Sep 21 07:24:36.944140: FIPS Product: YES Sep 21 07:24:36.944190: FIPS Kernel: NO Sep 21 07:24:36.944193: FIPS Mode: NO Sep 21 07:24:36.944196: NSS DB directory: sql:/etc/ipsec.d Sep 21 07:24:36.944360: Initializing NSS Sep 21 07:24:36.944366: Opening NSS database "sql:/etc/ipsec.d" read-only Sep 21 07:24:36.989332: NSS initialized Sep 21 07:24:36.989343: NSS crypto library initialized Sep 21 07:24:36.989346: FIPS HMAC integrity support [enabled] Sep 21 07:24:36.989348: FIPS mode disabled for pluto daemon Sep 21 07:24:37.176695: FIPS HMAC integrity verification self-test FAILED Sep 21 07:24:37.176805: libcap-ng support [enabled] Sep 21 07:24:37.176819: Linux audit support [enabled] Sep 21 07:24:37.176851: Linux audit activated Sep 21 07:24:37.176858: Starting Pluto (Libreswan Version v3.28-827-gc9aa82b8a6-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC SYSTEMD_WATCHDOG FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:25748 Sep 21 07:24:37.176861: core dump dir: /tmp Sep 21 07:24:37.176864: secrets file: /etc/ipsec.secrets Sep 21 07:24:37.176866: leak-detective disabled Sep 21 07:24:37.176868: NSS crypto [enabled] Sep 21 07:24:37.176870: XAUTH PAM support [enabled] Sep 21 07:24:37.176946: | libevent is using pluto's memory allocator Sep 21 07:24:37.176952: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Sep 21 07:24:37.176967: | libevent_malloc: new ptr-libevent@0x5589e779b4e0 size 40 Sep 21 07:24:37.176970: | libevent_malloc: new ptr-libevent@0x5589e779c790 size 40 Sep 21 07:24:37.176975: | libevent_malloc: new ptr-libevent@0x5589e779c7c0 size 40 Sep 21 07:24:37.176978: | creating event base Sep 21 07:24:37.176980: | libevent_malloc: new ptr-libevent@0x5589e779c750 size 56 Sep 21 07:24:37.176983: | libevent_malloc: new ptr-libevent@0x5589e779c7f0 size 664 Sep 21 07:24:37.176994: | libevent_malloc: new ptr-libevent@0x5589e779ca90 size 24 Sep 21 07:24:37.176997: | libevent_malloc: new ptr-libevent@0x5589e778e250 size 384 Sep 21 07:24:37.177008: | libevent_malloc: new ptr-libevent@0x5589e779cab0 size 16 Sep 21 07:24:37.177010: | libevent_malloc: new ptr-libevent@0x5589e779cad0 size 40 Sep 21 07:24:37.177013: | libevent_malloc: new ptr-libevent@0x5589e779cb00 size 48 Sep 21 07:24:37.177020: | libevent_realloc: new ptr-libevent@0x5589e7720370 size 256 Sep 21 07:24:37.177022: | libevent_malloc: new ptr-libevent@0x5589e779cb40 size 16 Sep 21 07:24:37.177027: | libevent_free: release ptr-libevent@0x5589e779c750 Sep 21 07:24:37.177031: | libevent initialized Sep 21 07:24:37.177034: | libevent_realloc: new ptr-libevent@0x5589e779cb60 size 64 Sep 21 07:24:37.177038: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Sep 21 07:24:37.177055: | init_nat_traversal() initialized with keep_alive=0s Sep 21 07:24:37.177057: NAT-Traversal support [enabled] Sep 21 07:24:37.177060: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Sep 21 07:24:37.177066: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Sep 21 07:24:37.177069: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Sep 21 07:24:37.177101: | global one-shot timer EVENT_REVIVE_CONNS initialized Sep 21 07:24:37.177105: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Sep 21 07:24:37.177108: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Sep 21 07:24:37.177158: Encryption algorithms: Sep 21 07:24:37.177168: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Sep 21 07:24:37.177171: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Sep 21 07:24:37.177175: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Sep 21 07:24:37.177179: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Sep 21 07:24:37.177182: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Sep 21 07:24:37.177192: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Sep 21 07:24:37.177196: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Sep 21 07:24:37.177200: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Sep 21 07:24:37.177203: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Sep 21 07:24:37.177207: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Sep 21 07:24:37.177210: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Sep 21 07:24:37.177214: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Sep 21 07:24:37.177217: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Sep 21 07:24:37.177221: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Sep 21 07:24:37.177225: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Sep 21 07:24:37.177227: NULL IKEv1: ESP IKEv2: ESP [] Sep 21 07:24:37.177231: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Sep 21 07:24:37.177237: Hash algorithms: Sep 21 07:24:37.177240: MD5 IKEv1: IKE IKEv2: Sep 21 07:24:37.177243: SHA1 IKEv1: IKE IKEv2: FIPS sha Sep 21 07:24:37.177246: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Sep 21 07:24:37.177249: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Sep 21 07:24:37.177252: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Sep 21 07:24:37.177264: PRF algorithms: Sep 21 07:24:37.177267: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Sep 21 07:24:37.177271: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Sep 21 07:24:37.177274: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Sep 21 07:24:37.177277: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Sep 21 07:24:37.177280: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Sep 21 07:24:37.177283: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Sep 21 07:24:37.177308: Integrity algorithms: Sep 21 07:24:37.177311: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Sep 21 07:24:37.177315: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Sep 21 07:24:37.177319: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Sep 21 07:24:37.177323: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Sep 21 07:24:37.177327: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Sep 21 07:24:37.177330: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Sep 21 07:24:37.177333: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Sep 21 07:24:37.177336: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Sep 21 07:24:37.177339: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Sep 21 07:24:37.177351: DH algorithms: Sep 21 07:24:37.177354: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Sep 21 07:24:37.177357: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Sep 21 07:24:37.177360: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Sep 21 07:24:37.177365: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Sep 21 07:24:37.177368: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Sep 21 07:24:37.177371: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Sep 21 07:24:37.177373: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Sep 21 07:24:37.177377: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Sep 21 07:24:37.177380: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Sep 21 07:24:37.177383: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Sep 21 07:24:37.177385: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Sep 21 07:24:37.177388: testing CAMELLIA_CBC: Sep 21 07:24:37.177390: Camellia: 16 bytes with 128-bit key Sep 21 07:24:37.177509: Camellia: 16 bytes with 128-bit key Sep 21 07:24:37.177539: Camellia: 16 bytes with 256-bit key Sep 21 07:24:37.177570: Camellia: 16 bytes with 256-bit key Sep 21 07:24:37.177597: testing AES_GCM_16: Sep 21 07:24:37.177600: empty string Sep 21 07:24:37.177627: one block Sep 21 07:24:37.177652: two blocks Sep 21 07:24:37.177677: two blocks with associated data Sep 21 07:24:37.177702: testing AES_CTR: Sep 21 07:24:37.177705: Encrypting 16 octets using AES-CTR with 128-bit key Sep 21 07:24:37.177731: Encrypting 32 octets using AES-CTR with 128-bit key Sep 21 07:24:37.177759: Encrypting 36 octets using AES-CTR with 128-bit key Sep 21 07:24:37.177790: Encrypting 16 octets using AES-CTR with 192-bit key Sep 21 07:24:37.177819: Encrypting 32 octets using AES-CTR with 192-bit key Sep 21 07:24:37.177848: Encrypting 36 octets using AES-CTR with 192-bit key Sep 21 07:24:37.177875: Encrypting 16 octets using AES-CTR with 256-bit key Sep 21 07:24:37.177901: Encrypting 32 octets using AES-CTR with 256-bit key Sep 21 07:24:37.177928: Encrypting 36 octets using AES-CTR with 256-bit key Sep 21 07:24:37.177956: testing AES_CBC: Sep 21 07:24:37.177958: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Sep 21 07:24:37.177984: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Sep 21 07:24:37.178013: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Sep 21 07:24:37.178041: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Sep 21 07:24:37.178075: testing AES_XCBC: Sep 21 07:24:37.178077: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Sep 21 07:24:37.178195: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Sep 21 07:24:37.178347: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Sep 21 07:24:37.178487: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Sep 21 07:24:37.178614: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Sep 21 07:24:37.178743: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Sep 21 07:24:37.178879: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Sep 21 07:24:37.179180: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Sep 21 07:24:37.179310: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Sep 21 07:24:37.179449: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Sep 21 07:24:37.179686: testing HMAC_MD5: Sep 21 07:24:37.179689: RFC 2104: MD5_HMAC test 1 Sep 21 07:24:37.179866: RFC 2104: MD5_HMAC test 2 Sep 21 07:24:37.180023: RFC 2104: MD5_HMAC test 3 Sep 21 07:24:37.180202: 8 CPU cores online Sep 21 07:24:37.180206: starting up 7 crypto helpers Sep 21 07:24:37.180253: started thread for crypto helper 0 Sep 21 07:24:37.180274: started thread for crypto helper 1 Sep 21 07:24:37.180293: started thread for crypto helper 2 Sep 21 07:24:37.180311: started thread for crypto helper 3 Sep 21 07:24:37.180330: started thread for crypto helper 4 Sep 21 07:24:37.180348: started thread for crypto helper 5 Sep 21 07:24:37.180372: started thread for crypto helper 6 Sep 21 07:24:37.180376: | checking IKEv1 state table Sep 21 07:24:37.180384: | MAIN_R0: category: half-open IKE SA flags: 0: Sep 21 07:24:37.180386: | -> MAIN_R1 EVENT_SO_DISCARD Sep 21 07:24:37.180389: | MAIN_I1: category: half-open IKE SA flags: 0: Sep 21 07:24:37.180391: | -> MAIN_I2 EVENT_RETRANSMIT Sep 21 07:24:37.180394: | MAIN_R1: category: open IKE SA flags: 200: Sep 21 07:24:37.180396: | -> MAIN_R2 EVENT_RETRANSMIT Sep 21 07:24:37.180399: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:24:37.180401: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:24:37.180403: | MAIN_I2: category: open IKE SA flags: 0: Sep 21 07:24:37.180406: | -> MAIN_I3 EVENT_RETRANSMIT Sep 21 07:24:37.180408: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:24:37.180410: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:24:37.180413: | MAIN_R2: category: open IKE SA flags: 0: Sep 21 07:24:37.180415: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:24:37.180417: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:24:37.180419: | -> UNDEFINED EVENT_SA_REPLACE Sep 21 07:24:37.180422: | MAIN_I3: category: open IKE SA flags: 0: Sep 21 07:24:37.180424: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:24:37.180426: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:24:37.180429: | -> UNDEFINED EVENT_SA_REPLACE Sep 21 07:24:37.180431: | MAIN_R3: category: established IKE SA flags: 200: Sep 21 07:24:37.180433: | -> UNDEFINED EVENT_NULL Sep 21 07:24:37.180436: | MAIN_I4: category: established IKE SA flags: 0: Sep 21 07:24:37.180438: | -> UNDEFINED EVENT_NULL Sep 21 07:24:37.180441: | AGGR_R0: category: half-open IKE SA flags: 0: Sep 21 07:24:37.180443: | -> AGGR_R1 EVENT_SO_DISCARD Sep 21 07:24:37.180446: | AGGR_I1: category: half-open IKE SA flags: 0: Sep 21 07:24:37.180448: | -> AGGR_I2 EVENT_SA_REPLACE Sep 21 07:24:37.180450: | -> AGGR_I2 EVENT_SA_REPLACE Sep 21 07:24:37.180453: | AGGR_R1: category: open IKE SA flags: 200: Sep 21 07:24:37.180455: | -> AGGR_R2 EVENT_SA_REPLACE Sep 21 07:24:37.180457: | -> AGGR_R2 EVENT_SA_REPLACE Sep 21 07:24:37.180460: | AGGR_I2: category: established IKE SA flags: 200: Sep 21 07:24:37.180462: | -> UNDEFINED EVENT_NULL Sep 21 07:24:37.180465: | AGGR_R2: category: established IKE SA flags: 0: Sep 21 07:24:37.180467: | -> UNDEFINED EVENT_NULL Sep 21 07:24:37.180470: | QUICK_R0: category: established CHILD SA flags: 0: Sep 21 07:24:37.180472: | -> QUICK_R1 EVENT_RETRANSMIT Sep 21 07:24:37.180475: | QUICK_I1: category: established CHILD SA flags: 0: Sep 21 07:24:37.180477: | -> QUICK_I2 EVENT_SA_REPLACE Sep 21 07:24:37.180480: | QUICK_R1: category: established CHILD SA flags: 0: Sep 21 07:24:37.180482: | -> QUICK_R2 EVENT_SA_REPLACE Sep 21 07:24:37.180484: | QUICK_I2: category: established CHILD SA flags: 200: Sep 21 07:24:37.180487: | -> UNDEFINED EVENT_NULL Sep 21 07:24:37.180489: | QUICK_R2: category: established CHILD SA flags: 0: Sep 21 07:24:37.180492: | -> UNDEFINED EVENT_NULL Sep 21 07:24:37.180494: | INFO: category: informational flags: 0: Sep 21 07:24:37.180496: | -> UNDEFINED EVENT_NULL Sep 21 07:24:37.180499: | INFO_PROTECTED: category: informational flags: 0: Sep 21 07:24:37.180501: | -> UNDEFINED EVENT_NULL Sep 21 07:24:37.180504: | XAUTH_R0: category: established IKE SA flags: 0: Sep 21 07:24:37.180506: | -> XAUTH_R1 EVENT_NULL Sep 21 07:24:37.180509: | XAUTH_R1: category: established IKE SA flags: 0: Sep 21 07:24:37.180511: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:24:37.180513: | MODE_CFG_R0: category: informational flags: 0: Sep 21 07:24:37.180516: | -> MODE_CFG_R1 EVENT_SA_REPLACE Sep 21 07:24:37.180518: | MODE_CFG_R1: category: established IKE SA flags: 0: Sep 21 07:24:37.180521: | -> MODE_CFG_R2 EVENT_SA_REPLACE Sep 21 07:24:37.180523: | MODE_CFG_R2: category: established IKE SA flags: 0: Sep 21 07:24:37.180526: | -> UNDEFINED EVENT_NULL Sep 21 07:24:37.180528: | MODE_CFG_I1: category: established IKE SA flags: 0: Sep 21 07:24:37.180533: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:24:37.180536: | XAUTH_I0: category: established IKE SA flags: 0: Sep 21 07:24:37.180538: | -> XAUTH_I1 EVENT_RETRANSMIT Sep 21 07:24:37.180541: | XAUTH_I1: category: established IKE SA flags: 0: Sep 21 07:24:37.180543: | -> MAIN_I4 EVENT_RETRANSMIT Sep 21 07:24:37.180549: | checking IKEv2 state table Sep 21 07:24:37.180554: | PARENT_I0: category: ignore flags: 0: Sep 21 07:24:37.180557: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Sep 21 07:24:37.180560: | PARENT_I1: category: half-open IKE SA flags: 0: Sep 21 07:24:37.180563: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Sep 21 07:24:37.180565: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Sep 21 07:24:37.180568: | PARENT_I2: category: open IKE SA flags: 0: Sep 21 07:24:37.180571: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Sep 21 07:24:37.180573: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Sep 21 07:24:37.180576: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Sep 21 07:24:37.180579: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Sep 21 07:24:37.180581: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Sep 21 07:24:37.180584: | PARENT_I3: category: established IKE SA flags: 0: Sep 21 07:24:37.180587: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Sep 21 07:24:37.180589: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Sep 21 07:24:37.180591: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Sep 21 07:24:37.180594: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Sep 21 07:24:37.180597: | PARENT_R0: category: half-open IKE SA flags: 0: Sep 21 07:24:37.180600: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Sep 21 07:24:37.180602: | PARENT_R1: category: half-open IKE SA flags: 0: Sep 21 07:24:37.180605: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Sep 21 07:24:37.180608: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Sep 21 07:24:37.180610: | PARENT_R2: category: established IKE SA flags: 0: Sep 21 07:24:37.180613: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Sep 21 07:24:37.180616: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Sep 21 07:24:37.180618: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Sep 21 07:24:37.180621: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Sep 21 07:24:37.180623: | V2_CREATE_I0: category: established IKE SA flags: 0: Sep 21 07:24:37.180626: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Sep 21 07:24:37.180629: | V2_CREATE_I: category: established IKE SA flags: 0: Sep 21 07:24:37.180631: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Sep 21 07:24:37.180634: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Sep 21 07:24:37.180637: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Sep 21 07:24:37.180640: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Sep 21 07:24:37.180642: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Sep 21 07:24:37.180645: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Sep 21 07:24:37.180647: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Sep 21 07:24:37.180650: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Sep 21 07:24:37.180653: | V2_CREATE_R: category: established IKE SA flags: 0: Sep 21 07:24:37.180656: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Sep 21 07:24:37.180661: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Sep 21 07:24:37.180663: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Sep 21 07:24:37.180666: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Sep 21 07:24:37.180669: | V2_IPSEC_I: category: established CHILD SA flags: 0: Sep 21 07:24:37.180672: | V2_IPSEC_R: category: established CHILD SA flags: 0: Sep 21 07:24:37.180674: | IKESA_DEL: category: established IKE SA flags: 0: Sep 21 07:24:37.180677: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Sep 21 07:24:37.180680: | CHILDSA_DEL: category: informational flags: 0: Sep 21 07:24:37.180691: Using Linux XFRM/NETKEY IPsec interface code on 5.2.11+ Sep 21 07:24:37.180753: | Hard-wiring algorithms Sep 21 07:24:37.180756: | adding AES_CCM_16 to kernel algorithm db Sep 21 07:24:37.180760: | adding AES_CCM_12 to kernel algorithm db Sep 21 07:24:37.180762: | adding AES_CCM_8 to kernel algorithm db Sep 21 07:24:37.180765: | adding 3DES_CBC to kernel algorithm db Sep 21 07:24:37.180767: | adding CAMELLIA_CBC to kernel algorithm db Sep 21 07:24:37.180770: | adding AES_GCM_16 to kernel algorithm db Sep 21 07:24:37.180772: | adding AES_GCM_12 to kernel algorithm db Sep 21 07:24:37.180774: | adding AES_GCM_8 to kernel algorithm db Sep 21 07:24:37.180776: | adding AES_CTR to kernel algorithm db Sep 21 07:24:37.180779: | adding AES_CBC to kernel algorithm db Sep 21 07:24:37.180781: | adding SERPENT_CBC to kernel algorithm db Sep 21 07:24:37.180787: | adding TWOFISH_CBC to kernel algorithm db Sep 21 07:24:37.180792: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Sep 21 07:24:37.180794: | adding NULL to kernel algorithm db Sep 21 07:24:37.180796: | adding CHACHA20_POLY1305 to kernel algorithm db Sep 21 07:24:37.180799: | adding HMAC_MD5_96 to kernel algorithm db Sep 21 07:24:37.180801: | adding HMAC_SHA1_96 to kernel algorithm db Sep 21 07:24:37.180804: | adding HMAC_SHA2_512_256 to kernel algorithm db Sep 21 07:24:37.180806: | adding HMAC_SHA2_384_192 to kernel algorithm db Sep 21 07:24:37.180809: | adding HMAC_SHA2_256_128 to kernel algorithm db Sep 21 07:24:37.180811: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Sep 21 07:24:37.180814: | adding AES_XCBC_96 to kernel algorithm db Sep 21 07:24:37.180816: | adding AES_CMAC_96 to kernel algorithm db Sep 21 07:24:37.180818: | adding NONE to kernel algorithm db Sep 21 07:24:37.180851: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Sep 21 07:24:37.180856: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Sep 21 07:24:37.180859: | setup kernel fd callback Sep 21 07:24:37.180862: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x5589e77a6f10 Sep 21 07:24:37.180865: | libevent_malloc: new ptr-libevent@0x5589e77ae3e0 size 128 Sep 21 07:24:37.180868: | libevent_malloc: new ptr-libevent@0x5589e779cca0 size 16 Sep 21 07:24:37.180873: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x5589e77a17b0 Sep 21 07:24:37.180876: | libevent_malloc: new ptr-libevent@0x5589e77ae470 size 128 Sep 21 07:24:37.180878: | libevent_malloc: new ptr-libevent@0x5589e77a1700 size 16 Sep 21 07:24:37.181110: | global one-shot timer EVENT_CHECK_CRLS initialized Sep 21 07:24:37.181118: selinux support is enabled. Sep 21 07:24:37.181195: systemd watchdog not enabled - not sending watchdog keepalives Sep 21 07:24:37.181366: | unbound context created - setting debug level to 5 Sep 21 07:24:37.181394: | /etc/hosts lookups activated Sep 21 07:24:37.181408: | /etc/resolv.conf usage activated Sep 21 07:24:37.181471: | outgoing-port-avoid set 0-65535 Sep 21 07:24:37.181500: | outgoing-port-permit set 32768-60999 Sep 21 07:24:37.181503: | Loading dnssec root key from:/var/lib/unbound/root.key Sep 21 07:24:37.181506: | No additional dnssec trust anchors defined via dnssec-trusted= option Sep 21 07:24:37.181509: | Setting up events, loop start Sep 21 07:24:37.181512: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x5589e77a1500 Sep 21 07:24:37.181518: | libevent_malloc: new ptr-libevent@0x5589e77b89e0 size 128 Sep 21 07:24:37.181521: | libevent_malloc: new ptr-libevent@0x5589e77b8a70 size 16 Sep 21 07:24:37.181528: | libevent_realloc: new ptr-libevent@0x5589e771e5b0 size 256 Sep 21 07:24:37.181531: | libevent_malloc: new ptr-libevent@0x5589e77b8a90 size 8 Sep 21 07:24:37.181534: | libevent_realloc: new ptr-libevent@0x5589e77ad6e0 size 144 Sep 21 07:24:37.181536: | libevent_malloc: new ptr-libevent@0x5589e77b8ab0 size 152 Sep 21 07:24:37.181540: | libevent_malloc: new ptr-libevent@0x5589e77b8b50 size 16 Sep 21 07:24:37.181544: | signal event handler PLUTO_SIGCHLD installed Sep 21 07:24:37.181546: | libevent_malloc: new ptr-libevent@0x5589e77b8b70 size 8 Sep 21 07:24:37.181549: | libevent_malloc: new ptr-libevent@0x5589e77b8b90 size 152 Sep 21 07:24:37.181552: | signal event handler PLUTO_SIGTERM installed Sep 21 07:24:37.181554: | libevent_malloc: new ptr-libevent@0x5589e77b8c30 size 8 Sep 21 07:24:37.181557: | libevent_malloc: new ptr-libevent@0x5589e77b8c50 size 152 Sep 21 07:24:37.181560: | signal event handler PLUTO_SIGHUP installed Sep 21 07:24:37.181562: | libevent_malloc: new ptr-libevent@0x5589e77b8cf0 size 8 Sep 21 07:24:37.181565: | libevent_realloc: release ptr-libevent@0x5589e77ad6e0 Sep 21 07:24:37.181567: | libevent_realloc: new ptr-libevent@0x5589e77b8d10 size 256 Sep 21 07:24:37.181570: | libevent_malloc: new ptr-libevent@0x5589e77ad6e0 size 152 Sep 21 07:24:37.181573: | signal event handler PLUTO_SIGSYS installed Sep 21 07:24:37.182045: | created addconn helper (pid:25963) using fork+execve Sep 21 07:24:37.182062: | forked child 25963 Sep 21 07:24:37.182103: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:24:37.182125: | pluto_sd: executing action action: reloading(4), status 0 Sep 21 07:24:37.182131: listening for IKE messages Sep 21 07:24:37.182186: | Inspecting interface lo Sep 21 07:24:37.182193: | found lo with address 127.0.0.1 Sep 21 07:24:37.182196: | Inspecting interface eth0 Sep 21 07:24:37.182200: | found eth0 with address 192.0.2.254 Sep 21 07:24:37.182202: | Inspecting interface eth1 Sep 21 07:24:37.182206: | found eth1 with address 192.1.2.23 Sep 21 07:24:37.182259: Kernel supports NIC esp-hw-offload Sep 21 07:24:37.182280: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.23:500 Sep 21 07:24:37.182318: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:24:37.182327: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:24:37.182332: adding interface eth1/eth1 192.1.2.23:4500 Sep 21 07:24:37.182370: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.2.254:500 Sep 21 07:24:37.182400: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:24:37.182405: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:24:37.182409: adding interface eth0/eth0 192.0.2.254:4500 Sep 21 07:24:37.182440: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Sep 21 07:24:37.182470: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:24:37.182475: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:24:37.182479: adding interface lo/lo 127.0.0.1:4500 Sep 21 07:24:37.182568: | no interfaces to sort Sep 21 07:24:37.182573: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Sep 21 07:24:37.182583: | add_fd_read_event_handler: new ethX-pe@0x5589e77a2280 Sep 21 07:24:37.182586: | libevent_malloc: new ptr-libevent@0x5589e77b9080 size 128 Sep 21 07:24:37.182590: | libevent_malloc: new ptr-libevent@0x5589e77b9110 size 16 Sep 21 07:24:37.182599: | setup callback for interface lo 127.0.0.1:4500 fd 22 Sep 21 07:24:37.182602: | add_fd_read_event_handler: new ethX-pe@0x5589e77b9130 Sep 21 07:24:37.182604: | libevent_malloc: new ptr-libevent@0x5589e77b9170 size 128 Sep 21 07:24:37.182607: | libevent_malloc: new ptr-libevent@0x5589e77b9200 size 16 Sep 21 07:24:37.182616: | setup callback for interface lo 127.0.0.1:500 fd 21 Sep 21 07:24:37.182619: | add_fd_read_event_handler: new ethX-pe@0x5589e77b9220 Sep 21 07:24:37.182622: | libevent_malloc: new ptr-libevent@0x5589e77b9260 size 128 Sep 21 07:24:37.182625: | libevent_malloc: new ptr-libevent@0x5589e77b92f0 size 16 Sep 21 07:24:37.182630: | setup callback for interface eth0 192.0.2.254:4500 fd 20 Sep 21 07:24:37.182633: | add_fd_read_event_handler: new ethX-pe@0x5589e77b9310 Sep 21 07:24:37.182635: | libevent_malloc: new ptr-libevent@0x5589e77b9350 size 128 Sep 21 07:24:37.182638: | libevent_malloc: new ptr-libevent@0x5589e77b93e0 size 16 Sep 21 07:24:37.182643: | setup callback for interface eth0 192.0.2.254:500 fd 19 Sep 21 07:24:37.182646: | add_fd_read_event_handler: new ethX-pe@0x5589e77b9400 Sep 21 07:24:37.182648: | libevent_malloc: new ptr-libevent@0x5589e77b9440 size 128 Sep 21 07:24:37.182651: | libevent_malloc: new ptr-libevent@0x5589e77b94d0 size 16 Sep 21 07:24:37.182656: | setup callback for interface eth1 192.1.2.23:4500 fd 18 Sep 21 07:24:37.182659: | add_fd_read_event_handler: new ethX-pe@0x5589e77b94f0 Sep 21 07:24:37.182661: | libevent_malloc: new ptr-libevent@0x5589e77b9530 size 128 Sep 21 07:24:37.182664: | libevent_malloc: new ptr-libevent@0x5589e77b95c0 size 16 Sep 21 07:24:37.182669: | setup callback for interface eth1 192.1.2.23:500 fd 17 Sep 21 07:24:37.182674: | certs and keys locked by 'free_preshared_secrets' Sep 21 07:24:37.182677: | certs and keys unlocked by 'free_preshared_secrets' Sep 21 07:24:37.182697: loading secrets from "/etc/ipsec.secrets" Sep 21 07:24:37.182719: | Processing PSK at line 1: passed Sep 21 07:24:37.182723: | certs and keys locked by 'process_secret' Sep 21 07:24:37.182728: | certs and keys unlocked by 'process_secret' Sep 21 07:24:37.182733: | pluto_sd: executing action action: ready(5), status 0 Sep 21 07:24:37.182847: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:24:37.182858: | spent 0.606 milliseconds in whack Sep 21 07:24:37.184926: | starting up helper thread 2 Sep 21 07:24:37.184944: | status value returned by setting the priority of this thread (crypto helper 2) 22 Sep 21 07:24:37.184950: | crypto helper 2 waiting (nothing to do) Sep 21 07:24:37.184962: | starting up helper thread 3 Sep 21 07:24:37.184967: | status value returned by setting the priority of this thread (crypto helper 3) 22 Sep 21 07:24:37.184969: | crypto helper 3 waiting (nothing to do) Sep 21 07:24:37.184979: | starting up helper thread 4 Sep 21 07:24:37.184983: | status value returned by setting the priority of this thread (crypto helper 4) 22 Sep 21 07:24:37.184986: | crypto helper 4 waiting (nothing to do) Sep 21 07:24:37.187200: | starting up helper thread 6 Sep 21 07:24:37.187215: | status value returned by setting the priority of this thread (crypto helper 6) 22 Sep 21 07:24:37.187218: | crypto helper 6 waiting (nothing to do) Sep 21 07:24:37.195803: | starting up helper thread 0 Sep 21 07:24:37.195823: | status value returned by setting the priority of this thread (crypto helper 0) 22 Sep 21 07:24:37.195828: | crypto helper 0 waiting (nothing to do) Sep 21 07:24:37.195840: | starting up helper thread 1 Sep 21 07:24:37.195846: | status value returned by setting the priority of this thread (crypto helper 1) 22 Sep 21 07:24:37.195849: | crypto helper 1 waiting (nothing to do) Sep 21 07:24:37.195858: | starting up helper thread 5 Sep 21 07:24:37.195864: | status value returned by setting the priority of this thread (crypto helper 5) 22 Sep 21 07:24:37.195866: | crypto helper 5 waiting (nothing to do) Sep 21 07:24:37.294205: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:24:37.294235: | pluto_sd: executing action action: reloading(4), status 0 Sep 21 07:24:37.294241: listening for IKE messages Sep 21 07:24:37.294281: | Inspecting interface lo Sep 21 07:24:37.294291: | found lo with address 127.0.0.1 Sep 21 07:24:37.294297: | Inspecting interface eth0 Sep 21 07:24:37.294302: | found eth0 with address 192.0.2.254 Sep 21 07:24:37.294311: | Inspecting interface eth1 Sep 21 07:24:37.294316: | found eth1 with address 192.1.2.23 Sep 21 07:24:37.294401: | no interfaces to sort Sep 21 07:24:37.294412: | libevent_free: release ptr-libevent@0x5589e77b9080 Sep 21 07:24:37.294415: | free_event_entry: release EVENT_NULL-pe@0x5589e77a2280 Sep 21 07:24:37.294419: | add_fd_read_event_handler: new ethX-pe@0x5589e77a2280 Sep 21 07:24:37.294422: | libevent_malloc: new ptr-libevent@0x5589e77b9080 size 128 Sep 21 07:24:37.294430: | setup callback for interface lo 127.0.0.1:4500 fd 22 Sep 21 07:24:37.294434: | libevent_free: release ptr-libevent@0x5589e77b9170 Sep 21 07:24:37.294436: | free_event_entry: release EVENT_NULL-pe@0x5589e77b9130 Sep 21 07:24:37.294439: | add_fd_read_event_handler: new ethX-pe@0x5589e77b9130 Sep 21 07:24:37.294442: | libevent_malloc: new ptr-libevent@0x5589e77b9170 size 128 Sep 21 07:24:37.294447: | setup callback for interface lo 127.0.0.1:500 fd 21 Sep 21 07:24:37.294450: | libevent_free: release ptr-libevent@0x5589e77b9260 Sep 21 07:24:37.294453: | free_event_entry: release EVENT_NULL-pe@0x5589e77b9220 Sep 21 07:24:37.294456: | add_fd_read_event_handler: new ethX-pe@0x5589e77b9220 Sep 21 07:24:37.294458: | libevent_malloc: new ptr-libevent@0x5589e77b9260 size 128 Sep 21 07:24:37.294463: | setup callback for interface eth0 192.0.2.254:4500 fd 20 Sep 21 07:24:37.294467: | libevent_free: release ptr-libevent@0x5589e77b9350 Sep 21 07:24:37.294470: | free_event_entry: release EVENT_NULL-pe@0x5589e77b9310 Sep 21 07:24:37.294472: | add_fd_read_event_handler: new ethX-pe@0x5589e77b9310 Sep 21 07:24:37.294475: | libevent_malloc: new ptr-libevent@0x5589e77b9350 size 128 Sep 21 07:24:37.294480: | setup callback for interface eth0 192.0.2.254:500 fd 19 Sep 21 07:24:37.294484: | libevent_free: release ptr-libevent@0x5589e77b9440 Sep 21 07:24:37.294487: | free_event_entry: release EVENT_NULL-pe@0x5589e77b9400 Sep 21 07:24:37.294489: | add_fd_read_event_handler: new ethX-pe@0x5589e77b9400 Sep 21 07:24:37.294492: | libevent_malloc: new ptr-libevent@0x5589e77b9440 size 128 Sep 21 07:24:37.294497: | setup callback for interface eth1 192.1.2.23:4500 fd 18 Sep 21 07:24:37.294500: | libevent_free: release ptr-libevent@0x5589e77b9530 Sep 21 07:24:37.294503: | free_event_entry: release EVENT_NULL-pe@0x5589e77b94f0 Sep 21 07:24:37.294505: | add_fd_read_event_handler: new ethX-pe@0x5589e77b94f0 Sep 21 07:24:37.294508: | libevent_malloc: new ptr-libevent@0x5589e77b9530 size 128 Sep 21 07:24:37.294513: | setup callback for interface eth1 192.1.2.23:500 fd 17 Sep 21 07:24:37.294516: | certs and keys locked by 'free_preshared_secrets' Sep 21 07:24:37.294518: forgetting secrets Sep 21 07:24:37.294524: | certs and keys unlocked by 'free_preshared_secrets' Sep 21 07:24:37.294539: loading secrets from "/etc/ipsec.secrets" Sep 21 07:24:37.294546: | Processing PSK at line 1: passed Sep 21 07:24:37.294549: | certs and keys locked by 'process_secret' Sep 21 07:24:37.294551: | certs and keys unlocked by 'process_secret' Sep 21 07:24:37.294556: | pluto_sd: executing action action: ready(5), status 0 Sep 21 07:24:37.294563: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:24:37.294579: | spent 0.374 milliseconds in whack Sep 21 07:24:37.298930: | processing signal PLUTO_SIGCHLD Sep 21 07:24:37.298961: | waitpid returned pid 25963 (exited with status 0) Sep 21 07:24:37.298968: | reaped addconn helper child (status 0) Sep 21 07:24:37.298975: | waitpid returned ECHILD (no child processes left) Sep 21 07:24:37.298984: | spent 0.0249 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:24:37.378546: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:24:37.378573: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:24:37.378578: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Sep 21 07:24:37.378580: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:24:37.378583: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Sep 21 07:24:37.378587: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:24:37.378599: | Added new connection test with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Sep 21 07:24:37.378603: | from whack: got --esp=aes256-sha1,aes-sha1 Sep 21 07:24:37.378628: | ESP/AH string values: AES_CBC_256-HMAC_SHA1_96, AES_CBC-HMAC_SHA1_96 Sep 21 07:24:37.378635: | counting wild cards for 192.1.2.23 is 0 Sep 21 07:24:37.378639: | counting wild cards for 192.1.2.45 is 0 Sep 21 07:24:37.378650: | connect_to_host_pair: 192.1.2.23:500 192.1.2.45:500 -> hp@(nil): none Sep 21 07:24:37.378655: | new hp@0x5589e7785a10 Sep 21 07:24:37.378659: added connection description "test" Sep 21 07:24:37.378667: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Sep 21 07:24:37.378680: | 192.1.2.23/32===192.1.2.23<192.1.2.23>...192.1.2.45<192.1.2.45>===10.1.1.0/29 Sep 21 07:24:37.378687: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:24:37.378694: | spent 0.149 milliseconds in whack Sep 21 07:24:38.404710: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:38.404741: | *received 92 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:38.404745: | c0 57 9e c8 78 be 5b 4c 00 00 00 00 00 00 00 00 Sep 21 07:24:38.404748: | 01 10 02 00 00 00 00 00 00 00 00 5c 00 00 00 40 Sep 21 07:24:38.404750: | 00 00 00 01 00 00 00 01 00 00 00 34 01 01 00 02 Sep 21 07:24:38.404752: | 03 00 00 1c 01 01 00 00 80 01 00 07 80 0e 00 80 Sep 21 07:24:38.404754: | 80 02 00 01 80 03 00 01 80 04 00 04 00 00 00 10 Sep 21 07:24:38.404757: | 02 01 00 00 80 03 00 01 80 04 00 04 Sep 21 07:24:38.404763: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:38.404768: | **parse ISAKMP Message: Sep 21 07:24:38.404771: | initiator cookie: Sep 21 07:24:38.404773: | c0 57 9e c8 78 be 5b 4c Sep 21 07:24:38.404775: | responder cookie: Sep 21 07:24:38.404778: | 00 00 00 00 00 00 00 00 Sep 21 07:24:38.404781: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:38.404787: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.404792: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:38.404795: | flags: none (0x0) Sep 21 07:24:38.404797: | Message ID: 0 (0x0) Sep 21 07:24:38.404799: | length: 92 (0x5c) Sep 21 07:24:38.404802: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:38.404806: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:38.404809: | #null state always idle Sep 21 07:24:38.404813: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:38.404816: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:38.404819: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.404821: | length: 64 (0x40) Sep 21 07:24:38.404823: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.404826: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:38.404829: | in statetime_start() with no state Sep 21 07:24:38.404834: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:38.404840: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:38.404843: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:38.404847: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:38.404850: | find_next_host_connection returns test Sep 21 07:24:38.404853: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:38.404855: | find_next_host_connection returns empty Sep 21 07:24:38.404881: | creating state object #1 at 0x5589e77bbab0 Sep 21 07:24:38.404884: | State DB: adding IKEv1 state #1 in UNDEFINED Sep 21 07:24:38.404892: | pstats #1 ikev1.isakmp started Sep 21 07:24:38.404897: | #1 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:38.404908: | start processing: state #1 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:38.404912: | parent state #1: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:38.404915: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:38.404918: | ICOOKIE-DUMP: c0 57 9e c8 78 be 5b 4c Sep 21 07:24:38.404921: "test" #1: responding to Main Mode Sep 21 07:24:38.404953: | **emit ISAKMP Message: Sep 21 07:24:38.404957: | initiator cookie: Sep 21 07:24:38.404959: | c0 57 9e c8 78 be 5b 4c Sep 21 07:24:38.404961: | responder cookie: Sep 21 07:24:38.404964: | 6c 9e 34 ad 8a f3 0b be Sep 21 07:24:38.404966: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:38.404969: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.404971: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:38.404973: | flags: none (0x0) Sep 21 07:24:38.404975: | Message ID: 0 (0x0) Sep 21 07:24:38.404978: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:38.404981: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:38.404983: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:38.404986: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:38.404988: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.404991: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:38.404994: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:38.404997: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:38.405000: | ****parse IPsec DOI SIT: Sep 21 07:24:38.405002: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:38.405005: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:38.405007: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.405009: | length: 52 (0x34) Sep 21 07:24:38.405012: | proposal number: 1 (0x1) Sep 21 07:24:38.405014: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:38.405016: | SPI size: 0 (0x0) Sep 21 07:24:38.405018: | number of transforms: 2 (0x2) Sep 21 07:24:38.405021: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:38.405023: | next payload type: ISAKMP_NEXT_T (0x3) Sep 21 07:24:38.405025: | length: 28 (0x1c) Sep 21 07:24:38.405027: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:38.405029: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:38.405032: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:38.405035: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:38.405037: | length/value: 7 (0x7) Sep 21 07:24:38.405040: | [7 is OAKLEY_AES_CBC] Sep 21 07:24:38.405044: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:38.405046: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Sep 21 07:24:38.405049: | length/value: 128 (0x80) Sep 21 07:24:38.405051: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:38.405054: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:38.405056: | length/value: 1 (0x1) Sep 21 07:24:38.405058: | [1 is OAKLEY_MD5] Sep 21 07:24:38.405061: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:38.405064: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Sep 21 07:24:38.405066: | length/value: 1 (0x1) Sep 21 07:24:38.405069: | [1 is OAKLEY_PRESHARED_KEY] Sep 21 07:24:38.405074: | started looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Sep 21 07:24:38.405078: | actually looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Sep 21 07:24:38.405082: | line 1: key type PKK_PSK(192.1.2.23) to type PKK_PSK Sep 21 07:24:38.405088: | 1: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Sep 21 07:24:38.405092: | 2: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Sep 21 07:24:38.405098: | line 1: match=002 Sep 21 07:24:38.405101: | match 002 beats previous best_match 000 match=0x5589e77ae5c0 (line=1) Sep 21 07:24:38.405104: | concluding with best_match=002 best=0x5589e77ae5c0 (lineno=1) Sep 21 07:24:38.405107: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:38.405109: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Sep 21 07:24:38.405112: | length/value: 4 (0x4) Sep 21 07:24:38.405114: | [4 is OAKLEY_GROUP_GP185(UNUSED)] Sep 21 07:24:38.405119: "test" #1: OAKLEY_GROUP 4 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Sep 21 07:24:38.405122: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:38.405125: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.405127: | length: 16 (0x10) Sep 21 07:24:38.405129: | ISAKMP transform number: 2 (0x2) Sep 21 07:24:38.405132: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:38.405134: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:38.405136: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Sep 21 07:24:38.405138: | length/value: 1 (0x1) Sep 21 07:24:38.405140: | [1 is OAKLEY_PRESHARED_KEY] Sep 21 07:24:38.405145: | started looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Sep 21 07:24:38.405149: | actually looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Sep 21 07:24:38.405153: | line 1: key type PKK_PSK(192.1.2.23) to type PKK_PSK Sep 21 07:24:38.405156: | 1: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Sep 21 07:24:38.405161: | 2: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Sep 21 07:24:38.405163: | line 1: match=002 Sep 21 07:24:38.405166: | match 002 beats previous best_match 000 match=0x5589e77ae5c0 (line=1) Sep 21 07:24:38.405168: | concluding with best_match=002 best=0x5589e77ae5c0 (lineno=1) Sep 21 07:24:38.405171: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:38.405173: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Sep 21 07:24:38.405175: | length/value: 4 (0x4) Sep 21 07:24:38.405178: | [4 is OAKLEY_GROUP_GP185(UNUSED)] Sep 21 07:24:38.405181: "test" #1: OAKLEY_GROUP 4 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Sep 21 07:24:38.405184: "test" #1: no acceptable Oakley Transform Sep 21 07:24:38.405188: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:38.405194: | [RE]START processing: state #1 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:38.405196: | #1 is idle Sep 21 07:24:38.409232: "test" #1: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:38.409248: | **emit ISAKMP Message: Sep 21 07:24:38.409251: | initiator cookie: Sep 21 07:24:38.409254: | c0 57 9e c8 78 be 5b 4c Sep 21 07:24:38.409256: | responder cookie: Sep 21 07:24:38.409258: | 6c 9e 34 ad 8a f3 0b be Sep 21 07:24:38.409261: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.409263: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.409266: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:38.409269: | flags: none (0x0) Sep 21 07:24:38.409271: | Message ID: 0 (0x0) Sep 21 07:24:38.409274: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:38.409277: | ***emit ISAKMP Notification Payload: Sep 21 07:24:38.409280: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.409283: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.409285: | protocol ID: 1 (0x1) Sep 21 07:24:38.409287: | SPI size: 0 (0x0) Sep 21 07:24:38.409290: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:38.409293: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:38.409297: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:38.409300: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:38.409303: | emitting length of ISAKMP Message: 40 Sep 21 07:24:38.409313: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1) Sep 21 07:24:38.409323: | c0 57 9e c8 78 be 5b 4c 6c 9e 34 ad 8a f3 0b be Sep 21 07:24:38.409325: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:38.409328: | 00 00 00 01 01 00 00 0e Sep 21 07:24:38.409371: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:38.409379: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:38.409385: | stop processing: state #1 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:38.409388: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:38.409396: | spent 0.718 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:38.626311: | spent 0.00198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:38.626334: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:38.626338: | ad 94 e2 cf 4a 37 80 3f 00 00 00 00 00 00 00 00 Sep 21 07:24:38.626340: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:24:38.626343: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:24:38.626345: | 00 00 00 18 01 01 00 00 80 01 00 1a 80 02 00 08 Sep 21 07:24:38.626347: | 80 03 00 0f 80 04 00 20 Sep 21 07:24:38.626352: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:38.626356: | **parse ISAKMP Message: Sep 21 07:24:38.626359: | initiator cookie: Sep 21 07:24:38.626361: | ad 94 e2 cf 4a 37 80 3f Sep 21 07:24:38.626364: | responder cookie: Sep 21 07:24:38.626366: | 00 00 00 00 00 00 00 00 Sep 21 07:24:38.626369: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:38.626371: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.626374: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:38.626377: | flags: none (0x0) Sep 21 07:24:38.626379: | Message ID: 0 (0x0) Sep 21 07:24:38.626381: | length: 72 (0x48) Sep 21 07:24:38.626384: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:38.626388: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:38.626391: | #null state always idle Sep 21 07:24:38.626394: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:38.626397: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:38.626400: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.626402: | length: 44 (0x2c) Sep 21 07:24:38.626404: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.626407: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:38.626409: | in statetime_start() with no state Sep 21 07:24:38.626415: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:38.626421: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:38.626424: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:38.626427: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:38.626430: | find_next_host_connection returns test Sep 21 07:24:38.626432: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:38.626435: | find_next_host_connection returns empty Sep 21 07:24:38.626459: | creating state object #2 at 0x5589e77bc570 Sep 21 07:24:38.626462: | State DB: adding IKEv1 state #2 in UNDEFINED Sep 21 07:24:38.626470: | pstats #2 ikev1.isakmp started Sep 21 07:24:38.626475: | #2 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:38.626482: | start processing: state #2 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:38.626485: | parent state #2: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:38.626488: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:38.626491: | ICOOKIE-DUMP: ad 94 e2 cf 4a 37 80 3f Sep 21 07:24:38.626499: "test" #2: responding to Main Mode Sep 21 07:24:38.626504: | **emit ISAKMP Message: Sep 21 07:24:38.626507: | initiator cookie: Sep 21 07:24:38.626509: | ad 94 e2 cf 4a 37 80 3f Sep 21 07:24:38.626511: | responder cookie: Sep 21 07:24:38.626513: | 6a 36 84 d3 3a 13 17 b9 Sep 21 07:24:38.626516: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:38.626518: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.626521: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:38.626523: | flags: none (0x0) Sep 21 07:24:38.626526: | Message ID: 0 (0x0) Sep 21 07:24:38.626529: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:38.626531: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:38.626534: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:38.626537: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:38.626539: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.626542: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:38.626545: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:38.626548: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:38.626551: | ****parse IPsec DOI SIT: Sep 21 07:24:38.626553: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:38.626556: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:38.626559: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.626561: | length: 32 (0x20) Sep 21 07:24:38.626563: | proposal number: 1 (0x1) Sep 21 07:24:38.626566: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:38.626568: | SPI size: 0 (0x0) Sep 21 07:24:38.626570: | number of transforms: 1 (0x1) Sep 21 07:24:38.626573: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:38.626576: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.626578: | length: 24 (0x18) Sep 21 07:24:38.626580: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:38.626583: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:38.626585: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:38.626588: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:38.626591: | length/value: 26 (0x1a) Sep 21 07:24:38.626593: | [26 is OAKLEY_CAMELLIA_CCM_B] Sep 21 07:24:38.626597: "test" #2: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:38.626600: "test" #2: no acceptable Oakley Transform Sep 21 07:24:38.626603: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:38.626608: | [RE]START processing: state #2 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:38.626610: | #2 is idle Sep 21 07:24:38.626689: "test" #2: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:38.626693: | **emit ISAKMP Message: Sep 21 07:24:38.626696: | initiator cookie: Sep 21 07:24:38.626698: | ad 94 e2 cf 4a 37 80 3f Sep 21 07:24:38.626700: | responder cookie: Sep 21 07:24:38.626702: | 6a 36 84 d3 3a 13 17 b9 Sep 21 07:24:38.626705: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.626707: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.626710: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:38.626712: | flags: none (0x0) Sep 21 07:24:38.626715: | Message ID: 0 (0x0) Sep 21 07:24:38.626717: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:38.626720: | ***emit ISAKMP Notification Payload: Sep 21 07:24:38.626723: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.626725: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.626727: | protocol ID: 1 (0x1) Sep 21 07:24:38.626733: | SPI size: 0 (0x0) Sep 21 07:24:38.626735: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:38.626738: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:38.626741: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:38.626744: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:38.626746: | emitting length of ISAKMP Message: 40 Sep 21 07:24:38.626753: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #2) Sep 21 07:24:38.626755: | ad 94 e2 cf 4a 37 80 3f 6a 36 84 d3 3a 13 17 b9 Sep 21 07:24:38.626758: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:38.626760: | 00 00 00 01 01 00 00 0e Sep 21 07:24:38.626787: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:38.626795: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:38.626800: | stop processing: state #2 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:38.626803: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:38.626808: | spent 0.461 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:38.687393: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:38.687425: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:38.687429: | 7b e1 26 3f 40 e9 aa 88 00 00 00 00 00 00 00 00 Sep 21 07:24:38.687431: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:38.687433: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:38.687435: | 00 00 00 14 01 01 00 00 80 02 00 08 80 03 00 0f Sep 21 07:24:38.687437: | 80 04 00 20 Sep 21 07:24:38.687442: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:38.687446: | **parse ISAKMP Message: Sep 21 07:24:38.687449: | initiator cookie: Sep 21 07:24:38.687451: | 7b e1 26 3f 40 e9 aa 88 Sep 21 07:24:38.687453: | responder cookie: Sep 21 07:24:38.687456: | 00 00 00 00 00 00 00 00 Sep 21 07:24:38.687459: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:38.687461: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.687464: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:38.687466: | flags: none (0x0) Sep 21 07:24:38.687469: | Message ID: 0 (0x0) Sep 21 07:24:38.687471: | length: 68 (0x44) Sep 21 07:24:38.687474: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:38.687478: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:38.687481: | #null state always idle Sep 21 07:24:38.687484: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:38.687487: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:38.687489: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.687491: | length: 40 (0x28) Sep 21 07:24:38.687494: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.687496: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:38.687499: | in statetime_start() with no state Sep 21 07:24:38.687505: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:38.687510: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:38.687514: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:38.687518: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:38.687520: | find_next_host_connection returns test Sep 21 07:24:38.687523: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:38.687525: | find_next_host_connection returns empty Sep 21 07:24:38.687555: | creating state object #3 at 0x5589e77bd030 Sep 21 07:24:38.687560: | State DB: adding IKEv1 state #3 in UNDEFINED Sep 21 07:24:38.687572: | pstats #3 ikev1.isakmp started Sep 21 07:24:38.687577: | #3 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:38.687585: | start processing: state #3 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:38.687588: | parent state #3: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:38.687592: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:38.687594: | ICOOKIE-DUMP: 7b e1 26 3f 40 e9 aa 88 Sep 21 07:24:38.687597: "test" #3: responding to Main Mode Sep 21 07:24:38.687603: | **emit ISAKMP Message: Sep 21 07:24:38.687605: | initiator cookie: Sep 21 07:24:38.687607: | 7b e1 26 3f 40 e9 aa 88 Sep 21 07:24:38.687609: | responder cookie: Sep 21 07:24:38.687611: | f6 e8 9d a3 95 dc 80 b6 Sep 21 07:24:38.687614: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:38.687617: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.687619: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:38.687622: | flags: none (0x0) Sep 21 07:24:38.687624: | Message ID: 0 (0x0) Sep 21 07:24:38.687627: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:38.687630: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:38.687632: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:38.687635: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:38.687637: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.687640: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:38.687644: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:38.687647: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:38.687650: | ****parse IPsec DOI SIT: Sep 21 07:24:38.687652: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:38.687655: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:38.687657: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.687660: | length: 28 (0x1c) Sep 21 07:24:38.687662: | proposal number: 1 (0x1) Sep 21 07:24:38.687664: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:38.687666: | SPI size: 0 (0x0) Sep 21 07:24:38.687668: | number of transforms: 1 (0x1) Sep 21 07:24:38.687671: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:38.687674: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.687676: | length: 20 (0x14) Sep 21 07:24:38.687678: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:38.687680: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:38.687683: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:38.687686: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:38.687688: | length/value: 8 (0x8) Sep 21 07:24:38.687693: "test" #3: 8?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:38.687697: "test" #3: no acceptable Oakley Transform Sep 21 07:24:38.687699: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:38.687705: | [RE]START processing: state #3 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:38.687707: | #3 is idle Sep 21 07:24:38.687808: "test" #3: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:38.687818: | **emit ISAKMP Message: Sep 21 07:24:38.687821: | initiator cookie: Sep 21 07:24:38.687823: | 7b e1 26 3f 40 e9 aa 88 Sep 21 07:24:38.687826: | responder cookie: Sep 21 07:24:38.687828: | f6 e8 9d a3 95 dc 80 b6 Sep 21 07:24:38.687830: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.687835: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.687842: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:38.687850: | flags: none (0x0) Sep 21 07:24:38.687853: | Message ID: 0 (0x0) Sep 21 07:24:38.687856: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:38.687859: | ***emit ISAKMP Notification Payload: Sep 21 07:24:38.687862: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.687864: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.687866: | protocol ID: 1 (0x1) Sep 21 07:24:38.687868: | SPI size: 0 (0x0) Sep 21 07:24:38.687871: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:38.687874: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:38.687877: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:38.687880: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:38.687882: | emitting length of ISAKMP Message: 40 Sep 21 07:24:38.687889: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3) Sep 21 07:24:38.687892: | 7b e1 26 3f 40 e9 aa 88 f6 e8 9d a3 95 dc 80 b6 Sep 21 07:24:38.687894: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:38.687896: | 00 00 00 01 01 00 00 0e Sep 21 07:24:38.687922: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:38.687928: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:38.687933: | stop processing: state #3 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:38.687936: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:38.687941: | spent 0.495 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:38.820876: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:38.820906: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:38.820909: | 07 36 eb 95 e0 26 bc ca 00 00 00 00 00 00 00 00 Sep 21 07:24:38.820912: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:38.820914: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:38.820916: | 00 00 00 14 01 01 00 00 80 01 00 1a 80 03 00 0f Sep 21 07:24:38.820919: | 80 04 00 20 Sep 21 07:24:38.820924: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:38.820928: | **parse ISAKMP Message: Sep 21 07:24:38.820931: | initiator cookie: Sep 21 07:24:38.820933: | 07 36 eb 95 e0 26 bc ca Sep 21 07:24:38.820935: | responder cookie: Sep 21 07:24:38.820937: | 00 00 00 00 00 00 00 00 Sep 21 07:24:38.820940: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:38.820943: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.820945: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:38.820948: | flags: none (0x0) Sep 21 07:24:38.820950: | Message ID: 0 (0x0) Sep 21 07:24:38.820952: | length: 68 (0x44) Sep 21 07:24:38.820955: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:38.820959: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:38.820962: | #null state always idle Sep 21 07:24:38.820965: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:38.820968: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:38.820970: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.820973: | length: 40 (0x28) Sep 21 07:24:38.820975: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.820978: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:38.820980: | in statetime_start() with no state Sep 21 07:24:38.820986: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:38.820991: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:38.820995: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:38.821002: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:38.821005: | find_next_host_connection returns test Sep 21 07:24:38.821008: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:38.821010: | find_next_host_connection returns empty Sep 21 07:24:38.821035: | creating state object #4 at 0x5589e77bdaf0 Sep 21 07:24:38.821039: | State DB: adding IKEv1 state #4 in UNDEFINED Sep 21 07:24:38.821044: | pstats #4 ikev1.isakmp started Sep 21 07:24:38.821049: | #4 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:38.821055: | start processing: state #4 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:38.821059: | parent state #4: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:38.821062: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:38.821065: | ICOOKIE-DUMP: 07 36 eb 95 e0 26 bc ca Sep 21 07:24:38.821067: "test" #4: responding to Main Mode Sep 21 07:24:38.821072: | **emit ISAKMP Message: Sep 21 07:24:38.821075: | initiator cookie: Sep 21 07:24:38.821077: | 07 36 eb 95 e0 26 bc ca Sep 21 07:24:38.821079: | responder cookie: Sep 21 07:24:38.821081: | 10 d6 4f 5c 2a 07 7c db Sep 21 07:24:38.821084: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:38.821086: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.821089: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:38.821091: | flags: none (0x0) Sep 21 07:24:38.821093: | Message ID: 0 (0x0) Sep 21 07:24:38.821096: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:38.821099: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:38.821102: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:38.821104: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:38.821107: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.821110: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:38.821112: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:38.821115: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:38.821119: | ****parse IPsec DOI SIT: Sep 21 07:24:38.821121: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:38.821124: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:38.821126: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.821128: | length: 28 (0x1c) Sep 21 07:24:38.821131: | proposal number: 1 (0x1) Sep 21 07:24:38.821133: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:38.821135: | SPI size: 0 (0x0) Sep 21 07:24:38.821138: | number of transforms: 1 (0x1) Sep 21 07:24:38.821140: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:38.821143: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.821145: | length: 20 (0x14) Sep 21 07:24:38.821147: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:38.821150: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:38.821153: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:38.821155: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:38.821158: | length/value: 26 (0x1a) Sep 21 07:24:38.821160: | [26 is OAKLEY_CAMELLIA_CCM_B] Sep 21 07:24:38.821165: "test" #4: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:38.821167: "test" #4: no acceptable Oakley Transform Sep 21 07:24:38.821170: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:38.821174: | [RE]START processing: state #4 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:38.821177: | #4 is idle Sep 21 07:24:38.821326: "test" #4: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:38.821331: | **emit ISAKMP Message: Sep 21 07:24:38.821334: | initiator cookie: Sep 21 07:24:38.821336: | 07 36 eb 95 e0 26 bc ca Sep 21 07:24:38.821339: | responder cookie: Sep 21 07:24:38.821341: | 10 d6 4f 5c 2a 07 7c db Sep 21 07:24:38.821343: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.821346: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.821349: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:38.821351: | flags: none (0x0) Sep 21 07:24:38.821353: | Message ID: 0 (0x0) Sep 21 07:24:38.821356: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:38.821359: | ***emit ISAKMP Notification Payload: Sep 21 07:24:38.821362: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.821364: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.821366: | protocol ID: 1 (0x1) Sep 21 07:24:38.821369: | SPI size: 0 (0x0) Sep 21 07:24:38.821371: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:38.821374: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:38.821377: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:38.821380: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:38.821382: | emitting length of ISAKMP Message: 40 Sep 21 07:24:38.821389: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #4) Sep 21 07:24:38.821391: | 07 36 eb 95 e0 26 bc ca 10 d6 4f 5c 2a 07 7c db Sep 21 07:24:38.821393: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:38.821396: | 00 00 00 01 01 00 00 0e Sep 21 07:24:38.821418: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:38.821424: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:38.821429: | stop processing: state #4 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:38.821432: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:38.821437: | spent 0.455 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:38.879698: | spent 0.00347 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:38.879721: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:38.879725: | c2 e5 01 a1 dd cb a0 76 00 00 00 00 00 00 00 00 Sep 21 07:24:38.879727: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:38.879730: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:38.879732: | 00 00 00 14 01 01 00 00 80 01 00 1a 80 02 00 08 Sep 21 07:24:38.879734: | 80 04 00 20 Sep 21 07:24:38.879739: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:38.879743: | **parse ISAKMP Message: Sep 21 07:24:38.879746: | initiator cookie: Sep 21 07:24:38.879748: | c2 e5 01 a1 dd cb a0 76 Sep 21 07:24:38.879750: | responder cookie: Sep 21 07:24:38.879753: | 00 00 00 00 00 00 00 00 Sep 21 07:24:38.879755: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:38.879758: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.879761: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:38.879763: | flags: none (0x0) Sep 21 07:24:38.879766: | Message ID: 0 (0x0) Sep 21 07:24:38.879768: | length: 68 (0x44) Sep 21 07:24:38.879771: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:38.879775: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:38.879777: | #null state always idle Sep 21 07:24:38.879781: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:38.879790: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:38.879794: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.879799: | length: 40 (0x28) Sep 21 07:24:38.879801: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.879804: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:38.879807: | in statetime_start() with no state Sep 21 07:24:38.879812: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:38.879818: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:38.879821: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:38.879825: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:38.879828: | find_next_host_connection returns test Sep 21 07:24:38.879830: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:38.879832: | find_next_host_connection returns empty Sep 21 07:24:38.879860: | creating state object #5 at 0x5589e77be5b0 Sep 21 07:24:38.879863: | State DB: adding IKEv1 state #5 in UNDEFINED Sep 21 07:24:38.879870: | pstats #5 ikev1.isakmp started Sep 21 07:24:38.879874: | #5 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:38.879880: | start processing: state #5 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:38.879884: | parent state #5: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:38.879887: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:38.879889: | ICOOKIE-DUMP: c2 e5 01 a1 dd cb a0 76 Sep 21 07:24:38.879892: "test" #5: responding to Main Mode Sep 21 07:24:38.879897: | **emit ISAKMP Message: Sep 21 07:24:38.879899: | initiator cookie: Sep 21 07:24:38.879902: | c2 e5 01 a1 dd cb a0 76 Sep 21 07:24:38.879904: | responder cookie: Sep 21 07:24:38.879906: | 4d 1c 84 fb 56 f6 b2 f2 Sep 21 07:24:38.879908: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:38.879911: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.879913: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:38.879916: | flags: none (0x0) Sep 21 07:24:38.879918: | Message ID: 0 (0x0) Sep 21 07:24:38.879921: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:38.879924: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:38.879927: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:38.879929: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:38.879931: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.879934: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:38.879937: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:38.879940: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:38.879943: | ****parse IPsec DOI SIT: Sep 21 07:24:38.879946: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:38.879948: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:38.879951: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.879953: | length: 28 (0x1c) Sep 21 07:24:38.879956: | proposal number: 1 (0x1) Sep 21 07:24:38.879958: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:38.879960: | SPI size: 0 (0x0) Sep 21 07:24:38.879963: | number of transforms: 1 (0x1) Sep 21 07:24:38.879965: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:38.879968: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.879970: | length: 20 (0x14) Sep 21 07:24:38.879972: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:38.879975: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:38.879977: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:38.879980: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:38.879985: | length/value: 26 (0x1a) Sep 21 07:24:38.879988: | [26 is OAKLEY_CAMELLIA_CCM_B] Sep 21 07:24:38.879992: "test" #5: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:38.879994: "test" #5: no acceptable Oakley Transform Sep 21 07:24:38.879997: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:38.880002: | [RE]START processing: state #5 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:38.880004: | #5 is idle Sep 21 07:24:38.880312: "test" #5: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:38.880318: | **emit ISAKMP Message: Sep 21 07:24:38.880321: | initiator cookie: Sep 21 07:24:38.880323: | c2 e5 01 a1 dd cb a0 76 Sep 21 07:24:38.880326: | responder cookie: Sep 21 07:24:38.880328: | 4d 1c 84 fb 56 f6 b2 f2 Sep 21 07:24:38.880330: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.880333: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.880335: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:38.880338: | flags: none (0x0) Sep 21 07:24:38.880340: | Message ID: 0 (0x0) Sep 21 07:24:38.880343: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:38.880346: | ***emit ISAKMP Notification Payload: Sep 21 07:24:38.880348: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.880351: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.880353: | protocol ID: 1 (0x1) Sep 21 07:24:38.880355: | SPI size: 0 (0x0) Sep 21 07:24:38.880358: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:38.880361: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:38.880364: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:38.880366: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:38.880369: | emitting length of ISAKMP Message: 40 Sep 21 07:24:38.880375: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #5) Sep 21 07:24:38.880378: | c2 e5 01 a1 dd cb a0 76 4d 1c 84 fb 56 f6 b2 f2 Sep 21 07:24:38.880380: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:38.880382: | 00 00 00 01 01 00 00 0e Sep 21 07:24:38.880414: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:38.880420: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:38.880425: | stop processing: state #5 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:38.880428: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:38.880433: | spent 0.459 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:38.972870: | spent 0.0036 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:38.972893: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:38.972897: | 2b ff ce 72 e6 06 88 20 00 00 00 00 00 00 00 00 Sep 21 07:24:38.972900: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:38.972902: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:38.972904: | 00 00 00 14 01 01 00 00 80 01 00 1a 80 02 00 08 Sep 21 07:24:38.972906: | 80 03 00 0f Sep 21 07:24:38.972911: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:38.972915: | **parse ISAKMP Message: Sep 21 07:24:38.972918: | initiator cookie: Sep 21 07:24:38.972920: | 2b ff ce 72 e6 06 88 20 Sep 21 07:24:38.972922: | responder cookie: Sep 21 07:24:38.972924: | 00 00 00 00 00 00 00 00 Sep 21 07:24:38.972927: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:38.972930: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.972933: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:38.972938: | flags: none (0x0) Sep 21 07:24:38.972940: | Message ID: 0 (0x0) Sep 21 07:24:38.972943: | length: 68 (0x44) Sep 21 07:24:38.972946: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:38.972949: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:38.972952: | #null state always idle Sep 21 07:24:38.972955: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:38.972958: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:38.972961: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.972963: | length: 40 (0x28) Sep 21 07:24:38.972966: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.972968: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:38.972971: | in statetime_start() with no state Sep 21 07:24:38.972977: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:38.972982: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:38.972985: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:38.972989: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:38.972991: | find_next_host_connection returns test Sep 21 07:24:38.972994: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:38.972996: | find_next_host_connection returns empty Sep 21 07:24:38.973017: | creating state object #6 at 0x5589e77bf070 Sep 21 07:24:38.973020: | State DB: adding IKEv1 state #6 in UNDEFINED Sep 21 07:24:38.973024: | pstats #6 ikev1.isakmp started Sep 21 07:24:38.973029: | #6 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:38.973035: | start processing: state #6 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:38.973038: | parent state #6: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:38.973042: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:38.973044: | ICOOKIE-DUMP: 2b ff ce 72 e6 06 88 20 Sep 21 07:24:38.973047: "test" #6: responding to Main Mode Sep 21 07:24:38.973052: | **emit ISAKMP Message: Sep 21 07:24:38.973054: | initiator cookie: Sep 21 07:24:38.973056: | 2b ff ce 72 e6 06 88 20 Sep 21 07:24:38.973059: | responder cookie: Sep 21 07:24:38.973061: | 05 16 e0 90 2c d3 36 42 Sep 21 07:24:38.973063: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:38.973066: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.973068: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:38.973070: | flags: none (0x0) Sep 21 07:24:38.973073: | Message ID: 0 (0x0) Sep 21 07:24:38.973075: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:38.973078: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:38.973081: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:38.973083: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:38.973086: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.973089: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:38.973092: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:38.973095: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:38.973098: | ****parse IPsec DOI SIT: Sep 21 07:24:38.973100: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:38.973103: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:38.973105: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.973108: | length: 28 (0x1c) Sep 21 07:24:38.973110: | proposal number: 1 (0x1) Sep 21 07:24:38.973113: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:38.973115: | SPI size: 0 (0x0) Sep 21 07:24:38.973119: | number of transforms: 1 (0x1) Sep 21 07:24:38.973122: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:38.973124: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.973126: | length: 20 (0x14) Sep 21 07:24:38.973129: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:38.973131: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:38.973134: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:38.973137: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:38.973139: | length/value: 26 (0x1a) Sep 21 07:24:38.973142: | [26 is OAKLEY_CAMELLIA_CCM_B] Sep 21 07:24:38.973146: "test" #6: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:38.973148: "test" #6: no acceptable Oakley Transform Sep 21 07:24:38.973151: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:38.973156: | [RE]START processing: state #6 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:38.973158: | #6 is idle Sep 21 07:24:38.973235: "test" #6: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:38.973239: | **emit ISAKMP Message: Sep 21 07:24:38.973241: | initiator cookie: Sep 21 07:24:38.973244: | 2b ff ce 72 e6 06 88 20 Sep 21 07:24:38.973246: | responder cookie: Sep 21 07:24:38.973248: | 05 16 e0 90 2c d3 36 42 Sep 21 07:24:38.973251: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.973253: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:38.973256: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:38.973258: | flags: none (0x0) Sep 21 07:24:38.973260: | Message ID: 0 (0x0) Sep 21 07:24:38.973263: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:38.973266: | ***emit ISAKMP Notification Payload: Sep 21 07:24:38.973268: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:38.973271: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:38.973273: | protocol ID: 1 (0x1) Sep 21 07:24:38.973275: | SPI size: 0 (0x0) Sep 21 07:24:38.973278: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:38.973281: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:38.973283: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:38.973286: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:38.973288: | emitting length of ISAKMP Message: 40 Sep 21 07:24:38.973294: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #6) Sep 21 07:24:38.973297: | 2b ff ce 72 e6 06 88 20 05 16 e0 90 2c d3 36 42 Sep 21 07:24:38.973299: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:38.973301: | 00 00 00 01 01 00 00 0e Sep 21 07:24:38.973328: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:38.973333: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:38.973338: | stop processing: state #6 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:38.973341: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:38.973346: | spent 0.443 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:39.044819: | spent 0.00282 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:39.044845: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:39.044849: | a9 50 48 9c 68 27 09 57 00 00 00 00 00 00 00 00 Sep 21 07:24:39.044852: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:24:39.044855: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:24:39.044858: | 00 00 00 18 01 01 00 00 80 01 00 11 80 02 00 1e Sep 21 07:24:39.044861: | 80 03 00 05 80 04 00 1b Sep 21 07:24:39.044870: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:39.044875: | **parse ISAKMP Message: Sep 21 07:24:39.044878: | initiator cookie: Sep 21 07:24:39.044880: | a9 50 48 9c 68 27 09 57 Sep 21 07:24:39.044883: | responder cookie: Sep 21 07:24:39.044886: | 00 00 00 00 00 00 00 00 Sep 21 07:24:39.044889: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:39.044893: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.044896: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:39.044899: | flags: none (0x0) Sep 21 07:24:39.044901: | Message ID: 0 (0x0) Sep 21 07:24:39.044904: | length: 72 (0x48) Sep 21 07:24:39.044908: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:39.044913: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:39.044916: | #null state always idle Sep 21 07:24:39.044920: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:39.044923: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:39.044927: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.044929: | length: 44 (0x2c) Sep 21 07:24:39.044932: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.044935: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:39.044939: | in statetime_start() with no state Sep 21 07:24:39.044945: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:39.044952: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:39.044955: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:39.044960: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:39.044963: | find_next_host_connection returns test Sep 21 07:24:39.044966: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:39.044969: | find_next_host_connection returns empty Sep 21 07:24:39.044997: | creating state object #7 at 0x5589e77bfb30 Sep 21 07:24:39.045001: | State DB: adding IKEv1 state #7 in UNDEFINED Sep 21 07:24:39.045005: | pstats #7 ikev1.isakmp started Sep 21 07:24:39.045011: | #7 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:39.045018: | start processing: state #7 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:39.045023: | parent state #7: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:39.045026: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:39.045029: | ICOOKIE-DUMP: a9 50 48 9c 68 27 09 57 Sep 21 07:24:39.045033: "test" #7: responding to Main Mode Sep 21 07:24:39.045038: | **emit ISAKMP Message: Sep 21 07:24:39.045041: | initiator cookie: Sep 21 07:24:39.045043: | a9 50 48 9c 68 27 09 57 Sep 21 07:24:39.045046: | responder cookie: Sep 21 07:24:39.045049: | cb 6f e3 13 92 6a 97 9f Sep 21 07:24:39.045052: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:39.045055: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.045058: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:39.045061: | flags: none (0x0) Sep 21 07:24:39.045064: | Message ID: 0 (0x0) Sep 21 07:24:39.045067: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:39.045071: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:39.045075: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:39.045077: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:39.045080: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.045084: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:39.045089: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:39.045094: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:39.045097: | ****parse IPsec DOI SIT: Sep 21 07:24:39.045101: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:39.045104: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:39.045107: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.045110: | length: 32 (0x20) Sep 21 07:24:39.045112: | proposal number: 1 (0x1) Sep 21 07:24:39.045115: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:39.045118: | SPI size: 0 (0x0) Sep 21 07:24:39.045121: | number of transforms: 1 (0x1) Sep 21 07:24:39.045125: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:39.045128: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.045130: | length: 24 (0x18) Sep 21 07:24:39.045133: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:39.045136: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:39.045139: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:39.045143: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:39.045145: | length/value: 17 (0x11) Sep 21 07:24:39.045148: | [17 is UNUSED_17] Sep 21 07:24:39.045153: "test" #7: UNUSED_17 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:39.045155: "test" #7: no acceptable Oakley Transform Sep 21 07:24:39.045159: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:39.045165: | [RE]START processing: state #7 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:39.045168: | #7 is idle Sep 21 07:24:39.054261: "test" #7: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:39.054274: | **emit ISAKMP Message: Sep 21 07:24:39.054278: | initiator cookie: Sep 21 07:24:39.054281: | a9 50 48 9c 68 27 09 57 Sep 21 07:24:39.054284: | responder cookie: Sep 21 07:24:39.054287: | cb 6f e3 13 92 6a 97 9f Sep 21 07:24:39.054290: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.054294: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.054297: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:39.054300: | flags: none (0x0) Sep 21 07:24:39.054303: | Message ID: 0 (0x0) Sep 21 07:24:39.054307: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:39.054315: | ***emit ISAKMP Notification Payload: Sep 21 07:24:39.054318: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.054321: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.054324: | protocol ID: 1 (0x1) Sep 21 07:24:39.054327: | SPI size: 0 (0x0) Sep 21 07:24:39.054330: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:39.054335: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:39.054339: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:39.054342: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:39.054345: | emitting length of ISAKMP Message: 40 Sep 21 07:24:39.054353: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #7) Sep 21 07:24:39.054356: | a9 50 48 9c 68 27 09 57 cb 6f e3 13 92 6a 97 9f Sep 21 07:24:39.054359: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:39.054362: | 00 00 00 01 01 00 00 0e Sep 21 07:24:39.054407: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:39.054415: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:39.054422: | stop processing: state #7 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:39.054426: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:39.054435: | spent 0.562 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:39.132761: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:39.132792: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:39.132797: | 82 fc f5 ca 04 e2 08 96 00 00 00 00 00 00 00 00 Sep 21 07:24:39.132800: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:39.132802: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:39.132805: | 00 00 00 14 01 01 00 00 80 02 00 1e 80 03 00 05 Sep 21 07:24:39.132807: | 80 04 00 1b Sep 21 07:24:39.132811: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:39.132815: | **parse ISAKMP Message: Sep 21 07:24:39.132818: | initiator cookie: Sep 21 07:24:39.132820: | 82 fc f5 ca 04 e2 08 96 Sep 21 07:24:39.132822: | responder cookie: Sep 21 07:24:39.132824: | 00 00 00 00 00 00 00 00 Sep 21 07:24:39.132827: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:39.132830: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.132833: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:39.132835: | flags: none (0x0) Sep 21 07:24:39.132837: | Message ID: 0 (0x0) Sep 21 07:24:39.132840: | length: 68 (0x44) Sep 21 07:24:39.132843: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:39.132846: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:39.132849: | #null state always idle Sep 21 07:24:39.132852: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:39.132855: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:39.132858: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.132860: | length: 40 (0x28) Sep 21 07:24:39.132862: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.132865: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:39.132868: | in statetime_start() with no state Sep 21 07:24:39.132873: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:39.132879: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:39.132882: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:39.132885: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:39.132888: | find_next_host_connection returns test Sep 21 07:24:39.132890: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:39.132893: | find_next_host_connection returns empty Sep 21 07:24:39.132919: | creating state object #8 at 0x5589e77c05f0 Sep 21 07:24:39.132922: | State DB: adding IKEv1 state #8 in UNDEFINED Sep 21 07:24:39.132926: | pstats #8 ikev1.isakmp started Sep 21 07:24:39.132931: | #8 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:39.132937: | start processing: state #8 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:39.132941: | parent state #8: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:39.132944: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:39.132946: | ICOOKIE-DUMP: 82 fc f5 ca 04 e2 08 96 Sep 21 07:24:39.132949: "test" #8: responding to Main Mode Sep 21 07:24:39.132954: | **emit ISAKMP Message: Sep 21 07:24:39.132956: | initiator cookie: Sep 21 07:24:39.132958: | 82 fc f5 ca 04 e2 08 96 Sep 21 07:24:39.132961: | responder cookie: Sep 21 07:24:39.132963: | 75 88 b2 78 3f 6a 41 db Sep 21 07:24:39.132965: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:39.132968: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.132970: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:39.132973: | flags: none (0x0) Sep 21 07:24:39.132975: | Message ID: 0 (0x0) Sep 21 07:24:39.132978: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:39.132980: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:39.132985: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:39.132988: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:39.132990: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.132993: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:39.132996: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:39.132999: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:39.133002: | ****parse IPsec DOI SIT: Sep 21 07:24:39.133004: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:39.133007: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:39.133009: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.133011: | length: 28 (0x1c) Sep 21 07:24:39.133014: | proposal number: 1 (0x1) Sep 21 07:24:39.133016: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:39.133019: | SPI size: 0 (0x0) Sep 21 07:24:39.133021: | number of transforms: 1 (0x1) Sep 21 07:24:39.133024: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:39.133026: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.133028: | length: 20 (0x14) Sep 21 07:24:39.133030: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:39.133033: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:39.133036: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:39.133038: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:39.133041: | length/value: 30 (0x1e) Sep 21 07:24:39.133045: "test" #8: 30?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:39.133047: "test" #8: no acceptable Oakley Transform Sep 21 07:24:39.133050: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:39.133055: | [RE]START processing: state #8 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:39.133057: | #8 is idle Sep 21 07:24:39.133143: "test" #8: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:39.133147: | **emit ISAKMP Message: Sep 21 07:24:39.133150: | initiator cookie: Sep 21 07:24:39.133155: | 82 fc f5 ca 04 e2 08 96 Sep 21 07:24:39.133158: | responder cookie: Sep 21 07:24:39.133160: | 75 88 b2 78 3f 6a 41 db Sep 21 07:24:39.133162: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.133165: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.133167: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:39.133170: | flags: none (0x0) Sep 21 07:24:39.133172: | Message ID: 0 (0x0) Sep 21 07:24:39.133175: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:39.133177: | ***emit ISAKMP Notification Payload: Sep 21 07:24:39.133180: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.133182: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.133185: | protocol ID: 1 (0x1) Sep 21 07:24:39.133187: | SPI size: 0 (0x0) Sep 21 07:24:39.133189: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:39.133192: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:39.133195: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:39.133198: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:39.133200: | emitting length of ISAKMP Message: 40 Sep 21 07:24:39.133206: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #8) Sep 21 07:24:39.133209: | 82 fc f5 ca 04 e2 08 96 75 88 b2 78 3f 6a 41 db Sep 21 07:24:39.133211: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:39.133213: | 00 00 00 01 01 00 00 0e Sep 21 07:24:39.133237: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:39.133245: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:39.133250: | stop processing: state #8 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:39.133253: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:39.133258: | spent 0.458 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:39.217274: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:39.217298: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:39.217302: | c3 44 28 a6 36 5f 98 18 00 00 00 00 00 00 00 00 Sep 21 07:24:39.217304: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:39.217307: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:39.217309: | 00 00 00 14 01 01 00 00 80 01 00 11 80 03 00 05 Sep 21 07:24:39.217311: | 80 04 00 1b Sep 21 07:24:39.217316: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:39.217319: | **parse ISAKMP Message: Sep 21 07:24:39.217322: | initiator cookie: Sep 21 07:24:39.217324: | c3 44 28 a6 36 5f 98 18 Sep 21 07:24:39.217327: | responder cookie: Sep 21 07:24:39.217329: | 00 00 00 00 00 00 00 00 Sep 21 07:24:39.217332: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:39.217335: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.217337: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:39.217340: | flags: none (0x0) Sep 21 07:24:39.217342: | Message ID: 0 (0x0) Sep 21 07:24:39.217344: | length: 68 (0x44) Sep 21 07:24:39.217347: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:39.217351: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:39.217353: | #null state always idle Sep 21 07:24:39.217356: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:39.217359: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:39.217362: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.217364: | length: 40 (0x28) Sep 21 07:24:39.217366: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.217369: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:39.217372: | in statetime_start() with no state Sep 21 07:24:39.217377: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:39.217383: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:39.217386: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:39.217390: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:39.217392: | find_next_host_connection returns test Sep 21 07:24:39.217395: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:39.217397: | find_next_host_connection returns empty Sep 21 07:24:39.217419: | creating state object #9 at 0x5589e77c10b0 Sep 21 07:24:39.217423: | State DB: adding IKEv1 state #9 in UNDEFINED Sep 21 07:24:39.217427: | pstats #9 ikev1.isakmp started Sep 21 07:24:39.217432: | #9 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:39.217438: | start processing: state #9 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:39.217441: | parent state #9: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:39.217444: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:39.217447: | ICOOKIE-DUMP: c3 44 28 a6 36 5f 98 18 Sep 21 07:24:39.217450: "test" #9: responding to Main Mode Sep 21 07:24:39.217455: | **emit ISAKMP Message: Sep 21 07:24:39.217457: | initiator cookie: Sep 21 07:24:39.217459: | c3 44 28 a6 36 5f 98 18 Sep 21 07:24:39.217462: | responder cookie: Sep 21 07:24:39.217464: | ad be 2d a0 ea 52 73 a3 Sep 21 07:24:39.217466: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:39.217472: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.217474: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:39.217477: | flags: none (0x0) Sep 21 07:24:39.217479: | Message ID: 0 (0x0) Sep 21 07:24:39.217482: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:39.217485: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:39.217488: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:39.217490: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:39.217492: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.217495: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:39.217498: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:39.217501: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:39.217504: | ****parse IPsec DOI SIT: Sep 21 07:24:39.217507: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:39.217509: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:39.217512: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.217514: | length: 28 (0x1c) Sep 21 07:24:39.217516: | proposal number: 1 (0x1) Sep 21 07:24:39.217519: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:39.217521: | SPI size: 0 (0x0) Sep 21 07:24:39.217523: | number of transforms: 1 (0x1) Sep 21 07:24:39.217526: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:39.217528: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.217531: | length: 20 (0x14) Sep 21 07:24:39.217533: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:39.217535: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:39.217538: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:39.217541: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:39.217543: | length/value: 17 (0x11) Sep 21 07:24:39.217546: | [17 is UNUSED_17] Sep 21 07:24:39.217549: "test" #9: UNUSED_17 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:39.217552: "test" #9: no acceptable Oakley Transform Sep 21 07:24:39.217555: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:39.217560: | [RE]START processing: state #9 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:39.217562: | #9 is idle Sep 21 07:24:39.217708: "test" #9: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:39.217713: | **emit ISAKMP Message: Sep 21 07:24:39.217716: | initiator cookie: Sep 21 07:24:39.217718: | c3 44 28 a6 36 5f 98 18 Sep 21 07:24:39.217720: | responder cookie: Sep 21 07:24:39.217723: | ad be 2d a0 ea 52 73 a3 Sep 21 07:24:39.217725: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.217728: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.217731: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:39.217733: | flags: none (0x0) Sep 21 07:24:39.217736: | Message ID: 0 (0x0) Sep 21 07:24:39.217739: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:39.217742: | ***emit ISAKMP Notification Payload: Sep 21 07:24:39.217744: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.217747: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.217749: | protocol ID: 1 (0x1) Sep 21 07:24:39.217751: | SPI size: 0 (0x0) Sep 21 07:24:39.217754: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:39.217757: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:39.217760: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:39.217763: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:39.217767: | emitting length of ISAKMP Message: 40 Sep 21 07:24:39.217774: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #9) Sep 21 07:24:39.217777: | c3 44 28 a6 36 5f 98 18 ad be 2d a0 ea 52 73 a3 Sep 21 07:24:39.217779: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:39.217781: | 00 00 00 01 01 00 00 0e Sep 21 07:24:39.217812: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:39.217819: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:39.217824: | stop processing: state #9 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:39.217827: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:39.217832: | spent 0.453 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:39.456758: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:39.456787: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:39.456792: | a3 33 87 61 34 11 3f 80 00 00 00 00 00 00 00 00 Sep 21 07:24:39.456794: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:39.456797: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:39.456799: | 00 00 00 14 01 01 00 00 80 01 00 11 80 02 00 1e Sep 21 07:24:39.456801: | 80 04 00 1b Sep 21 07:24:39.456807: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:39.456811: | **parse ISAKMP Message: Sep 21 07:24:39.456813: | initiator cookie: Sep 21 07:24:39.456815: | a3 33 87 61 34 11 3f 80 Sep 21 07:24:39.456818: | responder cookie: Sep 21 07:24:39.456820: | 00 00 00 00 00 00 00 00 Sep 21 07:24:39.456823: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:39.456825: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.456828: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:39.456831: | flags: none (0x0) Sep 21 07:24:39.456833: | Message ID: 0 (0x0) Sep 21 07:24:39.456835: | length: 68 (0x44) Sep 21 07:24:39.456838: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:39.456842: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:39.456845: | #null state always idle Sep 21 07:24:39.456848: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:39.456851: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:39.456854: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.456856: | length: 40 (0x28) Sep 21 07:24:39.456858: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.456861: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:39.456864: | in statetime_start() with no state Sep 21 07:24:39.456870: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:39.456875: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:39.456878: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:39.456882: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:39.456884: | find_next_host_connection returns test Sep 21 07:24:39.456887: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:39.456889: | find_next_host_connection returns empty Sep 21 07:24:39.456916: | creating state object #10 at 0x5589e77c1b70 Sep 21 07:24:39.456919: | State DB: adding IKEv1 state #10 in UNDEFINED Sep 21 07:24:39.456925: | pstats #10 ikev1.isakmp started Sep 21 07:24:39.456930: | #10 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:39.456936: | start processing: state #10 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:39.456939: | parent state #10: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:39.456945: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:39.456948: | ICOOKIE-DUMP: a3 33 87 61 34 11 3f 80 Sep 21 07:24:39.456951: "test" #10: responding to Main Mode Sep 21 07:24:39.456955: | **emit ISAKMP Message: Sep 21 07:24:39.456958: | initiator cookie: Sep 21 07:24:39.456960: | a3 33 87 61 34 11 3f 80 Sep 21 07:24:39.456962: | responder cookie: Sep 21 07:24:39.456964: | 4a 85 69 a0 f2 7c b2 73 Sep 21 07:24:39.456967: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:39.456969: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.456972: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:39.456974: | flags: none (0x0) Sep 21 07:24:39.456977: | Message ID: 0 (0x0) Sep 21 07:24:39.456979: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:39.456982: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:39.456985: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:39.456988: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:39.456990: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.456993: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:39.456996: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:39.456999: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:39.457002: | ****parse IPsec DOI SIT: Sep 21 07:24:39.457004: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:39.457007: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:39.457009: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.457012: | length: 28 (0x1c) Sep 21 07:24:39.457014: | proposal number: 1 (0x1) Sep 21 07:24:39.457016: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:39.457019: | SPI size: 0 (0x0) Sep 21 07:24:39.457021: | number of transforms: 1 (0x1) Sep 21 07:24:39.457024: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:39.457026: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.457028: | length: 20 (0x14) Sep 21 07:24:39.457031: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:39.457033: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:39.457036: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:39.457038: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:39.457041: | length/value: 17 (0x11) Sep 21 07:24:39.457043: | [17 is UNUSED_17] Sep 21 07:24:39.457047: "test" #10: UNUSED_17 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:39.457050: "test" #10: no acceptable Oakley Transform Sep 21 07:24:39.457053: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:39.457058: | [RE]START processing: state #10 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:39.457060: | #10 is idle Sep 21 07:24:39.457170: "test" #10: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:39.457175: | **emit ISAKMP Message: Sep 21 07:24:39.457177: | initiator cookie: Sep 21 07:24:39.457180: | a3 33 87 61 34 11 3f 80 Sep 21 07:24:39.457182: | responder cookie: Sep 21 07:24:39.457184: | 4a 85 69 a0 f2 7c b2 73 Sep 21 07:24:39.457187: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.457189: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.457192: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:39.457194: | flags: none (0x0) Sep 21 07:24:39.457196: | Message ID: 0 (0x0) Sep 21 07:24:39.457199: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:39.457202: | ***emit ISAKMP Notification Payload: Sep 21 07:24:39.457204: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.457207: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.457212: | protocol ID: 1 (0x1) Sep 21 07:24:39.457214: | SPI size: 0 (0x0) Sep 21 07:24:39.457217: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:39.457220: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:39.457223: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:39.457226: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:39.457228: | emitting length of ISAKMP Message: 40 Sep 21 07:24:39.457234: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #10) Sep 21 07:24:39.457237: | a3 33 87 61 34 11 3f 80 4a 85 69 a0 f2 7c b2 73 Sep 21 07:24:39.457239: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:39.457241: | 00 00 00 01 01 00 00 0e Sep 21 07:24:39.457265: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:39.457271: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:39.457276: | stop processing: state #10 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:39.457279: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:39.457284: | spent 0.46 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:39.571655: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:39.571686: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:39.571690: | 61 d0 82 e9 64 4a b2 6f 00 00 00 00 00 00 00 00 Sep 21 07:24:39.571692: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:39.571695: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:39.571697: | 00 00 00 14 01 01 00 00 80 01 00 11 80 02 00 1e Sep 21 07:24:39.571699: | 80 03 00 05 Sep 21 07:24:39.571704: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:39.571708: | **parse ISAKMP Message: Sep 21 07:24:39.571711: | initiator cookie: Sep 21 07:24:39.571713: | 61 d0 82 e9 64 4a b2 6f Sep 21 07:24:39.571715: | responder cookie: Sep 21 07:24:39.571717: | 00 00 00 00 00 00 00 00 Sep 21 07:24:39.571720: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:39.571723: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.571725: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:39.571728: | flags: none (0x0) Sep 21 07:24:39.571730: | Message ID: 0 (0x0) Sep 21 07:24:39.571733: | length: 68 (0x44) Sep 21 07:24:39.571736: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:39.571739: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:39.571742: | #null state always idle Sep 21 07:24:39.571746: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:39.571748: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:39.571751: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.571753: | length: 40 (0x28) Sep 21 07:24:39.571756: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.571758: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:39.571761: | in statetime_start() with no state Sep 21 07:24:39.571767: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:39.571772: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:39.571775: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:39.571779: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:39.571782: | find_next_host_connection returns test Sep 21 07:24:39.571790: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:39.571792: | find_next_host_connection returns empty Sep 21 07:24:39.571824: | creating state object #11 at 0x5589e77c2630 Sep 21 07:24:39.571828: | State DB: adding IKEv1 state #11 in UNDEFINED Sep 21 07:24:39.571832: | pstats #11 ikev1.isakmp started Sep 21 07:24:39.571837: | #11 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:39.571843: | start processing: state #11 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:39.571846: | parent state #11: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:39.571849: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:39.571852: | ICOOKIE-DUMP: 61 d0 82 e9 64 4a b2 6f Sep 21 07:24:39.571855: "test" #11: responding to Main Mode Sep 21 07:24:39.571859: | **emit ISAKMP Message: Sep 21 07:24:39.571862: | initiator cookie: Sep 21 07:24:39.571864: | 61 d0 82 e9 64 4a b2 6f Sep 21 07:24:39.571866: | responder cookie: Sep 21 07:24:39.571869: | 84 f4 fd cd c9 09 e9 3d Sep 21 07:24:39.571871: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:39.571873: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.571876: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:39.571878: | flags: none (0x0) Sep 21 07:24:39.571881: | Message ID: 0 (0x0) Sep 21 07:24:39.571883: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:39.571886: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:39.571889: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:39.571891: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:39.571894: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.571896: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:39.571899: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:39.571902: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:39.571905: | ****parse IPsec DOI SIT: Sep 21 07:24:39.571908: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:39.571910: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:39.571913: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.571915: | length: 28 (0x1c) Sep 21 07:24:39.571917: | proposal number: 1 (0x1) Sep 21 07:24:39.571920: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:39.571922: | SPI size: 0 (0x0) Sep 21 07:24:39.571925: | number of transforms: 1 (0x1) Sep 21 07:24:39.571927: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:39.571930: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.571932: | length: 20 (0x14) Sep 21 07:24:39.571934: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:39.571936: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:39.571939: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:39.571942: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:39.571944: | length/value: 17 (0x11) Sep 21 07:24:39.571947: | [17 is UNUSED_17] Sep 21 07:24:39.571951: "test" #11: UNUSED_17 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:39.571954: "test" #11: no acceptable Oakley Transform Sep 21 07:24:39.571957: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:39.571962: | [RE]START processing: state #11 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:39.571964: | #11 is idle Sep 21 07:24:39.576695: "test" #11: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:39.576705: | **emit ISAKMP Message: Sep 21 07:24:39.576708: | initiator cookie: Sep 21 07:24:39.576711: | 61 d0 82 e9 64 4a b2 6f Sep 21 07:24:39.576713: | responder cookie: Sep 21 07:24:39.576716: | 84 f4 fd cd c9 09 e9 3d Sep 21 07:24:39.576718: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.576724: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.576727: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:39.576729: | flags: none (0x0) Sep 21 07:24:39.576732: | Message ID: 0 (0x0) Sep 21 07:24:39.576735: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:39.576738: | ***emit ISAKMP Notification Payload: Sep 21 07:24:39.576740: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.576743: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.576745: | protocol ID: 1 (0x1) Sep 21 07:24:39.576747: | SPI size: 0 (0x0) Sep 21 07:24:39.576750: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:39.576753: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:39.576756: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:39.576759: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:39.576761: | emitting length of ISAKMP Message: 40 Sep 21 07:24:39.576768: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #11) Sep 21 07:24:39.576770: | 61 d0 82 e9 64 4a b2 6f 84 f4 fd cd c9 09 e9 3d Sep 21 07:24:39.576773: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:39.576775: | 00 00 00 01 01 00 00 0e Sep 21 07:24:39.576816: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:39.576829: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:39.576835: | stop processing: state #11 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:39.576838: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:39.576845: | spent 0.492 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:39.718579: | spent 0.00313 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:39.718603: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:39.718607: | 4c 09 c4 41 d4 1a c4 ca 00 00 00 00 00 00 00 00 Sep 21 07:24:39.718610: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:24:39.718613: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:24:39.718616: | 00 00 00 18 01 01 00 00 80 01 00 08 80 02 00 10 Sep 21 07:24:39.718618: | 80 03 00 1f 80 04 00 05 Sep 21 07:24:39.718623: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:39.718628: | **parse ISAKMP Message: Sep 21 07:24:39.718631: | initiator cookie: Sep 21 07:24:39.718633: | 4c 09 c4 41 d4 1a c4 ca Sep 21 07:24:39.718636: | responder cookie: Sep 21 07:24:39.718638: | 00 00 00 00 00 00 00 00 Sep 21 07:24:39.718642: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:39.718645: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.718648: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:39.718651: | flags: none (0x0) Sep 21 07:24:39.718654: | Message ID: 0 (0x0) Sep 21 07:24:39.718657: | length: 72 (0x48) Sep 21 07:24:39.718660: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:39.718665: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:39.718668: | #null state always idle Sep 21 07:24:39.718672: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:39.718675: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:39.718678: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.718681: | length: 44 (0x2c) Sep 21 07:24:39.718684: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.718687: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:39.718690: | in statetime_start() with no state Sep 21 07:24:39.718696: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:39.718706: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:39.718710: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:39.718715: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:39.718718: | find_next_host_connection returns test Sep 21 07:24:39.718721: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:39.718724: | find_next_host_connection returns empty Sep 21 07:24:39.718749: | creating state object #12 at 0x5589e77c30f0 Sep 21 07:24:39.718753: | State DB: adding IKEv1 state #12 in UNDEFINED Sep 21 07:24:39.718757: | pstats #12 ikev1.isakmp started Sep 21 07:24:39.718763: | #12 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:39.718771: | start processing: state #12 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:39.718775: | parent state #12: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:39.718779: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:39.718788: | ICOOKIE-DUMP: 4c 09 c4 41 d4 1a c4 ca Sep 21 07:24:39.718794: "test" #12: responding to Main Mode Sep 21 07:24:39.718799: | **emit ISAKMP Message: Sep 21 07:24:39.718802: | initiator cookie: Sep 21 07:24:39.718804: | 4c 09 c4 41 d4 1a c4 ca Sep 21 07:24:39.718807: | responder cookie: Sep 21 07:24:39.718810: | 50 04 ed 1c 24 d9 ad e8 Sep 21 07:24:39.718813: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:39.718816: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.718819: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:39.718821: | flags: none (0x0) Sep 21 07:24:39.718824: | Message ID: 0 (0x0) Sep 21 07:24:39.718828: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:39.718831: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:39.718835: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:39.718845: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:39.718849: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.718852: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:39.718857: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:39.718861: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:39.718864: | ****parse IPsec DOI SIT: Sep 21 07:24:39.718867: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:39.718871: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:39.718873: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.718876: | length: 32 (0x20) Sep 21 07:24:39.718879: | proposal number: 1 (0x1) Sep 21 07:24:39.718882: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:39.718885: | SPI size: 0 (0x0) Sep 21 07:24:39.718888: | number of transforms: 1 (0x1) Sep 21 07:24:39.718891: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:39.718893: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.718896: | length: 24 (0x18) Sep 21 07:24:39.718898: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:39.718901: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:39.718904: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:39.718907: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:39.718910: | length/value: 8 (0x8) Sep 21 07:24:39.718913: | [8 is OAKLEY_CAMELLIA_CBC] Sep 21 07:24:39.718917: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:39.718920: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:39.718922: | length/value: 16 (0x10) Sep 21 07:24:39.718926: "test" #12: 16?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:39.718931: "test" #12: no acceptable Oakley Transform Sep 21 07:24:39.718935: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:39.718941: | [RE]START processing: state #12 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:39.718944: | #12 is idle Sep 21 07:24:39.719018: "test" #12: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:39.719022: | **emit ISAKMP Message: Sep 21 07:24:39.719025: | initiator cookie: Sep 21 07:24:39.719028: | 4c 09 c4 41 d4 1a c4 ca Sep 21 07:24:39.719030: | responder cookie: Sep 21 07:24:39.719032: | 50 04 ed 1c 24 d9 ad e8 Sep 21 07:24:39.719035: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.719038: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.719040: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:39.719043: | flags: none (0x0) Sep 21 07:24:39.719046: | Message ID: 0 (0x0) Sep 21 07:24:39.719049: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:39.719052: | ***emit ISAKMP Notification Payload: Sep 21 07:24:39.719055: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.719058: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.719061: | protocol ID: 1 (0x1) Sep 21 07:24:39.719064: | SPI size: 0 (0x0) Sep 21 07:24:39.719067: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:39.719071: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:39.719075: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:39.719078: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:39.719081: | emitting length of ISAKMP Message: 40 Sep 21 07:24:39.719089: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #12) Sep 21 07:24:39.719092: | 4c 09 c4 41 d4 1a c4 ca 50 04 ed 1c 24 d9 ad e8 Sep 21 07:24:39.719094: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:39.719097: | 00 00 00 01 01 00 00 0e Sep 21 07:24:39.719123: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:39.719130: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:39.719136: | stop processing: state #12 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:39.719140: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:39.719146: | spent 0.53 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:39.949274: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:39.949299: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:39.949302: | 2d 0d d2 a7 2e 43 2b 78 00 00 00 00 00 00 00 00 Sep 21 07:24:39.949305: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:39.949307: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:39.949309: | 00 00 00 14 01 01 00 00 80 02 00 10 80 03 00 1f Sep 21 07:24:39.949311: | 80 04 00 05 Sep 21 07:24:39.949316: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:39.949320: | **parse ISAKMP Message: Sep 21 07:24:39.949324: | initiator cookie: Sep 21 07:24:39.949325: | 2d 0d d2 a7 2e 43 2b 78 Sep 21 07:24:39.949327: | responder cookie: Sep 21 07:24:39.949329: | 00 00 00 00 00 00 00 00 Sep 21 07:24:39.949331: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:39.949334: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.949336: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:39.949338: | flags: none (0x0) Sep 21 07:24:39.949340: | Message ID: 0 (0x0) Sep 21 07:24:39.949342: | length: 68 (0x44) Sep 21 07:24:39.949344: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:39.949351: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:39.949354: | #null state always idle Sep 21 07:24:39.949357: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:39.949360: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:39.949363: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.949365: | length: 40 (0x28) Sep 21 07:24:39.949367: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.949369: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:39.949372: | in statetime_start() with no state Sep 21 07:24:39.949377: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:39.949382: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:39.949385: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:39.949389: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:39.949391: | find_next_host_connection returns test Sep 21 07:24:39.949394: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:39.949396: | find_next_host_connection returns empty Sep 21 07:24:39.949427: | creating state object #13 at 0x5589e77c3bb0 Sep 21 07:24:39.949431: | State DB: adding IKEv1 state #13 in UNDEFINED Sep 21 07:24:39.949435: | pstats #13 ikev1.isakmp started Sep 21 07:24:39.949440: | #13 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:39.949446: | start processing: state #13 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:39.949450: | parent state #13: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:39.949453: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:39.949456: | ICOOKIE-DUMP: 2d 0d d2 a7 2e 43 2b 78 Sep 21 07:24:39.949458: "test" #13: responding to Main Mode Sep 21 07:24:39.949463: | **emit ISAKMP Message: Sep 21 07:24:39.949466: | initiator cookie: Sep 21 07:24:39.949468: | 2d 0d d2 a7 2e 43 2b 78 Sep 21 07:24:39.949470: | responder cookie: Sep 21 07:24:39.949472: | 79 ed 21 2e 96 6f 95 e5 Sep 21 07:24:39.949475: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:39.949477: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.949480: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:39.949482: | flags: none (0x0) Sep 21 07:24:39.949485: | Message ID: 0 (0x0) Sep 21 07:24:39.949488: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:39.949490: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:39.949493: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:39.949496: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:39.949498: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.949501: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:39.949504: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:39.949507: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:39.949510: | ****parse IPsec DOI SIT: Sep 21 07:24:39.949512: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:39.949515: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:39.949517: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.949520: | length: 28 (0x1c) Sep 21 07:24:39.949522: | proposal number: 1 (0x1) Sep 21 07:24:39.949525: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:39.949527: | SPI size: 0 (0x0) Sep 21 07:24:39.949529: | number of transforms: 1 (0x1) Sep 21 07:24:39.949532: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:39.949534: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.949538: | length: 20 (0x14) Sep 21 07:24:39.949541: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:39.949543: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:39.949546: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:39.949549: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:39.949551: | length/value: 16 (0x10) Sep 21 07:24:39.949555: "test" #13: 16?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:39.949558: "test" #13: no acceptable Oakley Transform Sep 21 07:24:39.949561: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:39.949566: | [RE]START processing: state #13 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:39.949568: | #13 is idle Sep 21 07:24:39.949644: "test" #13: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:39.949648: | **emit ISAKMP Message: Sep 21 07:24:39.949650: | initiator cookie: Sep 21 07:24:39.949652: | 2d 0d d2 a7 2e 43 2b 78 Sep 21 07:24:39.949655: | responder cookie: Sep 21 07:24:39.949657: | 79 ed 21 2e 96 6f 95 e5 Sep 21 07:24:39.949659: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.949662: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:39.949664: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:39.949667: | flags: none (0x0) Sep 21 07:24:39.949669: | Message ID: 0 (0x0) Sep 21 07:24:39.949672: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:39.949675: | ***emit ISAKMP Notification Payload: Sep 21 07:24:39.949677: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:39.949679: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:39.949682: | protocol ID: 1 (0x1) Sep 21 07:24:39.949684: | SPI size: 0 (0x0) Sep 21 07:24:39.949686: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:39.949689: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:39.949692: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:39.949695: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:39.949697: | emitting length of ISAKMP Message: 40 Sep 21 07:24:39.949703: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #13) Sep 21 07:24:39.949706: | 2d 0d d2 a7 2e 43 2b 78 79 ed 21 2e 96 6f 95 e5 Sep 21 07:24:39.949708: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:39.949710: | 00 00 00 01 01 00 00 0e Sep 21 07:24:39.949734: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:39.949740: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:39.949745: | stop processing: state #13 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:39.949748: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:39.949753: | spent 0.447 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:40.022092: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:40.022115: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:40.022118: | 0f f8 ac 66 37 c0 78 e7 00 00 00 00 00 00 00 00 Sep 21 07:24:40.022119: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:40.022121: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:40.022122: | 00 00 00 14 01 01 00 00 80 01 00 08 80 03 00 1f Sep 21 07:24:40.022123: | 80 04 00 05 Sep 21 07:24:40.022128: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:40.022131: | **parse ISAKMP Message: Sep 21 07:24:40.022133: | initiator cookie: Sep 21 07:24:40.022134: | 0f f8 ac 66 37 c0 78 e7 Sep 21 07:24:40.022136: | responder cookie: Sep 21 07:24:40.022140: | 00 00 00 00 00 00 00 00 Sep 21 07:24:40.022144: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.022146: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.022148: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.022150: | flags: none (0x0) Sep 21 07:24:40.022151: | Message ID: 0 (0x0) Sep 21 07:24:40.022153: | length: 68 (0x44) Sep 21 07:24:40.022155: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:40.022159: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:40.022161: | #null state always idle Sep 21 07:24:40.022163: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:40.022165: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:40.022167: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.022169: | length: 40 (0x28) Sep 21 07:24:40.022171: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.022174: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:40.022176: | in statetime_start() with no state Sep 21 07:24:40.022179: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:40.022183: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:40.022186: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.022189: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:40.022191: | find_next_host_connection returns test Sep 21 07:24:40.022192: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.022194: | find_next_host_connection returns empty Sep 21 07:24:40.022217: | creating state object #14 at 0x5589e77c4670 Sep 21 07:24:40.022220: | State DB: adding IKEv1 state #14 in UNDEFINED Sep 21 07:24:40.022223: | pstats #14 ikev1.isakmp started Sep 21 07:24:40.022227: | #14 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:40.022232: | start processing: state #14 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:40.022235: | parent state #14: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:40.022237: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:40.022239: | ICOOKIE-DUMP: 0f f8 ac 66 37 c0 78 e7 Sep 21 07:24:40.022241: "test" #14: responding to Main Mode Sep 21 07:24:40.022245: | **emit ISAKMP Message: Sep 21 07:24:40.022247: | initiator cookie: Sep 21 07:24:40.022249: | 0f f8 ac 66 37 c0 78 e7 Sep 21 07:24:40.022251: | responder cookie: Sep 21 07:24:40.022252: | 2a 8a 81 71 51 a2 64 44 Sep 21 07:24:40.022254: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.022256: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.022259: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.022261: | flags: none (0x0) Sep 21 07:24:40.022263: | Message ID: 0 (0x0) Sep 21 07:24:40.022271: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.022276: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:40.022281: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:40.022284: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:40.022286: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.022289: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:40.022292: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:40.022295: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:40.022298: | ****parse IPsec DOI SIT: Sep 21 07:24:40.022301: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:40.022306: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:40.022314: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.022317: | length: 28 (0x1c) Sep 21 07:24:40.022320: | proposal number: 1 (0x1) Sep 21 07:24:40.022323: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:40.022325: | SPI size: 0 (0x0) Sep 21 07:24:40.022327: | number of transforms: 1 (0x1) Sep 21 07:24:40.022328: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:40.022330: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.022332: | length: 20 (0x14) Sep 21 07:24:40.022335: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:40.022337: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:40.022338: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.022340: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:40.022342: | length/value: 8 (0x8) Sep 21 07:24:40.022344: | [8 is OAKLEY_CAMELLIA_CBC] Sep 21 07:24:40.022346: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.022348: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Sep 21 07:24:40.022351: | length/value: 31 (0x1f) Sep 21 07:24:40.022354: "test" #14: Pluto does not support 31?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Sep 21 07:24:40.022356: "test" #14: no acceptable Oakley Transform Sep 21 07:24:40.022358: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:40.022361: | [RE]START processing: state #14 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:40.022363: | #14 is idle Sep 21 07:24:40.022439: "test" #14: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:40.022445: | **emit ISAKMP Message: Sep 21 07:24:40.022448: | initiator cookie: Sep 21 07:24:40.022450: | 0f f8 ac 66 37 c0 78 e7 Sep 21 07:24:40.022453: | responder cookie: Sep 21 07:24:40.022455: | 2a 8a 81 71 51 a2 64 44 Sep 21 07:24:40.022458: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.022461: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.022464: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:40.022467: | flags: none (0x0) Sep 21 07:24:40.022469: | Message ID: 0 (0x0) Sep 21 07:24:40.022472: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.022476: | ***emit ISAKMP Notification Payload: Sep 21 07:24:40.022479: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.022482: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.022484: | protocol ID: 1 (0x1) Sep 21 07:24:40.022487: | SPI size: 0 (0x0) Sep 21 07:24:40.022490: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:40.022494: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:40.022497: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:40.022500: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:40.022503: | emitting length of ISAKMP Message: 40 Sep 21 07:24:40.022510: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #14) Sep 21 07:24:40.022513: | 0f f8 ac 66 37 c0 78 e7 2a 8a 81 71 51 a2 64 44 Sep 21 07:24:40.022516: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:40.022521: | 00 00 00 01 01 00 00 0e Sep 21 07:24:40.022546: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:40.022554: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:40.022559: | stop processing: state #14 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:40.022562: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:40.022568: | spent 0.445 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:40.080570: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:40.080602: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:40.080605: | a4 f9 78 8a c8 13 ab a1 00 00 00 00 00 00 00 00 Sep 21 07:24:40.080608: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:40.080610: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:40.080612: | 00 00 00 14 01 01 00 00 80 01 00 08 80 02 00 10 Sep 21 07:24:40.080614: | 80 04 00 05 Sep 21 07:24:40.080619: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:40.080623: | **parse ISAKMP Message: Sep 21 07:24:40.080626: | initiator cookie: Sep 21 07:24:40.080628: | a4 f9 78 8a c8 13 ab a1 Sep 21 07:24:40.080630: | responder cookie: Sep 21 07:24:40.080633: | 00 00 00 00 00 00 00 00 Sep 21 07:24:40.080636: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.080638: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.080641: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.080644: | flags: none (0x0) Sep 21 07:24:40.080646: | Message ID: 0 (0x0) Sep 21 07:24:40.080648: | length: 68 (0x44) Sep 21 07:24:40.080651: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:40.080655: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:40.080658: | #null state always idle Sep 21 07:24:40.080661: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:40.080664: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:40.080667: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.080669: | length: 40 (0x28) Sep 21 07:24:40.080671: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.080674: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:40.080677: | in statetime_start() with no state Sep 21 07:24:40.080682: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:40.080687: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:40.080691: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.080695: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:40.080697: | find_next_host_connection returns test Sep 21 07:24:40.080700: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.080702: | find_next_host_connection returns empty Sep 21 07:24:40.080725: | creating state object #15 at 0x5589e77c5130 Sep 21 07:24:40.080728: | State DB: adding IKEv1 state #15 in UNDEFINED Sep 21 07:24:40.080732: | pstats #15 ikev1.isakmp started Sep 21 07:24:40.080736: | #15 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:40.080743: | start processing: state #15 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:40.080746: | parent state #15: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:40.080750: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:40.080752: | ICOOKIE-DUMP: a4 f9 78 8a c8 13 ab a1 Sep 21 07:24:40.080755: "test" #15: responding to Main Mode Sep 21 07:24:40.080760: | **emit ISAKMP Message: Sep 21 07:24:40.080762: | initiator cookie: Sep 21 07:24:40.080765: | a4 f9 78 8a c8 13 ab a1 Sep 21 07:24:40.080767: | responder cookie: Sep 21 07:24:40.080769: | 93 67 8c a4 ad 30 10 8f Sep 21 07:24:40.080771: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.080774: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.080776: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.080779: | flags: none (0x0) Sep 21 07:24:40.080781: | Message ID: 0 (0x0) Sep 21 07:24:40.080787: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.080792: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:40.080795: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:40.080800: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:40.080802: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.080805: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:40.080808: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:40.080811: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:40.080814: | ****parse IPsec DOI SIT: Sep 21 07:24:40.080817: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:40.080820: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:40.080822: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.080825: | length: 28 (0x1c) Sep 21 07:24:40.080827: | proposal number: 1 (0x1) Sep 21 07:24:40.080829: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:40.080832: | SPI size: 0 (0x0) Sep 21 07:24:40.080834: | number of transforms: 1 (0x1) Sep 21 07:24:40.080837: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:40.080840: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.080842: | length: 20 (0x14) Sep 21 07:24:40.080844: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:40.080847: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:40.080849: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.080852: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:40.080854: | length/value: 8 (0x8) Sep 21 07:24:40.080857: | [8 is OAKLEY_CAMELLIA_CBC] Sep 21 07:24:40.080860: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.080863: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:40.080865: | length/value: 16 (0x10) Sep 21 07:24:40.080869: "test" #15: 16?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:40.080872: "test" #15: no acceptable Oakley Transform Sep 21 07:24:40.080874: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:40.080879: | [RE]START processing: state #15 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:40.080882: | #15 is idle Sep 21 07:24:40.080960: "test" #15: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:40.080964: | **emit ISAKMP Message: Sep 21 07:24:40.080967: | initiator cookie: Sep 21 07:24:40.080969: | a4 f9 78 8a c8 13 ab a1 Sep 21 07:24:40.080971: | responder cookie: Sep 21 07:24:40.080973: | 93 67 8c a4 ad 30 10 8f Sep 21 07:24:40.080976: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.080978: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.080981: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:40.080983: | flags: none (0x0) Sep 21 07:24:40.080986: | Message ID: 0 (0x0) Sep 21 07:24:40.080988: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.080991: | ***emit ISAKMP Notification Payload: Sep 21 07:24:40.080993: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.080996: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.080998: | protocol ID: 1 (0x1) Sep 21 07:24:40.081000: | SPI size: 0 (0x0) Sep 21 07:24:40.081003: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:40.081006: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:40.081009: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:40.081011: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:40.081014: | emitting length of ISAKMP Message: 40 Sep 21 07:24:40.081020: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #15) Sep 21 07:24:40.081023: | a4 f9 78 8a c8 13 ab a1 93 67 8c a4 ad 30 10 8f Sep 21 07:24:40.081025: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:40.081029: | 00 00 00 01 01 00 00 0e Sep 21 07:24:40.081053: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:40.081059: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:40.081064: | stop processing: state #15 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:40.081067: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:40.081072: | spent 0.455 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:40.123099: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:40.123125: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:40.123129: | 27 b9 b2 60 dc 3b d8 ec 00 00 00 00 00 00 00 00 Sep 21 07:24:40.123132: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:40.123134: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:40.123135: | 00 00 00 14 01 01 00 00 80 01 00 08 80 02 00 10 Sep 21 07:24:40.123138: | 80 03 00 1f Sep 21 07:24:40.123142: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:40.123146: | **parse ISAKMP Message: Sep 21 07:24:40.123149: | initiator cookie: Sep 21 07:24:40.123151: | 27 b9 b2 60 dc 3b d8 ec Sep 21 07:24:40.123153: | responder cookie: Sep 21 07:24:40.123155: | 00 00 00 00 00 00 00 00 Sep 21 07:24:40.123158: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.123160: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.123162: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.123165: | flags: none (0x0) Sep 21 07:24:40.123167: | Message ID: 0 (0x0) Sep 21 07:24:40.123169: | length: 68 (0x44) Sep 21 07:24:40.123172: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:40.123176: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:40.123178: | #null state always idle Sep 21 07:24:40.123182: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:40.123185: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:40.123188: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.123190: | length: 40 (0x28) Sep 21 07:24:40.123192: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.123195: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:40.123198: | in statetime_start() with no state Sep 21 07:24:40.123203: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:40.123209: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:40.123212: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.123216: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:40.123219: | find_next_host_connection returns test Sep 21 07:24:40.123221: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.123223: | find_next_host_connection returns empty Sep 21 07:24:40.123251: | creating state object #16 at 0x5589e77c5bf0 Sep 21 07:24:40.123256: | State DB: adding IKEv1 state #16 in UNDEFINED Sep 21 07:24:40.123261: | pstats #16 ikev1.isakmp started Sep 21 07:24:40.123266: | #16 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:40.123272: | start processing: state #16 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:40.123276: | parent state #16: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:40.123279: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:40.123282: | ICOOKIE-DUMP: 27 b9 b2 60 dc 3b d8 ec Sep 21 07:24:40.123285: "test" #16: responding to Main Mode Sep 21 07:24:40.123290: | **emit ISAKMP Message: Sep 21 07:24:40.123293: | initiator cookie: Sep 21 07:24:40.123299: | 27 b9 b2 60 dc 3b d8 ec Sep 21 07:24:40.123301: | responder cookie: Sep 21 07:24:40.123303: | 10 35 6c af c9 54 62 d7 Sep 21 07:24:40.123305: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.123307: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.123310: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.123312: | flags: none (0x0) Sep 21 07:24:40.123314: | Message ID: 0 (0x0) Sep 21 07:24:40.123317: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.123319: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:40.123322: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:40.123324: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:40.123327: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.123330: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:40.123333: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:40.123335: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:40.123339: | ****parse IPsec DOI SIT: Sep 21 07:24:40.123341: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:40.123344: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:40.123346: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.123348: | length: 28 (0x1c) Sep 21 07:24:40.123351: | proposal number: 1 (0x1) Sep 21 07:24:40.123353: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:40.123355: | SPI size: 0 (0x0) Sep 21 07:24:40.123357: | number of transforms: 1 (0x1) Sep 21 07:24:40.123360: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:40.123363: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.123365: | length: 20 (0x14) Sep 21 07:24:40.123367: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:40.123370: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:40.123372: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.123375: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:40.123378: | length/value: 8 (0x8) Sep 21 07:24:40.123380: | [8 is OAKLEY_CAMELLIA_CBC] Sep 21 07:24:40.123383: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.123386: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:40.123388: | length/value: 16 (0x10) Sep 21 07:24:40.123392: "test" #16: 16?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:40.123395: "test" #16: no acceptable Oakley Transform Sep 21 07:24:40.123398: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:40.123403: | [RE]START processing: state #16 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:40.123406: | #16 is idle Sep 21 07:24:40.123494: "test" #16: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:40.123499: | **emit ISAKMP Message: Sep 21 07:24:40.123503: | initiator cookie: Sep 21 07:24:40.123505: | 27 b9 b2 60 dc 3b d8 ec Sep 21 07:24:40.123507: | responder cookie: Sep 21 07:24:40.123510: | 10 35 6c af c9 54 62 d7 Sep 21 07:24:40.123512: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.123515: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.123519: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:40.123521: | flags: none (0x0) Sep 21 07:24:40.123524: | Message ID: 0 (0x0) Sep 21 07:24:40.123527: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.123530: | ***emit ISAKMP Notification Payload: Sep 21 07:24:40.123533: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.123536: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.123539: | protocol ID: 1 (0x1) Sep 21 07:24:40.123541: | SPI size: 0 (0x0) Sep 21 07:24:40.123547: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:40.123552: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:40.123557: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:40.123560: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:40.123562: | emitting length of ISAKMP Message: 40 Sep 21 07:24:40.123569: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #16) Sep 21 07:24:40.123572: | 27 b9 b2 60 dc 3b d8 ec 10 35 6c af c9 54 62 d7 Sep 21 07:24:40.123574: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:40.123576: | 00 00 00 01 01 00 00 0e Sep 21 07:24:40.123606: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:40.123613: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:40.123618: | stop processing: state #16 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:40.123621: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:40.123627: | spent 0.484 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:40.221868: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:40.221903: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:40.221908: | 92 1d b8 41 d1 2a d7 f7 00 00 00 00 00 00 00 00 Sep 21 07:24:40.221910: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:24:40.221912: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:24:40.221914: | 00 00 00 18 01 01 00 00 80 01 00 0c 80 02 00 0c Sep 21 07:24:40.221916: | 80 03 00 02 80 04 00 10 Sep 21 07:24:40.221921: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:40.221924: | **parse ISAKMP Message: Sep 21 07:24:40.221927: | initiator cookie: Sep 21 07:24:40.221929: | 92 1d b8 41 d1 2a d7 f7 Sep 21 07:24:40.221931: | responder cookie: Sep 21 07:24:40.221933: | 00 00 00 00 00 00 00 00 Sep 21 07:24:40.221936: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.221938: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.221941: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.221943: | flags: none (0x0) Sep 21 07:24:40.221946: | Message ID: 0 (0x0) Sep 21 07:24:40.221948: | length: 72 (0x48) Sep 21 07:24:40.221951: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:40.221955: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:40.221958: | #null state always idle Sep 21 07:24:40.221961: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:40.221964: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:40.221967: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.221969: | length: 44 (0x2c) Sep 21 07:24:40.221971: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.221973: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:40.221976: | in statetime_start() with no state Sep 21 07:24:40.221981: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:40.221986: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:40.221989: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.221993: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:40.221995: | find_next_host_connection returns test Sep 21 07:24:40.221997: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.221999: | find_next_host_connection returns empty Sep 21 07:24:40.222028: | creating state object #17 at 0x5589e77c66b0 Sep 21 07:24:40.222032: | State DB: adding IKEv1 state #17 in UNDEFINED Sep 21 07:24:40.222042: | pstats #17 ikev1.isakmp started Sep 21 07:24:40.222046: | #17 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:40.222052: | start processing: state #17 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:40.222056: | parent state #17: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:40.222059: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:40.222061: | ICOOKIE-DUMP: 92 1d b8 41 d1 2a d7 f7 Sep 21 07:24:40.222064: "test" #17: responding to Main Mode Sep 21 07:24:40.222069: | **emit ISAKMP Message: Sep 21 07:24:40.222072: | initiator cookie: Sep 21 07:24:40.222074: | 92 1d b8 41 d1 2a d7 f7 Sep 21 07:24:40.222076: | responder cookie: Sep 21 07:24:40.222078: | c7 9e c3 bc e5 e4 5f 99 Sep 21 07:24:40.222081: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.222083: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.222085: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.222088: | flags: none (0x0) Sep 21 07:24:40.222090: | Message ID: 0 (0x0) Sep 21 07:24:40.222093: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.222095: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:40.222098: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:40.222101: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:40.222103: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.222106: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:40.222109: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:40.222111: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:40.222115: | ****parse IPsec DOI SIT: Sep 21 07:24:40.222117: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:40.222120: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:40.222123: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.222125: | length: 32 (0x20) Sep 21 07:24:40.222128: | proposal number: 1 (0x1) Sep 21 07:24:40.222130: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:40.222133: | SPI size: 0 (0x0) Sep 21 07:24:40.222135: | number of transforms: 1 (0x1) Sep 21 07:24:40.222137: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:40.222140: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.222142: | length: 24 (0x18) Sep 21 07:24:40.222144: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:40.222146: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:40.222150: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.222152: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:40.222155: | length/value: 12 (0xc) Sep 21 07:24:40.222158: | [12 is UNUSED_12] Sep 21 07:24:40.222162: "test" #17: UNUSED_12 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:40.222164: "test" #17: no acceptable Oakley Transform Sep 21 07:24:40.222168: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:40.222172: | [RE]START processing: state #17 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:40.222174: | #17 is idle Sep 21 07:24:40.222848: "test" #17: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:40.222859: | **emit ISAKMP Message: Sep 21 07:24:40.222862: | initiator cookie: Sep 21 07:24:40.222865: | 92 1d b8 41 d1 2a d7 f7 Sep 21 07:24:40.222867: | responder cookie: Sep 21 07:24:40.222869: | c7 9e c3 bc e5 e4 5f 99 Sep 21 07:24:40.222872: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.222875: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.222877: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:40.222883: | flags: none (0x0) Sep 21 07:24:40.222885: | Message ID: 0 (0x0) Sep 21 07:24:40.222888: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.222891: | ***emit ISAKMP Notification Payload: Sep 21 07:24:40.222894: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.222896: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.222898: | protocol ID: 1 (0x1) Sep 21 07:24:40.222901: | SPI size: 0 (0x0) Sep 21 07:24:40.222903: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:40.222907: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:40.222909: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:40.222912: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:40.222915: | emitting length of ISAKMP Message: 40 Sep 21 07:24:40.222922: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #17) Sep 21 07:24:40.222924: | 92 1d b8 41 d1 2a d7 f7 c7 9e c3 bc e5 e4 5f 99 Sep 21 07:24:40.222926: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:40.222929: | 00 00 00 01 01 00 00 0e Sep 21 07:24:40.222969: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:40.222975: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:40.222981: | stop processing: state #17 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:40.222984: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:40.222991: | spent 0.487 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:40.290877: | spent 0.00338 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:40.290902: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:40.290907: | 63 df 78 3e 5f a7 d6 e1 00 00 00 00 00 00 00 00 Sep 21 07:24:40.290910: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:40.290912: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:40.290915: | 00 00 00 14 01 01 00 00 80 02 00 0c 80 03 00 02 Sep 21 07:24:40.290917: | 80 04 00 10 Sep 21 07:24:40.290922: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:40.290927: | **parse ISAKMP Message: Sep 21 07:24:40.290929: | initiator cookie: Sep 21 07:24:40.290932: | 63 df 78 3e 5f a7 d6 e1 Sep 21 07:24:40.290934: | responder cookie: Sep 21 07:24:40.290936: | 00 00 00 00 00 00 00 00 Sep 21 07:24:40.290939: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.290942: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.290944: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.290947: | flags: none (0x0) Sep 21 07:24:40.290950: | Message ID: 0 (0x0) Sep 21 07:24:40.290952: | length: 68 (0x44) Sep 21 07:24:40.290955: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:40.290959: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:40.290962: | #null state always idle Sep 21 07:24:40.290965: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:40.290968: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:40.290971: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.290974: | length: 40 (0x28) Sep 21 07:24:40.290976: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.290979: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:40.290982: | in statetime_start() with no state Sep 21 07:24:40.290988: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:40.290994: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:40.291001: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.291006: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:40.291009: | find_next_host_connection returns test Sep 21 07:24:40.291011: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.291014: | find_next_host_connection returns empty Sep 21 07:24:40.291037: | creating state object #18 at 0x5589e77c7170 Sep 21 07:24:40.291041: | State DB: adding IKEv1 state #18 in UNDEFINED Sep 21 07:24:40.291045: | pstats #18 ikev1.isakmp started Sep 21 07:24:40.291050: | #18 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:40.291056: | start processing: state #18 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:40.291060: | parent state #18: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:40.291063: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:40.291066: | ICOOKIE-DUMP: 63 df 78 3e 5f a7 d6 e1 Sep 21 07:24:40.291069: "test" #18: responding to Main Mode Sep 21 07:24:40.291074: | **emit ISAKMP Message: Sep 21 07:24:40.291076: | initiator cookie: Sep 21 07:24:40.291078: | 63 df 78 3e 5f a7 d6 e1 Sep 21 07:24:40.291081: | responder cookie: Sep 21 07:24:40.291083: | e0 ac 51 a1 65 96 3e 75 Sep 21 07:24:40.291085: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.291088: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.291090: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.291093: | flags: none (0x0) Sep 21 07:24:40.291095: | Message ID: 0 (0x0) Sep 21 07:24:40.291098: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.291101: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:40.291104: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:40.291106: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:40.291109: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.291111: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:40.291114: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:40.291117: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:40.291120: | ****parse IPsec DOI SIT: Sep 21 07:24:40.291123: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:40.291126: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:40.291128: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.291130: | length: 28 (0x1c) Sep 21 07:24:40.291133: | proposal number: 1 (0x1) Sep 21 07:24:40.291135: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:40.291137: | SPI size: 0 (0x0) Sep 21 07:24:40.291140: | number of transforms: 1 (0x1) Sep 21 07:24:40.291143: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:40.291145: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.291147: | length: 20 (0x14) Sep 21 07:24:40.291149: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:40.291152: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:40.291154: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.291157: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:40.291160: | length/value: 12 (0xc) Sep 21 07:24:40.291164: "test" #18: 12?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:40.291167: "test" #18: no acceptable Oakley Transform Sep 21 07:24:40.291170: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:40.291175: | [RE]START processing: state #18 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:40.291177: | #18 is idle Sep 21 07:24:40.291415: "test" #18: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:40.291426: | **emit ISAKMP Message: Sep 21 07:24:40.291429: | initiator cookie: Sep 21 07:24:40.291432: | 63 df 78 3e 5f a7 d6 e1 Sep 21 07:24:40.291434: | responder cookie: Sep 21 07:24:40.291436: | e0 ac 51 a1 65 96 3e 75 Sep 21 07:24:40.291439: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.291442: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.291445: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:40.291447: | flags: none (0x0) Sep 21 07:24:40.291450: | Message ID: 0 (0x0) Sep 21 07:24:40.291453: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.291456: | ***emit ISAKMP Notification Payload: Sep 21 07:24:40.291459: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.291461: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.291464: | protocol ID: 1 (0x1) Sep 21 07:24:40.291466: | SPI size: 0 (0x0) Sep 21 07:24:40.291469: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:40.291472: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:40.291476: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:40.291478: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:40.291481: | emitting length of ISAKMP Message: 40 Sep 21 07:24:40.291488: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #18) Sep 21 07:24:40.291490: | 63 df 78 3e 5f a7 d6 e1 e0 ac 51 a1 65 96 3e 75 Sep 21 07:24:40.291493: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:40.291495: | 00 00 00 01 01 00 00 0e Sep 21 07:24:40.291524: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:40.291530: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:40.291536: | stop processing: state #18 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:40.291539: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:40.291544: | spent 0.478 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:40.333171: | spent 0.00444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:40.333196: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:40.333200: | 89 f3 05 79 77 b0 29 31 00 00 00 00 00 00 00 00 Sep 21 07:24:40.333202: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:40.333205: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:40.333208: | 00 00 00 14 01 01 00 00 80 01 00 0c 80 03 00 02 Sep 21 07:24:40.333210: | 80 04 00 10 Sep 21 07:24:40.333216: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:40.333220: | **parse ISAKMP Message: Sep 21 07:24:40.333222: | initiator cookie: Sep 21 07:24:40.333225: | 89 f3 05 79 77 b0 29 31 Sep 21 07:24:40.333227: | responder cookie: Sep 21 07:24:40.333230: | 00 00 00 00 00 00 00 00 Sep 21 07:24:40.333232: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.333235: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.333237: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.333240: | flags: none (0x0) Sep 21 07:24:40.333242: | Message ID: 0 (0x0) Sep 21 07:24:40.333244: | length: 68 (0x44) Sep 21 07:24:40.333247: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:40.333250: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:40.333256: | #null state always idle Sep 21 07:24:40.333260: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:40.333263: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:40.333266: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.333273: | length: 40 (0x28) Sep 21 07:24:40.333276: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.333279: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:40.333281: | in statetime_start() with no state Sep 21 07:24:40.333288: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:40.333293: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:40.333297: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.333301: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:40.333304: | find_next_host_connection returns test Sep 21 07:24:40.333306: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.333309: | find_next_host_connection returns empty Sep 21 07:24:40.333339: | creating state object #19 at 0x5589e77c7c30 Sep 21 07:24:40.333343: | State DB: adding IKEv1 state #19 in UNDEFINED Sep 21 07:24:40.333348: | pstats #19 ikev1.isakmp started Sep 21 07:24:40.333352: | #19 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:40.333358: | start processing: state #19 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:40.333362: | parent state #19: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:40.333366: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:40.333368: | ICOOKIE-DUMP: 89 f3 05 79 77 b0 29 31 Sep 21 07:24:40.333371: "test" #19: responding to Main Mode Sep 21 07:24:40.333376: | **emit ISAKMP Message: Sep 21 07:24:40.333379: | initiator cookie: Sep 21 07:24:40.333380: | 89 f3 05 79 77 b0 29 31 Sep 21 07:24:40.333382: | responder cookie: Sep 21 07:24:40.333385: | 25 42 fd 7a 3f e0 0d 18 Sep 21 07:24:40.333387: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.333390: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.333392: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.333394: | flags: none (0x0) Sep 21 07:24:40.333397: | Message ID: 0 (0x0) Sep 21 07:24:40.333399: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.333402: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:40.333405: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:40.333407: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:40.333410: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.333412: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:40.333415: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:40.333418: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:40.333421: | ****parse IPsec DOI SIT: Sep 21 07:24:40.333424: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:40.333427: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:40.333430: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.333432: | length: 28 (0x1c) Sep 21 07:24:40.333434: | proposal number: 1 (0x1) Sep 21 07:24:40.333437: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:40.333439: | SPI size: 0 (0x0) Sep 21 07:24:40.333442: | number of transforms: 1 (0x1) Sep 21 07:24:40.333445: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:40.333447: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.333449: | length: 20 (0x14) Sep 21 07:24:40.333451: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:40.333453: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:40.333456: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.333459: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:40.333461: | length/value: 12 (0xc) Sep 21 07:24:40.333466: | [12 is UNUSED_12] Sep 21 07:24:40.333470: "test" #19: UNUSED_12 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:40.333473: "test" #19: no acceptable Oakley Transform Sep 21 07:24:40.333475: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:40.333480: | [RE]START processing: state #19 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:40.333482: | #19 is idle Sep 21 07:24:40.333764: "test" #19: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:40.333769: | **emit ISAKMP Message: Sep 21 07:24:40.333770: | initiator cookie: Sep 21 07:24:40.333772: | 89 f3 05 79 77 b0 29 31 Sep 21 07:24:40.333773: | responder cookie: Sep 21 07:24:40.333775: | 25 42 fd 7a 3f e0 0d 18 Sep 21 07:24:40.333776: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.333778: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.333780: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:40.333781: | flags: none (0x0) Sep 21 07:24:40.333793: | Message ID: 0 (0x0) Sep 21 07:24:40.333800: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.333803: | ***emit ISAKMP Notification Payload: Sep 21 07:24:40.333805: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.333807: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.333810: | protocol ID: 1 (0x1) Sep 21 07:24:40.333812: | SPI size: 0 (0x0) Sep 21 07:24:40.333814: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:40.333817: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:40.333820: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:40.333823: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:40.333825: | emitting length of ISAKMP Message: 40 Sep 21 07:24:40.333832: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #19) Sep 21 07:24:40.333834: | 89 f3 05 79 77 b0 29 31 25 42 fd 7a 3f e0 0d 18 Sep 21 07:24:40.333836: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:40.333838: | 00 00 00 01 01 00 00 0e Sep 21 07:24:40.333869: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:40.333875: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:40.333880: | stop processing: state #19 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:40.333883: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:40.333889: | spent 0.469 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:40.386337: | spent 0.00414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:40.386366: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:40.386370: | 98 7e a9 d8 49 2c b4 fc 00 00 00 00 00 00 00 00 Sep 21 07:24:40.386372: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:40.386375: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:40.386377: | 00 00 00 14 01 01 00 00 80 01 00 0c 80 02 00 0c Sep 21 07:24:40.386379: | 80 04 00 10 Sep 21 07:24:40.386384: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:40.386388: | **parse ISAKMP Message: Sep 21 07:24:40.386391: | initiator cookie: Sep 21 07:24:40.386393: | 98 7e a9 d8 49 2c b4 fc Sep 21 07:24:40.386395: | responder cookie: Sep 21 07:24:40.386398: | 00 00 00 00 00 00 00 00 Sep 21 07:24:40.386401: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.386404: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.386406: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.386409: | flags: none (0x0) Sep 21 07:24:40.386416: | Message ID: 0 (0x0) Sep 21 07:24:40.386419: | length: 68 (0x44) Sep 21 07:24:40.386422: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:40.386426: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:40.386428: | #null state always idle Sep 21 07:24:40.386432: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:40.386435: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:40.386438: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.386440: | length: 40 (0x28) Sep 21 07:24:40.386443: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.386446: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:40.386448: | in statetime_start() with no state Sep 21 07:24:40.386454: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:40.386460: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:40.386463: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.386467: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:40.386470: | find_next_host_connection returns test Sep 21 07:24:40.386472: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.386475: | find_next_host_connection returns empty Sep 21 07:24:40.386500: | creating state object #20 at 0x5589e77c86f0 Sep 21 07:24:40.386504: | State DB: adding IKEv1 state #20 in UNDEFINED Sep 21 07:24:40.386508: | pstats #20 ikev1.isakmp started Sep 21 07:24:40.386513: | #20 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:40.386519: | start processing: state #20 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:40.386523: | parent state #20: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:40.386526: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:40.386529: | ICOOKIE-DUMP: 98 7e a9 d8 49 2c b4 fc Sep 21 07:24:40.386531: "test" #20: responding to Main Mode Sep 21 07:24:40.386536: | **emit ISAKMP Message: Sep 21 07:24:40.386539: | initiator cookie: Sep 21 07:24:40.386541: | 98 7e a9 d8 49 2c b4 fc Sep 21 07:24:40.386543: | responder cookie: Sep 21 07:24:40.386546: | 8b d8 53 42 0f 6e 53 82 Sep 21 07:24:40.386548: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.386551: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.386553: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.386556: | flags: none (0x0) Sep 21 07:24:40.386558: | Message ID: 0 (0x0) Sep 21 07:24:40.386561: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.386564: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:40.386566: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:40.386569: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:40.386571: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.386574: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:40.386577: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:40.386580: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:40.386583: | ****parse IPsec DOI SIT: Sep 21 07:24:40.386585: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:40.386588: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:40.386590: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.386593: | length: 28 (0x1c) Sep 21 07:24:40.386595: | proposal number: 1 (0x1) Sep 21 07:24:40.386598: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:40.386600: | SPI size: 0 (0x0) Sep 21 07:24:40.386604: | number of transforms: 1 (0x1) Sep 21 07:24:40.386607: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:40.386610: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.386612: | length: 20 (0x14) Sep 21 07:24:40.386614: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:40.386617: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:40.386619: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.386622: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:40.386625: | length/value: 12 (0xc) Sep 21 07:24:40.386627: | [12 is UNUSED_12] Sep 21 07:24:40.386631: "test" #20: UNUSED_12 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:40.386634: "test" #20: no acceptable Oakley Transform Sep 21 07:24:40.386636: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:40.386641: | [RE]START processing: state #20 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:40.386644: | #20 is idle Sep 21 07:24:40.386812: "test" #20: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:40.386823: | **emit ISAKMP Message: Sep 21 07:24:40.386826: | initiator cookie: Sep 21 07:24:40.386829: | 98 7e a9 d8 49 2c b4 fc Sep 21 07:24:40.386831: | responder cookie: Sep 21 07:24:40.386833: | 8b d8 53 42 0f 6e 53 82 Sep 21 07:24:40.386836: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.386839: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.386841: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:40.386844: | flags: none (0x0) Sep 21 07:24:40.386846: | Message ID: 0 (0x0) Sep 21 07:24:40.386849: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.386852: | ***emit ISAKMP Notification Payload: Sep 21 07:24:40.386855: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.386858: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.386861: | protocol ID: 1 (0x1) Sep 21 07:24:40.386863: | SPI size: 0 (0x0) Sep 21 07:24:40.386866: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:40.386869: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:40.386872: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:40.386874: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:40.386877: | emitting length of ISAKMP Message: 40 Sep 21 07:24:40.386883: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #20) Sep 21 07:24:40.386886: | 98 7e a9 d8 49 2c b4 fc 8b d8 53 42 0f 6e 53 82 Sep 21 07:24:40.386888: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:40.386890: | 00 00 00 01 01 00 00 0e Sep 21 07:24:40.386932: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:40.386938: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:40.386943: | stop processing: state #20 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:40.386946: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:40.386952: | spent 0.493 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:40.442231: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:40.442257: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:40.442262: | 60 ef 2b 89 54 84 99 72 00 00 00 00 00 00 00 00 Sep 21 07:24:40.442264: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:40.442267: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:40.442269: | 00 00 00 14 01 01 00 00 80 01 00 0c 80 02 00 0c Sep 21 07:24:40.442271: | 80 03 00 02 Sep 21 07:24:40.442276: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:40.442285: | **parse ISAKMP Message: Sep 21 07:24:40.442288: | initiator cookie: Sep 21 07:24:40.442291: | 60 ef 2b 89 54 84 99 72 Sep 21 07:24:40.442293: | responder cookie: Sep 21 07:24:40.442295: | 00 00 00 00 00 00 00 00 Sep 21 07:24:40.442298: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.442301: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.442303: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.442306: | flags: none (0x0) Sep 21 07:24:40.442309: | Message ID: 0 (0x0) Sep 21 07:24:40.442311: | length: 68 (0x44) Sep 21 07:24:40.442314: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:40.442318: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:40.442321: | #null state always idle Sep 21 07:24:40.442325: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:40.442328: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:40.442331: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.442333: | length: 40 (0x28) Sep 21 07:24:40.442336: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.442338: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:40.442341: | in statetime_start() with no state Sep 21 07:24:40.442347: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:40.442352: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:40.442356: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.442360: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:40.442363: | find_next_host_connection returns test Sep 21 07:24:40.442366: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.442368: | find_next_host_connection returns empty Sep 21 07:24:40.442396: | creating state object #21 at 0x5589e77c91b0 Sep 21 07:24:40.442400: | State DB: adding IKEv1 state #21 in UNDEFINED Sep 21 07:24:40.442407: | pstats #21 ikev1.isakmp started Sep 21 07:24:40.442411: | #21 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:40.442417: | start processing: state #21 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:40.442421: | parent state #21: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:40.442424: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:40.442426: | ICOOKIE-DUMP: 60 ef 2b 89 54 84 99 72 Sep 21 07:24:40.442429: "test" #21: responding to Main Mode Sep 21 07:24:40.442434: | **emit ISAKMP Message: Sep 21 07:24:40.442436: | initiator cookie: Sep 21 07:24:40.442438: | 60 ef 2b 89 54 84 99 72 Sep 21 07:24:40.442440: | responder cookie: Sep 21 07:24:40.442442: | 33 7e de 9a 59 40 24 a0 Sep 21 07:24:40.442445: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.442447: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.442450: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.442452: | flags: none (0x0) Sep 21 07:24:40.442455: | Message ID: 0 (0x0) Sep 21 07:24:40.442457: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.442460: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:40.442463: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:40.442466: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:40.442468: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.442471: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:40.442475: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:40.442478: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:40.442483: | ****parse IPsec DOI SIT: Sep 21 07:24:40.442486: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:40.442489: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:40.442491: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.442493: | length: 28 (0x1c) Sep 21 07:24:40.442496: | proposal number: 1 (0x1) Sep 21 07:24:40.442498: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:40.442500: | SPI size: 0 (0x0) Sep 21 07:24:40.442502: | number of transforms: 1 (0x1) Sep 21 07:24:40.442505: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:40.442507: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.442509: | length: 20 (0x14) Sep 21 07:24:40.442511: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:40.442514: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:40.442516: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.442519: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:40.442521: | length/value: 12 (0xc) Sep 21 07:24:40.442524: | [12 is UNUSED_12] Sep 21 07:24:40.442527: "test" #21: UNUSED_12 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:40.442530: "test" #21: no acceptable Oakley Transform Sep 21 07:24:40.442533: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:40.442538: | [RE]START processing: state #21 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:40.442540: | #21 is idle Sep 21 07:24:40.442818: "test" #21: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:40.442827: | **emit ISAKMP Message: Sep 21 07:24:40.442831: | initiator cookie: Sep 21 07:24:40.442833: | 60 ef 2b 89 54 84 99 72 Sep 21 07:24:40.442835: | responder cookie: Sep 21 07:24:40.442838: | 33 7e de 9a 59 40 24 a0 Sep 21 07:24:40.442841: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.442843: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.442846: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:40.442849: | flags: none (0x0) Sep 21 07:24:40.442851: | Message ID: 0 (0x0) Sep 21 07:24:40.442854: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.442857: | ***emit ISAKMP Notification Payload: Sep 21 07:24:40.442860: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.442863: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.442865: | protocol ID: 1 (0x1) Sep 21 07:24:40.442868: | SPI size: 0 (0x0) Sep 21 07:24:40.442870: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:40.442873: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:40.442876: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:40.442879: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:40.442882: | emitting length of ISAKMP Message: 40 Sep 21 07:24:40.442888: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #21) Sep 21 07:24:40.442891: | 60 ef 2b 89 54 84 99 72 33 7e de 9a 59 40 24 a0 Sep 21 07:24:40.442893: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:40.442896: | 00 00 00 01 01 00 00 0e Sep 21 07:24:40.442925: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:40.442932: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:40.442937: | stop processing: state #21 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:40.442940: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:40.442946: | spent 0.495 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:40.498390: | spent 0.00422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:40.498419: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:40.498424: | 06 8c 45 20 2f f7 4b 13 00 00 00 00 00 00 00 00 Sep 21 07:24:40.498426: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:24:40.498428: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:24:40.498431: | 00 00 00 18 01 01 00 00 80 01 00 03 80 02 00 06 Sep 21 07:24:40.498433: | 80 03 00 18 80 04 00 1d Sep 21 07:24:40.498438: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:40.498442: | **parse ISAKMP Message: Sep 21 07:24:40.498444: | initiator cookie: Sep 21 07:24:40.498447: | 06 8c 45 20 2f f7 4b 13 Sep 21 07:24:40.498449: | responder cookie: Sep 21 07:24:40.498451: | 00 00 00 00 00 00 00 00 Sep 21 07:24:40.498454: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.498457: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.498460: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.498463: | flags: none (0x0) Sep 21 07:24:40.498465: | Message ID: 0 (0x0) Sep 21 07:24:40.498468: | length: 72 (0x48) Sep 21 07:24:40.498470: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:40.498474: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:40.498477: | #null state always idle Sep 21 07:24:40.498481: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:40.498484: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:40.498487: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.498489: | length: 44 (0x2c) Sep 21 07:24:40.498492: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.498494: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:40.498497: | in statetime_start() with no state Sep 21 07:24:40.498502: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:40.498508: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:40.498512: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.498516: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:40.498519: | find_next_host_connection returns test Sep 21 07:24:40.498521: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.498523: | find_next_host_connection returns empty Sep 21 07:24:40.498551: | creating state object #22 at 0x5589e77c9c70 Sep 21 07:24:40.498556: | State DB: adding IKEv1 state #22 in UNDEFINED Sep 21 07:24:40.498560: | pstats #22 ikev1.isakmp started Sep 21 07:24:40.498566: | #22 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:40.498572: | start processing: state #22 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:40.498575: | parent state #22: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:40.498578: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:40.498581: | ICOOKIE-DUMP: 06 8c 45 20 2f f7 4b 13 Sep 21 07:24:40.498584: "test" #22: responding to Main Mode Sep 21 07:24:40.498590: | **emit ISAKMP Message: Sep 21 07:24:40.498593: | initiator cookie: Sep 21 07:24:40.498595: | 06 8c 45 20 2f f7 4b 13 Sep 21 07:24:40.498597: | responder cookie: Sep 21 07:24:40.498599: | 56 0d 4d 18 99 5f 3c c5 Sep 21 07:24:40.498602: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.498604: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.498606: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.498609: | flags: none (0x0) Sep 21 07:24:40.498612: | Message ID: 0 (0x0) Sep 21 07:24:40.498614: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.498617: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:40.498622: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:40.498624: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:40.498627: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.498630: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:40.498633: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:40.498636: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:40.498640: | ****parse IPsec DOI SIT: Sep 21 07:24:40.498642: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:40.498645: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:40.498648: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.498650: | length: 32 (0x20) Sep 21 07:24:40.498652: | proposal number: 1 (0x1) Sep 21 07:24:40.498655: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:40.498657: | SPI size: 0 (0x0) Sep 21 07:24:40.498660: | number of transforms: 1 (0x1) Sep 21 07:24:40.498663: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:40.498665: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.498668: | length: 24 (0x18) Sep 21 07:24:40.498670: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:40.498673: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:40.498675: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.498678: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:40.498680: | length/value: 3 (0x3) Sep 21 07:24:40.498683: | [3 is OAKLEY_BLOWFISH_CBC(UNUSED)] Sep 21 07:24:40.498687: "test" #22: OAKLEY_BLOWFISH_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:40.498690: "test" #22: no acceptable Oakley Transform Sep 21 07:24:40.498693: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:40.498698: | [RE]START processing: state #22 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:40.498701: | #22 is idle Sep 21 07:24:40.500004: "test" #22: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:40.500013: | **emit ISAKMP Message: Sep 21 07:24:40.500016: | initiator cookie: Sep 21 07:24:40.500019: | 06 8c 45 20 2f f7 4b 13 Sep 21 07:24:40.500021: | responder cookie: Sep 21 07:24:40.500023: | 56 0d 4d 18 99 5f 3c c5 Sep 21 07:24:40.500026: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.500029: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.500032: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:40.500034: | flags: none (0x0) Sep 21 07:24:40.500037: | Message ID: 0 (0x0) Sep 21 07:24:40.500040: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.500043: | ***emit ISAKMP Notification Payload: Sep 21 07:24:40.500045: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.500048: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.500050: | protocol ID: 1 (0x1) Sep 21 07:24:40.500053: | SPI size: 0 (0x0) Sep 21 07:24:40.500055: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:40.500058: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:40.500061: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:40.500064: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:40.500067: | emitting length of ISAKMP Message: 40 Sep 21 07:24:40.500073: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #22) Sep 21 07:24:40.500076: | 06 8c 45 20 2f f7 4b 13 56 0d 4d 18 99 5f 3c c5 Sep 21 07:24:40.500078: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:40.500080: | 00 00 00 01 01 00 00 0e Sep 21 07:24:40.500120: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:40.500127: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:40.500132: | stop processing: state #22 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:40.500135: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:40.500142: | spent 0.492 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:40.575580: | spent 0.00349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:40.575612: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:40.575616: | 2b 80 de ab 68 3c a3 70 00 00 00 00 00 00 00 00 Sep 21 07:24:40.575618: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:40.575620: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:40.575623: | 00 00 00 14 01 01 00 00 80 02 00 06 80 03 00 18 Sep 21 07:24:40.575625: | 80 04 00 1d Sep 21 07:24:40.575630: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:40.575634: | **parse ISAKMP Message: Sep 21 07:24:40.575636: | initiator cookie: Sep 21 07:24:40.575639: | 2b 80 de ab 68 3c a3 70 Sep 21 07:24:40.575641: | responder cookie: Sep 21 07:24:40.575643: | 00 00 00 00 00 00 00 00 Sep 21 07:24:40.575646: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.575649: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.575651: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.575654: | flags: none (0x0) Sep 21 07:24:40.575656: | Message ID: 0 (0x0) Sep 21 07:24:40.575659: | length: 68 (0x44) Sep 21 07:24:40.575662: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:40.575665: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:40.575668: | #null state always idle Sep 21 07:24:40.575671: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:40.575674: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:40.575677: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.575679: | length: 40 (0x28) Sep 21 07:24:40.575681: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.575684: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:40.575687: | in statetime_start() with no state Sep 21 07:24:40.575693: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:40.575698: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:40.575701: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.575704: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:40.575707: | find_next_host_connection returns test Sep 21 07:24:40.575709: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.575712: | find_next_host_connection returns empty Sep 21 07:24:40.575739: | creating state object #23 at 0x5589e77ca730 Sep 21 07:24:40.575742: | State DB: adding IKEv1 state #23 in UNDEFINED Sep 21 07:24:40.575747: | pstats #23 ikev1.isakmp started Sep 21 07:24:40.575751: | #23 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:40.575758: | start processing: state #23 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:40.575761: | parent state #23: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:40.575765: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:40.575768: | ICOOKIE-DUMP: 2b 80 de ab 68 3c a3 70 Sep 21 07:24:40.575771: "test" #23: responding to Main Mode Sep 21 07:24:40.575775: | **emit ISAKMP Message: Sep 21 07:24:40.575778: | initiator cookie: Sep 21 07:24:40.575780: | 2b 80 de ab 68 3c a3 70 Sep 21 07:24:40.575785: | responder cookie: Sep 21 07:24:40.575790: | 72 ff 71 48 8c dc a9 17 Sep 21 07:24:40.575796: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.575799: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.575801: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.575803: | flags: none (0x0) Sep 21 07:24:40.575806: | Message ID: 0 (0x0) Sep 21 07:24:40.575809: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.575811: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:40.575814: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:40.575817: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:40.575819: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.575822: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:40.575825: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:40.575828: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:40.575831: | ****parse IPsec DOI SIT: Sep 21 07:24:40.575833: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:40.575836: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:40.575839: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.575841: | length: 28 (0x1c) Sep 21 07:24:40.575843: | proposal number: 1 (0x1) Sep 21 07:24:40.575846: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:40.575848: | SPI size: 0 (0x0) Sep 21 07:24:40.575850: | number of transforms: 1 (0x1) Sep 21 07:24:40.575853: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:40.575856: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.575858: | length: 20 (0x14) Sep 21 07:24:40.575860: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:40.575862: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:40.575865: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.575868: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:40.575870: | length/value: 6 (0x6) Sep 21 07:24:40.575873: | [6 is OAKLEY_SHA2_512] Sep 21 07:24:40.575876: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.575878: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Sep 21 07:24:40.575881: | length/value: 24 (0x18) Sep 21 07:24:40.575884: "test" #23: Pluto does not support 24?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Sep 21 07:24:40.575887: "test" #23: no acceptable Oakley Transform Sep 21 07:24:40.575890: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:40.575894: | [RE]START processing: state #23 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:40.575897: | #23 is idle Sep 21 07:24:40.576185: "test" #23: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:40.576191: | **emit ISAKMP Message: Sep 21 07:24:40.576194: | initiator cookie: Sep 21 07:24:40.576196: | 2b 80 de ab 68 3c a3 70 Sep 21 07:24:40.576199: | responder cookie: Sep 21 07:24:40.576201: | 72 ff 71 48 8c dc a9 17 Sep 21 07:24:40.576204: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.576206: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.576209: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:40.576212: | flags: none (0x0) Sep 21 07:24:40.576214: | Message ID: 0 (0x0) Sep 21 07:24:40.576217: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.576220: | ***emit ISAKMP Notification Payload: Sep 21 07:24:40.576222: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.576225: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.576227: | protocol ID: 1 (0x1) Sep 21 07:24:40.576230: | SPI size: 0 (0x0) Sep 21 07:24:40.576232: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:40.576235: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:40.576241: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:40.576244: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:40.576247: | emitting length of ISAKMP Message: 40 Sep 21 07:24:40.576254: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #23) Sep 21 07:24:40.576257: | 2b 80 de ab 68 3c a3 70 72 ff 71 48 8c dc a9 17 Sep 21 07:24:40.576259: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:40.576261: | 00 00 00 01 01 00 00 0e Sep 21 07:24:40.576290: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:40.576296: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:40.576301: | stop processing: state #23 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:40.576305: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:40.576311: | spent 0.488 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:40.655539: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:40.655564: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:40.655568: | 7d f0 c6 15 29 ec e5 dd 00 00 00 00 00 00 00 00 Sep 21 07:24:40.655570: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:40.655572: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:40.655574: | 00 00 00 14 01 01 00 00 80 01 00 03 80 03 00 18 Sep 21 07:24:40.655576: | 80 04 00 1d Sep 21 07:24:40.655581: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:40.655585: | **parse ISAKMP Message: Sep 21 07:24:40.655587: | initiator cookie: Sep 21 07:24:40.655589: | 7d f0 c6 15 29 ec e5 dd Sep 21 07:24:40.655592: | responder cookie: Sep 21 07:24:40.655594: | 00 00 00 00 00 00 00 00 Sep 21 07:24:40.655597: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.655600: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.655602: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.655605: | flags: none (0x0) Sep 21 07:24:40.655607: | Message ID: 0 (0x0) Sep 21 07:24:40.655610: | length: 68 (0x44) Sep 21 07:24:40.655612: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:40.655616: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:40.655619: | #null state always idle Sep 21 07:24:40.655622: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:40.655625: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:40.655628: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.655630: | length: 40 (0x28) Sep 21 07:24:40.655632: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.655635: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:40.655638: | in statetime_start() with no state Sep 21 07:24:40.655643: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:40.655648: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:40.655652: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.655656: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:40.655658: | find_next_host_connection returns test Sep 21 07:24:40.655661: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.655663: | find_next_host_connection returns empty Sep 21 07:24:40.655682: | creating state object #24 at 0x5589e77cb1f0 Sep 21 07:24:40.655685: | State DB: adding IKEv1 state #24 in UNDEFINED Sep 21 07:24:40.655692: | pstats #24 ikev1.isakmp started Sep 21 07:24:40.655697: | #24 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:40.655708: | start processing: state #24 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:40.655712: | parent state #24: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:40.655715: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:40.655718: | ICOOKIE-DUMP: 7d f0 c6 15 29 ec e5 dd Sep 21 07:24:40.655720: "test" #24: responding to Main Mode Sep 21 07:24:40.655725: | **emit ISAKMP Message: Sep 21 07:24:40.655728: | initiator cookie: Sep 21 07:24:40.655730: | 7d f0 c6 15 29 ec e5 dd Sep 21 07:24:40.655732: | responder cookie: Sep 21 07:24:40.655734: | 36 86 0b 4c da 05 a3 e7 Sep 21 07:24:40.655737: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.655739: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.655742: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.655744: | flags: none (0x0) Sep 21 07:24:40.655746: | Message ID: 0 (0x0) Sep 21 07:24:40.655749: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.655752: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:40.655755: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:40.655758: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:40.655760: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.655763: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:40.655766: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:40.655769: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:40.655772: | ****parse IPsec DOI SIT: Sep 21 07:24:40.655774: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:40.655777: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:40.655779: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.655782: | length: 28 (0x1c) Sep 21 07:24:40.655792: | proposal number: 1 (0x1) Sep 21 07:24:40.655794: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:40.655797: | SPI size: 0 (0x0) Sep 21 07:24:40.655799: | number of transforms: 1 (0x1) Sep 21 07:24:40.655802: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:40.655805: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.655807: | length: 20 (0x14) Sep 21 07:24:40.655810: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:40.655812: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:40.655815: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.655818: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:40.655820: | length/value: 3 (0x3) Sep 21 07:24:40.655823: | [3 is OAKLEY_BLOWFISH_CBC(UNUSED)] Sep 21 07:24:40.655827: "test" #24: OAKLEY_BLOWFISH_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:40.655830: "test" #24: no acceptable Oakley Transform Sep 21 07:24:40.655833: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:40.655838: | [RE]START processing: state #24 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:40.655841: | #24 is idle Sep 21 07:24:40.655921: "test" #24: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:40.655927: | **emit ISAKMP Message: Sep 21 07:24:40.655929: | initiator cookie: Sep 21 07:24:40.655932: | 7d f0 c6 15 29 ec e5 dd Sep 21 07:24:40.655934: | responder cookie: Sep 21 07:24:40.655936: | 36 86 0b 4c da 05 a3 e7 Sep 21 07:24:40.655938: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.655941: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.655943: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:40.655946: | flags: none (0x0) Sep 21 07:24:40.655950: | Message ID: 0 (0x0) Sep 21 07:24:40.655953: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.655956: | ***emit ISAKMP Notification Payload: Sep 21 07:24:40.655958: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.655960: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.655963: | protocol ID: 1 (0x1) Sep 21 07:24:40.655965: | SPI size: 0 (0x0) Sep 21 07:24:40.655967: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:40.655971: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:40.655973: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:40.655976: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:40.655978: | emitting length of ISAKMP Message: 40 Sep 21 07:24:40.655985: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #24) Sep 21 07:24:40.655988: | 7d f0 c6 15 29 ec e5 dd 36 86 0b 4c da 05 a3 e7 Sep 21 07:24:40.655990: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:40.655992: | 00 00 00 01 01 00 00 0e Sep 21 07:24:40.656018: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:40.656024: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:40.656029: | stop processing: state #24 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:40.656032: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:40.656038: | spent 0.46 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:40.731744: | spent 0.00386 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:40.731770: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:40.731773: | d2 12 fe ba 55 88 df 70 00 00 00 00 00 00 00 00 Sep 21 07:24:40.731775: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:40.731778: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:40.731780: | 00 00 00 14 01 01 00 00 80 01 00 03 80 02 00 06 Sep 21 07:24:40.731782: | 80 04 00 1d Sep 21 07:24:40.731813: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:40.731817: | **parse ISAKMP Message: Sep 21 07:24:40.731819: | initiator cookie: Sep 21 07:24:40.731822: | d2 12 fe ba 55 88 df 70 Sep 21 07:24:40.731824: | responder cookie: Sep 21 07:24:40.731826: | 00 00 00 00 00 00 00 00 Sep 21 07:24:40.731829: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.731832: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.731834: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.731837: | flags: none (0x0) Sep 21 07:24:40.731839: | Message ID: 0 (0x0) Sep 21 07:24:40.731842: | length: 68 (0x44) Sep 21 07:24:40.731845: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:40.731849: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:40.731852: | #null state always idle Sep 21 07:24:40.731855: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:40.731858: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:40.731861: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.731863: | length: 40 (0x28) Sep 21 07:24:40.731865: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.731868: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:40.731871: | in statetime_start() with no state Sep 21 07:24:40.731876: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:40.731882: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:40.731885: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.731892: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:40.731895: | find_next_host_connection returns test Sep 21 07:24:40.731897: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.731900: | find_next_host_connection returns empty Sep 21 07:24:40.731925: | creating state object #25 at 0x5589e77cbcb0 Sep 21 07:24:40.731929: | State DB: adding IKEv1 state #25 in UNDEFINED Sep 21 07:24:40.731933: | pstats #25 ikev1.isakmp started Sep 21 07:24:40.731938: | #25 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:40.731944: | start processing: state #25 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:40.731948: | parent state #25: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:40.731951: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:40.731953: | ICOOKIE-DUMP: d2 12 fe ba 55 88 df 70 Sep 21 07:24:40.731956: "test" #25: responding to Main Mode Sep 21 07:24:40.731962: | **emit ISAKMP Message: Sep 21 07:24:40.731964: | initiator cookie: Sep 21 07:24:40.731966: | d2 12 fe ba 55 88 df 70 Sep 21 07:24:40.731969: | responder cookie: Sep 21 07:24:40.731971: | e0 e3 e9 d7 6d d6 69 68 Sep 21 07:24:40.731973: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.731976: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.731979: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.731981: | flags: none (0x0) Sep 21 07:24:40.731983: | Message ID: 0 (0x0) Sep 21 07:24:40.731986: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.731989: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:40.731992: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:40.731994: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:40.731996: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.731999: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:40.732002: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:40.732005: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:40.732008: | ****parse IPsec DOI SIT: Sep 21 07:24:40.732011: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:40.732013: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:40.732016: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.732018: | length: 28 (0x1c) Sep 21 07:24:40.732021: | proposal number: 1 (0x1) Sep 21 07:24:40.732023: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:40.732025: | SPI size: 0 (0x0) Sep 21 07:24:40.732028: | number of transforms: 1 (0x1) Sep 21 07:24:40.732031: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:40.732033: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.732035: | length: 20 (0x14) Sep 21 07:24:40.732038: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:40.732040: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:40.732043: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.732046: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:40.732048: | length/value: 3 (0x3) Sep 21 07:24:40.732051: | [3 is OAKLEY_BLOWFISH_CBC(UNUSED)] Sep 21 07:24:40.732055: "test" #25: OAKLEY_BLOWFISH_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:40.732058: "test" #25: no acceptable Oakley Transform Sep 21 07:24:40.732061: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:40.732065: | [RE]START processing: state #25 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:40.732068: | #25 is idle Sep 21 07:24:40.732242: "test" #25: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:40.732247: | **emit ISAKMP Message: Sep 21 07:24:40.732250: | initiator cookie: Sep 21 07:24:40.732252: | d2 12 fe ba 55 88 df 70 Sep 21 07:24:40.732254: | responder cookie: Sep 21 07:24:40.732256: | e0 e3 e9 d7 6d d6 69 68 Sep 21 07:24:40.732259: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.732262: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.732264: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:40.732266: | flags: none (0x0) Sep 21 07:24:40.732269: | Message ID: 0 (0x0) Sep 21 07:24:40.732271: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.732274: | ***emit ISAKMP Notification Payload: Sep 21 07:24:40.732277: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.732279: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.732282: | protocol ID: 1 (0x1) Sep 21 07:24:40.732284: | SPI size: 0 (0x0) Sep 21 07:24:40.732286: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:40.732289: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:40.732292: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:40.732295: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:40.732297: | emitting length of ISAKMP Message: 40 Sep 21 07:24:40.732304: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #25) Sep 21 07:24:40.732306: | d2 12 fe ba 55 88 df 70 e0 e3 e9 d7 6d d6 69 68 Sep 21 07:24:40.732309: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:40.732311: | 00 00 00 01 01 00 00 0e Sep 21 07:24:40.732340: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:40.732346: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:40.732351: | stop processing: state #25 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:40.732354: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:40.732359: | spent 0.461 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:40.932475: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:40.932498: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:40.932501: | 8a 6a 86 0e 98 db fe 5a 00 00 00 00 00 00 00 00 Sep 21 07:24:40.932504: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:40.932506: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:40.932508: | 00 00 00 14 01 01 00 00 80 01 00 03 80 02 00 06 Sep 21 07:24:40.932511: | 80 03 00 18 Sep 21 07:24:40.932516: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:40.932519: | **parse ISAKMP Message: Sep 21 07:24:40.932522: | initiator cookie: Sep 21 07:24:40.932524: | 8a 6a 86 0e 98 db fe 5a Sep 21 07:24:40.932526: | responder cookie: Sep 21 07:24:40.932529: | 00 00 00 00 00 00 00 00 Sep 21 07:24:40.932532: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.932534: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.932537: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.932539: | flags: none (0x0) Sep 21 07:24:40.932542: | Message ID: 0 (0x0) Sep 21 07:24:40.932544: | length: 68 (0x44) Sep 21 07:24:40.932547: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:40.932550: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:40.932553: | #null state always idle Sep 21 07:24:40.932556: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:40.932559: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:40.932562: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.932569: | length: 40 (0x28) Sep 21 07:24:40.932571: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.932574: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:40.932577: | in statetime_start() with no state Sep 21 07:24:40.932582: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:40.932588: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:40.932591: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.932595: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:40.932597: | find_next_host_connection returns test Sep 21 07:24:40.932600: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:40.932602: | find_next_host_connection returns empty Sep 21 07:24:40.932620: | creating state object #26 at 0x5589e77cc770 Sep 21 07:24:40.932624: | State DB: adding IKEv1 state #26 in UNDEFINED Sep 21 07:24:40.932628: | pstats #26 ikev1.isakmp started Sep 21 07:24:40.932632: | #26 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:40.932638: | start processing: state #26 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:40.932642: | parent state #26: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:40.932645: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:40.932647: | ICOOKIE-DUMP: 8a 6a 86 0e 98 db fe 5a Sep 21 07:24:40.932650: "test" #26: responding to Main Mode Sep 21 07:24:40.932655: | **emit ISAKMP Message: Sep 21 07:24:40.932657: | initiator cookie: Sep 21 07:24:40.932659: | 8a 6a 86 0e 98 db fe 5a Sep 21 07:24:40.932662: | responder cookie: Sep 21 07:24:40.932664: | 20 89 99 81 aa 94 f4 be Sep 21 07:24:40.932666: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:40.932669: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.932671: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:40.932674: | flags: none (0x0) Sep 21 07:24:40.932676: | Message ID: 0 (0x0) Sep 21 07:24:40.932679: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.932682: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:40.932684: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:40.932687: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:40.932689: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.932692: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:40.932695: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:40.932698: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:40.932701: | ****parse IPsec DOI SIT: Sep 21 07:24:40.932704: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:40.932706: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:40.932709: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.932711: | length: 28 (0x1c) Sep 21 07:24:40.932714: | proposal number: 1 (0x1) Sep 21 07:24:40.932716: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:40.932719: | SPI size: 0 (0x0) Sep 21 07:24:40.932721: | number of transforms: 1 (0x1) Sep 21 07:24:40.932724: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:40.932726: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.932728: | length: 20 (0x14) Sep 21 07:24:40.932731: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:40.932733: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:40.932736: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:40.932739: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:40.932743: | length/value: 3 (0x3) Sep 21 07:24:40.932746: | [3 is OAKLEY_BLOWFISH_CBC(UNUSED)] Sep 21 07:24:40.932750: "test" #26: OAKLEY_BLOWFISH_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:40.932752: "test" #26: no acceptable Oakley Transform Sep 21 07:24:40.932755: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:40.932759: | [RE]START processing: state #26 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:40.932762: | #26 is idle Sep 21 07:24:40.932848: "test" #26: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:40.932855: | **emit ISAKMP Message: Sep 21 07:24:40.932858: | initiator cookie: Sep 21 07:24:40.932860: | 8a 6a 86 0e 98 db fe 5a Sep 21 07:24:40.932862: | responder cookie: Sep 21 07:24:40.932864: | 20 89 99 81 aa 94 f4 be Sep 21 07:24:40.932867: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.932869: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:40.932872: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:40.932874: | flags: none (0x0) Sep 21 07:24:40.932876: | Message ID: 0 (0x0) Sep 21 07:24:40.932879: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:40.932882: | ***emit ISAKMP Notification Payload: Sep 21 07:24:40.932884: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:40.932887: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:40.932889: | protocol ID: 1 (0x1) Sep 21 07:24:40.932891: | SPI size: 0 (0x0) Sep 21 07:24:40.932894: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:40.932896: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:40.932899: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:40.932902: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:40.932904: | emitting length of ISAKMP Message: 40 Sep 21 07:24:40.932910: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #26) Sep 21 07:24:40.932913: | 8a 6a 86 0e 98 db fe 5a 20 89 99 81 aa 94 f4 be Sep 21 07:24:40.932915: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:40.932917: | 00 00 00 01 01 00 00 0e Sep 21 07:24:40.932942: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:40.932948: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:40.932953: | stop processing: state #26 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:40.932956: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:40.932961: | spent 0.449 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:41.023223: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:41.023250: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:41.023255: | aa 54 79 6e 25 79 89 70 00 00 00 00 00 00 00 00 Sep 21 07:24:41.023258: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:24:41.023261: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:24:41.023264: | 00 00 00 18 01 01 00 00 80 01 00 0d 80 02 00 19 Sep 21 07:24:41.023266: | 80 03 00 1a 80 04 00 01 Sep 21 07:24:41.023272: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:41.023276: | **parse ISAKMP Message: Sep 21 07:24:41.023279: | initiator cookie: Sep 21 07:24:41.023281: | aa 54 79 6e 25 79 89 70 Sep 21 07:24:41.023283: | responder cookie: Sep 21 07:24:41.023285: | 00 00 00 00 00 00 00 00 Sep 21 07:24:41.023288: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.023291: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.023293: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.023300: | flags: none (0x0) Sep 21 07:24:41.023303: | Message ID: 0 (0x0) Sep 21 07:24:41.023305: | length: 72 (0x48) Sep 21 07:24:41.023308: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:41.023312: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:41.023315: | #null state always idle Sep 21 07:24:41.023318: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:41.023321: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:41.023323: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.023325: | length: 44 (0x2c) Sep 21 07:24:41.023328: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.023330: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:41.023333: | in statetime_start() with no state Sep 21 07:24:41.023339: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:41.023344: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:41.023347: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.023350: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:41.023353: | find_next_host_connection returns test Sep 21 07:24:41.023355: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.023358: | find_next_host_connection returns empty Sep 21 07:24:41.023384: | creating state object #27 at 0x5589e77cd230 Sep 21 07:24:41.023388: | State DB: adding IKEv1 state #27 in UNDEFINED Sep 21 07:24:41.023392: | pstats #27 ikev1.isakmp started Sep 21 07:24:41.023396: | #27 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:41.023403: | start processing: state #27 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:41.023406: | parent state #27: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:41.023410: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:41.023412: | ICOOKIE-DUMP: aa 54 79 6e 25 79 89 70 Sep 21 07:24:41.023415: "test" #27: responding to Main Mode Sep 21 07:24:41.023420: | **emit ISAKMP Message: Sep 21 07:24:41.023423: | initiator cookie: Sep 21 07:24:41.023425: | aa 54 79 6e 25 79 89 70 Sep 21 07:24:41.023427: | responder cookie: Sep 21 07:24:41.023430: | 24 fe f0 2b 6c 13 6d 1c Sep 21 07:24:41.023432: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.023435: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.023437: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.023440: | flags: none (0x0) Sep 21 07:24:41.023443: | Message ID: 0 (0x0) Sep 21 07:24:41.023445: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.023448: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:41.023452: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:41.023454: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:41.023457: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.023460: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:41.023463: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:41.023466: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:41.023469: | ****parse IPsec DOI SIT: Sep 21 07:24:41.023472: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:41.023475: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:41.023478: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.023480: | length: 32 (0x20) Sep 21 07:24:41.023483: | proposal number: 1 (0x1) Sep 21 07:24:41.023485: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:41.023490: | SPI size: 0 (0x0) Sep 21 07:24:41.023492: | number of transforms: 1 (0x1) Sep 21 07:24:41.023496: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:41.023498: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.023501: | length: 24 (0x18) Sep 21 07:24:41.023503: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:41.023506: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:41.023509: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:41.023512: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:41.023515: | length/value: 13 (0xd) Sep 21 07:24:41.023518: | [13 is OAKLEY_AES_CTR] Sep 21 07:24:41.023521: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:41.023524: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:41.023526: | length/value: 25 (0x19) Sep 21 07:24:41.023530: "test" #27: 25?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:41.023533: "test" #27: no acceptable Oakley Transform Sep 21 07:24:41.023536: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:41.023541: | [RE]START processing: state #27 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:41.023544: | #27 is idle Sep 21 07:24:41.023633: "test" #27: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:41.023638: | **emit ISAKMP Message: Sep 21 07:24:41.023641: | initiator cookie: Sep 21 07:24:41.023643: | aa 54 79 6e 25 79 89 70 Sep 21 07:24:41.023645: | responder cookie: Sep 21 07:24:41.023647: | 24 fe f0 2b 6c 13 6d 1c Sep 21 07:24:41.023650: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.023652: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.023654: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:41.023656: | flags: none (0x0) Sep 21 07:24:41.023659: | Message ID: 0 (0x0) Sep 21 07:24:41.023662: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.023664: | ***emit ISAKMP Notification Payload: Sep 21 07:24:41.023667: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.023669: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.023671: | protocol ID: 1 (0x1) Sep 21 07:24:41.023673: | SPI size: 0 (0x0) Sep 21 07:24:41.023676: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:41.023679: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:41.023682: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:41.023684: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:41.023686: | emitting length of ISAKMP Message: 40 Sep 21 07:24:41.023692: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #27) Sep 21 07:24:41.023695: | aa 54 79 6e 25 79 89 70 24 fe f0 2b 6c 13 6d 1c Sep 21 07:24:41.023697: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:41.023699: | 00 00 00 01 01 00 00 0e Sep 21 07:24:41.023725: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:41.023731: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:41.023736: | stop processing: state #27 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:41.023739: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:41.023744: | spent 0.485 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:41.143475: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:41.143500: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:41.143504: | 86 4d 6c 6d 80 b0 51 e6 00 00 00 00 00 00 00 00 Sep 21 07:24:41.143506: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:41.143508: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:41.143514: | 00 00 00 14 01 01 00 00 80 02 00 19 80 03 00 1a Sep 21 07:24:41.143516: | 80 04 00 01 Sep 21 07:24:41.143522: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:41.143525: | **parse ISAKMP Message: Sep 21 07:24:41.143528: | initiator cookie: Sep 21 07:24:41.143530: | 86 4d 6c 6d 80 b0 51 e6 Sep 21 07:24:41.143533: | responder cookie: Sep 21 07:24:41.143535: | 00 00 00 00 00 00 00 00 Sep 21 07:24:41.143538: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.143541: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.143543: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.143546: | flags: none (0x0) Sep 21 07:24:41.143548: | Message ID: 0 (0x0) Sep 21 07:24:41.143550: | length: 68 (0x44) Sep 21 07:24:41.143553: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:41.143557: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:41.143559: | #null state always idle Sep 21 07:24:41.143563: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:41.143566: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:41.143568: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.143571: | length: 40 (0x28) Sep 21 07:24:41.143573: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.143576: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:41.143578: | in statetime_start() with no state Sep 21 07:24:41.143583: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:41.143589: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:41.143592: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.143596: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:41.143599: | find_next_host_connection returns test Sep 21 07:24:41.143602: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.143604: | find_next_host_connection returns empty Sep 21 07:24:41.143630: | creating state object #28 at 0x5589e77cdcf0 Sep 21 07:24:41.143633: | State DB: adding IKEv1 state #28 in UNDEFINED Sep 21 07:24:41.143637: | pstats #28 ikev1.isakmp started Sep 21 07:24:41.143642: | #28 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:41.143648: | start processing: state #28 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:41.143651: | parent state #28: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:41.143655: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:41.143657: | ICOOKIE-DUMP: 86 4d 6c 6d 80 b0 51 e6 Sep 21 07:24:41.143660: "test" #28: responding to Main Mode Sep 21 07:24:41.143665: | **emit ISAKMP Message: Sep 21 07:24:41.143667: | initiator cookie: Sep 21 07:24:41.143669: | 86 4d 6c 6d 80 b0 51 e6 Sep 21 07:24:41.143672: | responder cookie: Sep 21 07:24:41.143674: | af 08 8b f1 70 11 7a d4 Sep 21 07:24:41.143676: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.143679: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.143681: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.143683: | flags: none (0x0) Sep 21 07:24:41.143686: | Message ID: 0 (0x0) Sep 21 07:24:41.143688: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.143691: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:41.143694: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:41.143696: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:41.143699: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.143701: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:41.143708: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:41.143711: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:41.143714: | ****parse IPsec DOI SIT: Sep 21 07:24:41.143717: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:41.143719: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:41.143722: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.143724: | length: 28 (0x1c) Sep 21 07:24:41.143726: | proposal number: 1 (0x1) Sep 21 07:24:41.143729: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:41.143731: | SPI size: 0 (0x0) Sep 21 07:24:41.143733: | number of transforms: 1 (0x1) Sep 21 07:24:41.143736: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:41.143738: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.143740: | length: 20 (0x14) Sep 21 07:24:41.143743: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:41.143745: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:41.143748: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:41.143751: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:41.143753: | length/value: 25 (0x19) Sep 21 07:24:41.143758: "test" #28: 25?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:41.143760: "test" #28: no acceptable Oakley Transform Sep 21 07:24:41.143763: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:41.143768: | [RE]START processing: state #28 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:41.143770: | #28 is idle Sep 21 07:24:41.143855: "test" #28: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:41.143861: | **emit ISAKMP Message: Sep 21 07:24:41.143863: | initiator cookie: Sep 21 07:24:41.143866: | 86 4d 6c 6d 80 b0 51 e6 Sep 21 07:24:41.143868: | responder cookie: Sep 21 07:24:41.143870: | af 08 8b f1 70 11 7a d4 Sep 21 07:24:41.143872: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.143875: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.143877: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:41.143880: | flags: none (0x0) Sep 21 07:24:41.143882: | Message ID: 0 (0x0) Sep 21 07:24:41.143885: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.143887: | ***emit ISAKMP Notification Payload: Sep 21 07:24:41.143890: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.143892: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.143894: | protocol ID: 1 (0x1) Sep 21 07:24:41.143897: | SPI size: 0 (0x0) Sep 21 07:24:41.143899: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:41.143902: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:41.143905: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:41.143908: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:41.143910: | emitting length of ISAKMP Message: 40 Sep 21 07:24:41.143916: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #28) Sep 21 07:24:41.143919: | 86 4d 6c 6d 80 b0 51 e6 af 08 8b f1 70 11 7a d4 Sep 21 07:24:41.143921: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:41.143923: | 00 00 00 01 01 00 00 0e Sep 21 07:24:41.143946: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:41.143952: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:41.143957: | stop processing: state #28 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:41.143960: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:41.143967: | spent 0.456 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:41.236753: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:41.236778: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:41.236781: | b0 07 eb 4b c3 fa 0d 5a 00 00 00 00 00 00 00 00 Sep 21 07:24:41.236790: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:41.236792: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:41.236794: | 00 00 00 14 01 01 00 00 80 01 00 0d 80 03 00 1a Sep 21 07:24:41.236797: | 80 04 00 01 Sep 21 07:24:41.236802: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:41.236806: | **parse ISAKMP Message: Sep 21 07:24:41.236808: | initiator cookie: Sep 21 07:24:41.236810: | b0 07 eb 4b c3 fa 0d 5a Sep 21 07:24:41.236813: | responder cookie: Sep 21 07:24:41.236815: | 00 00 00 00 00 00 00 00 Sep 21 07:24:41.236818: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.236821: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.236824: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.236826: | flags: none (0x0) Sep 21 07:24:41.236829: | Message ID: 0 (0x0) Sep 21 07:24:41.236831: | length: 68 (0x44) Sep 21 07:24:41.236834: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:41.236837: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:41.236840: | #null state always idle Sep 21 07:24:41.236844: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:41.236847: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:41.236850: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.236852: | length: 40 (0x28) Sep 21 07:24:41.236854: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.236857: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:41.236860: | in statetime_start() with no state Sep 21 07:24:41.236865: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:41.236871: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:41.236874: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.236878: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:41.236880: | find_next_host_connection returns test Sep 21 07:24:41.236883: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.236885: | find_next_host_connection returns empty Sep 21 07:24:41.236909: | creating state object #29 at 0x5589e77ce7b0 Sep 21 07:24:41.236913: | State DB: adding IKEv1 state #29 in UNDEFINED Sep 21 07:24:41.236917: | pstats #29 ikev1.isakmp started Sep 21 07:24:41.236922: | #29 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:41.236928: | start processing: state #29 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:41.236932: | parent state #29: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:41.236935: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:41.236938: | ICOOKIE-DUMP: b0 07 eb 4b c3 fa 0d 5a Sep 21 07:24:41.236941: "test" #29: responding to Main Mode Sep 21 07:24:41.236946: | **emit ISAKMP Message: Sep 21 07:24:41.236948: | initiator cookie: Sep 21 07:24:41.236950: | b0 07 eb 4b c3 fa 0d 5a Sep 21 07:24:41.236953: | responder cookie: Sep 21 07:24:41.236955: | 90 bb a9 d2 8b 08 13 97 Sep 21 07:24:41.236957: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.236960: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.236962: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.236964: | flags: none (0x0) Sep 21 07:24:41.236967: | Message ID: 0 (0x0) Sep 21 07:24:41.236970: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.236976: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:41.236979: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:41.236981: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:41.236983: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.236986: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:41.236989: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:41.236992: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:41.236996: | ****parse IPsec DOI SIT: Sep 21 07:24:41.236998: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:41.237001: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:41.237003: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.237006: | length: 28 (0x1c) Sep 21 07:24:41.237008: | proposal number: 1 (0x1) Sep 21 07:24:41.237011: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:41.237013: | SPI size: 0 (0x0) Sep 21 07:24:41.237015: | number of transforms: 1 (0x1) Sep 21 07:24:41.237018: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:41.237020: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.237023: | length: 20 (0x14) Sep 21 07:24:41.237025: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:41.237027: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:41.237030: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:41.237033: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:41.237035: | length/value: 13 (0xd) Sep 21 07:24:41.237038: | [13 is OAKLEY_AES_CTR] Sep 21 07:24:41.237041: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:41.237044: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Sep 21 07:24:41.237046: | length/value: 26 (0x1a) Sep 21 07:24:41.237050: "test" #29: Pluto does not support 26?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Sep 21 07:24:41.237053: "test" #29: no acceptable Oakley Transform Sep 21 07:24:41.237056: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:41.237061: | [RE]START processing: state #29 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:41.237063: | #29 is idle Sep 21 07:24:41.237329: "test" #29: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:41.237335: | **emit ISAKMP Message: Sep 21 07:24:41.237337: | initiator cookie: Sep 21 07:24:41.237340: | b0 07 eb 4b c3 fa 0d 5a Sep 21 07:24:41.237342: | responder cookie: Sep 21 07:24:41.237345: | 90 bb a9 d2 8b 08 13 97 Sep 21 07:24:41.237347: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.237350: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.237352: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:41.237355: | flags: none (0x0) Sep 21 07:24:41.237358: | Message ID: 0 (0x0) Sep 21 07:24:41.237360: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.237364: | ***emit ISAKMP Notification Payload: Sep 21 07:24:41.237366: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.237369: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.237371: | protocol ID: 1 (0x1) Sep 21 07:24:41.237374: | SPI size: 0 (0x0) Sep 21 07:24:41.237376: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:41.237379: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:41.237382: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:41.237385: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:41.237387: | emitting length of ISAKMP Message: 40 Sep 21 07:24:41.237397: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #29) Sep 21 07:24:41.237400: | b0 07 eb 4b c3 fa 0d 5a 90 bb a9 d2 8b 08 13 97 Sep 21 07:24:41.237402: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:41.237404: | 00 00 00 01 01 00 00 0e Sep 21 07:24:41.237430: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:41.237436: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:41.237441: | stop processing: state #29 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:41.237444: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:41.237450: | spent 0.479 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:41.293050: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:41.293074: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:41.293078: | ec 38 22 12 f2 ec c3 74 00 00 00 00 00 00 00 00 Sep 21 07:24:41.293080: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:41.293082: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:41.293084: | 00 00 00 14 01 01 00 00 80 01 00 0d 80 02 00 19 Sep 21 07:24:41.293086: | 80 04 00 01 Sep 21 07:24:41.293091: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:41.293095: | **parse ISAKMP Message: Sep 21 07:24:41.293097: | initiator cookie: Sep 21 07:24:41.293099: | ec 38 22 12 f2 ec c3 74 Sep 21 07:24:41.293101: | responder cookie: Sep 21 07:24:41.293103: | 00 00 00 00 00 00 00 00 Sep 21 07:24:41.293106: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.293109: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.293112: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.293115: | flags: none (0x0) Sep 21 07:24:41.293117: | Message ID: 0 (0x0) Sep 21 07:24:41.293120: | length: 68 (0x44) Sep 21 07:24:41.293123: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:41.293128: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:41.293131: | #null state always idle Sep 21 07:24:41.293134: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:41.293137: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:41.293139: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.293141: | length: 40 (0x28) Sep 21 07:24:41.293143: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.293146: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:41.293148: | in statetime_start() with no state Sep 21 07:24:41.293153: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:41.293158: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:41.293161: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.293165: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:41.293167: | find_next_host_connection returns test Sep 21 07:24:41.293169: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.293171: | find_next_host_connection returns empty Sep 21 07:24:41.293195: | creating state object #30 at 0x5589e77cf270 Sep 21 07:24:41.293198: | State DB: adding IKEv1 state #30 in UNDEFINED Sep 21 07:24:41.293203: | pstats #30 ikev1.isakmp started Sep 21 07:24:41.293207: | #30 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:41.293212: | start processing: state #30 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:41.293215: | parent state #30: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:41.293219: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:41.293221: | ICOOKIE-DUMP: ec 38 22 12 f2 ec c3 74 Sep 21 07:24:41.293227: "test" #30: responding to Main Mode Sep 21 07:24:41.293232: | **emit ISAKMP Message: Sep 21 07:24:41.293235: | initiator cookie: Sep 21 07:24:41.293237: | ec 38 22 12 f2 ec c3 74 Sep 21 07:24:41.293239: | responder cookie: Sep 21 07:24:41.293241: | 5e bd 5f 4f 51 47 7d 36 Sep 21 07:24:41.293243: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.293245: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.293247: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.293249: | flags: none (0x0) Sep 21 07:24:41.293251: | Message ID: 0 (0x0) Sep 21 07:24:41.293254: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.293256: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:41.293259: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:41.293261: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:41.293263: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.293266: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:41.293269: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:41.293271: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:41.293274: | ****parse IPsec DOI SIT: Sep 21 07:24:41.293276: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:41.293279: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:41.293282: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.293285: | length: 28 (0x1c) Sep 21 07:24:41.293287: | proposal number: 1 (0x1) Sep 21 07:24:41.293290: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:41.293292: | SPI size: 0 (0x0) Sep 21 07:24:41.293295: | number of transforms: 1 (0x1) Sep 21 07:24:41.293298: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:41.293300: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.293303: | length: 20 (0x14) Sep 21 07:24:41.293305: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:41.293308: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:41.293311: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:41.293313: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:41.293315: | length/value: 13 (0xd) Sep 21 07:24:41.293318: | [13 is OAKLEY_AES_CTR] Sep 21 07:24:41.293320: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:41.293323: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:41.293325: | length/value: 25 (0x19) Sep 21 07:24:41.293328: "test" #30: 25?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:41.293331: "test" #30: no acceptable Oakley Transform Sep 21 07:24:41.293333: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:41.293338: | [RE]START processing: state #30 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:41.293340: | #30 is idle Sep 21 07:24:41.293448: "test" #30: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:41.293453: | **emit ISAKMP Message: Sep 21 07:24:41.293455: | initiator cookie: Sep 21 07:24:41.293458: | ec 38 22 12 f2 ec c3 74 Sep 21 07:24:41.293460: | responder cookie: Sep 21 07:24:41.293462: | 5e bd 5f 4f 51 47 7d 36 Sep 21 07:24:41.293465: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.293467: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.293470: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:41.293472: | flags: none (0x0) Sep 21 07:24:41.293475: | Message ID: 0 (0x0) Sep 21 07:24:41.293478: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.293481: | ***emit ISAKMP Notification Payload: Sep 21 07:24:41.293484: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.293488: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.293490: | protocol ID: 1 (0x1) Sep 21 07:24:41.293492: | SPI size: 0 (0x0) Sep 21 07:24:41.293494: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:41.293497: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:41.293500: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:41.293502: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:41.293504: | emitting length of ISAKMP Message: 40 Sep 21 07:24:41.293510: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #30) Sep 21 07:24:41.293512: | ec 38 22 12 f2 ec c3 74 5e bd 5f 4f 51 47 7d 36 Sep 21 07:24:41.293515: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:41.293517: | 00 00 00 01 01 00 00 0e Sep 21 07:24:41.293542: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:41.293548: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:41.293552: | stop processing: state #30 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:41.293555: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:41.293560: | spent 0.47 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:41.376587: | spent 0.00381 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:41.376615: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:41.376619: | b8 e5 f7 07 2f 10 4a 29 00 00 00 00 00 00 00 00 Sep 21 07:24:41.376622: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:41.376625: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:41.376627: | 00 00 00 14 01 01 00 00 80 01 00 0d 80 02 00 19 Sep 21 07:24:41.376629: | 80 03 00 1a Sep 21 07:24:41.376635: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:41.376639: | **parse ISAKMP Message: Sep 21 07:24:41.376642: | initiator cookie: Sep 21 07:24:41.376645: | b8 e5 f7 07 2f 10 4a 29 Sep 21 07:24:41.376647: | responder cookie: Sep 21 07:24:41.376650: | 00 00 00 00 00 00 00 00 Sep 21 07:24:41.376653: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.376656: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.376659: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.376662: | flags: none (0x0) Sep 21 07:24:41.376665: | Message ID: 0 (0x0) Sep 21 07:24:41.376668: | length: 68 (0x44) Sep 21 07:24:41.376672: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:41.376676: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:41.376679: | #null state always idle Sep 21 07:24:41.376683: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:41.376687: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:41.376689: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.376692: | length: 40 (0x28) Sep 21 07:24:41.376694: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.376697: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:41.376700: | in statetime_start() with no state Sep 21 07:24:41.376706: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:41.376712: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:41.376716: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.376720: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:41.376723: | find_next_host_connection returns test Sep 21 07:24:41.376726: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.376733: | find_next_host_connection returns empty Sep 21 07:24:41.376761: | creating state object #31 at 0x5589e77cfd30 Sep 21 07:24:41.376766: | State DB: adding IKEv1 state #31 in UNDEFINED Sep 21 07:24:41.376771: | pstats #31 ikev1.isakmp started Sep 21 07:24:41.376777: | #31 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:41.376788: | start processing: state #31 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:41.376795: | parent state #31: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:41.376799: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:41.376802: | ICOOKIE-DUMP: b8 e5 f7 07 2f 10 4a 29 Sep 21 07:24:41.376805: "test" #31: responding to Main Mode Sep 21 07:24:41.376811: | **emit ISAKMP Message: Sep 21 07:24:41.376814: | initiator cookie: Sep 21 07:24:41.376816: | b8 e5 f7 07 2f 10 4a 29 Sep 21 07:24:41.376819: | responder cookie: Sep 21 07:24:41.376821: | 4a 86 e8 93 fb 86 cc 9c Sep 21 07:24:41.376824: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.376827: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.376831: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.376833: | flags: none (0x0) Sep 21 07:24:41.376836: | Message ID: 0 (0x0) Sep 21 07:24:41.376839: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.376842: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:41.376846: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:41.376849: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:41.376852: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.376856: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:41.376860: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:41.376864: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:41.376868: | ****parse IPsec DOI SIT: Sep 21 07:24:41.376871: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:41.376875: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:41.376878: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.376880: | length: 28 (0x1c) Sep 21 07:24:41.376883: | proposal number: 1 (0x1) Sep 21 07:24:41.376886: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:41.376889: | SPI size: 0 (0x0) Sep 21 07:24:41.376892: | number of transforms: 1 (0x1) Sep 21 07:24:41.376895: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:41.376899: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.376901: | length: 20 (0x14) Sep 21 07:24:41.376904: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:41.376906: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:41.376910: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:41.376913: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:41.376919: | length/value: 13 (0xd) Sep 21 07:24:41.376922: | [13 is OAKLEY_AES_CTR] Sep 21 07:24:41.376926: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:41.376929: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:41.376931: | length/value: 25 (0x19) Sep 21 07:24:41.376935: "test" #31: 25?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:41.376938: "test" #31: no acceptable Oakley Transform Sep 21 07:24:41.376941: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:41.376946: | [RE]START processing: state #31 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:41.376953: | #31 is idle Sep 21 07:24:41.377149: "test" #31: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:41.377158: | **emit ISAKMP Message: Sep 21 07:24:41.377164: | initiator cookie: Sep 21 07:24:41.377167: | b8 e5 f7 07 2f 10 4a 29 Sep 21 07:24:41.377170: | responder cookie: Sep 21 07:24:41.377173: | 4a 86 e8 93 fb 86 cc 9c Sep 21 07:24:41.377177: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.377182: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.377185: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:41.377188: | flags: none (0x0) Sep 21 07:24:41.377191: | Message ID: 0 (0x0) Sep 21 07:24:41.377194: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.377197: | ***emit ISAKMP Notification Payload: Sep 21 07:24:41.377200: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.377203: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.377205: | protocol ID: 1 (0x1) Sep 21 07:24:41.377208: | SPI size: 0 (0x0) Sep 21 07:24:41.377211: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:41.377213: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:41.377216: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:41.377219: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:41.377222: | emitting length of ISAKMP Message: 40 Sep 21 07:24:41.377229: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #31) Sep 21 07:24:41.377232: | b8 e5 f7 07 2f 10 4a 29 4a 86 e8 93 fb 86 cc 9c Sep 21 07:24:41.377234: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:41.377236: | 00 00 00 01 01 00 00 0e Sep 21 07:24:41.377268: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:41.377274: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:41.377279: | stop processing: state #31 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:41.377283: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:41.377288: | spent 0.547 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:41.454774: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:41.454807: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:41.454813: | c9 90 98 1e b8 05 a0 4c 00 00 00 00 00 00 00 00 Sep 21 07:24:41.454816: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:24:41.454818: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:24:41.454820: | 00 00 00 18 01 01 00 00 80 01 00 1f 80 02 00 11 Sep 21 07:24:41.454822: | 80 03 00 20 80 04 00 06 Sep 21 07:24:41.454827: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:41.454830: | **parse ISAKMP Message: Sep 21 07:24:41.454833: | initiator cookie: Sep 21 07:24:41.454834: | c9 90 98 1e b8 05 a0 4c Sep 21 07:24:41.454836: | responder cookie: Sep 21 07:24:41.454838: | 00 00 00 00 00 00 00 00 Sep 21 07:24:41.454841: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.454843: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.454845: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.454847: | flags: none (0x0) Sep 21 07:24:41.454849: | Message ID: 0 (0x0) Sep 21 07:24:41.454851: | length: 72 (0x48) Sep 21 07:24:41.454854: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:41.454857: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:41.454860: | #null state always idle Sep 21 07:24:41.454864: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:41.454867: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:41.454869: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.454871: | length: 44 (0x2c) Sep 21 07:24:41.454873: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.454880: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:41.454883: | in statetime_start() with no state Sep 21 07:24:41.454888: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:41.454893: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:41.454896: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.454900: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:41.454903: | find_next_host_connection returns test Sep 21 07:24:41.454905: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.454908: | find_next_host_connection returns empty Sep 21 07:24:41.454936: | creating state object #32 at 0x5589e77d07f0 Sep 21 07:24:41.454940: | State DB: adding IKEv1 state #32 in UNDEFINED Sep 21 07:24:41.454944: | pstats #32 ikev1.isakmp started Sep 21 07:24:41.454949: | #32 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:41.454955: | start processing: state #32 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:41.454960: | parent state #32: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:41.454963: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:41.454965: | ICOOKIE-DUMP: c9 90 98 1e b8 05 a0 4c Sep 21 07:24:41.454968: "test" #32: responding to Main Mode Sep 21 07:24:41.454974: | **emit ISAKMP Message: Sep 21 07:24:41.454976: | initiator cookie: Sep 21 07:24:41.454978: | c9 90 98 1e b8 05 a0 4c Sep 21 07:24:41.454980: | responder cookie: Sep 21 07:24:41.454982: | 9a 38 af 97 ba 69 e0 11 Sep 21 07:24:41.454984: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.454986: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.454988: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.454990: | flags: none (0x0) Sep 21 07:24:41.454992: | Message ID: 0 (0x0) Sep 21 07:24:41.454995: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.454998: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:41.455000: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:41.455003: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:41.455005: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.455007: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:41.455010: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:41.455013: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:41.455015: | ****parse IPsec DOI SIT: Sep 21 07:24:41.455018: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:41.455020: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:41.455023: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.455025: | length: 32 (0x20) Sep 21 07:24:41.455027: | proposal number: 1 (0x1) Sep 21 07:24:41.455029: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:41.455031: | SPI size: 0 (0x0) Sep 21 07:24:41.455034: | number of transforms: 1 (0x1) Sep 21 07:24:41.455036: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:41.455038: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.455040: | length: 24 (0x18) Sep 21 07:24:41.455042: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:41.455044: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:41.455047: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:41.455049: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:41.455051: | length/value: 31 (0x1f) Sep 21 07:24:41.455056: "test" #32: 31?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:41.455061: "test" #32: no acceptable Oakley Transform Sep 21 07:24:41.455064: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:41.455068: | [RE]START processing: state #32 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:41.455070: | #32 is idle Sep 21 07:24:41.455152: "test" #32: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:41.455158: | **emit ISAKMP Message: Sep 21 07:24:41.455160: | initiator cookie: Sep 21 07:24:41.455163: | c9 90 98 1e b8 05 a0 4c Sep 21 07:24:41.455165: | responder cookie: Sep 21 07:24:41.455167: | 9a 38 af 97 ba 69 e0 11 Sep 21 07:24:41.455169: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.455172: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.455174: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:41.455176: | flags: none (0x0) Sep 21 07:24:41.455178: | Message ID: 0 (0x0) Sep 21 07:24:41.455181: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.455184: | ***emit ISAKMP Notification Payload: Sep 21 07:24:41.455186: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.455188: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.455191: | protocol ID: 1 (0x1) Sep 21 07:24:41.455193: | SPI size: 0 (0x0) Sep 21 07:24:41.455196: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:41.455199: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:41.455202: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:41.455204: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:41.455207: | emitting length of ISAKMP Message: 40 Sep 21 07:24:41.455213: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #32) Sep 21 07:24:41.455216: | c9 90 98 1e b8 05 a0 4c 9a 38 af 97 ba 69 e0 11 Sep 21 07:24:41.455218: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:41.455220: | 00 00 00 01 01 00 00 0e Sep 21 07:24:41.455246: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:41.455253: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:41.455258: | stop processing: state #32 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:41.455261: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:41.455267: | spent 0.451 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:41.597226: | spent 0.00356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:41.597252: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:41.597256: | fd 35 27 28 3a a0 b3 42 00 00 00 00 00 00 00 00 Sep 21 07:24:41.597258: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:41.597260: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:41.597262: | 00 00 00 14 01 01 00 00 80 02 00 11 80 03 00 20 Sep 21 07:24:41.597265: | 80 04 00 06 Sep 21 07:24:41.597270: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:41.597273: | **parse ISAKMP Message: Sep 21 07:24:41.597276: | initiator cookie: Sep 21 07:24:41.597278: | fd 35 27 28 3a a0 b3 42 Sep 21 07:24:41.597280: | responder cookie: Sep 21 07:24:41.597283: | 00 00 00 00 00 00 00 00 Sep 21 07:24:41.597285: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.597288: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.597291: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.597294: | flags: none (0x0) Sep 21 07:24:41.597296: | Message ID: 0 (0x0) Sep 21 07:24:41.597298: | length: 68 (0x44) Sep 21 07:24:41.597301: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:41.597307: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:41.597310: | #null state always idle Sep 21 07:24:41.597314: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:41.597316: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:41.597319: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.597321: | length: 40 (0x28) Sep 21 07:24:41.597324: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.597326: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:41.597329: | in statetime_start() with no state Sep 21 07:24:41.597334: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:41.597340: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:41.597343: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.597347: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:41.597350: | find_next_host_connection returns test Sep 21 07:24:41.597352: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.597355: | find_next_host_connection returns empty Sep 21 07:24:41.597376: | creating state object #33 at 0x5589e77d12b0 Sep 21 07:24:41.597379: | State DB: adding IKEv1 state #33 in UNDEFINED Sep 21 07:24:41.597383: | pstats #33 ikev1.isakmp started Sep 21 07:24:41.597388: | #33 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:41.597394: | start processing: state #33 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:41.597398: | parent state #33: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:41.597401: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:41.597403: | ICOOKIE-DUMP: fd 35 27 28 3a a0 b3 42 Sep 21 07:24:41.597406: "test" #33: responding to Main Mode Sep 21 07:24:41.597411: | **emit ISAKMP Message: Sep 21 07:24:41.597413: | initiator cookie: Sep 21 07:24:41.597416: | fd 35 27 28 3a a0 b3 42 Sep 21 07:24:41.597418: | responder cookie: Sep 21 07:24:41.597420: | a1 e6 58 00 be f3 41 bc Sep 21 07:24:41.597422: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.597425: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.597427: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.597429: | flags: none (0x0) Sep 21 07:24:41.597431: | Message ID: 0 (0x0) Sep 21 07:24:41.597434: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.597437: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:41.597440: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:41.597442: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:41.597445: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.597448: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:41.597451: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:41.597453: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:41.597457: | ****parse IPsec DOI SIT: Sep 21 07:24:41.597459: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:41.597462: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:41.597464: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.597466: | length: 28 (0x1c) Sep 21 07:24:41.597468: | proposal number: 1 (0x1) Sep 21 07:24:41.597471: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:41.597473: | SPI size: 0 (0x0) Sep 21 07:24:41.597475: | number of transforms: 1 (0x1) Sep 21 07:24:41.597478: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:41.597482: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.597484: | length: 20 (0x14) Sep 21 07:24:41.597487: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:41.597489: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:41.597492: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:41.597495: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:41.597497: | length/value: 17 (0x11) Sep 21 07:24:41.597502: "test" #33: 17?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:41.597504: "test" #33: no acceptable Oakley Transform Sep 21 07:24:41.597507: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:41.597512: | [RE]START processing: state #33 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:41.597514: | #33 is idle Sep 21 07:24:41.597596: "test" #33: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:41.597600: | **emit ISAKMP Message: Sep 21 07:24:41.597602: | initiator cookie: Sep 21 07:24:41.597604: | fd 35 27 28 3a a0 b3 42 Sep 21 07:24:41.597607: | responder cookie: Sep 21 07:24:41.597609: | a1 e6 58 00 be f3 41 bc Sep 21 07:24:41.597611: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.597614: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.597616: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:41.597619: | flags: none (0x0) Sep 21 07:24:41.597621: | Message ID: 0 (0x0) Sep 21 07:24:41.597624: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.597626: | ***emit ISAKMP Notification Payload: Sep 21 07:24:41.597629: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.597631: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.597633: | protocol ID: 1 (0x1) Sep 21 07:24:41.597636: | SPI size: 0 (0x0) Sep 21 07:24:41.597638: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:41.597641: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:41.597644: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:41.597647: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:41.597649: | emitting length of ISAKMP Message: 40 Sep 21 07:24:41.597655: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #33) Sep 21 07:24:41.597657: | fd 35 27 28 3a a0 b3 42 a1 e6 58 00 be f3 41 bc Sep 21 07:24:41.597660: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:41.597662: | 00 00 00 01 01 00 00 0e Sep 21 07:24:41.597691: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:41.597697: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:41.597702: | stop processing: state #33 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:41.597705: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:41.597710: | spent 0.449 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:41.948501: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:41.948526: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:41.948530: | 87 ee 4a 2b ce 9f 9e 21 00 00 00 00 00 00 00 00 Sep 21 07:24:41.948532: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:41.948534: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:41.948537: | 00 00 00 14 01 01 00 00 80 01 00 1f 80 03 00 20 Sep 21 07:24:41.948539: | 80 04 00 06 Sep 21 07:24:41.948544: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:41.948547: | **parse ISAKMP Message: Sep 21 07:24:41.948550: | initiator cookie: Sep 21 07:24:41.948552: | 87 ee 4a 2b ce 9f 9e 21 Sep 21 07:24:41.948555: | responder cookie: Sep 21 07:24:41.948560: | 00 00 00 00 00 00 00 00 Sep 21 07:24:41.948563: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.948566: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.948568: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.948571: | flags: none (0x0) Sep 21 07:24:41.948573: | Message ID: 0 (0x0) Sep 21 07:24:41.948576: | length: 68 (0x44) Sep 21 07:24:41.948579: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:41.948582: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:41.948585: | #null state always idle Sep 21 07:24:41.948588: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:41.948591: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:41.948594: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.948596: | length: 40 (0x28) Sep 21 07:24:41.948599: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.948601: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:41.948604: | in statetime_start() with no state Sep 21 07:24:41.948609: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:41.948615: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:41.948618: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.948622: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:41.948624: | find_next_host_connection returns test Sep 21 07:24:41.948627: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:41.948629: | find_next_host_connection returns empty Sep 21 07:24:41.948655: | creating state object #34 at 0x5589e77d1d70 Sep 21 07:24:41.948658: | State DB: adding IKEv1 state #34 in UNDEFINED Sep 21 07:24:41.948662: | pstats #34 ikev1.isakmp started Sep 21 07:24:41.948667: | #34 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:41.948674: | start processing: state #34 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:41.948677: | parent state #34: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:41.948680: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:41.948683: | ICOOKIE-DUMP: 87 ee 4a 2b ce 9f 9e 21 Sep 21 07:24:41.948686: "test" #34: responding to Main Mode Sep 21 07:24:41.948691: | **emit ISAKMP Message: Sep 21 07:24:41.948693: | initiator cookie: Sep 21 07:24:41.948695: | 87 ee 4a 2b ce 9f 9e 21 Sep 21 07:24:41.948698: | responder cookie: Sep 21 07:24:41.948700: | 65 4b 4e 8d ed 95 31 0d Sep 21 07:24:41.948702: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:41.948705: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.948708: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:41.948710: | flags: none (0x0) Sep 21 07:24:41.948712: | Message ID: 0 (0x0) Sep 21 07:24:41.948715: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.948718: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:41.948721: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:41.948723: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:41.948726: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.948729: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:41.948732: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:41.948735: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:41.948738: | ****parse IPsec DOI SIT: Sep 21 07:24:41.948740: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:41.948747: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:41.948749: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.948752: | length: 28 (0x1c) Sep 21 07:24:41.948754: | proposal number: 1 (0x1) Sep 21 07:24:41.948756: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:41.948759: | SPI size: 0 (0x0) Sep 21 07:24:41.948761: | number of transforms: 1 (0x1) Sep 21 07:24:41.948764: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:41.948766: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.948769: | length: 20 (0x14) Sep 21 07:24:41.948771: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:41.948773: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:41.948776: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:41.948779: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:41.948782: | length/value: 31 (0x1f) Sep 21 07:24:41.948791: "test" #34: 31?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:41.948794: "test" #34: no acceptable Oakley Transform Sep 21 07:24:41.948797: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:41.948802: | [RE]START processing: state #34 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:41.948804: | #34 is idle Sep 21 07:24:41.948890: "test" #34: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:41.948894: | **emit ISAKMP Message: Sep 21 07:24:41.948897: | initiator cookie: Sep 21 07:24:41.948899: | 87 ee 4a 2b ce 9f 9e 21 Sep 21 07:24:41.948901: | responder cookie: Sep 21 07:24:41.948903: | 65 4b 4e 8d ed 95 31 0d Sep 21 07:24:41.948906: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.948908: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:41.948911: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:41.948913: | flags: none (0x0) Sep 21 07:24:41.948916: | Message ID: 0 (0x0) Sep 21 07:24:41.948919: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:41.948921: | ***emit ISAKMP Notification Payload: Sep 21 07:24:41.948924: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:41.948926: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:41.948929: | protocol ID: 1 (0x1) Sep 21 07:24:41.948931: | SPI size: 0 (0x0) Sep 21 07:24:41.948933: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:41.948936: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:41.948939: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:41.948942: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:41.948944: | emitting length of ISAKMP Message: 40 Sep 21 07:24:41.948951: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #34) Sep 21 07:24:41.948953: | 87 ee 4a 2b ce 9f 9e 21 65 4b 4e 8d ed 95 31 0d Sep 21 07:24:41.948955: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:41.948958: | 00 00 00 01 01 00 00 0e Sep 21 07:24:41.948984: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:41.948990: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:41.948995: | stop processing: state #34 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:41.948998: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:41.949003: | spent 0.465 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:42.043553: | spent 0.003 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:42.043576: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:42.043579: | fa 62 a5 06 84 24 85 28 00 00 00 00 00 00 00 00 Sep 21 07:24:42.043582: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:42.043588: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:42.043591: | 00 00 00 14 01 01 00 00 80 01 00 1f 80 02 00 11 Sep 21 07:24:42.043593: | 80 04 00 06 Sep 21 07:24:42.043598: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:42.043602: | **parse ISAKMP Message: Sep 21 07:24:42.043604: | initiator cookie: Sep 21 07:24:42.043606: | fa 62 a5 06 84 24 85 28 Sep 21 07:24:42.043609: | responder cookie: Sep 21 07:24:42.043611: | 00 00 00 00 00 00 00 00 Sep 21 07:24:42.043614: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.043617: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.043619: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.043622: | flags: none (0x0) Sep 21 07:24:42.043624: | Message ID: 0 (0x0) Sep 21 07:24:42.043627: | length: 68 (0x44) Sep 21 07:24:42.043629: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:42.043633: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:42.043636: | #null state always idle Sep 21 07:24:42.043639: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:42.043642: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:42.043644: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.043647: | length: 40 (0x28) Sep 21 07:24:42.043649: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.043652: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:42.043654: | in statetime_start() with no state Sep 21 07:24:42.043660: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:42.043665: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:42.043668: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.043672: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:42.043674: | find_next_host_connection returns test Sep 21 07:24:42.043677: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.043679: | find_next_host_connection returns empty Sep 21 07:24:42.043708: | creating state object #35 at 0x5589e77d2830 Sep 21 07:24:42.043711: | State DB: adding IKEv1 state #35 in UNDEFINED Sep 21 07:24:42.043715: | pstats #35 ikev1.isakmp started Sep 21 07:24:42.043720: | #35 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:42.043726: | start processing: state #35 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:42.043730: | parent state #35: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:42.043733: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:42.043735: | ICOOKIE-DUMP: fa 62 a5 06 84 24 85 28 Sep 21 07:24:42.043738: "test" #35: responding to Main Mode Sep 21 07:24:42.043743: | **emit ISAKMP Message: Sep 21 07:24:42.043745: | initiator cookie: Sep 21 07:24:42.043747: | fa 62 a5 06 84 24 85 28 Sep 21 07:24:42.043750: | responder cookie: Sep 21 07:24:42.043752: | 11 75 ab c0 4d d1 5d d6 Sep 21 07:24:42.043754: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.043757: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.043759: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.043762: | flags: none (0x0) Sep 21 07:24:42.043764: | Message ID: 0 (0x0) Sep 21 07:24:42.043767: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.043769: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:42.043772: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:42.043775: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:42.043777: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.043780: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:42.043793: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:42.043799: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:42.043802: | ****parse IPsec DOI SIT: Sep 21 07:24:42.043804: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:42.043807: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:42.043810: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.043812: | length: 28 (0x1c) Sep 21 07:24:42.043815: | proposal number: 1 (0x1) Sep 21 07:24:42.043817: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:42.043819: | SPI size: 0 (0x0) Sep 21 07:24:42.043822: | number of transforms: 1 (0x1) Sep 21 07:24:42.043824: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:42.043827: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.043829: | length: 20 (0x14) Sep 21 07:24:42.043832: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:42.043834: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:42.043837: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:42.043839: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:42.043842: | length/value: 31 (0x1f) Sep 21 07:24:42.043846: "test" #35: 31?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:42.043849: "test" #35: no acceptable Oakley Transform Sep 21 07:24:42.043852: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:42.043857: | [RE]START processing: state #35 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:42.043859: | #35 is idle Sep 21 07:24:42.044538: "test" #35: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:42.044546: | **emit ISAKMP Message: Sep 21 07:24:42.044549: | initiator cookie: Sep 21 07:24:42.044552: | fa 62 a5 06 84 24 85 28 Sep 21 07:24:42.044554: | responder cookie: Sep 21 07:24:42.044556: | 11 75 ab c0 4d d1 5d d6 Sep 21 07:24:42.044559: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.044562: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.044564: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:42.044567: | flags: none (0x0) Sep 21 07:24:42.044569: | Message ID: 0 (0x0) Sep 21 07:24:42.044572: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.044575: | ***emit ISAKMP Notification Payload: Sep 21 07:24:42.044578: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.044580: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.044582: | protocol ID: 1 (0x1) Sep 21 07:24:42.044585: | SPI size: 0 (0x0) Sep 21 07:24:42.044587: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:42.044590: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:42.044593: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:42.044596: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:42.044598: | emitting length of ISAKMP Message: 40 Sep 21 07:24:42.044605: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #35) Sep 21 07:24:42.044607: | fa 62 a5 06 84 24 85 28 11 75 ab c0 4d d1 5d d6 Sep 21 07:24:42.044610: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:42.044612: | 00 00 00 01 01 00 00 0e Sep 21 07:24:42.044647: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:42.044654: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:42.044659: | stop processing: state #35 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:42.044663: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:42.044671: | spent 0.474 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:42.093492: | spent 0.00312 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:42.093518: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:42.093522: | e6 bb 23 e0 d0 28 4b 9b 00 00 00 00 00 00 00 00 Sep 21 07:24:42.093524: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:42.093526: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:42.093529: | 00 00 00 14 01 01 00 00 80 01 00 1f 80 02 00 11 Sep 21 07:24:42.093531: | 80 03 00 20 Sep 21 07:24:42.093536: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:42.093540: | **parse ISAKMP Message: Sep 21 07:24:42.093542: | initiator cookie: Sep 21 07:24:42.093545: | e6 bb 23 e0 d0 28 4b 9b Sep 21 07:24:42.093547: | responder cookie: Sep 21 07:24:42.093549: | 00 00 00 00 00 00 00 00 Sep 21 07:24:42.093552: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.093555: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.093557: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.093560: | flags: none (0x0) Sep 21 07:24:42.093562: | Message ID: 0 (0x0) Sep 21 07:24:42.093565: | length: 68 (0x44) Sep 21 07:24:42.093567: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:42.093571: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:42.093574: | #null state always idle Sep 21 07:24:42.093577: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:42.093580: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:42.093583: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.093585: | length: 40 (0x28) Sep 21 07:24:42.093588: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.093590: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:42.093593: | in statetime_start() with no state Sep 21 07:24:42.093599: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:42.093604: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:42.093607: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.093611: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:42.093613: | find_next_host_connection returns test Sep 21 07:24:42.093616: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.093618: | find_next_host_connection returns empty Sep 21 07:24:42.093642: | creating state object #36 at 0x5589e77d32f0 Sep 21 07:24:42.093646: | State DB: adding IKEv1 state #36 in UNDEFINED Sep 21 07:24:42.093650: | pstats #36 ikev1.isakmp started Sep 21 07:24:42.093654: | #36 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:42.093660: | start processing: state #36 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:42.093664: | parent state #36: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:42.093667: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:42.093670: | ICOOKIE-DUMP: e6 bb 23 e0 d0 28 4b 9b Sep 21 07:24:42.093672: "test" #36: responding to Main Mode Sep 21 07:24:42.093677: | **emit ISAKMP Message: Sep 21 07:24:42.093679: | initiator cookie: Sep 21 07:24:42.093682: | e6 bb 23 e0 d0 28 4b 9b Sep 21 07:24:42.093684: | responder cookie: Sep 21 07:24:42.093686: | da b0 71 4e 1e 90 13 31 Sep 21 07:24:42.093689: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.093691: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.093694: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.093696: | flags: none (0x0) Sep 21 07:24:42.093699: | Message ID: 0 (0x0) Sep 21 07:24:42.093705: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.093708: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:42.093711: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:42.093714: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:42.093716: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.093719: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:42.093722: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:42.093725: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:42.093728: | ****parse IPsec DOI SIT: Sep 21 07:24:42.093731: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:42.093734: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:42.093736: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.093739: | length: 28 (0x1c) Sep 21 07:24:42.093741: | proposal number: 1 (0x1) Sep 21 07:24:42.093743: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:42.093746: | SPI size: 0 (0x0) Sep 21 07:24:42.093748: | number of transforms: 1 (0x1) Sep 21 07:24:42.093751: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:42.093753: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.093755: | length: 20 (0x14) Sep 21 07:24:42.093758: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:42.093760: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:42.093763: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:42.093766: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:42.093768: | length/value: 31 (0x1f) Sep 21 07:24:42.093772: "test" #36: 31?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:42.093775: "test" #36: no acceptable Oakley Transform Sep 21 07:24:42.093778: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:42.093787: | [RE]START processing: state #36 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:42.093791: | #36 is idle Sep 21 07:24:42.093868: "test" #36: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:42.093872: | **emit ISAKMP Message: Sep 21 07:24:42.093875: | initiator cookie: Sep 21 07:24:42.093877: | e6 bb 23 e0 d0 28 4b 9b Sep 21 07:24:42.093879: | responder cookie: Sep 21 07:24:42.093881: | da b0 71 4e 1e 90 13 31 Sep 21 07:24:42.093884: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.093886: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.093889: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:42.093891: | flags: none (0x0) Sep 21 07:24:42.093893: | Message ID: 0 (0x0) Sep 21 07:24:42.093896: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.093899: | ***emit ISAKMP Notification Payload: Sep 21 07:24:42.093901: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.093904: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.093906: | protocol ID: 1 (0x1) Sep 21 07:24:42.093908: | SPI size: 0 (0x0) Sep 21 07:24:42.093911: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:42.093914: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:42.093917: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:42.093919: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:42.093922: | emitting length of ISAKMP Message: 40 Sep 21 07:24:42.093928: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #36) Sep 21 07:24:42.093931: | e6 bb 23 e0 d0 28 4b 9b da b0 71 4e 1e 90 13 31 Sep 21 07:24:42.093935: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:42.093938: | 00 00 00 01 01 00 00 0e Sep 21 07:24:42.093964: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:42.093971: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:42.093975: | stop processing: state #36 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:42.093978: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:42.093984: | spent 0.452 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:42.157477: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:42.157501: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:42.157504: | 38 d1 ba 82 07 9f db 2b 00 00 00 00 00 00 00 00 Sep 21 07:24:42.157507: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:24:42.157509: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:24:42.157511: | 00 00 00 18 01 01 00 00 80 01 00 10 80 02 00 0f Sep 21 07:24:42.157513: | 80 03 00 1d 80 04 00 14 Sep 21 07:24:42.157518: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:42.157522: | **parse ISAKMP Message: Sep 21 07:24:42.157525: | initiator cookie: Sep 21 07:24:42.157527: | 38 d1 ba 82 07 9f db 2b Sep 21 07:24:42.157530: | responder cookie: Sep 21 07:24:42.157532: | 00 00 00 00 00 00 00 00 Sep 21 07:24:42.157535: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.157537: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.157540: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.157542: | flags: none (0x0) Sep 21 07:24:42.157545: | Message ID: 0 (0x0) Sep 21 07:24:42.157547: | length: 72 (0x48) Sep 21 07:24:42.157550: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:42.157554: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:42.157556: | #null state always idle Sep 21 07:24:42.157560: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:42.157563: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:42.157565: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.157567: | length: 44 (0x2c) Sep 21 07:24:42.157570: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.157573: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:42.157575: | in statetime_start() with no state Sep 21 07:24:42.157581: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:42.157586: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:42.157590: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.157593: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:42.157596: | find_next_host_connection returns test Sep 21 07:24:42.157598: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.157601: | find_next_host_connection returns empty Sep 21 07:24:42.157626: | creating state object #37 at 0x5589e77d3db0 Sep 21 07:24:42.157629: | State DB: adding IKEv1 state #37 in UNDEFINED Sep 21 07:24:42.157633: | pstats #37 ikev1.isakmp started Sep 21 07:24:42.157638: | #37 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:42.157644: | start processing: state #37 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:42.157648: | parent state #37: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:42.157651: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:42.157653: | ICOOKIE-DUMP: 38 d1 ba 82 07 9f db 2b Sep 21 07:24:42.157656: "test" #37: responding to Main Mode Sep 21 07:24:42.157661: | **emit ISAKMP Message: Sep 21 07:24:42.157663: | initiator cookie: Sep 21 07:24:42.157667: | 38 d1 ba 82 07 9f db 2b Sep 21 07:24:42.157670: | responder cookie: Sep 21 07:24:42.157672: | 58 9a 2d c1 e3 8a bd f7 Sep 21 07:24:42.157674: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.157677: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.157679: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.157682: | flags: none (0x0) Sep 21 07:24:42.157684: | Message ID: 0 (0x0) Sep 21 07:24:42.157687: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.157690: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:42.157693: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:42.157696: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:42.157698: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.157701: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:42.157704: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:42.157707: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:42.157710: | ****parse IPsec DOI SIT: Sep 21 07:24:42.157712: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:42.157715: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:42.157718: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.157720: | length: 32 (0x20) Sep 21 07:24:42.157722: | proposal number: 1 (0x1) Sep 21 07:24:42.157725: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:42.157727: | SPI size: 0 (0x0) Sep 21 07:24:42.157729: | number of transforms: 1 (0x1) Sep 21 07:24:42.157732: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:42.157734: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.157737: | length: 24 (0x18) Sep 21 07:24:42.157739: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:42.157741: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:42.157744: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:42.157747: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:42.157749: | length/value: 16 (0x10) Sep 21 07:24:42.157752: | [16 is OAKLEY_AES_CCM_16] Sep 21 07:24:42.157756: "test" #37: OAKLEY_AES_CCM_16 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:42.157758: "test" #37: no acceptable Oakley Transform Sep 21 07:24:42.157761: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:42.157766: | [RE]START processing: state #37 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:42.157768: | #37 is idle Sep 21 07:24:42.157841: "test" #37: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:42.157847: | **emit ISAKMP Message: Sep 21 07:24:42.157849: | initiator cookie: Sep 21 07:24:42.157852: | 38 d1 ba 82 07 9f db 2b Sep 21 07:24:42.157854: | responder cookie: Sep 21 07:24:42.157856: | 58 9a 2d c1 e3 8a bd f7 Sep 21 07:24:42.157858: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.157861: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.157863: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:42.157866: | flags: none (0x0) Sep 21 07:24:42.157868: | Message ID: 0 (0x0) Sep 21 07:24:42.157871: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.157874: | ***emit ISAKMP Notification Payload: Sep 21 07:24:42.157876: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.157879: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.157881: | protocol ID: 1 (0x1) Sep 21 07:24:42.157883: | SPI size: 0 (0x0) Sep 21 07:24:42.157886: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:42.157889: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:42.157895: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:42.157898: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:42.157900: | emitting length of ISAKMP Message: 40 Sep 21 07:24:42.157906: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #37) Sep 21 07:24:42.157909: | 38 d1 ba 82 07 9f db 2b 58 9a 2d c1 e3 8a bd f7 Sep 21 07:24:42.157911: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:42.157913: | 00 00 00 01 01 00 00 0e Sep 21 07:24:42.157938: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:42.157944: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:42.157949: | stop processing: state #37 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:42.157952: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:42.157957: | spent 0.447 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:42.214910: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:42.214934: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:42.214937: | 98 cc 03 32 45 15 6e 6a 00 00 00 00 00 00 00 00 Sep 21 07:24:42.214940: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:42.214942: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:42.214944: | 00 00 00 14 01 01 00 00 80 02 00 0f 80 03 00 1d Sep 21 07:24:42.214946: | 80 04 00 14 Sep 21 07:24:42.214951: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:42.214956: | **parse ISAKMP Message: Sep 21 07:24:42.214958: | initiator cookie: Sep 21 07:24:42.214960: | 98 cc 03 32 45 15 6e 6a Sep 21 07:24:42.214963: | responder cookie: Sep 21 07:24:42.214965: | 00 00 00 00 00 00 00 00 Sep 21 07:24:42.214968: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.214971: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.214974: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.214976: | flags: none (0x0) Sep 21 07:24:42.214979: | Message ID: 0 (0x0) Sep 21 07:24:42.214981: | length: 68 (0x44) Sep 21 07:24:42.214984: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:42.214988: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:42.214991: | #null state always idle Sep 21 07:24:42.214994: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:42.214998: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:42.215000: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.215003: | length: 40 (0x28) Sep 21 07:24:42.215005: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.215008: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:42.215010: | in statetime_start() with no state Sep 21 07:24:42.215016: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:42.215021: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:42.215024: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.215028: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:42.215031: | find_next_host_connection returns test Sep 21 07:24:42.215034: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.215036: | find_next_host_connection returns empty Sep 21 07:24:42.215056: | creating state object #38 at 0x5589e77d4870 Sep 21 07:24:42.215059: | State DB: adding IKEv1 state #38 in UNDEFINED Sep 21 07:24:42.215064: | pstats #38 ikev1.isakmp started Sep 21 07:24:42.215068: | #38 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:42.215078: | start processing: state #38 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:42.215081: | parent state #38: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:42.215085: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:42.215088: | ICOOKIE-DUMP: 98 cc 03 32 45 15 6e 6a Sep 21 07:24:42.215091: "test" #38: responding to Main Mode Sep 21 07:24:42.215095: | **emit ISAKMP Message: Sep 21 07:24:42.215098: | initiator cookie: Sep 21 07:24:42.215100: | 98 cc 03 32 45 15 6e 6a Sep 21 07:24:42.215102: | responder cookie: Sep 21 07:24:42.215104: | ab be a9 43 6c 74 c6 ec Sep 21 07:24:42.215107: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.215110: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.215112: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.215114: | flags: none (0x0) Sep 21 07:24:42.215117: | Message ID: 0 (0x0) Sep 21 07:24:42.215120: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.215123: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:42.215126: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:42.215128: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:42.215131: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.215133: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:42.215136: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:42.215139: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:42.215142: | ****parse IPsec DOI SIT: Sep 21 07:24:42.215145: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:42.215148: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:42.215150: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.215153: | length: 28 (0x1c) Sep 21 07:24:42.215155: | proposal number: 1 (0x1) Sep 21 07:24:42.215157: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:42.215160: | SPI size: 0 (0x0) Sep 21 07:24:42.215162: | number of transforms: 1 (0x1) Sep 21 07:24:42.215165: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:42.215167: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.215170: | length: 20 (0x14) Sep 21 07:24:42.215172: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:42.215174: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:42.215177: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:42.215180: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:42.215182: | length/value: 15 (0xf) Sep 21 07:24:42.215187: "test" #38: 15?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:42.215189: "test" #38: no acceptable Oakley Transform Sep 21 07:24:42.215192: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:42.215197: | [RE]START processing: state #38 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:42.215199: | #38 is idle Sep 21 07:24:42.215273: "test" #38: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:42.215278: | **emit ISAKMP Message: Sep 21 07:24:42.215280: | initiator cookie: Sep 21 07:24:42.215282: | 98 cc 03 32 45 15 6e 6a Sep 21 07:24:42.215285: | responder cookie: Sep 21 07:24:42.215287: | ab be a9 43 6c 74 c6 ec Sep 21 07:24:42.215289: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.215292: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.215294: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:42.215297: | flags: none (0x0) Sep 21 07:24:42.215299: | Message ID: 0 (0x0) Sep 21 07:24:42.215302: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.215306: | ***emit ISAKMP Notification Payload: Sep 21 07:24:42.215309: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.215311: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.215314: | protocol ID: 1 (0x1) Sep 21 07:24:42.215316: | SPI size: 0 (0x0) Sep 21 07:24:42.215319: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:42.215322: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:42.215325: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:42.215327: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:42.215330: | emitting length of ISAKMP Message: 40 Sep 21 07:24:42.215336: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #38) Sep 21 07:24:42.215338: | 98 cc 03 32 45 15 6e 6a ab be a9 43 6c 74 c6 ec Sep 21 07:24:42.215341: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:42.215343: | 00 00 00 01 01 00 00 0e Sep 21 07:24:42.215368: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:42.215374: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:42.215379: | stop processing: state #38 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:42.215382: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:42.215387: | spent 0.448 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:42.335884: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:42.335913: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:42.335917: | 9b bd 34 db b9 1b ef 01 00 00 00 00 00 00 00 00 Sep 21 07:24:42.335920: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:42.335923: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:42.335926: | 00 00 00 14 01 01 00 00 80 01 00 10 80 03 00 1d Sep 21 07:24:42.335928: | 80 04 00 14 Sep 21 07:24:42.335933: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:42.335937: | **parse ISAKMP Message: Sep 21 07:24:42.335940: | initiator cookie: Sep 21 07:24:42.335943: | 9b bd 34 db b9 1b ef 01 Sep 21 07:24:42.335945: | responder cookie: Sep 21 07:24:42.335948: | 00 00 00 00 00 00 00 00 Sep 21 07:24:42.335951: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.335954: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.335957: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.335960: | flags: none (0x0) Sep 21 07:24:42.335963: | Message ID: 0 (0x0) Sep 21 07:24:42.335966: | length: 68 (0x44) Sep 21 07:24:42.335969: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:42.335973: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:42.335976: | #null state always idle Sep 21 07:24:42.335980: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:42.335984: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:42.335987: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.335989: | length: 40 (0x28) Sep 21 07:24:42.335992: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.335995: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:42.335998: | in statetime_start() with no state Sep 21 07:24:42.336005: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:42.336011: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:42.336015: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.336019: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:42.336026: | find_next_host_connection returns test Sep 21 07:24:42.336029: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.336032: | find_next_host_connection returns empty Sep 21 07:24:42.336056: | creating state object #39 at 0x5589e77d5330 Sep 21 07:24:42.336060: | State DB: adding IKEv1 state #39 in UNDEFINED Sep 21 07:24:42.336065: | pstats #39 ikev1.isakmp started Sep 21 07:24:42.336071: | #39 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:42.336078: | start processing: state #39 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:42.336082: | parent state #39: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:42.336085: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:42.336088: | ICOOKIE-DUMP: 9b bd 34 db b9 1b ef 01 Sep 21 07:24:42.336091: "test" #39: responding to Main Mode Sep 21 07:24:42.336096: | **emit ISAKMP Message: Sep 21 07:24:42.336099: | initiator cookie: Sep 21 07:24:42.336102: | 9b bd 34 db b9 1b ef 01 Sep 21 07:24:42.336104: | responder cookie: Sep 21 07:24:42.336107: | 40 e3 a6 a6 1d c5 7e bd Sep 21 07:24:42.336110: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.336113: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.336116: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.336118: | flags: none (0x0) Sep 21 07:24:42.336121: | Message ID: 0 (0x0) Sep 21 07:24:42.336124: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.336128: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:42.336131: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:42.336134: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:42.336137: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.336140: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:42.336144: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:42.336148: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:42.336151: | ****parse IPsec DOI SIT: Sep 21 07:24:42.336154: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:42.336157: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:42.336160: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.336163: | length: 28 (0x1c) Sep 21 07:24:42.336166: | proposal number: 1 (0x1) Sep 21 07:24:42.336168: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:42.336171: | SPI size: 0 (0x0) Sep 21 07:24:42.336174: | number of transforms: 1 (0x1) Sep 21 07:24:42.336177: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:42.336180: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.336182: | length: 20 (0x14) Sep 21 07:24:42.336185: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:42.336188: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:42.336191: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:42.336194: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:42.336197: | length/value: 16 (0x10) Sep 21 07:24:42.336200: | [16 is OAKLEY_AES_CCM_16] Sep 21 07:24:42.336204: "test" #39: OAKLEY_AES_CCM_16 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:42.336207: "test" #39: no acceptable Oakley Transform Sep 21 07:24:42.336210: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:42.336216: | [RE]START processing: state #39 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:42.336219: | #39 is idle Sep 21 07:24:42.336304: "test" #39: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:42.336308: | **emit ISAKMP Message: Sep 21 07:24:42.336311: | initiator cookie: Sep 21 07:24:42.336318: | 9b bd 34 db b9 1b ef 01 Sep 21 07:24:42.336321: | responder cookie: Sep 21 07:24:42.336324: | 40 e3 a6 a6 1d c5 7e bd Sep 21 07:24:42.336327: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.336330: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.336333: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:42.336335: | flags: none (0x0) Sep 21 07:24:42.336338: | Message ID: 0 (0x0) Sep 21 07:24:42.336341: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.336344: | ***emit ISAKMP Notification Payload: Sep 21 07:24:42.336347: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.336350: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.336353: | protocol ID: 1 (0x1) Sep 21 07:24:42.336355: | SPI size: 0 (0x0) Sep 21 07:24:42.336358: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:42.336362: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:42.336366: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:42.336369: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:42.336372: | emitting length of ISAKMP Message: 40 Sep 21 07:24:42.336379: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #39) Sep 21 07:24:42.336382: | 9b bd 34 db b9 1b ef 01 40 e3 a6 a6 1d c5 7e bd Sep 21 07:24:42.336385: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:42.336387: | 00 00 00 01 01 00 00 0e Sep 21 07:24:42.336414: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:42.336420: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:42.336426: | stop processing: state #39 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:42.336430: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:42.336436: | spent 0.513 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:42.420933: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:42.420964: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:42.420967: | e9 a7 65 03 26 dd 88 7a 00 00 00 00 00 00 00 00 Sep 21 07:24:42.420970: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:42.420972: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:42.420974: | 00 00 00 14 01 01 00 00 80 01 00 10 80 02 00 0f Sep 21 07:24:42.420976: | 80 04 00 14 Sep 21 07:24:42.420981: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:42.420985: | **parse ISAKMP Message: Sep 21 07:24:42.420987: | initiator cookie: Sep 21 07:24:42.420990: | e9 a7 65 03 26 dd 88 7a Sep 21 07:24:42.420992: | responder cookie: Sep 21 07:24:42.420994: | 00 00 00 00 00 00 00 00 Sep 21 07:24:42.420997: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.421000: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.421002: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.421005: | flags: none (0x0) Sep 21 07:24:42.421007: | Message ID: 0 (0x0) Sep 21 07:24:42.421009: | length: 68 (0x44) Sep 21 07:24:42.421012: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:42.421016: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:42.421018: | #null state always idle Sep 21 07:24:42.421022: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:42.421025: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:42.421027: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.421030: | length: 40 (0x28) Sep 21 07:24:42.421032: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.421035: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:42.421041: | in statetime_start() with no state Sep 21 07:24:42.421046: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:42.421052: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:42.421055: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.421058: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:42.421061: | find_next_host_connection returns test Sep 21 07:24:42.421064: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.421066: | find_next_host_connection returns empty Sep 21 07:24:42.421091: | creating state object #40 at 0x5589e77d5df0 Sep 21 07:24:42.421094: | State DB: adding IKEv1 state #40 in UNDEFINED Sep 21 07:24:42.421098: | pstats #40 ikev1.isakmp started Sep 21 07:24:42.421103: | #40 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:42.421109: | start processing: state #40 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:42.421113: | parent state #40: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:42.421116: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:42.421119: | ICOOKIE-DUMP: e9 a7 65 03 26 dd 88 7a Sep 21 07:24:42.421121: "test" #40: responding to Main Mode Sep 21 07:24:42.421126: | **emit ISAKMP Message: Sep 21 07:24:42.421128: | initiator cookie: Sep 21 07:24:42.421131: | e9 a7 65 03 26 dd 88 7a Sep 21 07:24:42.421133: | responder cookie: Sep 21 07:24:42.421135: | a0 4c d4 00 bd 20 0f bf Sep 21 07:24:42.421138: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.421140: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.421142: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.421145: | flags: none (0x0) Sep 21 07:24:42.421147: | Message ID: 0 (0x0) Sep 21 07:24:42.421150: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.421153: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:42.421156: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:42.421158: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:42.421160: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.421163: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:42.421166: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:42.421169: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:42.421172: | ****parse IPsec DOI SIT: Sep 21 07:24:42.421175: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:42.421178: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:42.421180: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.421182: | length: 28 (0x1c) Sep 21 07:24:42.421185: | proposal number: 1 (0x1) Sep 21 07:24:42.421187: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:42.421190: | SPI size: 0 (0x0) Sep 21 07:24:42.421192: | number of transforms: 1 (0x1) Sep 21 07:24:42.421195: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:42.421197: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.421199: | length: 20 (0x14) Sep 21 07:24:42.421202: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:42.421204: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:42.421207: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:42.421209: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:42.421212: | length/value: 16 (0x10) Sep 21 07:24:42.421214: | [16 is OAKLEY_AES_CCM_16] Sep 21 07:24:42.421218: "test" #40: OAKLEY_AES_CCM_16 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:42.421223: "test" #40: no acceptable Oakley Transform Sep 21 07:24:42.421225: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:42.421230: | [RE]START processing: state #40 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:42.421233: | #40 is idle Sep 21 07:24:42.421311: "test" #40: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:42.421316: | **emit ISAKMP Message: Sep 21 07:24:42.421318: | initiator cookie: Sep 21 07:24:42.421320: | e9 a7 65 03 26 dd 88 7a Sep 21 07:24:42.421323: | responder cookie: Sep 21 07:24:42.421325: | a0 4c d4 00 bd 20 0f bf Sep 21 07:24:42.421327: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.421330: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.421332: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:42.421335: | flags: none (0x0) Sep 21 07:24:42.421337: | Message ID: 0 (0x0) Sep 21 07:24:42.421340: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.421342: | ***emit ISAKMP Notification Payload: Sep 21 07:24:42.421345: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.421347: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.421349: | protocol ID: 1 (0x1) Sep 21 07:24:42.421352: | SPI size: 0 (0x0) Sep 21 07:24:42.421354: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:42.421357: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:42.421360: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:42.421363: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:42.421365: | emitting length of ISAKMP Message: 40 Sep 21 07:24:42.421372: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #40) Sep 21 07:24:42.421374: | e9 a7 65 03 26 dd 88 7a a0 4c d4 00 bd 20 0f bf Sep 21 07:24:42.421376: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:42.421378: | 00 00 00 01 01 00 00 0e Sep 21 07:24:42.421404: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:42.421410: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:42.421415: | stop processing: state #40 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:42.421418: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:42.421423: | spent 0.449 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:42.482331: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:42.482355: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:42.482358: | 33 ea 39 91 b9 84 60 46 00 00 00 00 00 00 00 00 Sep 21 07:24:42.482361: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:42.482363: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:42.482365: | 00 00 00 14 01 01 00 00 80 01 00 10 80 02 00 0f Sep 21 07:24:42.482367: | 80 03 00 1d Sep 21 07:24:42.482372: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:42.482376: | **parse ISAKMP Message: Sep 21 07:24:42.482379: | initiator cookie: Sep 21 07:24:42.482381: | 33 ea 39 91 b9 84 60 46 Sep 21 07:24:42.482384: | responder cookie: Sep 21 07:24:42.482386: | 00 00 00 00 00 00 00 00 Sep 21 07:24:42.482388: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.482391: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.482394: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.482397: | flags: none (0x0) Sep 21 07:24:42.482399: | Message ID: 0 (0x0) Sep 21 07:24:42.482401: | length: 68 (0x44) Sep 21 07:24:42.482404: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:42.482410: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:42.482413: | #null state always idle Sep 21 07:24:42.482416: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:42.482419: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:42.482422: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.482424: | length: 40 (0x28) Sep 21 07:24:42.482427: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.482429: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:42.482432: | in statetime_start() with no state Sep 21 07:24:42.482438: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:42.482443: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:42.482447: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.482450: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:42.482453: | find_next_host_connection returns test Sep 21 07:24:42.482455: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.482458: | find_next_host_connection returns empty Sep 21 07:24:42.482480: | creating state object #41 at 0x5589e77d68b0 Sep 21 07:24:42.482484: | State DB: adding IKEv1 state #41 in UNDEFINED Sep 21 07:24:42.482488: | pstats #41 ikev1.isakmp started Sep 21 07:24:42.482492: | #41 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:42.482498: | start processing: state #41 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:42.482502: | parent state #41: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:42.482505: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:42.482508: | ICOOKIE-DUMP: 33 ea 39 91 b9 84 60 46 Sep 21 07:24:42.482510: "test" #41: responding to Main Mode Sep 21 07:24:42.482515: | **emit ISAKMP Message: Sep 21 07:24:42.482518: | initiator cookie: Sep 21 07:24:42.482520: | 33 ea 39 91 b9 84 60 46 Sep 21 07:24:42.482522: | responder cookie: Sep 21 07:24:42.482524: | 42 e3 86 2f 79 d1 cf 2a Sep 21 07:24:42.482527: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.482529: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.482532: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.482534: | flags: none (0x0) Sep 21 07:24:42.482537: | Message ID: 0 (0x0) Sep 21 07:24:42.482539: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.482542: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:42.482545: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:42.482547: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:42.482550: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.482552: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:42.482555: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:42.482558: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:42.482561: | ****parse IPsec DOI SIT: Sep 21 07:24:42.482564: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:42.482567: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:42.482569: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.482571: | length: 28 (0x1c) Sep 21 07:24:42.482574: | proposal number: 1 (0x1) Sep 21 07:24:42.482576: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:42.482579: | SPI size: 0 (0x0) Sep 21 07:24:42.482581: | number of transforms: 1 (0x1) Sep 21 07:24:42.482584: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:42.482589: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.482592: | length: 20 (0x14) Sep 21 07:24:42.482594: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:42.482596: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:42.482599: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:42.482602: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:42.482604: | length/value: 16 (0x10) Sep 21 07:24:42.482607: | [16 is OAKLEY_AES_CCM_16] Sep 21 07:24:42.482629: "test" #41: OAKLEY_AES_CCM_16 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Sep 21 07:24:42.482633: "test" #41: no acceptable Oakley Transform Sep 21 07:24:42.482636: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:42.482641: | [RE]START processing: state #41 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:42.482643: | #41 is idle Sep 21 07:24:42.482722: "test" #41: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:42.482726: | **emit ISAKMP Message: Sep 21 07:24:42.482729: | initiator cookie: Sep 21 07:24:42.482731: | 33 ea 39 91 b9 84 60 46 Sep 21 07:24:42.482733: | responder cookie: Sep 21 07:24:42.482735: | 42 e3 86 2f 79 d1 cf 2a Sep 21 07:24:42.482738: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.482740: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.482743: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:42.482745: | flags: none (0x0) Sep 21 07:24:42.482748: | Message ID: 0 (0x0) Sep 21 07:24:42.482750: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.482753: | ***emit ISAKMP Notification Payload: Sep 21 07:24:42.482756: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.482758: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.482761: | protocol ID: 1 (0x1) Sep 21 07:24:42.482763: | SPI size: 0 (0x0) Sep 21 07:24:42.482765: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:42.482768: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:42.482771: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:42.482774: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:42.482776: | emitting length of ISAKMP Message: 40 Sep 21 07:24:42.482787: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #41) Sep 21 07:24:42.482792: | 33 ea 39 91 b9 84 60 46 42 e3 86 2f 79 d1 cf 2a Sep 21 07:24:42.482795: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:42.482797: | 00 00 00 01 01 00 00 0e Sep 21 07:24:42.482820: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:42.482826: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:42.482831: | stop processing: state #41 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:42.482834: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:42.482839: | spent 0.454 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:42.663669: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:42.663693: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:42.663697: | ad 8b a5 38 2b 18 19 63 00 00 00 00 00 00 00 00 Sep 21 07:24:42.663700: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Sep 21 07:24:42.663702: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Sep 21 07:24:42.663704: | 00 00 00 18 01 01 00 00 80 01 00 05 80 02 00 18 Sep 21 07:24:42.663706: | 80 03 00 12 80 04 00 0c Sep 21 07:24:42.663711: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:42.663716: | **parse ISAKMP Message: Sep 21 07:24:42.663719: | initiator cookie: Sep 21 07:24:42.663726: | ad 8b a5 38 2b 18 19 63 Sep 21 07:24:42.663728: | responder cookie: Sep 21 07:24:42.663730: | 00 00 00 00 00 00 00 00 Sep 21 07:24:42.663733: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.663735: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.663738: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.663740: | flags: none (0x0) Sep 21 07:24:42.663743: | Message ID: 0 (0x0) Sep 21 07:24:42.663746: | length: 72 (0x48) Sep 21 07:24:42.663749: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:42.663754: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:42.663757: | #null state always idle Sep 21 07:24:42.663760: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:42.663764: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:42.663766: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.663769: | length: 44 (0x2c) Sep 21 07:24:42.663771: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.663773: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:42.663776: | in statetime_start() with no state Sep 21 07:24:42.663782: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:42.663797: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:42.663801: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.663804: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:42.663807: | find_next_host_connection returns test Sep 21 07:24:42.663809: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.663811: | find_next_host_connection returns empty Sep 21 07:24:42.663836: | creating state object #42 at 0x5589e77d7370 Sep 21 07:24:42.663840: | State DB: adding IKEv1 state #42 in UNDEFINED Sep 21 07:24:42.663845: | pstats #42 ikev1.isakmp started Sep 21 07:24:42.663850: | #42 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:42.663856: | start processing: state #42 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:42.663860: | parent state #42: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:42.663863: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:42.663865: | ICOOKIE-DUMP: ad 8b a5 38 2b 18 19 63 Sep 21 07:24:42.663868: "test" #42: responding to Main Mode Sep 21 07:24:42.663873: | **emit ISAKMP Message: Sep 21 07:24:42.663876: | initiator cookie: Sep 21 07:24:42.663878: | ad 8b a5 38 2b 18 19 63 Sep 21 07:24:42.663880: | responder cookie: Sep 21 07:24:42.663882: | 17 4d 28 fc 37 31 0c cc Sep 21 07:24:42.663885: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.663888: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.663890: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.663893: | flags: none (0x0) Sep 21 07:24:42.663895: | Message ID: 0 (0x0) Sep 21 07:24:42.663897: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.663900: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:42.663903: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:42.663905: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:42.663908: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.663910: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:42.663913: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:42.663916: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:42.663919: | ****parse IPsec DOI SIT: Sep 21 07:24:42.663924: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:42.663927: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:42.663929: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.663931: | length: 32 (0x20) Sep 21 07:24:42.663934: | proposal number: 1 (0x1) Sep 21 07:24:42.663936: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:42.663939: | SPI size: 0 (0x0) Sep 21 07:24:42.663941: | number of transforms: 1 (0x1) Sep 21 07:24:42.663943: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:42.663946: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.663948: | length: 24 (0x18) Sep 21 07:24:42.663950: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:42.663952: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:42.663954: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:42.663957: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:42.663959: | length/value: 5 (0x5) Sep 21 07:24:42.663961: | [5 is OAKLEY_3DES_CBC] Sep 21 07:24:42.663965: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:42.663967: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:42.663970: | length/value: 24 (0x18) Sep 21 07:24:42.663973: "test" #42: 24?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:42.663976: "test" #42: no acceptable Oakley Transform Sep 21 07:24:42.663979: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:42.663984: | [RE]START processing: state #42 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:42.663986: | #42 is idle Sep 21 07:24:42.664254: "test" #42: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:42.664260: | **emit ISAKMP Message: Sep 21 07:24:42.664263: | initiator cookie: Sep 21 07:24:42.664266: | ad 8b a5 38 2b 18 19 63 Sep 21 07:24:42.664268: | responder cookie: Sep 21 07:24:42.664270: | 17 4d 28 fc 37 31 0c cc Sep 21 07:24:42.664273: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.664275: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.664278: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:42.664280: | flags: none (0x0) Sep 21 07:24:42.664282: | Message ID: 0 (0x0) Sep 21 07:24:42.664285: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.664288: | ***emit ISAKMP Notification Payload: Sep 21 07:24:42.664290: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.664293: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.664295: | protocol ID: 1 (0x1) Sep 21 07:24:42.664298: | SPI size: 0 (0x0) Sep 21 07:24:42.664300: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:42.664303: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:42.664306: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:42.664309: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:42.664311: | emitting length of ISAKMP Message: 40 Sep 21 07:24:42.664318: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #42) Sep 21 07:24:42.664321: | ad 8b a5 38 2b 18 19 63 17 4d 28 fc 37 31 0c cc Sep 21 07:24:42.664323: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:42.664325: | 00 00 00 01 01 00 00 0e Sep 21 07:24:42.664349: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:42.664355: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:42.664360: | stop processing: state #42 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:42.664362: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:42.664367: | spent 0.471 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:42.723315: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:42.723342: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:42.723346: | 2f a6 f5 96 22 f6 96 df 00 00 00 00 00 00 00 00 Sep 21 07:24:42.723349: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:42.723351: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:42.723354: | 00 00 00 14 01 01 00 00 80 02 00 18 80 03 00 12 Sep 21 07:24:42.723356: | 80 04 00 0c Sep 21 07:24:42.723361: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:42.723365: | **parse ISAKMP Message: Sep 21 07:24:42.723368: | initiator cookie: Sep 21 07:24:42.723370: | 2f a6 f5 96 22 f6 96 df Sep 21 07:24:42.723373: | responder cookie: Sep 21 07:24:42.723375: | 00 00 00 00 00 00 00 00 Sep 21 07:24:42.723378: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.723381: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.723383: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.723386: | flags: none (0x0) Sep 21 07:24:42.723388: | Message ID: 0 (0x0) Sep 21 07:24:42.723391: | length: 68 (0x44) Sep 21 07:24:42.723394: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:42.723398: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:42.723400: | #null state always idle Sep 21 07:24:42.723404: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:42.723407: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:42.723410: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.723412: | length: 40 (0x28) Sep 21 07:24:42.723415: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.723418: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:42.723420: | in statetime_start() with no state Sep 21 07:24:42.723426: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:42.723432: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:42.723435: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.723439: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:42.723442: | find_next_host_connection returns test Sep 21 07:24:42.723444: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.723447: | find_next_host_connection returns empty Sep 21 07:24:42.723473: | creating state object #43 at 0x5589e77d7e30 Sep 21 07:24:42.723477: | State DB: adding IKEv1 state #43 in UNDEFINED Sep 21 07:24:42.723481: | pstats #43 ikev1.isakmp started Sep 21 07:24:42.723485: | #43 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:42.723492: | start processing: state #43 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:42.723496: | parent state #43: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:42.723499: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:42.723502: | ICOOKIE-DUMP: 2f a6 f5 96 22 f6 96 df Sep 21 07:24:42.723505: "test" #43: responding to Main Mode Sep 21 07:24:42.723510: | **emit ISAKMP Message: Sep 21 07:24:42.723512: | initiator cookie: Sep 21 07:24:42.723514: | 2f a6 f5 96 22 f6 96 df Sep 21 07:24:42.723516: | responder cookie: Sep 21 07:24:42.723519: | 9c 49 23 3b 0d 67 e5 05 Sep 21 07:24:42.723521: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.723523: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.723526: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.723528: | flags: none (0x0) Sep 21 07:24:42.723530: | Message ID: 0 (0x0) Sep 21 07:24:42.723533: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.723535: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:42.723542: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:42.723545: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:42.723547: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.723550: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:42.723553: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:42.723556: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:42.723559: | ****parse IPsec DOI SIT: Sep 21 07:24:42.723561: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:42.723564: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:42.723566: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.723568: | length: 28 (0x1c) Sep 21 07:24:42.723570: | proposal number: 1 (0x1) Sep 21 07:24:42.723572: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:42.723574: | SPI size: 0 (0x0) Sep 21 07:24:42.723576: | number of transforms: 1 (0x1) Sep 21 07:24:42.723579: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:42.723581: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.723584: | length: 20 (0x14) Sep 21 07:24:42.723586: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:42.723588: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:42.723591: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:42.723593: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:42.723596: | length/value: 24 (0x18) Sep 21 07:24:42.723600: "test" #43: 24?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:42.723603: "test" #43: no acceptable Oakley Transform Sep 21 07:24:42.723606: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:42.723611: | [RE]START processing: state #43 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:42.723613: | #43 is idle Sep 21 07:24:42.723853: "test" #43: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:42.723861: | **emit ISAKMP Message: Sep 21 07:24:42.723865: | initiator cookie: Sep 21 07:24:42.723867: | 2f a6 f5 96 22 f6 96 df Sep 21 07:24:42.723870: | responder cookie: Sep 21 07:24:42.723872: | 9c 49 23 3b 0d 67 e5 05 Sep 21 07:24:42.723875: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.723877: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.723880: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:42.723883: | flags: none (0x0) Sep 21 07:24:42.723885: | Message ID: 0 (0x0) Sep 21 07:24:42.723888: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.723891: | ***emit ISAKMP Notification Payload: Sep 21 07:24:42.723921: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.723927: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.723929: | protocol ID: 1 (0x1) Sep 21 07:24:42.723932: | SPI size: 0 (0x0) Sep 21 07:24:42.723935: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:42.723938: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:42.723941: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:42.723944: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:42.723947: | emitting length of ISAKMP Message: 40 Sep 21 07:24:42.723954: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #43) Sep 21 07:24:42.723957: | 2f a6 f5 96 22 f6 96 df 9c 49 23 3b 0d 67 e5 05 Sep 21 07:24:42.723959: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:42.723961: | 00 00 00 01 01 00 00 0e Sep 21 07:24:42.723989: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:42.723999: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:42.724005: | stop processing: state #43 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:42.724008: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:42.724014: | spent 0.475 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:42.799862: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:42.799895: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:42.799900: | 8a 87 a5 e5 44 3f 84 f1 00 00 00 00 00 00 00 00 Sep 21 07:24:42.799902: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:42.799904: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:42.799906: | 00 00 00 14 01 01 00 00 80 01 00 05 80 03 00 12 Sep 21 07:24:42.799908: | 80 04 00 0c Sep 21 07:24:42.799914: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:42.799918: | **parse ISAKMP Message: Sep 21 07:24:42.799921: | initiator cookie: Sep 21 07:24:42.799923: | 8a 87 a5 e5 44 3f 84 f1 Sep 21 07:24:42.799926: | responder cookie: Sep 21 07:24:42.799928: | 00 00 00 00 00 00 00 00 Sep 21 07:24:42.799931: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.799933: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.799936: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.799938: | flags: none (0x0) Sep 21 07:24:42.799941: | Message ID: 0 (0x0) Sep 21 07:24:42.799943: | length: 68 (0x44) Sep 21 07:24:42.799946: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:42.799951: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:42.799954: | #null state always idle Sep 21 07:24:42.799957: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:42.799961: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:42.799963: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.799966: | length: 40 (0x28) Sep 21 07:24:42.799968: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.799971: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:42.799974: | in statetime_start() with no state Sep 21 07:24:42.799979: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:42.799984: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:42.799987: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.799992: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:42.799994: | find_next_host_connection returns test Sep 21 07:24:42.799997: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.799999: | find_next_host_connection returns empty Sep 21 07:24:42.800027: | creating state object #44 at 0x5589e77d88f0 Sep 21 07:24:42.800030: | State DB: adding IKEv1 state #44 in UNDEFINED Sep 21 07:24:42.800035: | pstats #44 ikev1.isakmp started Sep 21 07:24:42.800039: | #44 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:42.800046: | start processing: state #44 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:42.800050: | parent state #44: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:42.800053: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:42.800055: | ICOOKIE-DUMP: 8a 87 a5 e5 44 3f 84 f1 Sep 21 07:24:42.800057: "test" #44: responding to Main Mode Sep 21 07:24:42.800062: | **emit ISAKMP Message: Sep 21 07:24:42.800064: | initiator cookie: Sep 21 07:24:42.800066: | 8a 87 a5 e5 44 3f 84 f1 Sep 21 07:24:42.800067: | responder cookie: Sep 21 07:24:42.800069: | 52 4b 22 50 91 36 44 75 Sep 21 07:24:42.800071: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.800077: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.800080: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.800081: | flags: none (0x0) Sep 21 07:24:42.800083: | Message ID: 0 (0x0) Sep 21 07:24:42.800086: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.800088: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:42.800090: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:42.800092: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:42.800094: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.800097: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:42.800099: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:42.800102: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:42.800104: | ****parse IPsec DOI SIT: Sep 21 07:24:42.800107: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:42.800109: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:42.800112: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.800114: | length: 28 (0x1c) Sep 21 07:24:42.800116: | proposal number: 1 (0x1) Sep 21 07:24:42.800118: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:42.800120: | SPI size: 0 (0x0) Sep 21 07:24:42.800122: | number of transforms: 1 (0x1) Sep 21 07:24:42.800125: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:42.800127: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.800129: | length: 20 (0x14) Sep 21 07:24:42.800131: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:42.800133: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:42.800136: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:42.800138: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:42.800140: | length/value: 5 (0x5) Sep 21 07:24:42.800143: | [5 is OAKLEY_3DES_CBC] Sep 21 07:24:42.800146: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:42.800148: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Sep 21 07:24:42.800150: | length/value: 18 (0x12) Sep 21 07:24:42.800154: "test" #44: Pluto does not support 18?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Sep 21 07:24:42.800157: "test" #44: no acceptable Oakley Transform Sep 21 07:24:42.800159: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:42.800164: | [RE]START processing: state #44 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:42.800167: | #44 is idle Sep 21 07:24:42.801511: "test" #44: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:42.801525: | **emit ISAKMP Message: Sep 21 07:24:42.801528: | initiator cookie: Sep 21 07:24:42.801531: | 8a 87 a5 e5 44 3f 84 f1 Sep 21 07:24:42.801533: | responder cookie: Sep 21 07:24:42.801535: | 52 4b 22 50 91 36 44 75 Sep 21 07:24:42.801538: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.801541: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.801544: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:42.801546: | flags: none (0x0) Sep 21 07:24:42.801549: | Message ID: 0 (0x0) Sep 21 07:24:42.801552: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.801555: | ***emit ISAKMP Notification Payload: Sep 21 07:24:42.801558: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.801560: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.801563: | protocol ID: 1 (0x1) Sep 21 07:24:42.801566: | SPI size: 0 (0x0) Sep 21 07:24:42.801568: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:42.801571: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:42.801577: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:42.801580: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:42.801583: | emitting length of ISAKMP Message: 40 Sep 21 07:24:42.801590: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #44) Sep 21 07:24:42.801593: | 8a 87 a5 e5 44 3f 84 f1 52 4b 22 50 91 36 44 75 Sep 21 07:24:42.801596: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:42.801598: | 00 00 00 01 01 00 00 0e Sep 21 07:24:42.801639: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:42.801647: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:42.801653: | stop processing: state #44 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:42.801656: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:42.801664: | spent 0.494 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:42.913334: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:42.913365: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:42.913369: | 12 a9 65 ad 9a c6 f0 51 00 00 00 00 00 00 00 00 Sep 21 07:24:42.913371: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:42.913374: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:42.913376: | 00 00 00 14 01 01 00 00 80 01 00 05 80 02 00 18 Sep 21 07:24:42.913378: | 80 04 00 0c Sep 21 07:24:42.913383: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:42.913387: | **parse ISAKMP Message: Sep 21 07:24:42.913390: | initiator cookie: Sep 21 07:24:42.913392: | 12 a9 65 ad 9a c6 f0 51 Sep 21 07:24:42.913394: | responder cookie: Sep 21 07:24:42.913396: | 00 00 00 00 00 00 00 00 Sep 21 07:24:42.913399: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.913402: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.913404: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.913407: | flags: none (0x0) Sep 21 07:24:42.913409: | Message ID: 0 (0x0) Sep 21 07:24:42.913412: | length: 68 (0x44) Sep 21 07:24:42.913414: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:42.913418: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:42.913421: | #null state always idle Sep 21 07:24:42.913424: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:42.913427: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:42.913430: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.913432: | length: 40 (0x28) Sep 21 07:24:42.913434: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.913437: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:42.913439: | in statetime_start() with no state Sep 21 07:24:42.913445: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:42.913450: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:42.913453: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.913457: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:42.913460: | find_next_host_connection returns test Sep 21 07:24:42.913462: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:42.913465: | find_next_host_connection returns empty Sep 21 07:24:42.913485: | creating state object #45 at 0x5589e77d93b0 Sep 21 07:24:42.913489: | State DB: adding IKEv1 state #45 in UNDEFINED Sep 21 07:24:42.913493: | pstats #45 ikev1.isakmp started Sep 21 07:24:42.913497: | #45 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:42.913507: | start processing: state #45 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:42.913511: | parent state #45: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:42.913514: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:42.913517: | ICOOKIE-DUMP: 12 a9 65 ad 9a c6 f0 51 Sep 21 07:24:42.913519: "test" #45: responding to Main Mode Sep 21 07:24:42.913524: | **emit ISAKMP Message: Sep 21 07:24:42.913527: | initiator cookie: Sep 21 07:24:42.913529: | 12 a9 65 ad 9a c6 f0 51 Sep 21 07:24:42.913531: | responder cookie: Sep 21 07:24:42.913533: | 57 94 0b 7d cc c1 0f 1c Sep 21 07:24:42.913536: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:42.913538: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.913541: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:42.913543: | flags: none (0x0) Sep 21 07:24:42.913546: | Message ID: 0 (0x0) Sep 21 07:24:42.913548: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.913551: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:42.913554: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:42.913556: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:42.913559: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.913561: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:42.913564: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:42.913567: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:42.913569: | ****parse IPsec DOI SIT: Sep 21 07:24:42.913572: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:42.913574: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:42.913577: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.913579: | length: 28 (0x1c) Sep 21 07:24:42.913582: | proposal number: 1 (0x1) Sep 21 07:24:42.913584: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:42.913587: | SPI size: 0 (0x0) Sep 21 07:24:42.913589: | number of transforms: 1 (0x1) Sep 21 07:24:42.913592: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:42.913594: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.913597: | length: 20 (0x14) Sep 21 07:24:42.913599: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:42.913601: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:42.913604: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:42.913607: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:42.913609: | length/value: 5 (0x5) Sep 21 07:24:42.913611: | [5 is OAKLEY_3DES_CBC] Sep 21 07:24:42.913615: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:42.913617: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:42.913619: | length/value: 24 (0x18) Sep 21 07:24:42.913623: "test" #45: 24?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:42.913625: "test" #45: no acceptable Oakley Transform Sep 21 07:24:42.913628: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:42.913633: | [RE]START processing: state #45 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:42.913635: | #45 is idle Sep 21 07:24:42.913720: "test" #45: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:42.913724: | **emit ISAKMP Message: Sep 21 07:24:42.913727: | initiator cookie: Sep 21 07:24:42.913729: | 12 a9 65 ad 9a c6 f0 51 Sep 21 07:24:42.913731: | responder cookie: Sep 21 07:24:42.913733: | 57 94 0b 7d cc c1 0f 1c Sep 21 07:24:42.913735: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.913738: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:42.913743: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:42.913745: | flags: none (0x0) Sep 21 07:24:42.913748: | Message ID: 0 (0x0) Sep 21 07:24:42.913750: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:42.913753: | ***emit ISAKMP Notification Payload: Sep 21 07:24:42.913755: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:42.913758: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:42.913760: | protocol ID: 1 (0x1) Sep 21 07:24:42.913762: | SPI size: 0 (0x0) Sep 21 07:24:42.913764: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:42.913767: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:42.913770: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:42.913773: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:42.913775: | emitting length of ISAKMP Message: 40 Sep 21 07:24:42.913781: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #45) Sep 21 07:24:42.916659: | 12 a9 65 ad 9a c6 f0 51 57 94 0b 7d cc c1 0f 1c Sep 21 07:24:42.916672: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:42.916675: | 00 00 00 01 01 00 00 0e Sep 21 07:24:42.916713: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:42.916721: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:42.916727: | stop processing: state #45 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:42.916730: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:42.916736: | spent 0.489 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:43.175026: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:24:43.175055: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Sep 21 07:24:43.175060: | c0 39 7d a2 b7 6c c8 a5 00 00 00 00 00 00 00 00 Sep 21 07:24:43.175062: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Sep 21 07:24:43.175065: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Sep 21 07:24:43.175067: | 00 00 00 14 01 01 00 00 80 01 00 05 80 02 00 18 Sep 21 07:24:43.175069: | 80 03 00 12 Sep 21 07:24:43.175074: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Sep 21 07:24:43.175078: | **parse ISAKMP Message: Sep 21 07:24:43.175080: | initiator cookie: Sep 21 07:24:43.175082: | c0 39 7d a2 b7 6c c8 a5 Sep 21 07:24:43.175085: | responder cookie: Sep 21 07:24:43.175087: | 00 00 00 00 00 00 00 00 Sep 21 07:24:43.175090: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:43.175093: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:43.175095: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:43.175098: | flags: none (0x0) Sep 21 07:24:43.175101: | Message ID: 0 (0x0) Sep 21 07:24:43.175103: | length: 68 (0x44) Sep 21 07:24:43.175106: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Sep 21 07:24:43.175110: | State DB: IKEv1 state not found (find_state_ikev1_init) Sep 21 07:24:43.175113: | #null state always idle Sep 21 07:24:43.175116: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Sep 21 07:24:43.175119: | ***parse ISAKMP Security Association Payload: Sep 21 07:24:43.175122: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:43.175124: | length: 40 (0x28) Sep 21 07:24:43.175126: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:43.175129: | message 'main_inI1_outR1' HASH payload not checked early Sep 21 07:24:43.175132: | in statetime_start() with no state Sep 21 07:24:43.175138: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Sep 21 07:24:43.175144: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Sep 21 07:24:43.175152: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:43.175156: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Sep 21 07:24:43.175159: | find_next_host_connection returns test Sep 21 07:24:43.175161: | find_next_host_connection policy=IKEV1_ALLOW Sep 21 07:24:43.175164: | find_next_host_connection returns empty Sep 21 07:24:43.175197: | creating state object #46 at 0x5589e77d9e70 Sep 21 07:24:43.175201: | State DB: adding IKEv1 state #46 in UNDEFINED Sep 21 07:24:43.175206: | pstats #46 ikev1.isakmp started Sep 21 07:24:43.175211: | #46 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:24:43.175218: | start processing: state #46 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Sep 21 07:24:43.175221: | parent state #46: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Sep 21 07:24:43.175225: | sender checking NAT-T: enabled; VID 0 Sep 21 07:24:43.175228: | ICOOKIE-DUMP: c0 39 7d a2 b7 6c c8 a5 Sep 21 07:24:43.175231: "test" #46: responding to Main Mode Sep 21 07:24:43.175236: | **emit ISAKMP Message: Sep 21 07:24:43.175238: | initiator cookie: Sep 21 07:24:43.175241: | c0 39 7d a2 b7 6c c8 a5 Sep 21 07:24:43.175243: | responder cookie: Sep 21 07:24:43.175246: | 42 4c cb f8 14 84 98 cb Sep 21 07:24:43.175248: | next payload type: ISAKMP_NEXT_SA (0x1) Sep 21 07:24:43.175251: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:43.175253: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Sep 21 07:24:43.175256: | flags: none (0x0) Sep 21 07:24:43.175258: | Message ID: 0 (0x0) Sep 21 07:24:43.175261: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:43.175264: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Sep 21 07:24:43.175267: | ***emit ISAKMP Security Association Payload: Sep 21 07:24:43.175269: | next payload type: ISAKMP_NEXT_VID (0xd) Sep 21 07:24:43.175272: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:43.175275: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Sep 21 07:24:43.175279: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Sep 21 07:24:43.175282: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:24:43.175285: | ****parse IPsec DOI SIT: Sep 21 07:24:43.175288: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Sep 21 07:24:43.175291: | ****parse ISAKMP Proposal Payload: Sep 21 07:24:43.175293: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:43.175296: | length: 28 (0x1c) Sep 21 07:24:43.175298: | proposal number: 1 (0x1) Sep 21 07:24:43.175301: | protocol ID: PROTO_ISAKMP (0x1) Sep 21 07:24:43.175304: | SPI size: 0 (0x0) Sep 21 07:24:43.175306: | number of transforms: 1 (0x1) Sep 21 07:24:43.175309: | *****parse ISAKMP Transform Payload (ISAKMP): Sep 21 07:24:43.175311: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:43.175313: | length: 20 (0x14) Sep 21 07:24:43.175315: | ISAKMP transform number: 1 (0x1) Sep 21 07:24:43.175318: | ISAKMP transform ID: KEY_IKE (0x1) Sep 21 07:24:43.175320: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:43.175323: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Sep 21 07:24:43.175325: | length/value: 5 (0x5) Sep 21 07:24:43.175328: | [5 is OAKLEY_3DES_CBC] Sep 21 07:24:43.175331: | ******parse ISAKMP Oakley attribute: Sep 21 07:24:43.175334: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Sep 21 07:24:43.175336: | length/value: 24 (0x18) Sep 21 07:24:43.175340: "test" #46: 24?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Sep 21 07:24:43.175343: "test" #46: no acceptable Oakley Transform Sep 21 07:24:43.175346: | complete v1 state transition with NO_PROPOSAL_CHOSEN Sep 21 07:24:43.175353: | [RE]START processing: state #46 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2649) Sep 21 07:24:43.175355: | #46 is idle Sep 21 07:24:43.175427: "test" #46: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Sep 21 07:24:43.175432: | **emit ISAKMP Message: Sep 21 07:24:43.175435: | initiator cookie: Sep 21 07:24:43.175437: | c0 39 7d a2 b7 6c c8 a5 Sep 21 07:24:43.175439: | responder cookie: Sep 21 07:24:43.175441: | 42 4c cb f8 14 84 98 cb Sep 21 07:24:43.175443: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:43.175445: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Sep 21 07:24:43.175448: | exchange type: ISAKMP_XCHG_INFO (0x5) Sep 21 07:24:43.175450: | flags: none (0x0) Sep 21 07:24:43.175452: | Message ID: 0 (0x0) Sep 21 07:24:43.175454: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:24:43.175457: | ***emit ISAKMP Notification Payload: Sep 21 07:24:43.175459: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:24:43.175461: | DOI: ISAKMP_DOI_IPSEC (0x1) Sep 21 07:24:43.175464: | protocol ID: 1 (0x1) Sep 21 07:24:43.175466: | SPI size: 0 (0x0) Sep 21 07:24:43.175469: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Sep 21 07:24:43.175472: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Sep 21 07:24:43.175475: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Sep 21 07:24:43.175478: | emitting length of ISAKMP Notification Payload: 12 Sep 21 07:24:43.175480: | emitting length of ISAKMP Message: 40 Sep 21 07:24:43.175487: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #46) Sep 21 07:24:43.175489: | c0 39 7d a2 b7 6c c8 a5 42 4c cb f8 14 84 98 cb Sep 21 07:24:43.175491: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Sep 21 07:24:43.175493: | 00 00 00 01 01 00 00 0e Sep 21 07:24:43.175518: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Sep 21 07:24:43.175524: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Sep 21 07:24:43.175529: | stop processing: state #46 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Sep 21 07:24:43.175532: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:24:43.175537: | spent 0.482 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:24:43.406847: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:24:43.406875: shutting down Sep 21 07:24:43.406885: | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825) Sep 21 07:24:43.406889: | pluto_sd: executing action action: stopping(6), status 0 Sep 21 07:24:43.406895: | certs and keys locked by 'free_preshared_secrets' Sep 21 07:24:43.406897: forgetting secrets Sep 21 07:24:43.406901: | certs and keys unlocked by 'free_preshared_secrets' Sep 21 07:24:43.406906: | start processing: connection "test" (in delete_connection() at connections.c:189) Sep 21 07:24:43.406910: | Deleting states for connection - including all other IPsec SA's of this IKE SA Sep 21 07:24:43.406912: | pass 0 Sep 21 07:24:43.406915: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Sep 21 07:24:43.406918: | state #46 Sep 21 07:24:43.406921: | suspend processing: connection "test" (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.406928: | start processing: state #46 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.406931: | pstats #46 ikev1.isakmp deleted other Sep 21 07:24:43.406936: | [RE]START processing: state #46 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.406941: "test" #46: deleting state (STATE_MAIN_R0) aged 0.231s and NOT sending notification Sep 21 07:24:43.406948: | parent state #46: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.407025: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.407033: | stop processing: connection "test" (BACKGROUND) (in update_state_connection() at connections.c:4037) Sep 21 07:24:43.407036: | start processing: connection NULL (in update_state_connection() at connections.c:4038) Sep 21 07:24:43.407039: | in connection_discard for connection test Sep 21 07:24:43.407042: | State DB: deleting IKEv1 state #46 in MAIN_R0 Sep 21 07:24:43.407046: | parent state #46: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.407051: | stop processing: state #46 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.407064: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.407067: | state #45 Sep 21 07:24:43.407072: | start processing: state #45 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.407075: | pstats #45 ikev1.isakmp deleted other Sep 21 07:24:43.407079: | [RE]START processing: state #45 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.407082: "test" #45: deleting state (STATE_MAIN_R0) aged 0.493s and NOT sending notification Sep 21 07:24:43.407085: | parent state #45: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.407130: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.407134: | in connection_discard for connection test Sep 21 07:24:43.407137: | State DB: deleting IKEv1 state #45 in MAIN_R0 Sep 21 07:24:43.407140: | parent state #45: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.407145: | stop processing: state #45 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.407149: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.407151: | state #44 Sep 21 07:24:43.407156: | start processing: state #44 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.407159: | pstats #44 ikev1.isakmp deleted other Sep 21 07:24:43.407163: | [RE]START processing: state #44 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.407166: "test" #44: deleting state (STATE_MAIN_R0) aged 0.607s and NOT sending notification Sep 21 07:24:43.407169: | parent state #44: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.407210: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.407214: | in connection_discard for connection test Sep 21 07:24:43.407217: | State DB: deleting IKEv1 state #44 in MAIN_R0 Sep 21 07:24:43.407220: | parent state #44: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.407225: | stop processing: state #44 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.407232: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.407235: | state #43 Sep 21 07:24:43.407240: | start processing: state #43 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.407243: | pstats #43 ikev1.isakmp deleted other Sep 21 07:24:43.407247: | [RE]START processing: state #43 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.407250: "test" #43: deleting state (STATE_MAIN_R0) aged 0.683s and NOT sending notification Sep 21 07:24:43.407253: | parent state #43: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.407294: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.407298: | in connection_discard for connection test Sep 21 07:24:43.407301: | State DB: deleting IKEv1 state #43 in MAIN_R0 Sep 21 07:24:43.407304: | parent state #43: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.407308: | stop processing: state #43 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.407318: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.407321: | state #42 Sep 21 07:24:43.407325: | start processing: state #42 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.407328: | pstats #42 ikev1.isakmp deleted other Sep 21 07:24:43.407332: | [RE]START processing: state #42 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.407335: "test" #42: deleting state (STATE_MAIN_R0) aged 0.743s and NOT sending notification Sep 21 07:24:43.407338: | parent state #42: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.407379: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.407383: | in connection_discard for connection test Sep 21 07:24:43.407386: | State DB: deleting IKEv1 state #42 in MAIN_R0 Sep 21 07:24:43.407389: | parent state #42: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.407393: | stop processing: state #42 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.407397: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.407400: | state #41 Sep 21 07:24:43.407404: | start processing: state #41 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.407407: | pstats #41 ikev1.isakmp deleted other Sep 21 07:24:43.407411: | [RE]START processing: state #41 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.407415: "test" #41: deleting state (STATE_MAIN_R0) aged 0.924s and NOT sending notification Sep 21 07:24:43.407417: | parent state #41: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.407457: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.407461: | in connection_discard for connection test Sep 21 07:24:43.407463: | State DB: deleting IKEv1 state #41 in MAIN_R0 Sep 21 07:24:43.407466: | parent state #41: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.407471: | stop processing: state #41 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.407478: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.407481: | state #40 Sep 21 07:24:43.407485: | start processing: state #40 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.407488: | pstats #40 ikev1.isakmp deleted other Sep 21 07:24:43.407492: | [RE]START processing: state #40 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.407495: "test" #40: deleting state (STATE_MAIN_R0) aged 0.986s and NOT sending notification Sep 21 07:24:43.407498: | parent state #40: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.407538: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.407542: | in connection_discard for connection test Sep 21 07:24:43.407544: | State DB: deleting IKEv1 state #40 in MAIN_R0 Sep 21 07:24:43.407547: | parent state #40: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.407552: | stop processing: state #40 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.407559: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.407562: | state #39 Sep 21 07:24:43.407566: | start processing: state #39 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.407569: | pstats #39 ikev1.isakmp deleted other Sep 21 07:24:43.407573: | [RE]START processing: state #39 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.407577: "test" #39: deleting state (STATE_MAIN_R0) aged 1.071s and NOT sending notification Sep 21 07:24:43.407580: | parent state #39: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.407622: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.407626: | in connection_discard for connection test Sep 21 07:24:43.407628: | State DB: deleting IKEv1 state #39 in MAIN_R0 Sep 21 07:24:43.407631: | parent state #39: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.407636: | stop processing: state #39 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.407639: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.407642: | state #38 Sep 21 07:24:43.407647: | start processing: state #38 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.407649: | pstats #38 ikev1.isakmp deleted other Sep 21 07:24:43.407654: | [RE]START processing: state #38 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.407657: "test" #38: deleting state (STATE_MAIN_R0) aged 1.192s and NOT sending notification Sep 21 07:24:43.407660: | parent state #38: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.407701: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.407705: | in connection_discard for connection test Sep 21 07:24:43.407707: | State DB: deleting IKEv1 state #38 in MAIN_R0 Sep 21 07:24:43.407710: | parent state #38: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.407715: | stop processing: state #38 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.407722: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.407725: | state #37 Sep 21 07:24:43.407730: | start processing: state #37 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.407732: | pstats #37 ikev1.isakmp deleted other Sep 21 07:24:43.407737: | [RE]START processing: state #37 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.407740: "test" #37: deleting state (STATE_MAIN_R0) aged 1.250s and NOT sending notification Sep 21 07:24:43.407743: | parent state #37: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.408176: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.408189: | in connection_discard for connection test Sep 21 07:24:43.408193: | State DB: deleting IKEv1 state #37 in MAIN_R0 Sep 21 07:24:43.408197: | parent state #37: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.408204: | stop processing: state #37 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.408213: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.408217: | state #36 Sep 21 07:24:43.408223: | start processing: state #36 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.408226: | pstats #36 ikev1.isakmp deleted other Sep 21 07:24:43.408232: | [RE]START processing: state #36 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.408239: "test" #36: deleting state (STATE_MAIN_R0) aged 1.314s and NOT sending notification Sep 21 07:24:43.408244: | parent state #36: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.408293: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.408299: | in connection_discard for connection test Sep 21 07:24:43.408302: | State DB: deleting IKEv1 state #36 in MAIN_R0 Sep 21 07:24:43.408307: | parent state #36: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.408313: | stop processing: state #36 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.408319: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.408324: | state #35 Sep 21 07:24:43.408331: | start processing: state #35 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.408340: | pstats #35 ikev1.isakmp deleted other Sep 21 07:24:43.408347: | [RE]START processing: state #35 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.408351: "test" #35: deleting state (STATE_MAIN_R0) aged 1.364s and NOT sending notification Sep 21 07:24:43.408355: | parent state #35: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.408407: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.408413: | in connection_discard for connection test Sep 21 07:24:43.408416: | State DB: deleting IKEv1 state #35 in MAIN_R0 Sep 21 07:24:43.408419: | parent state #35: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.408425: | stop processing: state #35 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.408433: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.408436: | state #34 Sep 21 07:24:43.408442: | start processing: state #34 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.408445: | pstats #34 ikev1.isakmp deleted other Sep 21 07:24:43.408449: | [RE]START processing: state #34 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.408453: "test" #34: deleting state (STATE_MAIN_R0) aged 1.459s and NOT sending notification Sep 21 07:24:43.408456: | parent state #34: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.408502: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.408506: | in connection_discard for connection test Sep 21 07:24:43.408509: | State DB: deleting IKEv1 state #34 in MAIN_R0 Sep 21 07:24:43.408513: | parent state #34: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.408518: | stop processing: state #34 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.408525: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.408528: | state #33 Sep 21 07:24:43.408533: | start processing: state #33 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.408536: | pstats #33 ikev1.isakmp deleted other Sep 21 07:24:43.408541: | [RE]START processing: state #33 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.408544: "test" #33: deleting state (STATE_MAIN_R0) aged 1.811s and NOT sending notification Sep 21 07:24:43.408547: | parent state #33: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.408590: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.408594: | in connection_discard for connection test Sep 21 07:24:43.408597: | State DB: deleting IKEv1 state #33 in MAIN_R0 Sep 21 07:24:43.408600: | parent state #33: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.408605: | stop processing: state #33 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.408609: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.408611: | state #32 Sep 21 07:24:43.408616: | start processing: state #32 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.408619: | pstats #32 ikev1.isakmp deleted other Sep 21 07:24:43.408624: | [RE]START processing: state #32 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.408627: "test" #32: deleting state (STATE_MAIN_R0) aged 1.953s and NOT sending notification Sep 21 07:24:43.408630: | parent state #32: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.408672: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.408677: | in connection_discard for connection test Sep 21 07:24:43.408679: | State DB: deleting IKEv1 state #32 in MAIN_R0 Sep 21 07:24:43.408683: | parent state #32: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.408688: | stop processing: state #32 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.408697: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.408700: | state #31 Sep 21 07:24:43.408705: | start processing: state #31 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.408708: | pstats #31 ikev1.isakmp deleted other Sep 21 07:24:43.408712: | [RE]START processing: state #31 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.408716: "test" #31: deleting state (STATE_MAIN_R0) aged 2.031s and NOT sending notification Sep 21 07:24:43.408719: | parent state #31: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.408760: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.408764: | in connection_discard for connection test Sep 21 07:24:43.408766: | State DB: deleting IKEv1 state #31 in MAIN_R0 Sep 21 07:24:43.408769: | parent state #31: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.408774: | stop processing: state #31 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.408781: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.408793: | state #30 Sep 21 07:24:43.408798: | start processing: state #30 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.408801: | pstats #30 ikev1.isakmp deleted other Sep 21 07:24:43.408805: | [RE]START processing: state #30 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.408809: "test" #30: deleting state (STATE_MAIN_R0) aged 2.115s and NOT sending notification Sep 21 07:24:43.408812: | parent state #30: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.408853: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.408857: | in connection_discard for connection test Sep 21 07:24:43.408860: | State DB: deleting IKEv1 state #30 in MAIN_R0 Sep 21 07:24:43.408863: | parent state #30: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.408868: | stop processing: state #30 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.408872: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.408874: | state #29 Sep 21 07:24:43.408879: | start processing: state #29 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.408881: | pstats #29 ikev1.isakmp deleted other Sep 21 07:24:43.408886: | [RE]START processing: state #29 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.408889: "test" #29: deleting state (STATE_MAIN_R0) aged 2.171s and NOT sending notification Sep 21 07:24:43.408892: | parent state #29: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.408931: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.408935: | in connection_discard for connection test Sep 21 07:24:43.408938: | State DB: deleting IKEv1 state #29 in MAIN_R0 Sep 21 07:24:43.408941: | parent state #29: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.408945: | stop processing: state #29 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.408952: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.408955: | state #28 Sep 21 07:24:43.408959: | start processing: state #28 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.408962: | pstats #28 ikev1.isakmp deleted other Sep 21 07:24:43.408966: | [RE]START processing: state #28 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.408969: "test" #28: deleting state (STATE_MAIN_R0) aged 2.265s and NOT sending notification Sep 21 07:24:43.408972: | parent state #28: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.409014: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.409018: | in connection_discard for connection test Sep 21 07:24:43.409021: | State DB: deleting IKEv1 state #28 in MAIN_R0 Sep 21 07:24:43.409024: | parent state #28: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.409028: | stop processing: state #28 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.409036: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.409038: | state #27 Sep 21 07:24:43.409043: | start processing: state #27 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.409045: | pstats #27 ikev1.isakmp deleted other Sep 21 07:24:43.409050: | [RE]START processing: state #27 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.409053: "test" #27: deleting state (STATE_MAIN_R0) aged 2.385s and NOT sending notification Sep 21 07:24:43.409056: | parent state #27: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.409096: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.409101: | in connection_discard for connection test Sep 21 07:24:43.409103: | State DB: deleting IKEv1 state #27 in MAIN_R0 Sep 21 07:24:43.409106: | parent state #27: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.409111: | stop processing: state #27 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.409114: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.409117: | state #26 Sep 21 07:24:43.409121: | start processing: state #26 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.409124: | pstats #26 ikev1.isakmp deleted other Sep 21 07:24:43.409128: | [RE]START processing: state #26 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.409131: "test" #26: deleting state (STATE_MAIN_R0) aged 2.476s and NOT sending notification Sep 21 07:24:43.409134: | parent state #26: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.409173: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.409177: | in connection_discard for connection test Sep 21 07:24:43.409180: | State DB: deleting IKEv1 state #26 in MAIN_R0 Sep 21 07:24:43.409182: | parent state #26: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.409187: | stop processing: state #26 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.409193: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.409196: | state #25 Sep 21 07:24:43.409201: | start processing: state #25 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.409203: | pstats #25 ikev1.isakmp deleted other Sep 21 07:24:43.409208: | [RE]START processing: state #25 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.409211: "test" #25: deleting state (STATE_MAIN_R0) aged 2.677s and NOT sending notification Sep 21 07:24:43.409214: | parent state #25: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.409253: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.409257: | in connection_discard for connection test Sep 21 07:24:43.409259: | State DB: deleting IKEv1 state #25 in MAIN_R0 Sep 21 07:24:43.409262: | parent state #25: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.409267: | stop processing: state #25 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.409273: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.409276: | state #24 Sep 21 07:24:43.409281: | start processing: state #24 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.409283: | pstats #24 ikev1.isakmp deleted other Sep 21 07:24:43.409290: | [RE]START processing: state #24 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.409293: "test" #24: deleting state (STATE_MAIN_R0) aged 2.753s and NOT sending notification Sep 21 07:24:43.409296: | parent state #24: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.409336: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.409340: | in connection_discard for connection test Sep 21 07:24:43.409342: | State DB: deleting IKEv1 state #24 in MAIN_R0 Sep 21 07:24:43.409345: | parent state #24: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.409349: | stop processing: state #24 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.409352: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.409355: | state #23 Sep 21 07:24:43.409359: | start processing: state #23 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.409362: | pstats #23 ikev1.isakmp deleted other Sep 21 07:24:43.409366: | [RE]START processing: state #23 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.409370: "test" #23: deleting state (STATE_MAIN_R0) aged 2.833s and NOT sending notification Sep 21 07:24:43.409372: | parent state #23: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.409412: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.409417: | in connection_discard for connection test Sep 21 07:24:43.409419: | State DB: deleting IKEv1 state #23 in MAIN_R0 Sep 21 07:24:43.409422: | parent state #23: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.409426: | stop processing: state #23 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.409434: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.409436: | state #22 Sep 21 07:24:43.409441: | start processing: state #22 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.409444: | pstats #22 ikev1.isakmp deleted other Sep 21 07:24:43.409448: | [RE]START processing: state #22 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.409451: "test" #22: deleting state (STATE_MAIN_R0) aged 2.910s and NOT sending notification Sep 21 07:24:43.409454: | parent state #22: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.409496: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.409500: | in connection_discard for connection test Sep 21 07:24:43.409503: | State DB: deleting IKEv1 state #22 in MAIN_R0 Sep 21 07:24:43.409506: | parent state #22: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.409510: | stop processing: state #22 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.409517: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.409520: | state #21 Sep 21 07:24:43.409524: | start processing: state #21 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.409527: | pstats #21 ikev1.isakmp deleted other Sep 21 07:24:43.409531: | [RE]START processing: state #21 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.409535: "test" #21: deleting state (STATE_MAIN_R0) aged 2.967s and NOT sending notification Sep 21 07:24:43.409537: | parent state #21: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.409577: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.409581: | in connection_discard for connection test Sep 21 07:24:43.409584: | State DB: deleting IKEv1 state #21 in MAIN_R0 Sep 21 07:24:43.409587: | parent state #21: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.409591: | stop processing: state #21 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.409597: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.409599: | state #20 Sep 21 07:24:43.409604: | start processing: state #20 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.409607: | pstats #20 ikev1.isakmp deleted other Sep 21 07:24:43.409611: | [RE]START processing: state #20 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.409614: "test" #20: deleting state (STATE_MAIN_R0) aged 3.023s and NOT sending notification Sep 21 07:24:43.409617: | parent state #20: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.409656: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.409660: | in connection_discard for connection test Sep 21 07:24:43.409662: | State DB: deleting IKEv1 state #20 in MAIN_R0 Sep 21 07:24:43.409665: | parent state #20: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.409670: | stop processing: state #20 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.409677: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.409679: | state #19 Sep 21 07:24:43.409684: | start processing: state #19 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.409687: | pstats #19 ikev1.isakmp deleted other Sep 21 07:24:43.409691: | [RE]START processing: state #19 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.409694: "test" #19: deleting state (STATE_MAIN_R0) aged 3.076s and NOT sending notification Sep 21 07:24:43.409697: | parent state #19: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.409736: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.409740: | in connection_discard for connection test Sep 21 07:24:43.409742: | State DB: deleting IKEv1 state #19 in MAIN_R0 Sep 21 07:24:43.409746: | parent state #19: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.409750: | stop processing: state #19 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.409756: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.409759: | state #18 Sep 21 07:24:43.409764: | start processing: state #18 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.409766: | pstats #18 ikev1.isakmp deleted other Sep 21 07:24:43.409771: | [RE]START processing: state #18 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.409774: "test" #18: deleting state (STATE_MAIN_R0) aged 3.118s and NOT sending notification Sep 21 07:24:43.409776: | parent state #18: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.409821: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.409828: | in connection_discard for connection test Sep 21 07:24:43.409831: | State DB: deleting IKEv1 state #18 in MAIN_R0 Sep 21 07:24:43.409834: | parent state #18: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.409838: | stop processing: state #18 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.409842: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.409845: | state #17 Sep 21 07:24:43.409849: | start processing: state #17 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.409852: | pstats #17 ikev1.isakmp deleted other Sep 21 07:24:43.409856: | [RE]START processing: state #17 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.409859: "test" #17: deleting state (STATE_MAIN_R0) aged 3.187s and NOT sending notification Sep 21 07:24:43.409862: | parent state #17: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.409901: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.409907: | in connection_discard for connection test Sep 21 07:24:43.409910: | State DB: deleting IKEv1 state #17 in MAIN_R0 Sep 21 07:24:43.409913: | parent state #17: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.409917: | stop processing: state #17 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.409924: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.409927: | state #16 Sep 21 07:24:43.409932: | start processing: state #16 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.409934: | pstats #16 ikev1.isakmp deleted other Sep 21 07:24:43.409939: | [RE]START processing: state #16 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.409942: "test" #16: deleting state (STATE_MAIN_R0) aged 3.286s and NOT sending notification Sep 21 07:24:43.409945: | parent state #16: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.409985: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.409989: | in connection_discard for connection test Sep 21 07:24:43.409992: | State DB: deleting IKEv1 state #16 in MAIN_R0 Sep 21 07:24:43.409995: | parent state #16: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.410000: | stop processing: state #16 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.410006: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.410009: | state #15 Sep 21 07:24:43.410014: | start processing: state #15 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.410016: | pstats #15 ikev1.isakmp deleted other Sep 21 07:24:43.410021: | [RE]START processing: state #15 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.410024: "test" #15: deleting state (STATE_MAIN_R0) aged 3.329s and NOT sending notification Sep 21 07:24:43.410026: | parent state #15: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.410067: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.410071: | in connection_discard for connection test Sep 21 07:24:43.410073: | State DB: deleting IKEv1 state #15 in MAIN_R0 Sep 21 07:24:43.410077: | parent state #15: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.410081: | stop processing: state #15 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.410084: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.410087: | state #14 Sep 21 07:24:43.410091: | start processing: state #14 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.410094: | pstats #14 ikev1.isakmp deleted other Sep 21 07:24:43.410098: | [RE]START processing: state #14 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.410102: "test" #14: deleting state (STATE_MAIN_R0) aged 3.387s and NOT sending notification Sep 21 07:24:43.410104: | parent state #14: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.410144: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.410148: | in connection_discard for connection test Sep 21 07:24:43.410151: | State DB: deleting IKEv1 state #14 in MAIN_R0 Sep 21 07:24:43.410154: | parent state #14: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.410158: | stop processing: state #14 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.410165: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.410167: | state #13 Sep 21 07:24:43.410172: | start processing: state #13 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.410175: | pstats #13 ikev1.isakmp deleted other Sep 21 07:24:43.410181: | [RE]START processing: state #13 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.410184: "test" #13: deleting state (STATE_MAIN_R0) aged 3.460s and NOT sending notification Sep 21 07:24:43.410186: | parent state #13: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.410226: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.410230: | in connection_discard for connection test Sep 21 07:24:43.410232: | State DB: deleting IKEv1 state #13 in MAIN_R0 Sep 21 07:24:43.410235: | parent state #13: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.410240: | stop processing: state #13 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.410247: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.410249: | state #12 Sep 21 07:24:43.410254: | start processing: state #12 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.410257: | pstats #12 ikev1.isakmp deleted other Sep 21 07:24:43.410261: | [RE]START processing: state #12 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.410264: "test" #12: deleting state (STATE_MAIN_R0) aged 3.691s and NOT sending notification Sep 21 07:24:43.410267: | parent state #12: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.410308: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.410312: | in connection_discard for connection test Sep 21 07:24:43.410314: | State DB: deleting IKEv1 state #12 in MAIN_R0 Sep 21 07:24:43.410317: | parent state #12: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.410322: | stop processing: state #12 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.410325: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.410328: | state #11 Sep 21 07:24:43.410332: | start processing: state #11 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.410335: | pstats #11 ikev1.isakmp deleted other Sep 21 07:24:43.410339: | [RE]START processing: state #11 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.410343: "test" #11: deleting state (STATE_MAIN_R0) aged 3.838s and NOT sending notification Sep 21 07:24:43.410346: | parent state #11: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.410385: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.410389: | in connection_discard for connection test Sep 21 07:24:43.410392: | State DB: deleting IKEv1 state #11 in MAIN_R0 Sep 21 07:24:43.410395: | parent state #11: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.410399: | stop processing: state #11 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.410406: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.410409: | state #10 Sep 21 07:24:43.410414: | start processing: state #10 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.410416: | pstats #10 ikev1.isakmp deleted other Sep 21 07:24:43.410420: | [RE]START processing: state #10 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.410424: "test" #10: deleting state (STATE_MAIN_R0) aged 3.953s and NOT sending notification Sep 21 07:24:43.410427: | parent state #10: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.410466: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.410470: | in connection_discard for connection test Sep 21 07:24:43.410473: | State DB: deleting IKEv1 state #10 in MAIN_R0 Sep 21 07:24:43.410476: | parent state #10: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.410480: | stop processing: state #10 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.410489: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.410492: | state #9 Sep 21 07:24:43.410496: | start processing: state #9 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.410499: | pstats #9 ikev1.isakmp deleted other Sep 21 07:24:43.410503: | [RE]START processing: state #9 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.410506: "test" #9: deleting state (STATE_MAIN_R0) aged 4.193s and NOT sending notification Sep 21 07:24:43.410509: | parent state #9: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.410549: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.410553: | in connection_discard for connection test Sep 21 07:24:43.410556: | State DB: deleting IKEv1 state #9 in MAIN_R0 Sep 21 07:24:43.410559: | parent state #9: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.410563: | stop processing: state #9 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.410567: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.410570: | state #8 Sep 21 07:24:43.410574: | start processing: state #8 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.410577: | pstats #8 ikev1.isakmp deleted other Sep 21 07:24:43.410581: | [RE]START processing: state #8 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.410584: "test" #8: deleting state (STATE_MAIN_R0) aged 4.277s and NOT sending notification Sep 21 07:24:43.410587: | parent state #8: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.410627: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.410631: | in connection_discard for connection test Sep 21 07:24:43.410633: | State DB: deleting IKEv1 state #8 in MAIN_R0 Sep 21 07:24:43.410637: | parent state #8: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.410641: | stop processing: state #8 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.410648: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.410650: | state #7 Sep 21 07:24:43.410655: | start processing: state #7 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.410658: | pstats #7 ikev1.isakmp deleted other Sep 21 07:24:43.410662: | [RE]START processing: state #7 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.410666: "test" #7: deleting state (STATE_MAIN_R0) aged 4.365s and NOT sending notification Sep 21 07:24:43.410668: | parent state #7: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.410707: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.410710: | in connection_discard for connection test Sep 21 07:24:43.410713: | State DB: deleting IKEv1 state #7 in MAIN_R0 Sep 21 07:24:43.410716: | parent state #7: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.410720: | stop processing: state #7 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.410727: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.410730: | state #6 Sep 21 07:24:43.410734: | start processing: state #6 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.410737: | pstats #6 ikev1.isakmp deleted other Sep 21 07:24:43.410741: | [RE]START processing: state #6 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.410744: "test" #6: deleting state (STATE_MAIN_R0) aged 4.437s and NOT sending notification Sep 21 07:24:43.410747: | parent state #6: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.410791: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.410799: | in connection_discard for connection test Sep 21 07:24:43.410801: | State DB: deleting IKEv1 state #6 in MAIN_R0 Sep 21 07:24:43.410805: | parent state #6: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.410809: | stop processing: state #6 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.410812: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.410815: | state #5 Sep 21 07:24:43.410820: | start processing: state #5 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.410822: | pstats #5 ikev1.isakmp deleted other Sep 21 07:24:43.410827: | [RE]START processing: state #5 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.410830: "test" #5: deleting state (STATE_MAIN_R0) aged 4.530s and NOT sending notification Sep 21 07:24:43.410833: | parent state #5: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.410873: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.410877: | in connection_discard for connection test Sep 21 07:24:43.410880: | State DB: deleting IKEv1 state #5 in MAIN_R0 Sep 21 07:24:43.410883: | parent state #5: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.410887: | stop processing: state #5 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.410894: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.410897: | state #4 Sep 21 07:24:43.410901: | start processing: state #4 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.410904: | pstats #4 ikev1.isakmp deleted other Sep 21 07:24:43.410908: | [RE]START processing: state #4 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.410912: "test" #4: deleting state (STATE_MAIN_R0) aged 4.589s and NOT sending notification Sep 21 07:24:43.410914: | parent state #4: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.410954: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.410958: | in connection_discard for connection test Sep 21 07:24:43.410960: | State DB: deleting IKEv1 state #4 in MAIN_R0 Sep 21 07:24:43.410963: | parent state #4: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.410968: | stop processing: state #4 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.410974: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.410977: | state #3 Sep 21 07:24:43.410981: | start processing: state #3 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.410984: | pstats #3 ikev1.isakmp deleted other Sep 21 07:24:43.410988: | [RE]START processing: state #3 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.410992: "test" #3: deleting state (STATE_MAIN_R0) aged 4.723s and NOT sending notification Sep 21 07:24:43.410994: | parent state #3: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.411034: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.411038: | in connection_discard for connection test Sep 21 07:24:43.411041: | State DB: deleting IKEv1 state #3 in MAIN_R0 Sep 21 07:24:43.411044: | parent state #3: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.411048: | stop processing: state #3 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.411052: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.411054: | state #2 Sep 21 07:24:43.411059: | start processing: state #2 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.411061: | pstats #2 ikev1.isakmp deleted other Sep 21 07:24:43.411066: | [RE]START processing: state #2 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.411072: "test" #2: deleting state (STATE_MAIN_R0) aged 4.784s and NOT sending notification Sep 21 07:24:43.411074: | parent state #2: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.411114: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.411118: | in connection_discard for connection test Sep 21 07:24:43.411120: | State DB: deleting IKEv1 state #2 in MAIN_R0 Sep 21 07:24:43.411123: | parent state #2: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.411128: | stop processing: state #2 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.411134: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.411137: | state #1 Sep 21 07:24:43.411142: | start processing: state #1 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:24:43.411144: | pstats #1 ikev1.isakmp deleted other Sep 21 07:24:43.411149: | [RE]START processing: state #1 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Sep 21 07:24:43.411152: "test" #1: deleting state (STATE_MAIN_R0) aged 5.006s and NOT sending notification Sep 21 07:24:43.411155: | parent state #1: MAIN_R0(half-open IKE SA) => delete Sep 21 07:24:43.411193: | State DB: IKEv1 state not found (flush_incomplete_children) Sep 21 07:24:43.411197: | in connection_discard for connection test Sep 21 07:24:43.411200: | State DB: deleting IKEv1 state #1 in MAIN_R0 Sep 21 07:24:43.411203: | parent state #1: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Sep 21 07:24:43.411207: | stop processing: state #1 from 192.1.2.45:500 (in delete_state() at state.c:1143) Sep 21 07:24:43.411214: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:24:43.411216: | pass 1 Sep 21 07:24:43.411219: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Sep 21 07:24:43.411223: | free hp@0x5589e7785a10 Sep 21 07:24:43.411226: | flush revival: connection 'test' wasn't on the list Sep 21 07:24:43.411230: | processing: STOP connection NULL (in discard_connection() at connections.c:249) Sep 21 07:24:43.411235: | crl fetch request list locked by 'free_crl_fetch' Sep 21 07:24:43.411237: | crl fetch request list unlocked by 'free_crl_fetch' Sep 21 07:24:43.411246: shutting down interface lo/lo 127.0.0.1:4500 Sep 21 07:24:43.411249: shutting down interface lo/lo 127.0.0.1:500 Sep 21 07:24:43.411253: shutting down interface eth0/eth0 192.0.2.254:4500 Sep 21 07:24:43.411257: shutting down interface eth0/eth0 192.0.2.254:500 Sep 21 07:24:43.411260: shutting down interface eth1/eth1 192.1.2.23:4500 Sep 21 07:24:43.411263: shutting down interface eth1/eth1 192.1.2.23:500 Sep 21 07:24:43.411268: | FOR_EACH_STATE_... in delete_states_dead_interfaces Sep 21 07:24:43.411277: | libevent_free: release ptr-libevent@0x5589e77b9080 Sep 21 07:24:43.411281: | free_event_entry: release EVENT_NULL-pe@0x5589e77a2280 Sep 21 07:24:43.411290: | libevent_free: release ptr-libevent@0x5589e77b9170 Sep 21 07:24:43.411293: | free_event_entry: release EVENT_NULL-pe@0x5589e77b9130 Sep 21 07:24:43.411300: | libevent_free: release ptr-libevent@0x5589e77b9260 Sep 21 07:24:43.411303: | free_event_entry: release EVENT_NULL-pe@0x5589e77b9220 Sep 21 07:24:43.411309: | libevent_free: release ptr-libevent@0x5589e77b9350 Sep 21 07:24:43.411312: | free_event_entry: release EVENT_NULL-pe@0x5589e77b9310 Sep 21 07:24:43.411318: | libevent_free: release ptr-libevent@0x5589e77b9440 Sep 21 07:24:43.411321: | free_event_entry: release EVENT_NULL-pe@0x5589e77b9400 Sep 21 07:24:43.411327: | libevent_free: release ptr-libevent@0x5589e77b9530 Sep 21 07:24:43.411329: | free_event_entry: release EVENT_NULL-pe@0x5589e77b94f0 Sep 21 07:24:43.411334: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Sep 21 07:24:43.412584: | libevent_free: release ptr-libevent@0x5589e77b89e0 Sep 21 07:24:43.412596: | free_event_entry: release EVENT_NULL-pe@0x5589e77a1500 Sep 21 07:24:43.412604: | libevent_free: release ptr-libevent@0x5589e77ae470 Sep 21 07:24:43.412607: | free_event_entry: release EVENT_NULL-pe@0x5589e77a17b0 Sep 21 07:24:43.412611: | libevent_free: release ptr-libevent@0x5589e77ae3e0 Sep 21 07:24:43.412615: | free_event_entry: release EVENT_NULL-pe@0x5589e77a6f10 Sep 21 07:24:43.412618: | global timer EVENT_REINIT_SECRET uninitialized Sep 21 07:24:43.412621: | global timer EVENT_SHUNT_SCAN uninitialized Sep 21 07:24:43.412624: | global timer EVENT_PENDING_DDNS uninitialized Sep 21 07:24:43.412626: | global timer EVENT_PENDING_PHASE2 uninitialized Sep 21 07:24:43.412628: | global timer EVENT_CHECK_CRLS uninitialized Sep 21 07:24:43.412631: | global timer EVENT_REVIVE_CONNS uninitialized Sep 21 07:24:43.412633: | global timer EVENT_FREE_ROOT_CERTS uninitialized Sep 21 07:24:43.412636: | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized Sep 21 07:24:43.412638: | global timer EVENT_NAT_T_KEEPALIVE uninitialized Sep 21 07:24:43.412643: | libevent_free: release ptr-libevent@0x5589e77b8ab0 Sep 21 07:24:43.412646: | signal event handler PLUTO_SIGCHLD uninstalled Sep 21 07:24:43.412649: | libevent_free: release ptr-libevent@0x5589e77b8b90 Sep 21 07:24:43.412651: | signal event handler PLUTO_SIGTERM uninstalled Sep 21 07:24:43.412655: | libevent_free: release ptr-libevent@0x5589e77b8c50 Sep 21 07:24:43.412657: | signal event handler PLUTO_SIGHUP uninstalled Sep 21 07:24:43.412660: | libevent_free: release ptr-libevent@0x5589e77ad6e0 Sep 21 07:24:43.412664: | signal event handler PLUTO_SIGSYS uninstalled Sep 21 07:24:43.412666: | releasing event base Sep 21 07:24:43.412680: | libevent_free: release ptr-libevent@0x5589e77b8d10 Sep 21 07:24:43.412683: | libevent_free: release ptr-libevent@0x5589e778e250 Sep 21 07:24:43.412687: | libevent_free: release ptr-libevent@0x5589e779ca90 Sep 21 07:24:43.412689: | libevent_free: release ptr-libevent@0x5589e779cb60 Sep 21 07:24:43.412692: | libevent_free: release ptr-libevent@0x5589e779cab0 Sep 21 07:24:43.412695: | libevent_free: release ptr-libevent@0x5589e77b8a70 Sep 21 07:24:43.412697: | libevent_free: release ptr-libevent@0x5589e77b8b50 Sep 21 07:24:43.412700: | libevent_free: release ptr-libevent@0x5589e779cb40 Sep 21 07:24:43.412702: | libevent_free: release ptr-libevent@0x5589e779cca0 Sep 21 07:24:43.412704: | libevent_free: release ptr-libevent@0x5589e77a1700 Sep 21 07:24:43.412707: | libevent_free: release ptr-libevent@0x5589e77b95c0 Sep 21 07:24:43.412709: | libevent_free: release ptr-libevent@0x5589e77b94d0 Sep 21 07:24:43.412712: | libevent_free: release ptr-libevent@0x5589e77b93e0 Sep 21 07:24:43.412714: | libevent_free: release ptr-libevent@0x5589e77b92f0 Sep 21 07:24:43.412716: | libevent_free: release ptr-libevent@0x5589e77b9200 Sep 21 07:24:43.412719: | libevent_free: release ptr-libevent@0x5589e77b9110 Sep 21 07:24:43.412721: | libevent_free: release ptr-libevent@0x5589e7720370 Sep 21 07:24:43.412724: | libevent_free: release ptr-libevent@0x5589e77b8c30 Sep 21 07:24:43.412726: | libevent_free: release ptr-libevent@0x5589e77b8b70 Sep 21 07:24:43.412728: | libevent_free: release ptr-libevent@0x5589e77b8a90 Sep 21 07:24:43.412731: | libevent_free: release ptr-libevent@0x5589e77b8cf0 Sep 21 07:24:43.412733: | libevent_free: release ptr-libevent@0x5589e771e5b0 Sep 21 07:24:43.412736: | libevent_free: release ptr-libevent@0x5589e779cad0 Sep 21 07:24:43.412739: | libevent_free: release ptr-libevent@0x5589e779cb00 Sep 21 07:24:43.412741: | libevent_free: release ptr-libevent@0x5589e779c7f0 Sep 21 07:24:43.412743: | releasing global libevent data Sep 21 07:24:43.412746: | libevent_free: release ptr-libevent@0x5589e779b4e0 Sep 21 07:24:43.412749: | libevent_free: release ptr-libevent@0x5589e779c790 Sep 21 07:24:43.412752: | libevent_free: release ptr-libevent@0x5589e779c7c0