI size: 0 (0x0) Sep 21 07:15:43.725483: | number of transforms: 1 (0x1) Sep 21 07:15:43.725486: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:43.725488: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.725490: | length: 20 (0x14) Sep 21 07:15:43.725492: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:43.725495: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:43.725497: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:43.725500: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:15:43.725502: | length/value: 16 (0x10) Sep 21 07:15:43.725506: "test" #43: 16?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:15:43.725509: "test" #43: no acceptable Oakley Transform Sep 21 07:15:43.725512: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:43.725516: | [RE]START processing: state #43 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:43.725519: | #43 is idle Sep 21 07:15:43.725600: "test" #43: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:43.725604: | **emit ISAKMP Message: Sep 21 07:15:43.725607: | initiator cookie: Sep 21 07:15:43.725609: | 10 d6 bd ef 3f 10 29 a6 Sep 21 07:15:43.725611: | responder cookie: Sep 21 07:15:43.725613: | 1b b1 63 a8 f4 ce 33 04 Sep 21 07:15:43.725615: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.725618: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.725620: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:43.725623: | flags: none (0x0) Sep 21 07:15:43.725625: | Message ID: 0 (0x0) Sep 21 07:15:43.725627: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.725630: | ***emit ISAKMP Notification Payload: Sep 21 07:15:43.725632: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.725634: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.725637: | protocol ID: 1 (0x1) Sep 21 07:15:43.725639: | SPI size: 0 (0x0) Sep 21 07:15:43.725641: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:43.725644: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:43.725647: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:43.725649: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:43.725651: | emitting length of ISAKMP Message: 40 Sep 21 07:15:43.725657: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #43) Sep 21 07:15:43.725660: | 10 d6 bd ef 3f 10 29 a6 1b b1 63 a8 f4 ce 33 04 Sep 21 07:15:43.725662: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:43.725664: | 00 00 00 01 01 00 00 0e Sep 21 07:15:43.725686: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:43.725691: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:43.725695: | stop processing: state #43 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:43.725698: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:43.725703: | spent 0.44 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:43.799655: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:43.799681: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:43.799685: | fb 72 3a c6 e3 75 f1 a5 00 00 00 00 00 00 00 00 Sep 21 07:15:43.799687: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:43.799690: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:43.799692: | 00 00 00 14 01 01 00 00 80 01 00 03 80 03 00 0d Sep 21 07:15:43.799694: | 80 04 00 07 Sep 21 07:15:43.799699: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:43.799703: | **parse ISAKMP Message: Sep 21 07:15:43.799708: | initiator cookie: Sep 21 07:15:43.799711: | fb 72 3a c6 e3 75 f1 a5 Sep 21 07:15:43.799713: | responder cookie: Sep 21 07:15:43.799715: | 00 00 00 00 00 00 00 00 Sep 21 07:15:43.799718: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.799721: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.799724: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.799726: | flags: none (0x0) Sep 21 07:15:43.799729: | Message ID: 0 (0x0) Sep 21 07:15:43.799731: | length: 68 (0x44) Sep 21 07:15:43.799734: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:43.799738: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:43.799741: | #null state always idle Sep 21 07:15:43.799744: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:43.799747: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:43.799750: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.799752: | length: 40 (0x28) Sep 21 07:15:43.799754: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.799757: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:43.799760: | in statetime_start() with no state Sep 21 07:15:43.799765: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:43.799771: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:43.799774: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.799778: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:43.799780: | find_next_host_connection returns test Sep 21 07:15:43.799788: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.799793: | find_next_host_connection returns empty Sep 21 07:15:43.799817: | creating state object #44 at 0x56077c1eb900 Sep 21 07:15:43.799820: | State DB: adding IKEv1 state #44 in UNDEFINED Sep 21 07:15:43.799825: | pstats #44 ikev1.isakmp started Sep 21 07:15:43.799829: | #44 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:43.799835: | start processing: state #44 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:43.799839: | parent state #44: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:43.799842: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:43.799845: | ICOOKIE-DUMP: fb 72 3a c6 e3 75 f1 a5 Sep 21 07:15:43.799848: "test" #44: responding to Main Mode Sep 21 07:15:43.799852: | **emit ISAKMP Message: Sep 21 07:15:43.799855: | initiator cookie: Sep 21 07:15:43.799857: | fb 72 3a c6 e3 75 f1 a5 Sep 21 07:15:43.799859: | responder cookie: Sep 21 07:15:43.799861: | 43 04 98 57 2b a1 07 29 Sep 21 07:15:43.799864: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.799867: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.799869: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.799871: | flags: none (0x0) Sep 21 07:15:43.799874: | Message ID: 0 (0x0) Sep 21 07:15:43.799876: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.799879: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:43.799882: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:43.799885: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:43.799887: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.799890: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:43.799893: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:43.799896: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:43.799901: | ****parse IPsec DOI SIT: Sep 21 07:15:43.799903: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:43.799906: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:43.799909: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.799911: | length: 28 (0x1c) Sep 21 07:15:43.799913: | proposal number: 1 (0x1) Sep 21 07:15:43.799916: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:43.799918: | SPI size: 0 (0x0) Sep 21 07:15:43.799921: | number of transforms: 1 (0x1) Sep 21 07:15:43.799924: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:43.799926: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.799928: | length: 20 (0x14) Sep 21 07:15:43.799931: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:43.799933: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:43.799936: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:43.799939: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:43.799941: | length/value: 3 (0x3) Sep 21 07:15:43.799944: | [3 is OAKLEY_BLOWFISH_CBC(UNUSED)] Sep 21 07:15:43.799948: "test" #44: OAKLEY_BLOWFISH_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:43.799951: "test" #44: no acceptable Oakley Transform Sep 21 07:15:43.799954: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:43.799959: | [RE]START processing: state #44 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:43.799961: | #44 is idle Sep 21 07:15:43.800032: "test" #44: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:43.800036: | **emit ISAKMP Message: Sep 21 07:15:43.800039: | initiator cookie: Sep 21 07:15:43.800041: | fb 72 3a c6 e3 75 f1 a5 Sep 21 07:15:43.800043: | responder cookie: Sep 21 07:15:43.800045: | 43 04 98 57 2b a1 07 29 Sep 21 07:15:43.800048: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.800050: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.800053: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:43.800055: | flags: none (0x0) Sep 21 07:15:43.800057: | Message ID: 0 (0x0) Sep 21 07:15:43.800060: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.800063: | ***emit ISAKMP Notification Payload: Sep 21 07:15:43.800065: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.800067: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.800070: | protocol ID: 1 (0x1) Sep 21 07:15:43.800072: | SPI size: 0 (0x0) Sep 21 07:15:43.800074: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:43.800077: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:43.800080: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:43.800083: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:43.800085: | emitting length of ISAKMP Message: 40 Sep 21 07:15:43.800092: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #44) Sep 21 07:15:43.800094: | fb 72 3a c6 e3 75 f1 a5 43 04 98 57 2b a1 07 29 Sep 21 07:15:43.800097: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:43.800099: | 00 00 00 01 01 00 00 0e Sep 21 07:15:43.800122: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:43.800128: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:43.800133: | stop processing: state #44 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:43.800136: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:43.800142: | spent 0.454 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:43.861846: | spent 0.00447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:43.861881: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:43.861886: | cd ec 8c 9d 2f 17 3a a1 00 00 00 00 00 00 00 00 Sep 21 07:15:43.861889: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:43.861891: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:43.861893: | 00 00 00 14 01 01 00 00 80 01 00 03 80 02 00 10 Sep 21 07:15:43.861895: | 80 04 00 07 Sep 21 07:15:43.861901: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:43.861905: | **parse ISAKMP Message: Sep 21 07:15:43.861908: | initiator cookie: Sep 21 07:15:43.861910: | cd ec 8c 9d 2f 17 3a a1 Sep 21 07:15:43.861913: | responder cookie: Sep 21 07:15:43.861915: | 00 00 00 00 00 00 00 00 Sep 21 07:15:43.861918: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.861921: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.861924: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.861927: | flags: none (0x0) Sep 21 07:15:43.861929: | Message ID: 0 (0x0) Sep 21 07:15:43.861932: | length: 68 (0x44) Sep 21 07:15:43.861935: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:43.861939: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:43.861942: | #null state always idle Sep 21 07:15:43.861946: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:43.861949: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:43.861952: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.861955: | length: 40 (0x28) Sep 21 07:15:43.861957: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.861960: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:43.861963: | in statetime_start() with no state Sep 21 07:15:43.861969: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:43.861975: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:43.861979: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.861983: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:43.861986: | find_next_host_connection returns test Sep 21 07:15:43.861989: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.861991: | find_next_host_connection returns empty Sep 21 07:15:43.862015: | creating state object #45 at 0x56077c1ec3c0 Sep 21 07:15:43.862019: | State DB: adding IKEv1 state #45 in UNDEFINED Sep 21 07:15:43.862024: | pstats #45 ikev1.isakmp started Sep 21 07:15:43.862029: | #45 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:43.862036: | start processing: state #45 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:43.862040: | parent state #45: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:43.862043: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:43.862046: | ICOOKIE-DUMP: cd ec 8c 9d 2f 17 3a a1 Sep 21 07:15:43.862050: "test" #45: responding to Main Mode Sep 21 07:15:43.862055: | **emit ISAKMP Message: Sep 21 07:15:43.862058: | initiator cookie: Sep 21 07:15:43.862060: | cd ec 8c 9d 2f 17 3a a1 Sep 21 07:15:43.862063: | responder cookie: Sep 21 07:15:43.862065: | 38 fd 0d 2d 13 55 d8 2d Sep 21 07:15:43.862068: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.862070: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.862073: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.862075: | flags: none (0x0) Sep 21 07:15:43.862078: | Message ID: 0 (0x0) Sep 21 07:15:43.862081: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.862084: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:43.862088: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:43.862156: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:43.862162: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.862165: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:43.862169: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:43.862172: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:43.862175: | ****parse IPsec DOI SIT: Sep 21 07:15:43.862178: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:43.862181: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:43.862184: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.862186: | length: 28 (0x1c) Sep 21 07:15:43.862189: | proposal number: 1 (0x1) Sep 21 07:15:43.862192: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:43.862194: | SPI size: 0 (0x0) Sep 21 07:15:43.862196: | number of transforms: 1 (0x1) Sep 21 07:15:43.862199: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:43.862202: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.862204: | length: 20 (0x14) Sep 21 07:15:43.862207: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:43.862209: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:43.862212: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:43.862215: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:43.862217: | length/value: 3 (0x3) Sep 21 07:15:43.862220: | [3 is OAKLEY_BLOWFISH_CBC(UNUSED)] Sep 21 07:15:43.862224: "test" #45: OAKLEY_BLOWFISH_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:43.862227: "test" #45: no acceptable Oakley Transform Sep 21 07:15:43.862230: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:43.862236: | [RE]START processing: state #45 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:43.862238: | #45 is idle Sep 21 07:15:43.862445: "test" #45: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:43.862451: | **emit ISAKMP Message: Sep 21 07:15:43.862454: | initiator cookie: Sep 21 07:15:43.862457: | cd ec 8c 9d 2f 17 3a a1 Sep 21 07:15:43.862459: | responder cookie: Sep 21 07:15:43.862461: | 38 fd 0d 2d 13 55 d8 2d Sep 21 07:15:43.862464: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.862467: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.862469: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:43.862472: | flags: none (0x0) Sep 21 07:15:43.862474: | Message ID: 0 (0x0) Sep 21 07:15:43.862477: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.862480: | ***emit ISAKMP Notification Payload: Sep 21 07:15:43.862483: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.862486: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.862488: | protocol ID: 1 (0x1) Sep 21 07:15:43.862491: | SPI size: 0 (0x0) Sep 21 07:15:43.862494: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:43.862497: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:43.862500: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:43.862503: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:43.862506: | emitting length of ISAKMP Message: 40 Sep 21 07:15:43.862512: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #45) Sep 21 07:15:43.862515: | cd ec 8c 9d 2f 17 3a a1 38 fd 0d 2d 13 55 d8 2d Sep 21 07:15:43.862518: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:43.862520: | 00 00 00 01 01 00 00 0e Sep 21 07:15:43.862558: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:43.862568: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:43.862572: | stop processing: state #45 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:43.862575: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:43.862581: | spent 0.51 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:43.912421: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:15:43.912446: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:15:43.912450: | 33 f4 fa ea db 41 cf da 00 00 00 00 00 00 00 00 Sep 21 07:15:43.912453: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:15:43.912455: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:15:43.912457: | 00 00 00 14 01 01 00 00 80 01 00 03 80 02 00 10 Sep 21 07:15:43.912459: | 80 03 00 0d Sep 21 07:15:43.912464: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:15:43.912469: | **parse ISAKMP Message: Sep 21 07:15:43.912471: | initiator cookie: Sep 21 07:15:43.912474: | 33 f4 fa ea db 41 cf da Sep 21 07:15:43.912476: | responder cookie: Sep 21 07:15:43.912478: | 00 00 00 00 00 00 00 00 Sep 21 07:15:43.912481: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.912484: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.912487: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.912490: | flags: none (0x0) Sep 21 07:15:43.912492: | Message ID: 0 (0x0) Sep 21 07:15:43.912494: | length: 68 (0x44) Sep 21 07:15:43.912497: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:15:43.912501: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:15:43.912504: | #null state always idle Sep 21 07:15:43.912507: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:15:43.912510: | ***parse ISAKMP Security Association Payload: Sep 21 07:15:43.912513: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.912515: | length: 40 (0x28) Sep 21 07:15:43.912518: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.912520: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:15:43.912523: | in statetime_start() with no state Sep 21 07:15:43.912529: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:15:43.912534: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:15:43.912537: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.912541: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:15:43.912544: | find_next_host_connection returns test Sep 21 07:15:43.912547: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:15:43.912549: | find_next_host_connection returns empty Sep 21 07:15:43.912579: | creating state object #46 at 0x56077c1ece80 Sep 21 07:15:43.912582: | State DB: adding IKEv1 state #46 in UNDEFINED Sep 21 07:15:43.912587: | pstats #46 ikev1.isakmp started Sep 21 07:15:43.912591: | #46 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:15:43.912598: | start processing: state #46 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:15:43.912601: | parent state #46: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:15:43.912605: | sender checking NAT-T: enabled; VID 0 Sep 21 07:15:43.912607: | ICOOKIE-DUMP: 33 f4 fa ea db 41 cf da Sep 21 07:15:43.912611: "test" #46: responding to Main Mode Sep 21 07:15:43.912615: | **emit ISAKMP Message: Sep 21 07:15:43.912618: | initiator cookie: Sep 21 07:15:43.912620: | 33 f4 fa ea db 41 cf da Sep 21 07:15:43.912623: | responder cookie: Sep 21 07:15:43.912625: | f7 51 94 8a 7e 9b f1 ad Sep 21 07:15:43.912627: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:15:43.912634: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.912636: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:15:43.912639: | flags: none (0x0) Sep 21 07:15:43.912641: | Message ID: 0 (0x0) Sep 21 07:15:43.912644: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.912647: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:15:43.912650: | ***emit ISAKMP Security Association Payload: Sep 21 07:15:43.912652: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:15:43.912654: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.912657: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:15:43.912660: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:15:43.912663: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:15:43.912666: | ****parse IPsec DOI SIT: Sep 21 07:15:43.912669: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:15:43.912671: | ****parse ISAKMP Proposal Payload: Sep 21 07:15:43.912674: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.912676: | length: 28 (0x1c) Sep 21 07:15:43.912679: | proposal number: 1 (0x1) Sep 21 07:15:43.912681: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:15:43.912684: | SPI size: 0 (0x0) Sep 21 07:15:43.912686: | number of transforms: 1 (0x1) Sep 21 07:15:43.912689: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:15:43.912691: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.912694: | length: 20 (0x14) Sep 21 07:15:43.912696: | ISAKMP transform number: 1 (0x1) Sep 21 07:15:43.912698: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:15:43.912701: | ******parse ISAKMP Oakley attribute: Sep 21 07:15:43.912704: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:15:43.912706: | length/value: 3 (0x3) Sep 21 07:15:43.912709: | [3 is OAKLEY_BLOWFISH_CBC(UNUSED)] Sep 21 07:15:43.912713: "test" #46: OAKLEY_BLOWFISH_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:15:43.912716: "test" #46: no acceptable Oakley Transform Sep 21 07:15:43.912719: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:15:43.912724: | [RE]START processing: state #46 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:15:43.912726: | #46 is idle Sep 21 07:15:43.912810: "test" #46: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:15:43.912819: | **emit ISAKMP Message: Sep 21 07:15:43.912822: | initiator cookie: Sep 21 07:15:43.912824: | 33 f4 fa ea db 41 cf da Sep 21 07:15:43.912827: | responder cookie: Sep 21 07:15:43.912829: | f7 51 94 8a 7e 9b f1 ad Sep 21 07:15:43.912832: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.912835: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:15:43.912838: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:15:43.912840: | flags: none (0x0) Sep 21 07:15:43.912843: | Message ID: 0 (0x0) Sep 21 07:15:43.912847: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:15:43.912850: | ***emit ISAKMP Notification Payload: Sep 21 07:15:43.912853: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:15:43.912856: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:15:43.912858: | protocol ID: 1 (0x1) Sep 21 07:15:43.912861: | SPI size: 0 (0x0) Sep 21 07:15:43.912863: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:15:43.912868: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:15:43.912871: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:15:43.912877: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:15:43.912880: | emitting length of ISAKMP Message: 40 Sep 21 07:15:43.912887: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #46) Sep 21 07:15:43.912890: | 33 f4 fa ea db 41 cf da f7 51 94 8a 7e 9b f1 ad Sep 21 07:15:43.912893: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:15:43.912896: | 00 00 00 01 01 00 00 0e Sep 21 07:15:43.912920: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:15:43.912928: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:15:43.912935: | stop processing: state #46 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:15:43.912938: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:15:43.912944: | spent 0.489 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:15:44.107303: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:15:44.107330: shutting down Sep 21 07:15:44.107338: | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825) Sep 21 07:15:44.107342: | pluto_sd: executing action action: stopping(6), status 0 Sep 21 07:15:44.107348: | certs and keys locked by 'free_preshared_secrets' Sep 21 07:15:44.107350: forgetting secrets Sep 21 07:15:44.107354: | certs and keys unlocked by 'free_preshared_secrets' Sep 21 07:15:44.107358: | start processing: connection "test" (in delete_connection() at connections.c:189) Sep 21 07:15:44.107362: | Deleting states for connection - including all other IPsec SA's of this IKE SA Sep 21 07:15:44.107364: | pass 0 Sep 21 07:15:44.107366: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Sep 21 07:15:44.107369: | state #46 Sep 21 07:15:44.107373: | suspend processing: connection "test" (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.107379: | start processing: state #46 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.107382: | pstats #46 ikev1.isakmp deleted other Sep 21 07:15:44.107386: | [RE]START processing: state #46 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.107391: "test" #46: deleting state (STATE_MAIN_R0) aged 0.194s and NOT sending notification Sep 21 07:15:44.107394: | parent state #46: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.107471: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.107480: | stop processing: connection "test" (BACKGROUND) (in update_state_connection() at connections.c:4037) Sep 21 07:15:44.107484: | start processing: connection NULL (in update_state_connection() at connections.c:4038) Sep 21 07:15:44.107487: | in connection_discard for connection test Sep 21 07:15:44.107490: | State DB: deleting IKEv1 state #46 in MAIN_R0 Sep 21 07:15:44.107494: | parent state #46: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.107501: | stop processing: state #46 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.107512: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.107515: | state #45 Sep 21 07:15:44.107521: | start processing: state #45 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.107525: | pstats #45 ikev1.isakmp deleted other Sep 21 07:15:44.107530: | [RE]START processing: state #45 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.107534: "test" #45: deleting state (STATE_MAIN_R0) aged 0.245s and NOT sending notification Sep 21 07:15:44.107541: | parent state #45: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.107588: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.107596: | in connection_discard for connection test Sep 21 07:15:44.107599: | State DB: deleting IKEv1 state #45 in MAIN_R0 Sep 21 07:15:44.107603: | parent state #45: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.107609: | stop processing: state #45 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.107613: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.107616: | state #44 Sep 21 07:15:44.107621: | start processing: state #44 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.107624: | pstats #44 ikev1.isakmp deleted other Sep 21 07:15:44.107630: | [RE]START processing: state #44 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.107633: "test" #44: deleting state (STATE_MAIN_R0) aged 0.307s and NOT sending notification Sep 21 07:15:44.107636: | parent state #44: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.107684: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.107690: | in connection_discard for connection test Sep 21 07:15:44.107694: | State DB: deleting IKEv1 state #44 in MAIN_R0 Sep 21 07:15:44.107698: | parent state #44: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.107704: | stop processing: state #44 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.107717: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.107721: | state #43 Sep 21 07:15:44.107728: | start processing: state #43 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.107731: | pstats #43 ikev1.isakmp deleted other Sep 21 07:15:44.107736: | [RE]START processing: state #43 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.107740: "test" #43: deleting state (STATE_MAIN_R0) aged 0.382s and NOT sending notification Sep 21 07:15:44.107744: | parent state #43: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.107943: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.107952: | in connection_discard for connection test Sep 21 07:15:44.107956: | State DB: deleting IKEv1 state #43 in MAIN_R0 Sep 21 07:15:44.107960: | parent state #43: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.107966: | stop processing: state #43 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.107975: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.107979: | state #42 Sep 21 07:15:44.107985: | start processing: state #42 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.107988: | pstats #42 ikev1.isakmp deleted other Sep 21 07:15:44.107995: | [RE]START processing: state #42 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.108001: "test" #42: deleting state (STATE_MAIN_R0) aged 0.639s and NOT sending notification Sep 21 07:15:44.108004: | parent state #42: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.108064: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.108071: | in connection_discard for connection test Sep 21 07:15:44.108074: | State DB: deleting IKEv1 state #42 in MAIN_R0 Sep 21 07:15:44.108078: | parent state #42: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.108084: | stop processing: state #42 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.108088: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.108094: | state #41 Sep 21 07:15:44.108101: | start processing: state #41 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.108105: | pstats #41 ikev1.isakmp deleted other Sep 21 07:15:44.108111: | [RE]START processing: state #41 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.108117: "test" #41: deleting state (STATE_MAIN_R0) aged 0.710s and NOT sending notification Sep 21 07:15:44.108121: | parent state #41: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.108171: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.108178: | in connection_discard for connection test Sep 21 07:15:44.108182: | State DB: deleting IKEv1 state #41 in MAIN_R0 Sep 21 07:15:44.108186: | parent state #41: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.108192: | stop processing: state #41 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.108201: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.108204: | state #40 Sep 21 07:15:44.108213: | start processing: state #40 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.108218: | pstats #40 ikev1.isakmp deleted other Sep 21 07:15:44.108223: | [RE]START processing: state #40 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.108227: "test" #40: deleting state (STATE_MAIN_R0) aged 0.764s and NOT sending notification Sep 21 07:15:44.108231: | parent state #40: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.108282: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.108289: | in connection_discard for connection test Sep 21 07:15:44.108293: | State DB: deleting IKEv1 state #40 in MAIN_R0 Sep 21 07:15:44.108297: | parent state #40: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.108302: | stop processing: state #40 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.108311: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.108314: | state #39 Sep 21 07:15:44.108323: | start processing: state #39 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.108328: | pstats #39 ikev1.isakmp deleted other Sep 21 07:15:44.108334: | [RE]START processing: state #39 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.108338: "test" #39: deleting state (STATE_MAIN_R0) aged 0.847s and NOT sending notification Sep 21 07:15:44.108341: | parent state #39: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.108392: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.108399: | in connection_discard for connection test Sep 21 07:15:44.108403: | State DB: deleting IKEv1 state #39 in MAIN_R0 Sep 21 07:15:44.108407: | parent state #39: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.108413: | stop processing: state #39 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.108417: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.108420: | state #38 Sep 21 07:15:44.108428: | start processing: state #38 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.108434: | pstats #38 ikev1.isakmp deleted other Sep 21 07:15:44.108440: | [RE]START processing: state #38 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.108444: "test" #38: deleting state (STATE_MAIN_R0) aged 0.906s and NOT sending notification Sep 21 07:15:44.108448: | parent state #38: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.108505: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.108512: | in connection_discard for connection test Sep 21 07:15:44.108516: | State DB: deleting IKEv1 state #38 in MAIN_R0 Sep 21 07:15:44.108519: | parent state #38: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.108525: | stop processing: state #38 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.108536: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.108544: | state #37 Sep 21 07:15:44.108551: | start processing: state #37 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.108554: | pstats #37 ikev1.isakmp deleted other Sep 21 07:15:44.108560: | [RE]START processing: state #37 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.108564: "test" #37: deleting state (STATE_MAIN_R0) aged 1.001s and NOT sending notification Sep 21 07:15:44.108568: | parent state #37: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.108616: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.108622: | in connection_discard for connection test Sep 21 07:15:44.108625: | State DB: deleting IKEv1 state #37 in MAIN_R0 Sep 21 07:15:44.108627: | parent state #37: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.108632: | stop processing: state #37 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.108639: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.108642: | state #36 Sep 21 07:15:44.108646: | start processing: state #36 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.108649: | pstats #36 ikev1.isakmp deleted other Sep 21 07:15:44.108653: | [RE]START processing: state #36 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.108656: "test" #36: deleting state (STATE_MAIN_R0) aged 1.058s and NOT sending notification Sep 21 07:15:44.108659: | parent state #36: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.108700: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.108704: | in connection_discard for connection test Sep 21 07:15:44.108707: | State DB: deleting IKEv1 state #36 in MAIN_R0 Sep 21 07:15:44.108710: | parent state #36: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.108714: | stop processing: state #36 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.108718: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.108720: | state #35 Sep 21 07:15:44.108725: | start processing: state #35 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.108728: | pstats #35 ikev1.isakmp deleted other Sep 21 07:15:44.108732: | [RE]START processing: state #35 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.108735: "test" #35: deleting state (STATE_MAIN_R0) aged 1.121s and NOT sending notification Sep 21 07:15:44.108737: | parent state #35: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.108778: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.108782: | in connection_discard for connection test Sep 21 07:15:44.108792: | State DB: deleting IKEv1 state #35 in MAIN_R0 Sep 21 07:15:44.108795: | parent state #35: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.108800: | stop processing: state #35 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.108808: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.108814: | state #34 Sep 21 07:15:44.108821: | start processing: state #34 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.108825: | pstats #34 ikev1.isakmp deleted other Sep 21 07:15:44.108830: | [RE]START processing: state #34 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.108834: "test" #34: deleting state (STATE_MAIN_R0) aged 1.322s and NOT sending notification Sep 21 07:15:44.108838: | parent state #34: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.108885: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.108890: | in connection_discard for connection test Sep 21 07:15:44.108897: | State DB: deleting IKEv1 state #34 in MAIN_R0 Sep 21 07:15:44.108903: | parent state #34: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.108910: | stop processing: state #34 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.108920: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.108923: | state #33 Sep 21 07:15:44.108929: | start processing: state #33 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.108932: | pstats #33 ikev1.isakmp deleted other Sep 21 07:15:44.108938: | [RE]START processing: state #33 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.108942: "test" #33: deleting state (STATE_MAIN_R0) aged 1.441s and NOT sending notification Sep 21 07:15:44.108945: | parent state #33: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.108991: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.108996: | in connection_discard for connection test Sep 21 07:15:44.109000: | State DB: deleting IKEv1 state #33 in MAIN_R0 Sep 21 07:15:44.109004: | parent state #33: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.109010: | stop processing: state #33 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.109014: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.109018: | state #32 Sep 21 07:15:44.109024: | start processing: state #32 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.109027: | pstats #32 ikev1.isakmp deleted other Sep 21 07:15:44.109033: | [RE]START processing: state #32 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.109037: "test" #32: deleting state (STATE_MAIN_R0) aged 1.566s and NOT sending notification Sep 21 07:15:44.109040: | parent state #32: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.109088: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.109094: | in connection_discard for connection test Sep 21 07:15:44.109098: | State DB: deleting IKEv1 state #32 in MAIN_R0 Sep 21 07:15:44.109102: | parent state #32: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.109108: | stop processing: state #32 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.109117: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.109120: | state #31 Sep 21 07:15:44.109126: | start processing: state #31 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.109129: | pstats #31 ikev1.isakmp deleted other Sep 21 07:15:44.109137: | [RE]START processing: state #31 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.109143: "test" #31: deleting state (STATE_MAIN_R0) aged 1.736s and NOT sending notification Sep 21 07:15:44.109147: | parent state #31: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.109192: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.109198: | in connection_discard for connection test Sep 21 07:15:44.109201: | State DB: deleting IKEv1 state #31 in MAIN_R0 Sep 21 07:15:44.109205: | parent state #31: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.109211: | stop processing: state #31 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.109219: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.109223: | state #30 Sep 21 07:15:44.109229: | start processing: state #30 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.109232: | pstats #30 ikev1.isakmp deleted other Sep 21 07:15:44.109238: | [RE]START processing: state #30 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.109244: "test" #30: deleting state (STATE_MAIN_R0) aged 1.875s and NOT sending notification Sep 21 07:15:44.109248: | parent state #30: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.109296: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.109302: | in connection_discard for connection test Sep 21 07:15:44.109306: | State DB: deleting IKEv1 state #30 in MAIN_R0 Sep 21 07:15:44.109310: | parent state #30: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.109316: | stop processing: state #30 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.109324: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.109328: | state #29 Sep 21 07:15:44.109334: | start processing: state #29 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.109338: | pstats #29 ikev1.isakmp deleted other Sep 21 07:15:44.109343: | [RE]START processing: state #29 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.109347: "test" #29: deleting state (STATE_MAIN_R0) aged 1.995s and NOT sending notification Sep 21 07:15:44.109351: | parent state #29: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.109396: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.109401: | in connection_discard for connection test Sep 21 07:15:44.109405: | State DB: deleting IKEv1 state #29 in MAIN_R0 Sep 21 07:15:44.109409: | parent state #29: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.109415: | stop processing: state #29 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.109424: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.109427: | state #28 Sep 21 07:15:44.109432: | start processing: state #28 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.109437: | pstats #28 ikev1.isakmp deleted other Sep 21 07:15:44.109443: | [RE]START processing: state #28 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.109447: "test" #28: deleting state (STATE_MAIN_R0) aged 2.075s and NOT sending notification Sep 21 07:15:44.109450: | parent state #28: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.109495: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.109500: | in connection_discard for connection test Sep 21 07:15:44.109506: | State DB: deleting IKEv1 state #28 in MAIN_R0 Sep 21 07:15:44.109511: | parent state #28: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.109517: | stop processing: state #28 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.109526: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.109529: | state #27 Sep 21 07:15:44.109536: | start processing: state #27 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.109539: | pstats #27 ikev1.isakmp deleted other Sep 21 07:15:44.109545: | [RE]START processing: state #27 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.109549: "test" #27: deleting state (STATE_MAIN_R0) aged 2.141s and NOT sending notification Sep 21 07:15:44.109553: | parent state #27: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.109603: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.109609: | in connection_discard for connection test Sep 21 07:15:44.109613: | State DB: deleting IKEv1 state #27 in MAIN_R0 Sep 21 07:15:44.109617: | parent state #27: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.109623: | stop processing: state #27 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.109627: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.109633: | state #26 Sep 21 07:15:44.109639: | start processing: state #26 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.109642: | pstats #26 ikev1.isakmp deleted other Sep 21 07:15:44.109648: | [RE]START processing: state #26 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.109652: "test" #26: deleting state (STATE_MAIN_R0) aged 2.199s and NOT sending notification Sep 21 07:15:44.109656: | parent state #26: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.109701: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.109706: | in connection_discard for connection test Sep 21 07:15:44.109709: | State DB: deleting IKEv1 state #26 in MAIN_R0 Sep 21 07:15:44.109713: | parent state #26: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.109719: | stop processing: state #26 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.109728: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.109731: | state #25 Sep 21 07:15:44.109737: | start processing: state #25 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.109741: | pstats #25 ikev1.isakmp deleted other Sep 21 07:15:44.109746: | [RE]START processing: state #25 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.109750: "test" #25: deleting state (STATE_MAIN_R0) aged 2.284s and NOT sending notification Sep 21 07:15:44.109753: | parent state #25: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.109806: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.109814: | in connection_discard for connection test Sep 21 07:15:44.109818: | State DB: deleting IKEv1 state #25 in MAIN_R0 Sep 21 07:15:44.109822: | parent state #25: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.109830: | stop processing: state #25 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.109841: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.109844: | state #24 Sep 21 07:15:44.109850: | start processing: state #24 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.109853: | pstats #24 ikev1.isakmp deleted other Sep 21 07:15:44.109859: | [RE]START processing: state #24 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.109863: "test" #24: deleting state (STATE_MAIN_R0) aged 2.347s and NOT sending notification Sep 21 07:15:44.109867: | parent state #24: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.109912: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.109917: | in connection_discard for connection test Sep 21 07:15:44.109921: | State DB: deleting IKEv1 state #24 in MAIN_R0 Sep 21 07:15:44.109925: | parent state #24: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.109931: | stop processing: state #24 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.109935: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.109937: | state #23 Sep 21 07:15:44.109942: | start processing: state #23 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.109949: | pstats #23 ikev1.isakmp deleted other Sep 21 07:15:44.109955: | [RE]START processing: state #23 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.109959: "test" #23: deleting state (STATE_MAIN_R0) aged 2.439s and NOT sending notification Sep 21 07:15:44.109963: | parent state #23: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.110011: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.110018: | in connection_discard for connection test Sep 21 07:15:44.110024: | State DB: deleting IKEv1 state #23 in MAIN_R0 Sep 21 07:15:44.110028: | parent state #23: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.110033: | stop processing: state #23 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.110043: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.110046: | state #22 Sep 21 07:15:44.110052: | start processing: state #22 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.110055: | pstats #22 ikev1.isakmp deleted other Sep 21 07:15:44.110061: | [RE]START processing: state #22 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.110065: "test" #22: deleting state (STATE_MAIN_R0) aged 2.511s and NOT sending notification Sep 21 07:15:44.110069: | parent state #22: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.110118: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.110125: | in connection_discard for connection test Sep 21 07:15:44.110128: | State DB: deleting IKEv1 state #22 in MAIN_R0 Sep 21 07:15:44.110135: | parent state #22: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.110142: | stop processing: state #22 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.110150: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.110153: | state #21 Sep 21 07:15:44.110161: | start processing: state #21 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.110166: | pstats #21 ikev1.isakmp deleted other Sep 21 07:15:44.110172: | [RE]START processing: state #21 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.110176: "test" #21: deleting state (STATE_MAIN_R0) aged 2.571s and NOT sending notification Sep 21 07:15:44.110179: | parent state #21: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.110226: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.110232: | in connection_discard for connection test Sep 21 07:15:44.110235: | State DB: deleting IKEv1 state #21 in MAIN_R0 Sep 21 07:15:44.110238: | parent state #21: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.110244: | stop processing: state #21 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.110248: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.110251: | state #20 Sep 21 07:15:44.110257: | start processing: state #20 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.110260: | pstats #20 ikev1.isakmp deleted other Sep 21 07:15:44.110265: | [RE]START processing: state #20 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.110269: "test" #20: deleting state (STATE_MAIN_R0) aged 2.641s and NOT sending notification Sep 21 07:15:44.110272: | parent state #20: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.110318: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.110323: | in connection_discard for connection test Sep 21 07:15:44.110327: | State DB: deleting IKEv1 state #20 in MAIN_R0 Sep 21 07:15:44.110331: | parent state #20: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.110337: | stop processing: state #20 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.110346: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.110352: | state #19 Sep 21 07:15:44.110358: | start processing: state #19 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.110362: | pstats #19 ikev1.isakmp deleted other Sep 21 07:15:44.110367: | [RE]START processing: state #19 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.110374: "test" #19: deleting state (STATE_MAIN_R0) aged 2.771s and NOT sending notification Sep 21 07:15:44.110377: | parent state #19: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.110426: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.110433: | in connection_discard for connection test Sep 21 07:15:44.110437: | State DB: deleting IKEv1 state #19 in MAIN_R0 Sep 21 07:15:44.110441: | parent state #19: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.110447: | stop processing: state #19 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.110456: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.110461: | state #18 Sep 21 07:15:44.110469: | start processing: state #18 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.110472: | pstats #18 ikev1.isakmp deleted other Sep 21 07:15:44.110478: | [RE]START processing: state #18 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.110482: "test" #18: deleting state (STATE_MAIN_R0) aged 2.832s and NOT sending notification Sep 21 07:15:44.110486: | parent state #18: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.110534: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.110541: | in connection_discard for connection test Sep 21 07:15:44.110545: | State DB: deleting IKEv1 state #18 in MAIN_R0 Sep 21 07:15:44.110549: | parent state #18: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.110555: | stop processing: state #18 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.110559: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.110565: | state #17 Sep 21 07:15:44.110572: | start processing: state #17 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.110576: | pstats #17 ikev1.isakmp deleted other Sep 21 07:15:44.110581: | [RE]START processing: state #17 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.110585: "test" #17: deleting state (STATE_MAIN_R0) aged 2.977s and NOT sending notification Sep 21 07:15:44.110589: | parent state #17: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.110636: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.110642: | in connection_discard for connection test Sep 21 07:15:44.110645: | State DB: deleting IKEv1 state #17 in MAIN_R0 Sep 21 07:15:44.110649: | parent state #17: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.110655: | stop processing: state #17 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.110663: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.110667: | state #16 Sep 21 07:15:44.110673: | start processing: state #16 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.110677: | pstats #16 ikev1.isakmp deleted other Sep 21 07:15:44.110683: | [RE]START processing: state #16 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.110687: "test" #16: deleting state (STATE_MAIN_R0) aged 3.221s and NOT sending notification Sep 21 07:15:44.110690: | parent state #16: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.110736: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.110742: | in connection_discard for connection test Sep 21 07:15:44.110745: | State DB: deleting IKEv1 state #16 in MAIN_R0 Sep 21 07:15:44.110749: | parent state #16: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.110756: | stop processing: state #16 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.110763: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.110769: | state #15 Sep 21 07:15:44.110776: | start processing: state #15 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.110779: | pstats #15 ikev1.isakmp deleted other Sep 21 07:15:44.110790: | [RE]START processing: state #15 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.110797: "test" #15: deleting state (STATE_MAIN_R0) aged 3.320s and NOT sending notification Sep 21 07:15:44.110801: | parent state #15: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.110846: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.110852: | in connection_discard for connection test Sep 21 07:15:44.110856: | State DB: deleting IKEv1 state #15 in MAIN_R0 Sep 21 07:15:44.110860: | parent state #15: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.110866: | stop processing: state #15 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.110870: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.110873: | state #14 Sep 21 07:15:44.110879: | start processing: state #14 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.110883: | pstats #14 ikev1.isakmp deleted other Sep 21 07:15:44.110889: | [RE]START processing: state #14 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.110893: "test" #14: deleting state (STATE_MAIN_R0) aged 3.425s and NOT sending notification Sep 21 07:15:44.110896: | parent state #14: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.110941: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.110947: | in connection_discard for connection test Sep 21 07:15:44.110951: | State DB: deleting IKEv1 state #14 in MAIN_R0 Sep 21 07:15:44.110955: | parent state #14: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.110960: | stop processing: state #14 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.110969: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.110973: | state #13 Sep 21 07:15:44.110979: | start processing: state #13 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.110982: | pstats #13 ikev1.isakmp deleted other Sep 21 07:15:44.110988: | [RE]START processing: state #13 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.110992: "test" #13: deleting state (STATE_MAIN_R0) aged 3.485s and NOT sending notification Sep 21 07:15:44.110995: | parent state #13: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.111153: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.111159: | in connection_discard for connection test Sep 21 07:15:44.111162: | State DB: deleting IKEv1 state #13 in MAIN_R0 Sep 21 07:15:44.111165: | parent state #13: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.111169: | stop processing: state #13 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.111177: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.111179: | state #12 Sep 21 07:15:44.111183: | start processing: state #12 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.111186: | pstats #12 ikev1.isakmp deleted other Sep 21 07:15:44.111190: | [RE]START processing: state #12 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.111193: "test" #12: deleting state (STATE_MAIN_R0) aged 3.542s and NOT sending notification Sep 21 07:15:44.111196: | parent state #12: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.111254: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.111259: | in connection_discard for connection test Sep 21 07:15:44.111262: | State DB: deleting IKEv1 state #12 in MAIN_R0 Sep 21 07:15:44.111267: | parent state #12: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.111272: | stop processing: state #12 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.111275: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.111277: | state #11 Sep 21 07:15:44.111281: | start processing: state #11 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.111284: | pstats #11 ikev1.isakmp deleted other Sep 21 07:15:44.111288: | [RE]START processing: state #11 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.111291: "test" #11: deleting state (STATE_MAIN_R0) aged 3.661s and NOT sending notification Sep 21 07:15:44.111294: | parent state #11: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.111338: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.111345: | in connection_discard for connection test Sep 21 07:15:44.111349: | State DB: deleting IKEv1 state #11 in MAIN_R0 Sep 21 07:15:44.111353: | parent state #11: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.111359: | stop processing: state #11 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.111368: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.111371: | state #10 Sep 21 07:15:44.111378: | start processing: state #10 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.111381: | pstats #10 ikev1.isakmp deleted other Sep 21 07:15:44.111387: | [RE]START processing: state #10 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.111391: "test" #10: deleting state (STATE_MAIN_R0) aged 3.755s and NOT sending notification Sep 21 07:15:44.111394: | parent state #10: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.111443: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.111449: | in connection_discard for connection test Sep 21 07:15:44.111452: | State DB: deleting IKEv1 state #10 in MAIN_R0 Sep 21 07:15:44.111455: | parent state #10: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.111460: | stop processing: state #10 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.111468: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.111470: | state #9 Sep 21 07:15:44.111475: | start processing: state #9 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.111478: | pstats #9 ikev1.isakmp deleted other Sep 21 07:15:44.111482: | [RE]START processing: state #9 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.111486: "test" #9: deleting state (STATE_MAIN_R0) aged 3.833s and NOT sending notification Sep 21 07:15:44.111489: | parent state #9: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.111537: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.111543: | in connection_discard for connection test Sep 21 07:15:44.111547: | State DB: deleting IKEv1 state #9 in MAIN_R0 Sep 21 07:15:44.111550: | parent state #9: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.111557: | stop processing: state #9 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.111561: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.111564: | state #8 Sep 21 07:15:44.111570: | start processing: state #8 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.111574: | pstats #8 ikev1.isakmp deleted other Sep 21 07:15:44.111579: | [RE]START processing: state #8 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.111585: "test" #8: deleting state (STATE_MAIN_R0) aged 3.889s and NOT sending notification Sep 21 07:15:44.111589: | parent state #8: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.111636: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.111642: | in connection_discard for connection test Sep 21 07:15:44.111645: | State DB: deleting IKEv1 state #8 in MAIN_R0 Sep 21 07:15:44.111649: | parent state #8: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.111655: | stop processing: state #8 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.111664: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.111667: | state #7 Sep 21 07:15:44.111674: | start processing: state #7 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.111677: | pstats #7 ikev1.isakmp deleted other Sep 21 07:15:44.111683: | [RE]START processing: state #7 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.111687: "test" #7: deleting state (STATE_MAIN_R0) aged 3.961s and NOT sending notification Sep 21 07:15:44.111690: | parent state #7: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.111747: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.111753: | in connection_discard for connection test Sep 21 07:15:44.111757: | State DB: deleting IKEv1 state #7 in MAIN_R0 Sep 21 07:15:44.111761: | parent state #7: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.111767: | stop processing: state #7 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.111775: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.111778: | state #6 Sep 21 07:15:44.111789: | start processing: state #6 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.111795: | pstats #6 ikev1.isakmp deleted other Sep 21 07:15:44.111801: | [RE]START processing: state #6 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.111806: "test" #6: deleting state (STATE_MAIN_R0) aged 4.022s and NOT sending notification Sep 21 07:15:44.111809: | parent state #6: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.111865: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.111872: | in connection_discard for connection test Sep 21 07:15:44.111876: | State DB: deleting IKEv1 state #6 in MAIN_R0 Sep 21 07:15:44.111879: | parent state #6: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.111885: | stop processing: state #6 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.111890: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.111893: | state #5 Sep 21 07:15:44.111899: | start processing: state #5 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.111902: | pstats #5 ikev1.isakmp deleted other Sep 21 07:15:44.111908: | [RE]START processing: state #5 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.111912: "test" #5: deleting state (STATE_MAIN_R0) aged 4.072s and NOT sending notification Sep 21 07:15:44.111915: | parent state #5: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.111971: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.111978: | in connection_discard for connection test Sep 21 07:15:44.111981: | State DB: deleting IKEv1 state #5 in MAIN_R0 Sep 21 07:15:44.111985: | parent state #5: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.111991: | stop processing: state #5 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.112000: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.112003: | state #4 Sep 21 07:15:44.112010: | start processing: state #4 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.112016: | pstats #4 ikev1.isakmp deleted other Sep 21 07:15:44.112021: | [RE]START processing: state #4 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.112025: "test" #4: deleting state (STATE_MAIN_R0) aged 4.196s and NOT sending notification Sep 21 07:15:44.112031: | parent state #4: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.112084: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.112090: | in connection_discard for connection test Sep 21 07:15:44.112094: | State DB: deleting IKEv1 state #4 in MAIN_R0 Sep 21 07:15:44.112098: | parent state #4: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.112104: | stop processing: state #4 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.112114: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.112117: | state #3 Sep 21 07:15:44.112123: | start processing: state #3 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.112127: | pstats #3 ikev1.isakmp deleted other Sep 21 07:15:44.112132: | [RE]START processing: state #3 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.112136: "test" #3: deleting state (STATE_MAIN_R0) aged 4.275s and NOT sending notification Sep 21 07:15:44.112140: | parent state #3: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.112201: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.112207: | in connection_discard for connection test Sep 21 07:15:44.112211: | State DB: deleting IKEv1 state #3 in MAIN_R0 Sep 21 07:15:44.112214: | parent state #3: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.112220: | stop processing: state #3 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.112225: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.112228: | state #2 Sep 21 07:15:44.112234: | start processing: state #2 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.112237: | pstats #2 ikev1.isakmp deleted other Sep 21 07:15:44.112243: | [RE]START processing: state #2 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.112247: "test" #2: deleting state (STATE_MAIN_R0) aged 4.332s and NOT sending notification Sep 21 07:15:44.112250: | parent state #2: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.112304: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.112311: | in connection_discard for connection test Sep 21 07:15:44.112315: | State DB: deleting IKEv1 state #2 in MAIN_R0 Sep 21 07:15:44.112319: | parent state #2: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.112325: | stop processing: state #2 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.112333: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.112336: | state #1 Sep 21 07:15:44.112343: | start processing: state #1 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:15:44.112346: | pstats #1 ikev1.isakmp deleted other Sep 21 07:15:44.112352: | [RE]START processing: state #1 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:15:44.112356: "test" #1: deleting state (STATE_MAIN_R0) aged 4.513s and NOT sending notification Sep 21 07:15:44.112359: | parent state #1: MAIN_R0(half-open IKE SA) => delete Sep 21 07:15:44.112414: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:15:44.112421: | in connection_discard for connection test Sep 21 07:15:44.112424: | State DB: deleting IKEv1 state #1 in MAIN_R0 Sep 21 07:15:44.112428: | parent state #1: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:15:44.112437: | stop processing: state #1 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:15:44.112446: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:15:44.112449: | pass 1 Sep 21 07:15:44.112452: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Sep 21 07:15:44.112457: | free hp@0x56077c198a20 Sep 21 07:15:44.112461: | flush revival: connection 'test' wasn't on the list Sep 21 07:15:44.112465: | processing: STOP connection NULL (in discard_connection() at connections.c:249) Sep 21 07:15:44.112472: | crl fetch request list locked by 'free_crl_fetch' Sep 21 07:15:44.112477: | crl fetch request list unlocked by 'free_crl_fetch' Sep 21 07:15:44.112488: shutting down interface lo/lo 127.0.0.1:4500 Sep 21 07:15:44.112492: shutting down interface lo/lo 127.0.0.1:500 Sep 21 07:15:44.112495: shutting down interface eth0/eth0 192.0.2.254:4500 Sep 21 07:15:44.112498: shutting down interface eth0/eth0 192.0.2.254:500 Sep 21 07:15:44.112501: shutting down interface eth1/eth1 192.1.2.23:4500 Sep 21 07:15:44.112504: shutting down interface eth1/eth1 192.1.2.23:500 Sep 21 07:15:44.112509: | FOR_EACH_STATE_... in delete_states_dead_interfaces Sep 21 07:15:44.112518: | libevent_free: release ptr-libevent@0x56077c1cc090 Sep 21 07:15:44.112522: | free_event_entry: release EVENT_NULL-pe@0x56077c1b5290 Sep 21 07:15:44.112533: | libevent_free: release ptr-libevent@0x56077c1cc180 Sep 21 07:15:44.112536: | free_event_entry: release EVENT_NULL-pe@0x56077c1cc140 Sep 21 07:15:44.112543: | libevent_free: release ptr-libevent@0x56077c1cc270 Sep 21 07:15:44.112546: | free_event_entry: release EVENT_NULL-pe@0x56077c1cc230 Sep 21 07:15:44.112553: | libevent_free: release ptr-libevent@0x56077c1cc360 Sep 21 07:15:44.112556: | free_event_entry: release EVENT_NULL-pe@0x56077c1cc320 Sep 21 07:15:44.112562: | libevent_free: release ptr-libevent@0x56077c1cc450 Sep 21 07:15:44.112565: | free_event_entry: release EVENT_NULL-pe@0x56077c1cc410 Sep 21 07:15:44.112572: | libevent_free: release ptr-libevent@0x56077c1cc540 Sep 21 07:15:44.112575: | free_event_entry: release EVENT_NULL-pe@0x56077c1cc500 Sep 21 07:15:44.112580: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Sep 21 07:15:44.113091: | libevent_free: release ptr-libevent@0x56077c1cb9f0 Sep 21 07:15:44.113099: | free_event_entry: release EVENT_NULL-pe@0x56077c1b4510 Sep 21 07:15:44.113103: | libevent_free: release ptr-libevent@0x56077c1c1480 Sep 21 07:15:44.113106: | free_event_entry: release EVENT_NULL-pe@0x56077c1b47c0 Sep 21 07:15:44.113109: | libevent_free: release ptr-libevent@0x56077c1c13f0 Sep 21 07:15:44.113113: | free_event_entry: release EVENT_NULL-pe@0x56077c1b9f20 Sep 21 07:15:44.113116: | global timer EVENT_REINIT_SECRET uninitialized Sep 21 07:15:44.113119: | global timer EVENT_SHUNT_SCAN uninitialized Sep 21 07:15:44.113121: | global timer EVENT_PENDING_DDNS uninitialized Sep 21 07:15:44.113124: | global timer EVENT_PENDING_PHASE2 uninitialized Sep 21 07:15:44.113126: | global timer EVENT_CHECK_CRLS uninitialized Sep 21 07:15:44.113129: | global timer EVENT_REVIVE_CONNS uninitialized Sep 21 07:15:44.113131: | global timer EVENT_FREE_ROOT_CERTS uninitialized Sep 21 07:15:44.113134: | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized Sep 21 07:15:44.113136: | global timer EVENT_NAT_T_KEEPALIVE uninitialized Sep 21 07:15:44.113140: | libevent_free: release ptr-libevent@0x56077c1cbac0 Sep 21 07:15:44.113143: | signal event handler PLUTO_SIGCHLD uninstalled Sep 21 07:15:44.113146: | libevent_free: release ptr-libevent@0x56077c1cbba0 Sep 21 07:15:44.113149: | signal event handler PLUTO_SIGTERM uninstalled Sep 21 07:15:44.113152: | libevent_free: release ptr-libevent@0x56077c1cbc60 Sep 21 07:15:44.113154: | signal event handler PLUTO_SIGHUP uninstalled Sep 21 07:15:44.113157: | libevent_free: release ptr-libevent@0x56077c1c06f0 Sep 21 07:15:44.113161: | signal event handler PLUTO_SIGSYS uninstalled Sep 21 07:15:44.113163: | releasing event base Sep 21 07:15:44.113177: | libevent_free: release ptr-libevent@0x56077c1cbd20 Sep 21 07:15:44.113180: | libevent_free: release ptr-libevent@0x56077c1a1260 Sep 21 07:15:44.113184: | libevent_free: release ptr-libevent@0x56077c1afaa0 Sep 21 07:15:44.113187: | libevent_free: release ptr-libevent@0x56077c1afb70 Sep 21 07:15:44.113189: | libevent_free: release ptr-libevent@0x56077c1afac0 Sep 21 07:15:44.113192: | libevent_free: release ptr-libevent@0x56077c1cba80 Sep 21 07:15:44.113194: | libevent_free: release ptr-libevent@0x56077c1cbb60 Sep 21 07:15:44.113197: | libevent_free: release ptr-libevent@0x56077c1afb50 Sep 21 07:15:44.113199: | libevent_free: release ptr-libevent@0x56077c1afcb0 Sep 21 07:15:44.113201: | libevent_free: release ptr-libevent@0x56077c1b4710 Sep 21 07:15:44.113204: | libevent_free: release ptr-libevent@0x56077c1cc5d0 Sep 21 07:15:44.113206: | libevent_free: release ptr-libevent@0x56077c1cc4e0 Sep 21 07:15:44.113209: | libevent_free: release ptr-libevent@0x56077c1cc3f0 Sep 21 07:15:44.113211: | libevent_free: release ptr-libevent@0x56077c1cc300 Sep 21 07:15:44.113213: | libevent_free: release ptr-libevent@0x56077c1cc210 Sep 21 07:15:44.113216: | libevent_free: release ptr-libevent@0x56077c1cc120 Sep 21 07:15:44.113218: | libevent_free: release ptr-libevent@0x56077c133370 Sep 21 07:15:44.113221: | libevent_free: release ptr-libevent@0x56077c1cbc40 Sep 21 07:15:44.113223: | libevent_free: release ptr-libevent@0x56077c1cbb80 Sep 21 07:15:44.113225: | libevent_free: release ptr-libevent@0x56077c1cbaa0 Sep 21 07:15:44.113228: | libevent_free: release ptr-libevent@0x56077c1cbd00 Sep 21 07:15:44.113230: | libevent_free: release ptr-libevent@0x56077c1315b0 Sep 21 07:15:44.113233: | libevent_free: release ptr-libevent@0x56077c1afae0 Sep 21 07:15:44.113236: | libevent_free: release ptr-libevent@0x56077c1afb10 Sep 21 07:15:44.113238: | libevent_free: release ptr-libevent@0x56077c1af800 Sep 21 07:15:44.113240: | releasing global libevent data Sep 21 07:15:44.113243: | libevent_free: release ptr-libevent@0x56077c1ae4f0 Sep 21 07:15:44.113246: | libevent_free: release ptr-libevent@0x56077c1af7a0 Sep 21 07:15:44.113249: | libevent_free: release ptr-libevent@0x56077c1af7d0