Sep 21 07:25:33.054652: FIPS Product: YES Sep 21 07:25:33.054679: FIPS Kernel: NO Sep 21 07:25:33.054681: FIPS Mode: NO Sep 21 07:25:33.054683: NSS DB directory: sql:/etc/ipsec.d Sep 21 07:25:33.054841: Initializing NSS Sep 21 07:25:33.054847: Opening NSS database "sql:/etc/ipsec.d" read-only Sep 21 07:25:33.093327: NSS initialized Sep 21 07:25:33.093343: NSS crypto library initialized Sep 21 07:25:33.093345: FIPS HMAC integrity support [enabled] Sep 21 07:25:33.093347: FIPS mode disabled for pluto daemon Sep 21 07:25:33.162792: FIPS HMAC integrity verification self-test FAILED Sep 21 07:25:33.162910: libcap-ng support [enabled] Sep 21 07:25:33.162917: Linux audit support [enabled] Sep 21 07:25:33.162936: Linux audit activated Sep 21 07:25:33.162947: Starting Pluto (Libreswan Version v3.28-827-gc9aa82b8a6-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC SYSTEMD_WATCHDOG FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:10912 Sep 21 07:25:33.162949: core dump dir: /tmp Sep 21 07:25:33.162950: secrets file: /etc/ipsec.secrets Sep 21 07:25:33.162951: leak-detective disabled Sep 21 07:25:33.162953: NSS crypto [enabled] Sep 21 07:25:33.162954: XAUTH PAM support [enabled] Sep 21 07:25:33.163011: | libevent is using pluto's memory allocator Sep 21 07:25:33.163017: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Sep 21 07:25:33.163028: | libevent_malloc: new ptr-libevent@0x55799c848240 size 40 Sep 21 07:25:33.163031: | libevent_malloc: new ptr-libevent@0x55799c8494f0 size 40 Sep 21 07:25:33.163033: | libevent_malloc: new ptr-libevent@0x55799c849520 size 40 Sep 21 07:25:33.163034: | creating event base Sep 21 07:25:33.163036: | libevent_malloc: new ptr-libevent@0x55799c8494b0 size 56 Sep 21 07:25:33.163038: | libevent_malloc: new ptr-libevent@0x55799c849550 size 664 Sep 21 07:25:33.163046: | libevent_malloc: new ptr-libevent@0x55799c8497f0 size 24 Sep 21 07:25:33.163050: | libevent_malloc: new ptr-libevent@0x55799c83af00 size 384 Sep 21 07:25:33.163058: | libevent_malloc: new ptr-libevent@0x55799c849810 size 16 Sep 21 07:25:33.163059: | libevent_malloc: new ptr-libevent@0x55799c849830 size 40 Sep 21 07:25:33.163061: | libevent_malloc: new ptr-libevent@0x55799c849860 size 48 Sep 21 07:25:33.163066: | libevent_realloc: new ptr-libevent@0x55799c7cb370 size 256 Sep 21 07:25:33.163068: | libevent_malloc: new ptr-libevent@0x55799c8498a0 size 16 Sep 21 07:25:33.163072: | libevent_free: release ptr-libevent@0x55799c8494b0 Sep 21 07:25:33.163074: | libevent initialized Sep 21 07:25:33.163077: | libevent_realloc: new ptr-libevent@0x55799c8498c0 size 64 Sep 21 07:25:33.163081: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Sep 21 07:25:33.163092: | init_nat_traversal() initialized with keep_alive=0s Sep 21 07:25:33.163094: NAT-Traversal support [enabled] Sep 21 07:25:33.163095: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Sep 21 07:25:33.163099: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Sep 21 07:25:33.163102: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Sep 21 07:25:33.163129: | global one-shot timer EVENT_REVIVE_CONNS initialized Sep 21 07:25:33.163131: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Sep 21 07:25:33.163133: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Sep 21 07:25:33.163175: Encryption algorithms: Sep 21 07:25:33.163186: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Sep 21 07:25:33.163189: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Sep 21 07:25:33.163192: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Sep 21 07:25:33.163194: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Sep 21 07:25:33.163196: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Sep 21 07:25:33.163203: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Sep 21 07:25:33.163206: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Sep 21 07:25:33.163208: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Sep 21 07:25:33.163210: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Sep 21 07:25:33.163212: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Sep 21 07:25:33.163214: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Sep 21 07:25:33.163217: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Sep 21 07:25:33.163219: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Sep 21 07:25:33.163221: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Sep 21 07:25:33.163223: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Sep 21 07:25:33.163225: NULL IKEv1: ESP IKEv2: ESP [] Sep 21 07:25:33.163227: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Sep 21 07:25:33.163232: Hash algorithms: Sep 21 07:25:33.163233: MD5 IKEv1: IKE IKEv2: Sep 21 07:25:33.163235: SHA1 IKEv1: IKE IKEv2: FIPS sha Sep 21 07:25:33.163237: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Sep 21 07:25:33.163239: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Sep 21 07:25:33.163241: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Sep 21 07:25:33.163249: PRF algorithms: Sep 21 07:25:33.163251: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Sep 21 07:25:33.163253: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Sep 21 07:25:33.163255: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Sep 21 07:25:33.163257: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Sep 21 07:25:33.163258: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Sep 21 07:25:33.163260: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Sep 21 07:25:33.163275: Integrity algorithms: Sep 21 07:25:33.163277: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Sep 21 07:25:33.163279: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Sep 21 07:25:33.163282: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Sep 21 07:25:33.163284: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Sep 21 07:25:33.163286: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Sep 21 07:25:33.163288: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Sep 21 07:25:33.163290: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Sep 21 07:25:33.163292: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Sep 21 07:25:33.163294: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Sep 21 07:25:33.163301: DH algorithms: Sep 21 07:25:33.163303: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Sep 21 07:25:33.163305: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Sep 21 07:25:33.163307: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Sep 21 07:25:33.163310: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Sep 21 07:25:33.163312: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Sep 21 07:25:33.163313: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Sep 21 07:25:33.163315: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Sep 21 07:25:33.163317: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Sep 21 07:25:33.163319: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Sep 21 07:25:33.163320: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Sep 21 07:25:33.163322: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Sep 21 07:25:33.163324: testing CAMELLIA_CBC: Sep 21 07:25:33.163325: Camellia: 16 bytes with 128-bit key Sep 21 07:25:33.163422: Camellia: 16 bytes with 128-bit key Sep 21 07:25:33.163441: Camellia: 16 bytes with 256-bit key Sep 21 07:25:33.163460: Camellia: 16 bytes with 256-bit key Sep 21 07:25:33.163477: testing AES_GCM_16: Sep 21 07:25:33.163480: empty string Sep 21 07:25:33.163499: one block Sep 21 07:25:33.163515: two blocks Sep 21 07:25:33.163531: two blocks with associated data Sep 21 07:25:33.163558: testing AES_CTR: Sep 21 07:25:33.163561: Encrypting 16 octets using AES-CTR with 128-bit key Sep 21 07:25:33.163589: Encrypting 32 octets using AES-CTR with 128-bit key Sep 21 07:25:33.163617: Encrypting 36 octets using AES-CTR with 128-bit key Sep 21 07:25:33.163645: Encrypting 16 octets using AES-CTR with 192-bit key Sep 21 07:25:33.163672: Encrypting 32 octets using AES-CTR with 192-bit key Sep 21 07:25:33.163700: Encrypting 36 octets using AES-CTR with 192-bit key Sep 21 07:25:33.163729: Encrypting 16 octets using AES-CTR with 256-bit key Sep 21 07:25:33.163757: Encrypting 32 octets using AES-CTR with 256-bit key Sep 21 07:25:33.163794: Encrypting 36 octets using AES-CTR with 256-bit key Sep 21 07:25:33.163825: testing AES_CBC: Sep 21 07:25:33.163828: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Sep 21 07:25:33.163851: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Sep 21 07:25:33.163880: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Sep 21 07:25:33.163909: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Sep 21 07:25:33.163936: testing AES_XCBC: Sep 21 07:25:33.163939: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Sep 21 07:25:33.164021: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Sep 21 07:25:33.164104: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Sep 21 07:25:33.164180: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Sep 21 07:25:33.164257: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Sep 21 07:25:33.164337: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Sep 21 07:25:33.164416: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Sep 21 07:25:33.164587: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Sep 21 07:25:33.164665: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Sep 21 07:25:33.164749: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Sep 21 07:25:33.164904: testing HMAC_MD5: Sep 21 07:25:33.164909: RFC 2104: MD5_HMAC test 1 Sep 21 07:25:33.165020: RFC 2104: MD5_HMAC test 2 Sep 21 07:25:33.165117: RFC 2104: MD5_HMAC test 3 Sep 21 07:25:33.165232: 8 CPU cores online Sep 21 07:25:33.165234: starting up 7 crypto helpers Sep 21 07:25:33.165260: started thread for crypto helper 0 Sep 21 07:25:33.165280: started thread for crypto helper 1 Sep 21 07:25:33.165286: | starting up helper thread 1 Sep 21 07:25:33.165295: started thread for crypto helper 2 Sep 21 07:25:33.165298: | status value returned by setting the priority of this thread (crypto helper 1) 22 Sep 21 07:25:33.165304: | crypto helper 1 waiting (nothing to do) Sep 21 07:25:33.165309: started thread for crypto helper 3 Sep 21 07:25:33.165312: | starting up helper thread 3 Sep 21 07:25:33.165318: | status value returned by setting the priority of this thread (crypto helper 3) 22 Sep 21 07:25:33.165320: | crypto helper 3 waiting (nothing to do) Sep 21 07:25:33.165322: started thread for crypto helper 4 Sep 21 07:25:33.165328: | starting up helper thread 4 Sep 21 07:25:33.165336: | status value returned by setting the priority of this thread (crypto helper 4) 22 Sep 21 07:25:33.165339: | crypto helper 4 waiting (nothing to do) Sep 21 07:25:33.165340: started thread for crypto helper 5 Sep 21 07:25:33.165343: | starting up helper thread 5 Sep 21 07:25:33.165352: | starting up helper thread 2 Sep 21 07:25:33.165358: | status value returned by setting the priority of this thread (crypto helper 5) 22 Sep 21 07:25:33.165372: | crypto helper 5 waiting (nothing to do) Sep 21 07:25:33.165348: | starting up helper thread 0 Sep 21 07:25:33.165367: | status value returned by setting the priority of this thread (crypto helper 2) 22 Sep 21 07:25:33.165384: | status value returned by setting the priority of this thread (crypto helper 0) 22 Sep 21 07:25:33.165387: | crypto helper 0 waiting (nothing to do) Sep 21 07:25:33.165392: | starting up helper thread 6 Sep 21 07:25:33.165382: started thread for crypto helper 6 Sep 21 07:25:33.165411: | checking IKEv1 state table Sep 21 07:25:33.165419: | MAIN_R0: category: half-open IKE SA flags: 0: Sep 21 07:25:33.165435: | -> MAIN_R1 EVENT_SO_DISCARD Sep 21 07:25:33.165437: | MAIN_I1: category: half-open IKE SA flags: 0: Sep 21 07:25:33.165440: | -> MAIN_I2 EVENT_RETRANSMIT Sep 21 07:25:33.165455: | MAIN_R1: category: open IKE SA flags: 200: Sep 21 07:25:33.165394: | crypto helper 2 waiting (nothing to do) Sep 21 07:25:33.165399: | status value returned by setting the priority of this thread (crypto helper 6) 22 Sep 21 07:25:33.165465: | crypto helper 6 waiting (nothing to do) Sep 21 07:25:33.165457: | -> MAIN_R2 EVENT_RETRANSMIT Sep 21 07:25:33.165473: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:25:33.165475: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:25:33.165478: | MAIN_I2: category: open IKE SA flags: 0: Sep 21 07:25:33.165480: | -> MAIN_I3 EVENT_RETRANSMIT Sep 21 07:25:33.165482: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:25:33.165484: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:25:33.165487: | MAIN_R2: category: open IKE SA flags: 0: Sep 21 07:25:33.165502: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:25:33.165504: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:25:33.165506: | -> UNDEFINED EVENT_SA_REPLACE Sep 21 07:25:33.165509: | MAIN_I3: category: open IKE SA flags: 0: Sep 21 07:25:33.165511: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:25:33.165513: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:25:33.165515: | -> UNDEFINED EVENT_SA_REPLACE Sep 21 07:25:33.165517: | MAIN_R3: category: established IKE SA flags: 200: Sep 21 07:25:33.165520: | -> UNDEFINED EVENT_NULL Sep 21 07:25:33.165522: | MAIN_I4: category: established IKE SA flags: 0: Sep 21 07:25:33.165524: | -> UNDEFINED EVENT_NULL Sep 21 07:25:33.165527: | AGGR_R0: category: half-open IKE SA flags: 0: Sep 21 07:25:33.165529: | -> AGGR_R1 EVENT_SO_DISCARD Sep 21 07:25:33.165531: | AGGR_I1: category: half-open IKE SA flags: 0: Sep 21 07:25:33.165534: | -> AGGR_I2 EVENT_SA_REPLACE Sep 21 07:25:33.165536: | -> AGGR_I2 EVENT_SA_REPLACE Sep 21 07:25:33.165538: | AGGR_R1: category: open IKE SA flags: 200: Sep 21 07:25:33.165540: | -> AGGR_R2 EVENT_SA_REPLACE Sep 21 07:25:33.165542: | -> AGGR_R2 EVENT_SA_REPLACE Sep 21 07:25:33.165545: | AGGR_I2: category: established IKE SA flags: 200: Sep 21 07:25:33.165547: | -> UNDEFINED EVENT_NULL Sep 21 07:25:33.165549: | AGGR_R2: category: established IKE SA flags: 0: Sep 21 07:25:33.165552: | -> UNDEFINED EVENT_NULL Sep 21 07:25:33.165554: | QUICK_R0: category: established CHILD SA flags: 0: Sep 21 07:25:33.165560: | -> QUICK_R1 EVENT_RETRANSMIT Sep 21 07:25:33.165563: | QUICK_I1: category: established CHILD SA flags: 0: Sep 21 07:25:33.165565: | -> QUICK_I2 EVENT_SA_REPLACE Sep 21 07:25:33.165568: | QUICK_R1: category: established CHILD SA flags: 0: Sep 21 07:25:33.165570: | -> QUICK_R2 EVENT_SA_REPLACE Sep 21 07:25:33.165573: | QUICK_I2: category: established CHILD SA flags: 200: Sep 21 07:25:33.165575: | -> UNDEFINED EVENT_NULL Sep 21 07:25:33.165577: | QUICK_R2: category: established CHILD SA flags: 0: Sep 21 07:25:33.165580: | -> UNDEFINED EVENT_NULL Sep 21 07:25:33.165582: | INFO: category: informational flags: 0: Sep 21 07:25:33.165584: | -> UNDEFINED EVENT_NULL Sep 21 07:25:33.165587: | INFO_PROTECTED: category: informational flags: 0: Sep 21 07:25:33.165589: | -> UNDEFINED EVENT_NULL Sep 21 07:25:33.165591: | XAUTH_R0: category: established IKE SA flags: 0: Sep 21 07:25:33.165593: | -> XAUTH_R1 EVENT_NULL Sep 21 07:25:33.165596: | XAUTH_R1: category: established IKE SA flags: 0: Sep 21 07:25:33.165598: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:25:33.165600: | MODE_CFG_R0: category: informational flags: 0: Sep 21 07:25:33.165603: | -> MODE_CFG_R1 EVENT_SA_REPLACE Sep 21 07:25:33.165605: | MODE_CFG_R1: category: established IKE SA flags: 0: Sep 21 07:25:33.165607: | -> MODE_CFG_R2 EVENT_SA_REPLACE Sep 21 07:25:33.165610: | MODE_CFG_R2: category: established IKE SA flags: 0: Sep 21 07:25:33.165612: | -> UNDEFINED EVENT_NULL Sep 21 07:25:33.165614: | MODE_CFG_I1: category: established IKE SA flags: 0: Sep 21 07:25:33.165617: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:25:33.165619: | XAUTH_I0: category: established IKE SA flags: 0: Sep 21 07:25:33.165621: | -> XAUTH_I1 EVENT_RETRANSMIT Sep 21 07:25:33.165624: | XAUTH_I1: category: established IKE SA flags: 0: Sep 21 07:25:33.165626: | -> MAIN_I4 EVENT_RETRANSMIT Sep 21 07:25:33.165632: | checking IKEv2 state table Sep 21 07:25:33.165638: | PARENT_I0: category: ignore flags: 0: Sep 21 07:25:33.165640: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Sep 21 07:25:33.165643: | PARENT_I1: category: half-open IKE SA flags: 0: Sep 21 07:25:33.165646: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Sep 21 07:25:33.165648: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Sep 21 07:25:33.165651: | PARENT_I2: category: open IKE SA flags: 0: Sep 21 07:25:33.165654: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Sep 21 07:25:33.165656: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Sep 21 07:25:33.165659: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Sep 21 07:25:33.165661: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Sep 21 07:25:33.165663: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Sep 21 07:25:33.165666: | PARENT_I3: category: established IKE SA flags: 0: Sep 21 07:25:33.165669: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Sep 21 07:25:33.165671: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Sep 21 07:25:33.165673: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Sep 21 07:25:33.165676: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Sep 21 07:25:33.165678: | PARENT_R0: category: half-open IKE SA flags: 0: Sep 21 07:25:33.165681: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Sep 21 07:25:33.165683: | PARENT_R1: category: half-open IKE SA flags: 0: Sep 21 07:25:33.165686: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Sep 21 07:25:33.165688: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Sep 21 07:25:33.165691: | PARENT_R2: category: established IKE SA flags: 0: Sep 21 07:25:33.165695: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Sep 21 07:25:33.165698: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Sep 21 07:25:33.165700: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Sep 21 07:25:33.165702: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Sep 21 07:25:33.165705: | V2_CREATE_I0: category: established IKE SA flags: 0: Sep 21 07:25:33.165707: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Sep 21 07:25:33.165710: | V2_CREATE_I: category: established IKE SA flags: 0: Sep 21 07:25:33.165713: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Sep 21 07:25:33.165715: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Sep 21 07:25:33.165718: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Sep 21 07:25:33.165721: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Sep 21 07:25:33.165723: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Sep 21 07:25:33.165726: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Sep 21 07:25:33.165728: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Sep 21 07:25:33.165731: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Sep 21 07:25:33.165734: | V2_CREATE_R: category: established IKE SA flags: 0: Sep 21 07:25:33.165736: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Sep 21 07:25:33.165739: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Sep 21 07:25:33.165741: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Sep 21 07:25:33.165744: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Sep 21 07:25:33.165747: | V2_IPSEC_I: category: established CHILD SA flags: 0: Sep 21 07:25:33.165749: | V2_IPSEC_R: category: established CHILD SA flags: 0: Sep 21 07:25:33.165752: | IKESA_DEL: category: established IKE SA flags: 0: Sep 21 07:25:33.165755: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Sep 21 07:25:33.165758: | CHILDSA_DEL: category: informational flags: 0: Sep 21 07:25:33.165770: Using Linux XFRM/NETKEY IPsec interface code on 5.2.11+ Sep 21 07:25:33.165864: | Hard-wiring algorithms Sep 21 07:25:33.165871: | adding AES_CCM_16 to kernel algorithm db Sep 21 07:25:33.165875: | adding AES_CCM_12 to kernel algorithm db Sep 21 07:25:33.165877: | adding AES_CCM_8 to kernel algorithm db Sep 21 07:25:33.165879: | adding 3DES_CBC to kernel algorithm db Sep 21 07:25:33.165881: | adding CAMELLIA_CBC to kernel algorithm db Sep 21 07:25:33.165884: | adding AES_GCM_16 to kernel algorithm db Sep 21 07:25:33.165886: | adding AES_GCM_12 to kernel algorithm db Sep 21 07:25:33.165888: | adding AES_GCM_8 to kernel algorithm db Sep 21 07:25:33.165890: | adding AES_CTR to kernel algorithm db Sep 21 07:25:33.165892: | adding AES_CBC to kernel algorithm db Sep 21 07:25:33.165895: | adding SERPENT_CBC to kernel algorithm db Sep 21 07:25:33.165897: | adding TWOFISH_CBC to kernel algorithm db Sep 21 07:25:33.165899: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Sep 21 07:25:33.165901: | adding NULL to kernel algorithm db Sep 21 07:25:33.165904: | adding CHACHA20_POLY1305 to kernel algorithm db Sep 21 07:25:33.165906: | adding HMAC_MD5_96 to kernel algorithm db Sep 21 07:25:33.165908: | adding HMAC_SHA1_96 to kernel algorithm db Sep 21 07:25:33.165911: | adding HMAC_SHA2_512_256 to kernel algorithm db Sep 21 07:25:33.165913: | adding HMAC_SHA2_384_192 to kernel algorithm db Sep 21 07:25:33.165915: | adding HMAC_SHA2_256_128 to kernel algorithm db Sep 21 07:25:33.165918: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Sep 21 07:25:33.165920: | adding AES_XCBC_96 to kernel algorithm db Sep 21 07:25:33.165922: | adding AES_CMAC_96 to kernel algorithm db Sep 21 07:25:33.165924: | adding NONE to kernel algorithm db Sep 21 07:25:33.165949: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Sep 21 07:25:33.165954: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Sep 21 07:25:33.165956: | setup kernel fd callback Sep 21 07:25:33.165959: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x55799c84ef60 Sep 21 07:25:33.165962: | libevent_malloc: new ptr-libevent@0x55799c85b080 size 128 Sep 21 07:25:33.165965: | libevent_malloc: new ptr-libevent@0x55799c84e240 size 16 Sep 21 07:25:33.165970: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x55799c84ef20 Sep 21 07:25:33.165973: | libevent_malloc: new ptr-libevent@0x55799c85b110 size 128 Sep 21 07:25:33.165975: | libevent_malloc: new ptr-libevent@0x55799c84e260 size 16 Sep 21 07:25:33.166204: | global one-shot timer EVENT_CHECK_CRLS initialized Sep 21 07:25:33.166211: selinux support is enabled. Sep 21 07:25:33.166285: systemd watchdog not enabled - not sending watchdog keepalives Sep 21 07:25:33.166485: | unbound context created - setting debug level to 5 Sep 21 07:25:33.166511: | /etc/hosts lookups activated Sep 21 07:25:33.166524: | /etc/resolv.conf usage activated Sep 21 07:25:33.166587: | outgoing-port-avoid set 0-65535 Sep 21 07:25:33.166617: | outgoing-port-permit set 32768-60999 Sep 21 07:25:33.166620: | Loading dnssec root key from:/var/lib/unbound/root.key Sep 21 07:25:33.166622: | No additional dnssec trust anchors defined via dnssec-trusted= option Sep 21 07:25:33.166625: | Setting up events, loop start Sep 21 07:25:33.166628: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x55799c8494b0 Sep 21 07:25:33.166631: | libevent_malloc: new ptr-libevent@0x55799c865680 size 128 Sep 21 07:25:33.166634: | libevent_malloc: new ptr-libevent@0x55799c865710 size 16 Sep 21 07:25:33.166640: | libevent_realloc: new ptr-libevent@0x55799c7c95b0 size 256 Sep 21 07:25:33.166643: | libevent_malloc: new ptr-libevent@0x55799c865730 size 8 Sep 21 07:25:33.166645: | libevent_realloc: new ptr-libevent@0x55799c85a480 size 144 Sep 21 07:25:33.166648: | libevent_malloc: new ptr-libevent@0x55799c865750 size 152 Sep 21 07:25:33.166651: | libevent_malloc: new ptr-libevent@0x55799c8657f0 size 16 Sep 21 07:25:33.166655: | signal event handler PLUTO_SIGCHLD installed Sep 21 07:25:33.166657: | libevent_malloc: new ptr-libevent@0x55799c865810 size 8 Sep 21 07:25:33.166660: | libevent_malloc: new ptr-libevent@0x55799c865830 size 152 Sep 21 07:25:33.166663: | signal event handler PLUTO_SIGTERM installed Sep 21 07:25:33.166665: | libevent_malloc: new ptr-libevent@0x55799c8658d0 size 8 Sep 21 07:25:33.166668: | libevent_malloc: new ptr-libevent@0x55799c8658f0 size 152 Sep 21 07:25:33.166670: | signal event handler PLUTO_SIGHUP installed Sep 21 07:25:33.166673: | libevent_malloc: new ptr-libevent@0x55799c865990 size 8 Sep 21 07:25:33.166675: | libevent_realloc: release ptr-libevent@0x55799c85a480 Sep 21 07:25:33.166678: | libevent_realloc: new ptr-libevent@0x55799c8659b0 size 256 Sep 21 07:25:33.166680: | libevent_malloc: new ptr-libevent@0x55799c85a480 size 152 Sep 21 07:25:33.166683: | signal event handler PLUTO_SIGSYS installed Sep 21 07:25:33.167060: | created addconn helper (pid:10976) using fork+execve Sep 21 07:25:33.167074: | forked child 10976 Sep 21 07:25:33.167106: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:25:33.167136: | pluto_sd: executing action action: reloading(4), status 0 Sep 21 07:25:33.167143: listening for IKE messages Sep 21 07:25:33.167204: | Inspecting interface lo Sep 21 07:25:33.167210: | found lo with address 127.0.0.1 Sep 21 07:25:33.167213: | Inspecting interface eth0 Sep 21 07:25:33.167217: | found eth0 with address 192.0.3.254 Sep 21 07:25:33.167219: | Inspecting interface eth1 Sep 21 07:25:33.167223: | found eth1 with address 192.1.3.33 Sep 21 07:25:33.167277: Kernel supports NIC esp-hw-offload Sep 21 07:25:33.167287: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.3.33:500 Sep 21 07:25:33.167322: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:25:33.167330: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:25:33.167346: adding interface eth1/eth1 192.1.3.33:4500 Sep 21 07:25:33.167383: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.3.254:500 Sep 21 07:25:33.167430: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:25:33.167434: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:25:33.167437: adding interface eth0/eth0 192.0.3.254:4500 Sep 21 07:25:33.167473: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Sep 21 07:25:33.167506: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:25:33.167509: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:25:33.167513: adding interface lo/lo 127.0.0.1:4500 Sep 21 07:25:33.167592: | no interfaces to sort Sep 21 07:25:33.167597: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Sep 21 07:25:33.167605: | add_fd_read_event_handler: new ethX-pe@0x55799c865d20 Sep 21 07:25:33.167608: | libevent_malloc: new ptr-libevent@0x55799c865d60 size 128 Sep 21 07:25:33.167612: | libevent_malloc: new ptr-libevent@0x55799c865df0 size 16 Sep 21 07:25:33.167620: | setup callback for interface lo 127.0.0.1:4500 fd 22 Sep 21 07:25:33.167623: | add_fd_read_event_handler: new ethX-pe@0x55799c865e10 Sep 21 07:25:33.167625: | libevent_malloc: new ptr-libevent@0x55799c865e50 size 128 Sep 21 07:25:33.167628: | libevent_malloc: new ptr-libevent@0x55799c865ee0 size 16 Sep 21 07:25:33.167632: | setup callback for interface lo 127.0.0.1:500 fd 21 Sep 21 07:25:33.167635: | add_fd_read_event_handler: new ethX-pe@0x55799c865f00 Sep 21 07:25:33.167637: | libevent_malloc: new ptr-libevent@0x55799c865f40 size 128 Sep 21 07:25:33.167640: | libevent_malloc: new ptr-libevent@0x55799c865fd0 size 16 Sep 21 07:25:33.167644: | setup callback for interface eth0 192.0.3.254:4500 fd 20 Sep 21 07:25:33.167647: | add_fd_read_event_handler: new ethX-pe@0x55799c865ff0 Sep 21 07:25:33.167649: | libevent_malloc: new ptr-libevent@0x55799c866030 size 128 Sep 21 07:25:33.167652: | libevent_malloc: new ptr-libevent@0x55799c8660c0 size 16 Sep 21 07:25:33.167656: | setup callback for interface eth0 192.0.3.254:500 fd 19 Sep 21 07:25:33.167659: | add_fd_read_event_handler: new ethX-pe@0x55799c8660e0 Sep 21 07:25:33.167661: | libevent_malloc: new ptr-libevent@0x55799c866120 size 128 Sep 21 07:25:33.167664: | libevent_malloc: new ptr-libevent@0x55799c8661b0 size 16 Sep 21 07:25:33.167668: | setup callback for interface eth1 192.1.3.33:4500 fd 18 Sep 21 07:25:33.167671: | add_fd_read_event_handler: new ethX-pe@0x55799c8661d0 Sep 21 07:25:33.167673: | libevent_malloc: new ptr-libevent@0x55799c866210 size 128 Sep 21 07:25:33.167676: | libevent_malloc: new ptr-libevent@0x55799c8662a0 size 16 Sep 21 07:25:33.167680: | setup callback for interface eth1 192.1.3.33:500 fd 17 Sep 21 07:25:33.167685: | certs and keys locked by 'free_preshared_secrets' Sep 21 07:25:33.167688: | certs and keys unlocked by 'free_preshared_secrets' Sep 21 07:25:33.167712: loading secrets from "/etc/ipsec.secrets" Sep 21 07:25:33.167732: | saving Modulus Sep 21 07:25:33.167735: | saving PublicExponent Sep 21 07:25:33.167739: | ignoring PrivateExponent Sep 21 07:25:33.167742: | ignoring Prime1 Sep 21 07:25:33.167745: | ignoring Prime2 Sep 21 07:25:33.167748: | ignoring Exponent1 Sep 21 07:25:33.167751: | ignoring Exponent2 Sep 21 07:25:33.167754: | ignoring Coefficient Sep 21 07:25:33.167757: | ignoring CKAIDNSS Sep 21 07:25:33.167795: | computed rsa CKAID 90 5d fc a1 08 68 74 7c 6f 20 d3 1b 2d 20 4b 8f Sep 21 07:25:33.167800: | computed rsa CKAID 88 aa 7c 5d Sep 21 07:25:33.167803: loaded private key for keyid: PKK_RSA:AQPl33O2P Sep 21 07:25:33.167810: | certs and keys locked by 'process_secret' Sep 21 07:25:33.167814: | certs and keys unlocked by 'process_secret' Sep 21 07:25:33.167819: | pluto_sd: executing action action: ready(5), status 0 Sep 21 07:25:33.167828: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:25:33.167838: | spent 0.736 milliseconds in whack Sep 21 07:25:33.199877: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:25:33.199897: | pluto_sd: executing action action: reloading(4), status 0 Sep 21 07:25:33.199902: listening for IKE messages Sep 21 07:25:33.199934: | Inspecting interface lo Sep 21 07:25:33.199939: | found lo with address 127.0.0.1 Sep 21 07:25:33.199941: | Inspecting interface eth0 Sep 21 07:25:33.199944: | found eth0 with address 192.0.3.254 Sep 21 07:25:33.199945: | Inspecting interface eth1 Sep 21 07:25:33.199947: | found eth1 with address 192.1.3.33 Sep 21 07:25:33.200019: | no interfaces to sort Sep 21 07:25:33.200025: | libevent_free: release ptr-libevent@0x55799c865d60 Sep 21 07:25:33.200028: | free_event_entry: release EVENT_NULL-pe@0x55799c865d20 Sep 21 07:25:33.200030: | add_fd_read_event_handler: new ethX-pe@0x55799c865d20 Sep 21 07:25:33.200032: | libevent_malloc: new ptr-libevent@0x55799c865d60 size 128 Sep 21 07:25:33.200037: | setup callback for interface lo 127.0.0.1:4500 fd 22 Sep 21 07:25:33.200039: | libevent_free: release ptr-libevent@0x55799c865e50 Sep 21 07:25:33.200041: | free_event_entry: release EVENT_NULL-pe@0x55799c865e10 Sep 21 07:25:33.200042: | add_fd_read_event_handler: new ethX-pe@0x55799c865e10 Sep 21 07:25:33.200044: | libevent_malloc: new ptr-libevent@0x55799c865e50 size 128 Sep 21 07:25:33.200047: | setup callback for interface lo 127.0.0.1:500 fd 21 Sep 21 07:25:33.200049: | libevent_free: release ptr-libevent@0x55799c865f40 Sep 21 07:25:33.200051: | free_event_entry: release EVENT_NULL-pe@0x55799c865f00 Sep 21 07:25:33.200052: | add_fd_read_event_handler: new ethX-pe@0x55799c865f00 Sep 21 07:25:33.200054: | libevent_malloc: new ptr-libevent@0x55799c865f40 size 128 Sep 21 07:25:33.200057: | setup callback for interface eth0 192.0.3.254:4500 fd 20 Sep 21 07:25:33.200059: | libevent_free: release ptr-libevent@0x55799c866030 Sep 21 07:25:33.200061: | free_event_entry: release EVENT_NULL-pe@0x55799c865ff0 Sep 21 07:25:33.200062: | add_fd_read_event_handler: new ethX-pe@0x55799c865ff0 Sep 21 07:25:33.200064: | libevent_malloc: new ptr-libevent@0x55799c866030 size 128 Sep 21 07:25:33.200067: | setup callback for interface eth0 192.0.3.254:500 fd 19 Sep 21 07:25:33.200069: | libevent_free: release ptr-libevent@0x55799c866120 Sep 21 07:25:33.200070: | free_event_entry: release EVENT_NULL-pe@0x55799c8660e0 Sep 21 07:25:33.200072: | add_fd_read_event_handler: new ethX-pe@0x55799c8660e0 Sep 21 07:25:33.200073: | libevent_malloc: new ptr-libevent@0x55799c866120 size 128 Sep 21 07:25:33.200076: | setup callback for interface eth1 192.1.3.33:4500 fd 18 Sep 21 07:25:33.200079: | libevent_free: release ptr-libevent@0x55799c866210 Sep 21 07:25:33.200080: | free_event_entry: release EVENT_NULL-pe@0x55799c8661d0 Sep 21 07:25:33.200081: | add_fd_read_event_handler: new ethX-pe@0x55799c8661d0 Sep 21 07:25:33.200083: | libevent_malloc: new ptr-libevent@0x55799c866210 size 128 Sep 21 07:25:33.200086: | setup callback for interface eth1 192.1.3.33:500 fd 17 Sep 21 07:25:33.200088: | certs and keys locked by 'free_preshared_secrets' Sep 21 07:25:33.200089: forgetting secrets Sep 21 07:25:33.200097: | certs and keys unlocked by 'free_preshared_secrets' Sep 21 07:25:33.200111: loading secrets from "/etc/ipsec.secrets" Sep 21 07:25:33.200124: | saving Modulus Sep 21 07:25:33.200127: | saving PublicExponent Sep 21 07:25:33.200129: | ignoring PrivateExponent Sep 21 07:25:33.200131: | ignoring Prime1 Sep 21 07:25:33.200133: | ignoring Prime2 Sep 21 07:25:33.200135: | ignoring Exponent1 Sep 21 07:25:33.200136: | ignoring Exponent2 Sep 21 07:25:33.200138: | ignoring Coefficient Sep 21 07:25:33.200140: | ignoring CKAIDNSS Sep 21 07:25:33.200154: | computed rsa CKAID 90 5d fc a1 08 68 74 7c 6f 20 d3 1b 2d 20 4b 8f Sep 21 07:25:33.200156: | computed rsa CKAID 88 aa 7c 5d Sep 21 07:25:33.200159: loaded private key for keyid: PKK_RSA:AQPl33O2P Sep 21 07:25:33.200164: | certs and keys locked by 'process_secret' Sep 21 07:25:33.200170: | certs and keys unlocked by 'process_secret' Sep 21 07:25:33.200174: | pluto_sd: executing action action: ready(5), status 0 Sep 21 07:25:33.200180: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:25:33.200186: | spent 0.317 milliseconds in whack Sep 21 07:25:33.200672: | processing signal PLUTO_SIGCHLD Sep 21 07:25:33.200680: | waitpid returned pid 10976 (exited with status 0) Sep 21 07:25:33.200682: | reaped addconn helper child (status 0) Sep 21 07:25:33.200686: | waitpid returned ECHILD (no child processes left) Sep 21 07:25:33.200689: | spent 0.0112 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:25:33.509302: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:25:33.509319: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:25:33.509321: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Sep 21 07:25:33.509323: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:25:33.509324: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Sep 21 07:25:33.509327: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:25:33.509332: | Added new connection north-eastnets/0x1 with policy ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Sep 21 07:25:33.509334: | No AUTH policy was set - defaulting to RSASIG Sep 21 07:25:33.509354: | ike (phase1) algorithm values: AES_CBC_256-HMAC_SHA2_256-MODP2048 Sep 21 07:25:33.509356: | from whack: got --esp=aes128-sha2_512;modp3072 Sep 21 07:25:33.509365: | ESP/AH string values: AES_CBC_128-HMAC_SHA2_512_256-MODP3072 Sep 21 07:25:33.509369: | counting wild cards for @north is 0 Sep 21 07:25:33.509371: | counting wild cards for @east is 0 Sep 21 07:25:33.509377: | connect_to_host_pair: 192.1.3.33:500 192.1.2.23:500 -> hp@(nil): none Sep 21 07:25:33.509380: | new hp@0x55799c832720 Sep 21 07:25:33.509383: added connection description "north-eastnets/0x1" Sep 21 07:25:33.509390: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Sep 21 07:25:33.509397: | 192.0.3.0/24===192.1.3.33<192.1.3.33>[@north]...192.1.2.23<192.1.2.23>[@east]===192.0.2.0/24 Sep 21 07:25:33.509402: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:25:33.509407: | spent 0.113 milliseconds in whack Sep 21 07:25:33.509491: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:25:33.509502: add keyid @north Sep 21 07:25:33.509505: | add pubkey 01 03 e5 df 73 b6 3e d5 36 a8 f1 3d 0d d3 02 ab Sep 21 07:25:33.509507: | add pubkey 7f ec 4c 9e 8b 0e 0e d2 cf 0f 59 bf 6d 88 21 86 Sep 21 07:25:33.509508: | add pubkey 93 9e 10 34 af 2d cf b3 7e eb e5 b2 24 b2 a5 b0 Sep 21 07:25:33.509510: | add pubkey 01 03 7d b5 96 ad 66 ee 48 c2 28 d9 9a 76 36 a9 Sep 21 07:25:33.509511: | add pubkey 10 84 b5 09 8f 17 4f 65 ce d8 2f 8e 78 80 8a 87 Sep 21 07:25:33.509513: | add pubkey f4 6b 98 d9 91 94 6b 52 15 5b 9c 47 12 be d8 6f Sep 21 07:25:33.509514: | add pubkey 25 b4 65 38 7e e4 8d c7 f0 58 d3 9f 69 14 cc 3e Sep 21 07:25:33.509515: | add pubkey c8 16 1f af bb 5d 93 2b 33 39 0e 94 55 81 f4 b3 Sep 21 07:25:33.509517: | add pubkey cc 92 58 6e 4a 5a 4e c3 76 ab 04 2e 11 08 06 55 Sep 21 07:25:33.509518: | add pubkey 13 0f 02 6c dd d1 bc c0 b8 8d 65 f5 97 ed fc 18 Sep 21 07:25:33.509519: | add pubkey 39 f9 55 ab fa 0d c5 49 99 7f 1b cf c3 de 99 7d Sep 21 07:25:33.509521: | add pubkey 9e ca 6f 9e 14 d6 5a ff de d6 4f 57 6a 83 ab 51 Sep 21 07:25:33.509522: | add pubkey ba 64 74 e0 22 e9 9a c5 10 71 bb d4 eb a4 99 28 Sep 21 07:25:33.509523: | add pubkey 9c 85 0e 31 ea cc ab ef 98 84 3f 59 c1 75 aa b3 Sep 21 07:25:33.509525: | add pubkey 61 eb 61 8c 58 a5 92 25 84 ad c7 79 f3 87 d0 c7 Sep 21 07:25:33.509526: | add pubkey 83 c2 d6 8a fe 26 9d 2a ff b1 dd 9b 89 21 7c ca Sep 21 07:25:33.509527: | add pubkey f5 38 2d 3f 64 0c 41 9c 34 e9 b2 55 0f 82 1a b3 Sep 21 07:25:33.509533: | add pubkey c7 5e a5 99 Sep 21 07:25:33.509552: | computed rsa CKAID 90 5d fc a1 08 68 74 7c 6f 20 d3 1b 2d 20 4b 8f Sep 21 07:25:33.509554: | computed rsa CKAID 88 aa 7c 5d Sep 21 07:25:33.509559: | keyid: *AQPl33O2P Sep 21 07:25:33.509560: | n e5 df 73 b6 3e d5 36 a8 f1 3d 0d d3 02 ab 7f ec Sep 21 07:25:33.509562: | n 4c 9e 8b 0e 0e d2 cf 0f 59 bf 6d 88 21 86 93 9e Sep 21 07:25:33.509563: | n 10 34 af 2d cf b3 7e eb e5 b2 24 b2 a5 b0 01 03 Sep 21 07:25:33.509565: | n 7d b5 96 ad 66 ee 48 c2 28 d9 9a 76 36 a9 10 84 Sep 21 07:25:33.509566: | n b5 09 8f 17 4f 65 ce d8 2f 8e 78 80 8a 87 f4 6b Sep 21 07:25:33.509567: | n 98 d9 91 94 6b 52 15 5b 9c 47 12 be d8 6f 25 b4 Sep 21 07:25:33.509569: | n 65 38 7e e4 8d c7 f0 58 d3 9f 69 14 cc 3e c8 16 Sep 21 07:25:33.509570: | n 1f af bb 5d 93 2b 33 39 0e 94 55 81 f4 b3 cc 92 Sep 21 07:25:33.509571: | n 58 6e 4a 5a 4e c3 76 ab 04 2e 11 08 06 55 13 0f Sep 21 07:25:33.509573: | n 02 6c dd d1 bc c0 b8 8d 65 f5 97 ed fc 18 39 f9 Sep 21 07:25:33.509574: | n 55 ab fa 0d c5 49 99 7f 1b cf c3 de 99 7d 9e ca Sep 21 07:25:33.509575: | n 6f 9e 14 d6 5a ff de d6 4f 57 6a 83 ab 51 ba 64 Sep 21 07:25:33.509577: | n 74 e0 22 e9 9a c5 10 71 bb d4 eb a4 99 28 9c 85 Sep 21 07:25:33.509578: | n 0e 31 ea cc ab ef 98 84 3f 59 c1 75 aa b3 61 eb Sep 21 07:25:33.509579: | n 61 8c 58 a5 92 25 84 ad c7 79 f3 87 d0 c7 83 c2 Sep 21 07:25:33.509581: | n d6 8a fe 26 9d 2a ff b1 dd 9b 89 21 7c ca f5 38 Sep 21 07:25:33.509582: | n 2d 3f 64 0c 41 9c 34 e9 b2 55 0f 82 1a b3 c7 5e Sep 21 07:25:33.509583: | n a5 99 Sep 21 07:25:33.509585: | e 03 Sep 21 07:25:33.509586: | CKAID 90 5d fc a1 08 68 74 7c 6f 20 d3 1b 2d 20 4b 8f Sep 21 07:25:33.509588: | CKAID 88 aa 7c 5d Sep 21 07:25:33.509594: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:25:33.509598: | spent 0.111 milliseconds in whack Sep 21 07:25:33.509649: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:25:33.509656: add keyid @east Sep 21 07:25:33.509658: | add pubkey 01 03 bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b Sep 21 07:25:33.509660: | add pubkey e5 16 c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 Sep 21 07:25:33.509661: | add pubkey 85 7a e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c Sep 21 07:25:33.509662: | add pubkey 78 ca 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 Sep 21 07:25:33.509664: | add pubkey 21 c9 f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d Sep 21 07:25:33.509665: | add pubkey d2 67 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 Sep 21 07:25:33.509666: | add pubkey 62 cd 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce Sep 21 07:25:33.509668: | add pubkey 62 b5 af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e Sep 21 07:25:33.509669: | add pubkey bb 23 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d Sep 21 07:25:33.509671: | add pubkey ac 47 f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce Sep 21 07:25:33.509672: | add pubkey e0 98 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a Sep 21 07:25:33.509673: | add pubkey 92 b8 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 Sep 21 07:25:33.509675: | add pubkey 4d 58 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 Sep 21 07:25:33.509676: | add pubkey 5f 56 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 Sep 21 07:25:33.509677: | add pubkey d5 f1 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c Sep 21 07:25:33.509679: | add pubkey 47 cc 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 Sep 21 07:25:33.509680: | add pubkey 07 8f 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 Sep 21 07:25:33.509681: | add pubkey 51 51 48 ef Sep 21 07:25:33.509688: | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Sep 21 07:25:33.509689: | computed rsa CKAID 8a 82 25 f1 Sep 21 07:25:33.509692: | keyid: *AQO9bJbr3 Sep 21 07:25:33.509693: | n bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b e5 16 Sep 21 07:25:33.509701: | n c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 85 7a Sep 21 07:25:33.509703: | n e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c 78 ca Sep 21 07:25:33.509704: | n 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 21 c9 Sep 21 07:25:33.509705: | n f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d d2 67 Sep 21 07:25:33.509707: | n 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 62 cd Sep 21 07:25:33.509708: | n 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce 62 b5 Sep 21 07:25:33.509709: | n af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e bb 23 Sep 21 07:25:33.509711: | n 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d ac 47 Sep 21 07:25:33.509712: | n f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce e0 98 Sep 21 07:25:33.509713: | n 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a 92 b8 Sep 21 07:25:33.509715: | n 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 4d 58 Sep 21 07:25:33.509716: | n 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 5f 56 Sep 21 07:25:33.509717: | n 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 d5 f1 Sep 21 07:25:33.509719: | n 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c 47 cc Sep 21 07:25:33.509720: | n 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 07 8f Sep 21 07:25:33.509721: | n 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 51 51 Sep 21 07:25:33.509723: | n 48 ef Sep 21 07:25:33.509724: | e 03 Sep 21 07:25:33.509725: | CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Sep 21 07:25:33.509727: | CKAID 8a 82 25 f1 Sep 21 07:25:33.509732: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:25:33.509735: | spent 0.0901 milliseconds in whack Sep 21 07:25:33.509752: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:25:33.509758: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:25:33.509759: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Sep 21 07:25:33.509761: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:25:33.509762: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Sep 21 07:25:33.509766: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:25:33.509770: | Added new connection north-eastnets/0x2 with policy ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Sep 21 07:25:33.509772: | No AUTH policy was set - defaulting to RSASIG Sep 21 07:25:33.509804: | ike (phase1) algorithm values: AES_CBC_256-HMAC_SHA2_256-MODP2048 Sep 21 07:25:33.509809: | from whack: got --esp=aes128-sha2_512;modp3072 Sep 21 07:25:33.509832: | ESP/AH string values: AES_CBC_128-HMAC_SHA2_512_256-MODP3072 Sep 21 07:25:33.509834: | counting wild cards for @north is 0 Sep 21 07:25:33.509836: | counting wild cards for @east is 0 Sep 21 07:25:33.509840: | find_host_pair: comparing 192.1.3.33:500 to 192.1.2.23:500 but ignoring ports Sep 21 07:25:33.509843: | connect_to_host_pair: 192.1.3.33:500 192.1.2.23:500 -> hp@0x55799c832720: north-eastnets/0x1 Sep 21 07:25:33.509845: added connection description "north-eastnets/0x2" Sep 21 07:25:33.509852: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Sep 21 07:25:33.509858: | 192.0.3.0/24===192.1.3.33<192.1.3.33>[@north]...192.1.2.23<192.1.2.23>[@east]===192.0.22.0/24 Sep 21 07:25:33.509863: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:25:33.509866: | spent 0.0956 milliseconds in whack Sep 21 07:25:33.509927: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:25:33.509939: add keyid @north Sep 21 07:25:33.509942: | unreference key: 0x55799c7c08f0 @north cnt 1-- Sep 21 07:25:33.509945: | add pubkey 01 03 e5 df 73 b6 3e d5 36 a8 f1 3d 0d d3 02 ab Sep 21 07:25:33.509947: | add pubkey 7f ec 4c 9e 8b 0e 0e d2 cf 0f 59 bf 6d 88 21 86 Sep 21 07:25:33.509948: | add pubkey 93 9e 10 34 af 2d cf b3 7e eb e5 b2 24 b2 a5 b0 Sep 21 07:25:33.509949: | add pubkey 01 03 7d b5 96 ad 66 ee 48 c2 28 d9 9a 76 36 a9 Sep 21 07:25:33.509954: | add pubkey 10 84 b5 09 8f 17 4f 65 ce d8 2f 8e 78 80 8a 87 Sep 21 07:25:33.509955: | add pubkey f4 6b 98 d9 91 94 6b 52 15 5b 9c 47 12 be d8 6f Sep 21 07:25:33.509957: | add pubkey 25 b4 65 38 7e e4 8d c7 f0 58 d3 9f 69 14 cc 3e Sep 21 07:25:33.509958: | add pubkey c8 16 1f af bb 5d 93 2b 33 39 0e 94 55 81 f4 b3 Sep 21 07:25:33.509959: | add pubkey cc 92 58 6e 4a 5a 4e c3 76 ab 04 2e 11 08 06 55 Sep 21 07:25:33.509961: | add pubkey 13 0f 02 6c dd d1 bc c0 b8 8d 65 f5 97 ed fc 18 Sep 21 07:25:33.509962: | add pubkey 39 f9 55 ab fa 0d c5 49 99 7f 1b cf c3 de 99 7d Sep 21 07:25:33.509964: | add pubkey 9e ca 6f 9e 14 d6 5a ff de d6 4f 57 6a 83 ab 51 Sep 21 07:25:33.509965: | add pubkey ba 64 74 e0 22 e9 9a c5 10 71 bb d4 eb a4 99 28 Sep 21 07:25:33.509966: | add pubkey 9c 85 0e 31 ea cc ab ef 98 84 3f 59 c1 75 aa b3 Sep 21 07:25:33.509968: | add pubkey 61 eb 61 8c 58 a5 92 25 84 ad c7 79 f3 87 d0 c7 Sep 21 07:25:33.509969: | add pubkey 83 c2 d6 8a fe 26 9d 2a ff b1 dd 9b 89 21 7c ca Sep 21 07:25:33.509970: | add pubkey f5 38 2d 3f 64 0c 41 9c 34 e9 b2 55 0f 82 1a b3 Sep 21 07:25:33.509972: | add pubkey c7 5e a5 99 Sep 21 07:25:33.509979: | computed rsa CKAID 90 5d fc a1 08 68 74 7c 6f 20 d3 1b 2d 20 4b 8f Sep 21 07:25:33.509980: | computed rsa CKAID 88 aa 7c 5d Sep 21 07:25:33.509983: | keyid: *AQPl33O2P Sep 21 07:25:33.509984: | n e5 df 73 b6 3e d5 36 a8 f1 3d 0d d3 02 ab 7f ec Sep 21 07:25:33.509986: | n 4c 9e 8b 0e 0e d2 cf 0f 59 bf 6d 88 21 86 93 9e Sep 21 07:25:33.509987: | n 10 34 af 2d cf b3 7e eb e5 b2 24 b2 a5 b0 01 03 Sep 21 07:25:33.509988: | n 7d b5 96 ad 66 ee 48 c2 28 d9 9a 76 36 a9 10 84 Sep 21 07:25:33.509990: | n b5 09 8f 17 4f 65 ce d8 2f 8e 78 80 8a 87 f4 6b Sep 21 07:25:33.509991: | n 98 d9 91 94 6b 52 15 5b 9c 47 12 be d8 6f 25 b4 Sep 21 07:25:33.509992: | n 65 38 7e e4 8d c7 f0 58 d3 9f 69 14 cc 3e c8 16 Sep 21 07:25:33.509994: | n 1f af bb 5d 93 2b 33 39 0e 94 55 81 f4 b3 cc 92 Sep 21 07:25:33.509995: | n 58 6e 4a 5a 4e c3 76 ab 04 2e 11 08 06 55 13 0f Sep 21 07:25:33.509996: | n 02 6c dd d1 bc c0 b8 8d 65 f5 97 ed fc 18 39 f9 Sep 21 07:25:33.509998: | n 55 ab fa 0d c5 49 99 7f 1b cf c3 de 99 7d 9e ca Sep 21 07:25:33.509999: | n 6f 9e 14 d6 5a ff de d6 4f 57 6a 83 ab 51 ba 64 Sep 21 07:25:33.510001: | n 74 e0 22 e9 9a c5 10 71 bb d4 eb a4 99 28 9c 85 Sep 21 07:25:33.510002: | n 0e 31 ea cc ab ef 98 84 3f 59 c1 75 aa b3 61 eb Sep 21 07:25:33.510003: | n 61 8c 58 a5 92 25 84 ad c7 79 f3 87 d0 c7 83 c2 Sep 21 07:25:33.510005: | n d6 8a fe 26 9d 2a ff b1 dd 9b 89 21 7c ca f5 38 Sep 21 07:25:33.510006: | n 2d 3f 64 0c 41 9c 34 e9 b2 55 0f 82 1a b3 c7 5e Sep 21 07:25:33.510007: | n a5 99 Sep 21 07:25:33.510009: | e 03 Sep 21 07:25:33.510010: | CKAID 90 5d fc a1 08 68 74 7c 6f 20 d3 1b 2d 20 4b 8f Sep 21 07:25:33.510011: | CKAID 88 aa 7c 5d Sep 21 07:25:33.510017: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:25:33.510021: | spent 0.0992 milliseconds in whack Sep 21 07:25:33.510079: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:25:33.510091: add keyid @east Sep 21 07:25:33.510094: | unreference key: 0x55799c7c96c0 @east cnt 1-- Sep 21 07:25:33.510097: | add pubkey 01 03 bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b Sep 21 07:25:33.510098: | add pubkey e5 16 c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 Sep 21 07:25:33.510100: | add pubkey 85 7a e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c Sep 21 07:25:33.510101: | add pubkey 78 ca 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 Sep 21 07:25:33.510102: | add pubkey 21 c9 f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d Sep 21 07:25:33.510104: | add pubkey d2 67 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 Sep 21 07:25:33.510105: | add pubkey 62 cd 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce Sep 21 07:25:33.510106: | add pubkey 62 b5 af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e Sep 21 07:25:33.510111: | add pubkey bb 23 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d Sep 21 07:25:33.510112: | add pubkey ac 47 f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce Sep 21 07:25:33.510113: | add pubkey e0 98 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a Sep 21 07:25:33.510115: | add pubkey 92 b8 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 Sep 21 07:25:33.510116: | add pubkey 4d 58 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 Sep 21 07:25:33.510118: | add pubkey 5f 56 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 Sep 21 07:25:33.510119: | add pubkey d5 f1 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c Sep 21 07:25:33.510120: | add pubkey 47 cc 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 Sep 21 07:25:33.510122: | add pubkey 07 8f 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 Sep 21 07:25:33.510123: | add pubkey 51 51 48 ef Sep 21 07:25:33.510130: | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Sep 21 07:25:33.510131: | computed rsa CKAID 8a 82 25 f1 Sep 21 07:25:33.510134: | keyid: *AQO9bJbr3 Sep 21 07:25:33.510135: | n bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b e5 16 Sep 21 07:25:33.510137: | n c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 85 7a Sep 21 07:25:33.510138: | n e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c 78 ca Sep 21 07:25:33.510139: | n 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 21 c9 Sep 21 07:25:33.510141: | n f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d d2 67 Sep 21 07:25:33.510142: | n 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 62 cd Sep 21 07:25:33.510143: | n 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce 62 b5 Sep 21 07:25:33.510145: | n af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e bb 23 Sep 21 07:25:33.510146: | n 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d ac 47 Sep 21 07:25:33.510147: | n f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce e0 98 Sep 21 07:25:33.510149: | n 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a 92 b8 Sep 21 07:25:33.510150: | n 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 4d 58 Sep 21 07:25:33.510151: | n 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 5f 56 Sep 21 07:25:33.510153: | n 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 d5 f1 Sep 21 07:25:33.510154: | n 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c 47 cc Sep 21 07:25:33.510155: | n 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 07 8f Sep 21 07:25:33.510157: | n 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 51 51 Sep 21 07:25:33.510158: | n 48 ef Sep 21 07:25:33.510159: | e 03 Sep 21 07:25:33.510161: | CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Sep 21 07:25:33.510162: | CKAID 8a 82 25 f1 Sep 21 07:25:33.510168: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:25:33.510172: | spent 0.0977 milliseconds in whack Sep 21 07:25:33.571711: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:25:33.571732: | dup_any(fd@16) -> fd@23 (in whack_process() at rcv_whack.c:590) Sep 21 07:25:33.571736: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:25:33.571739: initiating all conns with alias='north-eastnets' Sep 21 07:25:33.571745: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Sep 21 07:25:33.571751: | start processing: connection "north-eastnets/0x2" (in initiate_a_connection() at initiate.c:186) Sep 21 07:25:33.571755: | connection 'north-eastnets/0x2' +POLICY_UP Sep 21 07:25:33.571759: | dup_any(fd@23) -> fd@24 (in initiate_a_connection() at initiate.c:342) Sep 21 07:25:33.571761: | FOR_EACH_STATE_... in find_phase1_state Sep 21 07:25:33.571776: | creating state object #1 at 0x55799c8680a0 Sep 21 07:25:33.571779: | State DB: adding IKEv2 state #1 in UNDEFINED Sep 21 07:25:33.571793: | pstats #1 ikev2.ike started Sep 21 07:25:33.571796: | Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 Sep 21 07:25:33.571799: | parent state #1: UNDEFINED(ignore) => PARENT_I0(ignore) Sep 21 07:25:33.571803: | Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 Sep 21 07:25:33.571814: | suspend processing: connection "north-eastnets/0x2" (in ikev2_parent_outI1() at ikev2_parent.c:535) Sep 21 07:25:33.571819: | start processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) Sep 21 07:25:33.571822: | dup_any(fd@24) -> fd@25 (in ikev2_parent_outI1() at ikev2_parent.c:551) Sep 21 07:25:33.571825: | Queuing pending IPsec SA negotiating with 192.1.2.23 "north-eastnets/0x2" IKE SA #1 "north-eastnets/0x2" Sep 21 07:25:33.571828: "north-eastnets/0x2" #1: initiating v2 parent SA Sep 21 07:25:33.571841: | constructing local IKE proposals for north-eastnets/0x2 (IKE SA initiator selecting KE) Sep 21 07:25:33.571849: | converting ike_info AES_CBC_256-HMAC_SHA2_256-MODP2048 to ikev2 ... Sep 21 07:25:33.571855: | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_256;INTEG=HMAC_SHA2_256_128;DH=MODP2048 Sep 21 07:25:33.571858: "north-eastnets/0x2": constructed local IKE proposals for north-eastnets/0x2 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_256;INTEG=HMAC_SHA2_256_128;DH=MODP2048 Sep 21 07:25:33.571865: | adding ikev2_outI1 KE work-order 1 for state #1 Sep 21 07:25:33.571868: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55799c867770 Sep 21 07:25:33.571873: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Sep 21 07:25:33.571876: | libevent_malloc: new ptr-libevent@0x55799c8677b0 size 128 Sep 21 07:25:33.571887: | #1 spent 0.129 milliseconds in ikev2_parent_outI1() Sep 21 07:25:33.571889: | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) Sep 21 07:25:33.571892: | RESET processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) Sep 21 07:25:33.571895: | RESET processing: connection "north-eastnets/0x2" (in ikev2_parent_outI1() at ikev2_parent.c:610) Sep 21 07:25:33.571894: | crypto helper 1 resuming Sep 21 07:25:33.571908: | crypto helper 1 starting work-order 1 for state #1 Sep 21 07:25:33.571913: | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 1 Sep 21 07:25:33.571916: | crypto helper is pausing for 1 seconds Sep 21 07:25:33.571897: | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) Sep 21 07:25:33.571955: | start processing: connection "north-eastnets/0x1" (in initiate_a_connection() at initiate.c:186) Sep 21 07:25:33.571959: | connection 'north-eastnets/0x1' +POLICY_UP Sep 21 07:25:33.571962: | dup_any(fd@23) -> fd@26 (in initiate_a_connection() at initiate.c:342) Sep 21 07:25:33.571964: | FOR_EACH_STATE_... in find_phase1_state Sep 21 07:25:33.571968: | Queuing pending IPsec SA negotiating with 192.1.2.23 "north-eastnets/0x1" IKE SA #1 "north-eastnets/0x2" Sep 21 07:25:33.571974: | stop processing: connection "north-eastnets/0x1" (in initiate_a_connection() at initiate.c:349) Sep 21 07:25:33.571976: | close_any(fd@23) (in initiate_connection() at initiate.c:384) Sep 21 07:25:33.571979: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:25:33.571983: | spent 0.27 milliseconds in whack Sep 21 07:25:34.572595: | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 1 time elapsed 1.000679 seconds Sep 21 07:25:34.572616: | (#1) spent 0.648 milliseconds in crypto helper computing work-order 1: ikev2_outI1 KE (pcr) Sep 21 07:25:34.572618: | crypto helper 1 sending results from work-order 1 for state #1 to event queue Sep 21 07:25:34.572621: | scheduling resume sending helper answer for #1 Sep 21 07:25:34.572624: | libevent_malloc: new ptr-libevent@0x7f1e24006900 size 128 Sep 21 07:25:34.572633: | crypto helper 1 waiting (nothing to do) Sep 21 07:25:34.572644: | processing resume sending helper answer for #1 Sep 21 07:25:34.572652: | start processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in resume_handler() at server.c:797) Sep 21 07:25:34.572655: | crypto helper 1 replies to request ID 1 Sep 21 07:25:34.572661: | calling continuation function 0x55799aef2630 Sep 21 07:25:34.572663: | ikev2_parent_outI1_continue for #1 Sep 21 07:25:34.572688: | **emit ISAKMP Message: Sep 21 07:25:34.572690: | initiator cookie: Sep 21 07:25:34.572692: | 87 ec 50 e3 56 d0 d9 73 Sep 21 07:25:34.572693: | responder cookie: Sep 21 07:25:34.572695: | 00 00 00 00 00 00 00 00 Sep 21 07:25:34.572697: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:25:34.572699: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:25:34.572700: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Sep 21 07:25:34.572702: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Sep 21 07:25:34.572704: | Message ID: 0 (0x0) Sep 21 07:25:34.572706: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:25:34.572712: | using existing local IKE proposals for connection north-eastnets/0x2 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_256;INTEG=HMAC_SHA2_256_128;DH=MODP2048 Sep 21 07:25:34.572713: | Emitting ikev2_proposals ... Sep 21 07:25:34.572715: | ***emit IKEv2 Security Association Payload: Sep 21 07:25:34.572717: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:34.572718: | flags: none (0x0) Sep 21 07:25:34.572720: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Sep 21 07:25:34.572722: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:25:34.572724: | ****emit IKEv2 Proposal Substructure Payload: Sep 21 07:25:34.572726: | last proposal: v2_PROPOSAL_LAST (0x0) Sep 21 07:25:34.572727: | prop #: 1 (0x1) Sep 21 07:25:34.572729: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Sep 21 07:25:34.572730: | spi size: 0 (0x0) Sep 21 07:25:34.572732: | # transforms: 4 (0x4) Sep 21 07:25:34.572734: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Sep 21 07:25:34.572735: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:25:34.572737: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:34.572738: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:25:34.572740: | IKEv2 transform ID: AES_CBC (0xc) Sep 21 07:25:34.572742: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:25:34.572743: | ******emit IKEv2 Attribute Substructure Payload: Sep 21 07:25:34.572745: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:25:34.572747: | length/value: 256 (0x100) Sep 21 07:25:34.572749: | emitting length of IKEv2 Transform Substructure Payload: 12 Sep 21 07:25:34.572750: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:25:34.572752: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:34.572753: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:25:34.572754: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Sep 21 07:25:34.572756: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:34.572758: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:25:34.572760: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:25:34.572761: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:25:34.572763: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:34.572764: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:25:34.572766: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Sep 21 07:25:34.572767: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:34.572769: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:25:34.572774: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:25:34.572776: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:25:34.572777: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:25:34.572779: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:25:34.572780: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:25:34.572782: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:34.572794: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:25:34.572796: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:25:34.572797: | emitting length of IKEv2 Proposal Substructure Payload: 44 Sep 21 07:25:34.572799: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Sep 21 07:25:34.572800: | emitting length of IKEv2 Security Association Payload: 48 Sep 21 07:25:34.572802: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Sep 21 07:25:34.572804: | ***emit IKEv2 Key Exchange Payload: Sep 21 07:25:34.572805: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:34.572807: | flags: none (0x0) Sep 21 07:25:34.572808: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:25:34.572810: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) Sep 21 07:25:34.572812: | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' Sep 21 07:25:34.572814: | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload Sep 21 07:25:34.572816: | ikev2 g^x a8 87 4a 8a 1e 83 b7 e7 e7 46 d1 09 5a 10 7f 67 Sep 21 07:25:34.572817: | ikev2 g^x cd 6f 8b 41 5f 0a b6 f9 cb e7 7b b4 5b 90 cd 17 Sep 21 07:25:34.572819: | ikev2 g^x 3c ff 05 dc f0 3c 3f 02 2c 99 4b 6c d4 50 01 94 Sep 21 07:25:34.572820: | ikev2 g^x a8 cf a6 a6 71 39 de 91 5e 9f c2 8f 94 b5 ae 61 Sep 21 07:25:34.572822: | ikev2 g^x a1 46 02 fb 90 e8 ee c7 b1 f5 63 a9 e4 15 f3 d5 Sep 21 07:25:34.572823: | ikev2 g^x ee 1d 64 74 d7 86 65 a9 af c4 0c 6e 45 5f de 4d Sep 21 07:25:34.572824: | ikev2 g^x d9 fa 07 48 5f 7b 7e d6 15 01 61 02 cd 9c 21 b6 Sep 21 07:25:34.572826: | ikev2 g^x 17 f3 67 01 31 8c cb 03 31 c0 79 db e3 a5 52 4e Sep 21 07:25:34.572827: | ikev2 g^x 7f 6a f1 6e f9 6b 92 09 99 58 54 54 43 8d ce 81 Sep 21 07:25:34.572828: | ikev2 g^x b7 20 62 15 9d 8e 34 88 27 6e 4e 3d 3e b5 a4 46 Sep 21 07:25:34.572830: | ikev2 g^x 35 ff ef 41 df d3 02 2d fa a4 77 9b b5 7f b1 a1 Sep 21 07:25:34.572831: | ikev2 g^x e9 e2 14 12 a6 48 1b b1 91 79 c1 d5 fb e7 c9 12 Sep 21 07:25:34.572833: | ikev2 g^x 20 b0 9d 15 d5 ea 0f 62 89 bf e6 f8 6a 5c e2 15 Sep 21 07:25:34.572834: | ikev2 g^x fa 64 4b e2 06 d3 12 1f fe 0a b5 8f b7 67 f4 b4 Sep 21 07:25:34.572835: | ikev2 g^x 76 f1 bd 7b 7b d6 11 8b 95 de 2f 74 2c 46 09 10 Sep 21 07:25:34.572837: | ikev2 g^x 94 04 71 d2 56 60 82 c4 5c 81 ff 05 47 76 e6 bc Sep 21 07:25:34.572838: | emitting length of IKEv2 Key Exchange Payload: 264 Sep 21 07:25:34.572840: | ***emit IKEv2 Nonce Payload: Sep 21 07:25:34.572841: | next payload type: ISAKMP_NEXT_v2N (0x29) Sep 21 07:25:34.572843: | flags: none (0x0) Sep 21 07:25:34.572845: | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N Sep 21 07:25:34.572846: | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Sep 21 07:25:34.572848: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' Sep 21 07:25:34.572851: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Sep 21 07:25:34.572853: | IKEv2 nonce af 14 97 22 97 04 26 fe 49 dd 55 90 da 18 75 62 Sep 21 07:25:34.572854: | IKEv2 nonce b8 26 7e c4 89 0e 06 91 09 0e 79 ba 43 0f 5e 49 Sep 21 07:25:34.572855: | emitting length of IKEv2 Nonce Payload: 36 Sep 21 07:25:34.572857: | Adding a v2N Payload Sep 21 07:25:34.572858: | ***emit IKEv2 Notify Payload: Sep 21 07:25:34.572860: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:34.572861: | flags: none (0x0) Sep 21 07:25:34.572863: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:25:34.572865: | SPI size: 0 (0x0) Sep 21 07:25:34.572866: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Sep 21 07:25:34.572868: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Sep 21 07:25:34.572870: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Sep 21 07:25:34.572871: | emitting length of IKEv2 Notify Payload: 8 Sep 21 07:25:34.572873: | NAT-Traversal support [enabled] add v2N payloads. Sep 21 07:25:34.572875: | natd_hash: rcookie is zero Sep 21 07:25:34.572884: | natd_hash: hasher=0x55799afc87a0(20) Sep 21 07:25:34.572885: | natd_hash: icookie= 87 ec 50 e3 56 d0 d9 73 Sep 21 07:25:34.572887: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Sep 21 07:25:34.572888: | natd_hash: ip= c0 01 03 21 Sep 21 07:25:34.572890: | natd_hash: port= 01 f4 Sep 21 07:25:34.572891: | natd_hash: hash= d2 6d 0e 7f 00 bd 05 44 77 5a 93 b6 20 1d 2d 8a Sep 21 07:25:34.572893: | natd_hash: hash= 2a f6 7c 6b Sep 21 07:25:34.572894: | Adding a v2N Payload Sep 21 07:25:34.572895: | ***emit IKEv2 Notify Payload: Sep 21 07:25:34.572897: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:34.572898: | flags: none (0x0) Sep 21 07:25:34.572900: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:25:34.572901: | SPI size: 0 (0x0) Sep 21 07:25:34.572903: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Sep 21 07:25:34.572904: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Sep 21 07:25:34.572906: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Sep 21 07:25:34.572908: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Sep 21 07:25:34.572909: | Notify data d2 6d 0e 7f 00 bd 05 44 77 5a 93 b6 20 1d 2d 8a Sep 21 07:25:34.572911: | Notify data 2a f6 7c 6b Sep 21 07:25:34.572912: | emitting length of IKEv2 Notify Payload: 28 Sep 21 07:25:34.572914: | natd_hash: rcookie is zero Sep 21 07:25:34.572917: | natd_hash: hasher=0x55799afc87a0(20) Sep 21 07:25:34.572919: | natd_hash: icookie= 87 ec 50 e3 56 d0 d9 73 Sep 21 07:25:34.572920: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Sep 21 07:25:34.572921: | natd_hash: ip= c0 01 02 17 Sep 21 07:25:34.572923: | natd_hash: port= 01 f4 Sep 21 07:25:34.572924: | natd_hash: hash= 8a 6e 8c 31 c3 bd 4e 3f b2 0f 8f 20 7a ba 16 8d Sep 21 07:25:34.572926: | natd_hash: hash= 18 7f 8b 75 Sep 21 07:25:34.572927: | Adding a v2N Payload Sep 21 07:25:34.572928: | ***emit IKEv2 Notify Payload: Sep 21 07:25:34.572930: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:34.572931: | flags: none (0x0) Sep 21 07:25:34.572933: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:25:34.572934: | SPI size: 0 (0x0) Sep 21 07:25:34.572935: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Sep 21 07:25:34.572937: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Sep 21 07:25:34.572939: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Sep 21 07:25:34.572940: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Sep 21 07:25:34.572942: | Notify data 8a 6e 8c 31 c3 bd 4e 3f b2 0f 8f 20 7a ba 16 8d Sep 21 07:25:34.572944: | Notify data 18 7f 8b 75 Sep 21 07:25:34.572946: | emitting length of IKEv2 Notify Payload: 28 Sep 21 07:25:34.572947: | emitting length of ISAKMP Message: 440 Sep 21 07:25:34.572952: | stop processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) Sep 21 07:25:34.572960: | start processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:25:34.572963: | #1 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK Sep 21 07:25:34.572964: | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 Sep 21 07:25:34.572967: | parent state #1: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) Sep 21 07:25:34.572969: | Message ID: updating counters for #1 to 4294967295 after switching state Sep 21 07:25:34.572970: | Message ID: IKE #1 skipping update_recv as MD is fake Sep 21 07:25:34.572974: | Message ID: sent #1 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 Sep 21 07:25:34.572976: "north-eastnets/0x2" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 Sep 21 07:25:34.572987: | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.33:500) Sep 21 07:25:34.572992: | sending 440 bytes for STATE_PARENT_I0 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Sep 21 07:25:34.572994: | 87 ec 50 e3 56 d0 d9 73 00 00 00 00 00 00 00 00 Sep 21 07:25:34.572995: | 21 20 22 08 00 00 00 00 00 00 01 b8 22 00 00 30 Sep 21 07:25:34.572997: | 00 00 00 2c 01 01 00 04 03 00 00 0c 01 00 00 0c Sep 21 07:25:34.572998: | 80 0e 01 00 03 00 00 08 02 00 00 05 03 00 00 08 Sep 21 07:25:34.573000: | 03 00 00 0c 00 00 00 08 04 00 00 0e 28 00 01 08 Sep 21 07:25:34.573002: | 00 0e 00 00 a8 87 4a 8a 1e 83 b7 e7 e7 46 d1 09 Sep 21 07:25:34.573004: | 5a 10 7f 67 cd 6f 8b 41 5f 0a b6 f9 cb e7 7b b4 Sep 21 07:25:34.573006: | 5b 90 cd 17 3c ff 05 dc f0 3c 3f 02 2c 99 4b 6c Sep 21 07:25:34.573008: | d4 50 01 94 a8 cf a6 a6 71 39 de 91 5e 9f c2 8f Sep 21 07:25:34.573010: | 94 b5 ae 61 a1 46 02 fb 90 e8 ee c7 b1 f5 63 a9 Sep 21 07:25:34.573012: | e4 15 f3 d5 ee 1d 64 74 d7 86 65 a9 af c4 0c 6e Sep 21 07:25:34.573013: | 45 5f de 4d d9 fa 07 48 5f 7b 7e d6 15 01 61 02 Sep 21 07:25:34.573015: | cd 9c 21 b6 17 f3 67 01 31 8c cb 03 31 c0 79 db Sep 21 07:25:34.573016: | e3 a5 52 4e 7f 6a f1 6e f9 6b 92 09 99 58 54 54 Sep 21 07:25:34.573017: | 43 8d ce 81 b7 20 62 15 9d 8e 34 88 27 6e 4e 3d Sep 21 07:25:34.573019: | 3e b5 a4 46 35 ff ef 41 df d3 02 2d fa a4 77 9b Sep 21 07:25:34.573020: | b5 7f b1 a1 e9 e2 14 12 a6 48 1b b1 91 79 c1 d5 Sep 21 07:25:34.573021: | fb e7 c9 12 20 b0 9d 15 d5 ea 0f 62 89 bf e6 f8 Sep 21 07:25:34.573023: | 6a 5c e2 15 fa 64 4b e2 06 d3 12 1f fe 0a b5 8f Sep 21 07:25:34.573024: | b7 67 f4 b4 76 f1 bd 7b 7b d6 11 8b 95 de 2f 74 Sep 21 07:25:34.573025: | 2c 46 09 10 94 04 71 d2 56 60 82 c4 5c 81 ff 05 Sep 21 07:25:34.573027: | 47 76 e6 bc 29 00 00 24 af 14 97 22 97 04 26 fe Sep 21 07:25:34.573028: | 49 dd 55 90 da 18 75 62 b8 26 7e c4 89 0e 06 91 Sep 21 07:25:34.573029: | 09 0e 79 ba 43 0f 5e 49 29 00 00 08 00 00 40 2e Sep 21 07:25:34.573031: | 29 00 00 1c 00 00 40 04 d2 6d 0e 7f 00 bd 05 44 Sep 21 07:25:34.573032: | 77 5a 93 b6 20 1d 2d 8a 2a f6 7c 6b 00 00 00 1c Sep 21 07:25:34.573034: | 00 00 40 05 8a 6e 8c 31 c3 bd 4e 3f b2 0f 8f 20 Sep 21 07:25:34.573035: | 7a ba 16 8d 18 7f 8b 75 Sep 21 07:25:34.573063: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Sep 21 07:25:34.573067: | libevent_free: release ptr-libevent@0x55799c8677b0 Sep 21 07:25:34.573070: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55799c867770 Sep 21 07:25:34.573072: | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=50ms Sep 21 07:25:34.573076: | event_schedule: new EVENT_RETRANSMIT-pe@0x55799c867770 Sep 21 07:25:34.573081: | inserting event EVENT_RETRANSMIT, timeout in 0.05 seconds for #1 Sep 21 07:25:34.573084: | libevent_malloc: new ptr-libevent@0x55799c8677b0 size 128 Sep 21 07:25:34.573089: | #1 STATE_PARENT_I1: retransmits: first event in 0.05 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49380.94134 Sep 21 07:25:34.573092: | resume sending helper answer for #1 suppresed complete_v2_state_transition() and stole MD Sep 21 07:25:34.573097: | #1 spent 0.421 milliseconds in resume sending helper answer Sep 21 07:25:34.573102: | stop processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in resume_handler() at server.c:833) Sep 21 07:25:34.573105: | libevent_free: release ptr-libevent@0x7f1e24006900 Sep 21 07:25:34.574711: | spent 0.00217 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:25:34.574736: | *received 440 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Sep 21 07:25:34.574739: | 87 ec 50 e3 56 d0 d9 73 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:34.574741: | 21 20 22 20 00 00 00 00 00 00 01 b8 22 00 00 30 Sep 21 07:25:34.574744: | 00 00 00 2c 01 01 00 04 03 00 00 0c 01 00 00 0c Sep 21 07:25:34.574745: | 80 0e 01 00 03 00 00 08 02 00 00 05 03 00 00 08 Sep 21 07:25:34.574747: | 03 00 00 0c 00 00 00 08 04 00 00 0e 28 00 01 08 Sep 21 07:25:34.574748: | 00 0e 00 00 67 47 fa ac 0e 50 40 6b ef 5e 28 3d Sep 21 07:25:34.574749: | 3a 47 5c 8a 6c 00 30 6e 27 44 8f 94 bf cd bf 14 Sep 21 07:25:34.574751: | 11 25 f5 44 6f 89 10 21 ab c6 15 d9 83 51 41 e3 Sep 21 07:25:34.574752: | 9d 57 4b 89 6a 44 97 04 f9 f1 7d 68 e5 45 51 64 Sep 21 07:25:34.574754: | 34 1e 49 c8 bd 68 61 84 a8 40 ab 89 af 87 22 7f Sep 21 07:25:34.574755: | a7 38 a2 f0 61 cc 24 f9 99 ee 13 22 69 5e f6 05 Sep 21 07:25:34.574756: | 57 55 84 28 bf d9 1e 75 e7 55 56 7c 22 bb f6 54 Sep 21 07:25:34.574758: | a2 4b 87 0d 19 f6 cc cf 32 e5 a0 de 96 0a 5f 11 Sep 21 07:25:34.574759: | ff b6 36 8c 91 ed bd 84 8e e9 cc ec 25 57 c8 f6 Sep 21 07:25:34.574760: | 1c a9 8c d5 f0 21 17 7e 31 65 ec 69 ab 24 c2 07 Sep 21 07:25:34.574762: | 51 4e 61 01 ac 16 88 c0 a0 14 65 13 4c f8 f1 cd Sep 21 07:25:34.574763: | ab c8 bf 94 03 e4 be 73 11 09 62 b6 a2 82 4e 81 Sep 21 07:25:34.574765: | c7 bd 35 a1 8f 10 15 58 03 73 fe 2e 6e 5e be 72 Sep 21 07:25:34.574766: | 6c b2 ac 2d e8 05 a7 b7 1c 7f b5 48 79 ab 8e 4f Sep 21 07:25:34.574767: | 03 be 73 be cb 6b 74 02 db ea 58 c1 10 f6 32 62 Sep 21 07:25:34.574769: | cf 58 22 e7 5f 65 3b 47 de 0a 4a b3 b4 96 b5 7c Sep 21 07:25:34.574770: | c8 f1 f7 67 29 00 00 24 6d e8 ca b3 34 65 eb 2d Sep 21 07:25:34.574771: | 9b b0 b3 3a 89 c3 83 fd 95 3d 3d 6d 6c 31 b3 9c Sep 21 07:25:34.574773: | 04 eb 97 84 03 f4 76 a1 29 00 00 08 00 00 40 2e Sep 21 07:25:34.574774: | 29 00 00 1c 00 00 40 04 87 b1 07 ec 92 37 41 e5 Sep 21 07:25:34.574776: | 60 42 e4 07 59 6b 7b 43 bd a9 6d 34 00 00 00 1c Sep 21 07:25:34.574777: | 00 00 40 05 5e c0 db e9 91 ed 2d 45 c3 cc af 90 Sep 21 07:25:34.574778: | 6e fa e0 84 1d 5c 62 57 Sep 21 07:25:34.574781: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Sep 21 07:25:34.574787: | **parse ISAKMP Message: Sep 21 07:25:34.574791: | initiator cookie: Sep 21 07:25:34.574793: | 87 ec 50 e3 56 d0 d9 73 Sep 21 07:25:34.574795: | responder cookie: Sep 21 07:25:34.574797: | 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:34.574799: | next payload type: ISAKMP_NEXT_v2SA (0x21) Sep 21 07:25:34.574801: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:25:34.574802: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Sep 21 07:25:34.574804: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:25:34.574806: | Message ID: 0 (0x0) Sep 21 07:25:34.574807: | length: 440 (0x1b8) Sep 21 07:25:34.574809: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) Sep 21 07:25:34.574811: | I am the IKE SA Original Initiator receiving an IKEv2 IKE_SA_INIT response Sep 21 07:25:34.574816: | State DB: found IKEv2 state #1 in PARENT_I1 (find_v2_ike_sa_by_initiator_spi) Sep 21 07:25:34.574820: | start processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2016) Sep 21 07:25:34.574823: | [RE]START processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:25:34.574824: | #1 is idle Sep 21 07:25:34.574826: | #1 idle Sep 21 07:25:34.574827: | unpacking clear payload Sep 21 07:25:34.574829: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Sep 21 07:25:34.574831: | ***parse IKEv2 Security Association Payload: Sep 21 07:25:34.574833: | next payload type: ISAKMP_NEXT_v2KE (0x22) Sep 21 07:25:34.574834: | flags: none (0x0) Sep 21 07:25:34.574836: | length: 48 (0x30) Sep 21 07:25:34.574837: | processing payload: ISAKMP_NEXT_v2SA (len=44) Sep 21 07:25:34.574839: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) Sep 21 07:25:34.574841: | ***parse IKEv2 Key Exchange Payload: Sep 21 07:25:34.574842: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Sep 21 07:25:34.574844: | flags: none (0x0) Sep 21 07:25:34.574845: | length: 264 (0x108) Sep 21 07:25:34.574847: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:25:34.574848: | processing payload: ISAKMP_NEXT_v2KE (len=256) Sep 21 07:25:34.574850: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Sep 21 07:25:34.574851: | ***parse IKEv2 Nonce Payload: Sep 21 07:25:34.574853: | next payload type: ISAKMP_NEXT_v2N (0x29) Sep 21 07:25:34.574854: | flags: none (0x0) Sep 21 07:25:34.574855: | length: 36 (0x24) Sep 21 07:25:34.574857: | processing payload: ISAKMP_NEXT_v2Ni (len=32) Sep 21 07:25:34.574858: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Sep 21 07:25:34.574860: | ***parse IKEv2 Notify Payload: Sep 21 07:25:34.574862: | next payload type: ISAKMP_NEXT_v2N (0x29) Sep 21 07:25:34.574863: | flags: none (0x0) Sep 21 07:25:34.574864: | length: 8 (0x8) Sep 21 07:25:34.574866: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:25:34.574867: | SPI size: 0 (0x0) Sep 21 07:25:34.574869: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Sep 21 07:25:34.574871: | processing payload: ISAKMP_NEXT_v2N (len=0) Sep 21 07:25:34.574872: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Sep 21 07:25:34.574874: | ***parse IKEv2 Notify Payload: Sep 21 07:25:34.574875: | next payload type: ISAKMP_NEXT_v2N (0x29) Sep 21 07:25:34.574876: | flags: none (0x0) Sep 21 07:25:34.574878: | length: 28 (0x1c) Sep 21 07:25:34.574879: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:25:34.574881: | SPI size: 0 (0x0) Sep 21 07:25:34.574882: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Sep 21 07:25:34.574884: | processing payload: ISAKMP_NEXT_v2N (len=20) Sep 21 07:25:34.574885: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Sep 21 07:25:34.574887: | ***parse IKEv2 Notify Payload: Sep 21 07:25:34.574888: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:34.574889: | flags: none (0x0) Sep 21 07:25:34.574891: | length: 28 (0x1c) Sep 21 07:25:34.574892: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:25:34.574894: | SPI size: 0 (0x0) Sep 21 07:25:34.574895: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Sep 21 07:25:34.574896: | processing payload: ISAKMP_NEXT_v2N (len=20) Sep 21 07:25:34.574898: | State DB: re-hashing IKEv2 state #1 IKE SPIi and SPI[ir] Sep 21 07:25:34.574902: | #1 in state PARENT_I1: sent v2I1, expected v2R1 Sep 21 07:25:34.574904: | selected state microcode Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH Sep 21 07:25:34.574905: | Now let's proceed with state specific processing Sep 21 07:25:34.574907: | calling processor Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH Sep 21 07:25:34.574910: | ikev2 parent inR1: calculating g^{xy} in order to send I2 Sep 21 07:25:34.574914: | using existing local IKE proposals for connection north-eastnets/0x2 (IKE SA initiator accepting remote proposal): 1:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_256;INTEG=HMAC_SHA2_256_128;DH=MODP2048 Sep 21 07:25:34.574917: | Comparing remote proposals against IKE initiator (accepting) 1 local proposals Sep 21 07:25:34.574920: | local proposal 1 type ENCR has 1 transforms Sep 21 07:25:34.574921: | local proposal 1 type PRF has 1 transforms Sep 21 07:25:34.574923: | local proposal 1 type INTEG has 1 transforms Sep 21 07:25:34.574924: | local proposal 1 type DH has 1 transforms Sep 21 07:25:34.574926: | local proposal 1 type ESN has 0 transforms Sep 21 07:25:34.574928: | local proposal 1 transforms: required: ENCR+PRF+INTEG+DH; optional: none Sep 21 07:25:34.574930: | ****parse IKEv2 Proposal Substructure Payload: Sep 21 07:25:34.574931: | last proposal: v2_PROPOSAL_LAST (0x0) Sep 21 07:25:34.574933: | length: 44 (0x2c) Sep 21 07:25:34.574934: | prop #: 1 (0x1) Sep 21 07:25:34.574936: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Sep 21 07:25:34.574937: | spi size: 0 (0x0) Sep 21 07:25:34.574939: | # transforms: 4 (0x4) Sep 21 07:25:34.574941: | Comparing remote proposal 1 containing 4 transforms against local proposal [1..1] of 1 local proposals Sep 21 07:25:34.574943: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:25:34.574944: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:34.574946: | length: 12 (0xc) Sep 21 07:25:34.574947: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:25:34.574949: | IKEv2 transform ID: AES_CBC (0xc) Sep 21 07:25:34.574950: | ******parse IKEv2 Attribute Substructure Payload: Sep 21 07:25:34.574952: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:25:34.574954: | length/value: 256 (0x100) Sep 21 07:25:34.574956: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 1 type 1 (ENCR) transform 0 Sep 21 07:25:34.574958: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:25:34.574959: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:34.574961: | length: 8 (0x8) Sep 21 07:25:34.574962: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:25:34.574964: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Sep 21 07:25:34.574966: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_256) matches local proposal 1 type 2 (PRF) transform 0 Sep 21 07:25:34.574968: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:25:34.574969: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:34.574970: | length: 8 (0x8) Sep 21 07:25:34.574972: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:25:34.574973: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Sep 21 07:25:34.574976: | remote proposal 1 transform 2 (INTEG=HMAC_SHA2_256_128) matches local proposal 1 type 3 (INTEG) transform 0 Sep 21 07:25:34.574977: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:25:34.574979: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:25:34.574980: | length: 8 (0x8) Sep 21 07:25:34.574981: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:25:34.574983: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:25:34.574985: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Sep 21 07:25:34.574987: | remote proposal 1 proposed transforms: ENCR+PRF+INTEG+DH; matched: ENCR+PRF+INTEG+DH; unmatched: none Sep 21 07:25:34.574990: | comparing remote proposal 1 containing ENCR+PRF+INTEG+DH transforms to local proposal 1; required: ENCR+PRF+INTEG+DH; optional: none; matched: ENCR+PRF+INTEG+DH Sep 21 07:25:34.574992: | remote proposal 1 matches local proposal 1 Sep 21 07:25:34.574994: | remote accepted the proposal 1:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_256;INTEG=HMAC_SHA2_256_128;DH=MODP2048[first-match] Sep 21 07:25:34.574995: | converting proposal to internal trans attrs Sep 21 07:25:34.575006: | natd_hash: hasher=0x55799afc87a0(20) Sep 21 07:25:34.575008: | natd_hash: icookie= 87 ec 50 e3 56 d0 d9 73 Sep 21 07:25:34.575009: | natd_hash: rcookie= 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:34.575011: | natd_hash: ip= c0 01 03 21 Sep 21 07:25:34.575013: | natd_hash: port= 01 f4 Sep 21 07:25:34.575015: | natd_hash: hash= 5e c0 db e9 91 ed 2d 45 c3 cc af 90 6e fa e0 84 Sep 21 07:25:34.575016: | natd_hash: hash= 1d 5c 62 57 Sep 21 07:25:34.575020: | natd_hash: hasher=0x55799afc87a0(20) Sep 21 07:25:34.575022: | natd_hash: icookie= 87 ec 50 e3 56 d0 d9 73 Sep 21 07:25:34.575023: | natd_hash: rcookie= 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:34.575024: | natd_hash: ip= c0 01 02 17 Sep 21 07:25:34.575026: | natd_hash: port= 01 f4 Sep 21 07:25:34.575027: | natd_hash: hash= 87 b1 07 ec 92 37 41 e5 60 42 e4 07 59 6b 7b 43 Sep 21 07:25:34.575029: | natd_hash: hash= bd a9 6d 34 Sep 21 07:25:34.575030: | NAT_TRAVERSAL encaps using auto-detect Sep 21 07:25:34.575032: | NAT_TRAVERSAL this end is NOT behind NAT Sep 21 07:25:34.575033: | NAT_TRAVERSAL that end is NOT behind NAT Sep 21 07:25:34.575035: | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 Sep 21 07:25:34.575037: | offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_256 integ=HMAC_SHA2_256_128 cipherkey=AES_CBC Sep 21 07:25:34.575040: | adding ikev2_inR1outI2 KE work-order 2 for state #1 Sep 21 07:25:34.575041: | state #1 requesting EVENT_RETRANSMIT to be deleted Sep 21 07:25:34.575044: | #1 STATE_PARENT_I1: retransmits: cleared Sep 21 07:25:34.575046: | libevent_free: release ptr-libevent@0x55799c8677b0 Sep 21 07:25:34.575047: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55799c867770 Sep 21 07:25:34.575049: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55799c867770 Sep 21 07:25:34.575052: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Sep 21 07:25:34.575053: | libevent_malloc: new ptr-libevent@0x55799c8677b0 size 128 Sep 21 07:25:34.575062: | #1 spent 0.151 milliseconds in processing: Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH in ikev2_process_state_packet() Sep 21 07:25:34.575067: | crypto helper 3 resuming Sep 21 07:25:34.575068: | [RE]START processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:25:34.575075: | crypto helper 3 starting work-order 2 for state #1 Sep 21 07:25:34.575082: | #1 complete_v2_state_transition() PARENT_I1->PARENT_I2 with status STF_SUSPEND Sep 21 07:25:34.575087: | crypto helper 3 doing compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 Sep 21 07:25:34.575088: | suspending state #1 and saving MD Sep 21 07:25:34.575091: | crypto helper is pausing for 1 seconds Sep 21 07:25:34.575094: | #1 is busy; has a suspended MD Sep 21 07:25:34.575105: | [RE]START processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in log_stf_suspend() at ikev2.c:3266) Sep 21 07:25:34.575107: | "north-eastnets/0x2" #1 complete v2 state STATE_PARENT_I1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3448 Sep 21 07:25:34.575110: | stop processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2018) Sep 21 07:25:34.575113: | #1 spent 0.383 milliseconds in ikev2_process_packet() Sep 21 07:25:34.575115: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Sep 21 07:25:34.575117: | processing: STOP state #0 (in process_md() at demux.c:382) Sep 21 07:25:34.575119: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:25:34.575121: | spent 0.392 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:25:35.576181: | calculating skeyseed using prf=sha2_256 integ=sha2_256 cipherkey-size=32 salt-size=0 Sep 21 07:25:35.576963: | crypto helper 3 finished compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 time elapsed 1.001874 seconds Sep 21 07:25:35.576976: | (#1) spent 1.56 milliseconds in crypto helper computing work-order 2: ikev2_inR1outI2 KE (pcr) Sep 21 07:25:35.576979: | crypto helper 3 sending results from work-order 2 for state #1 to event queue Sep 21 07:25:35.576982: | scheduling resume sending helper answer for #1 Sep 21 07:25:35.576986: | libevent_malloc: new ptr-libevent@0x7f1e1c003060 size 128 Sep 21 07:25:35.576995: | crypto helper 3 waiting (nothing to do) Sep 21 07:25:35.577009: | processing resume sending helper answer for #1 Sep 21 07:25:35.577017: | start processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in resume_handler() at server.c:797) Sep 21 07:25:35.577020: | crypto helper 3 replies to request ID 2 Sep 21 07:25:35.577022: | calling continuation function 0x55799aef2630 Sep 21 07:25:35.577025: | ikev2_parent_inR1outI2_continue for #1: calculating g^{xy}, sending I2 Sep 21 07:25:35.577032: | creating state object #2 at 0x55799c86bed0 Sep 21 07:25:35.577035: | State DB: adding IKEv2 state #2 in UNDEFINED Sep 21 07:25:35.577039: | pstats #2 ikev2.child started Sep 21 07:25:35.577042: | duplicating state object #1 "north-eastnets/0x2" as #2 for IPSEC SA Sep 21 07:25:35.577047: | #2 setting local endpoint to 192.1.3.33:500 from #1.st_localport (in duplicate_state() at state.c:1481) Sep 21 07:25:35.577053: | Message ID: init_child #1.#2; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1 Sep 21 07:25:35.577058: | Message ID: switch-from #1 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=0->-1 wip.responder=-1 Sep 21 07:25:35.577063: | Message ID: switch-to #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->0 wip.responder=-1 Sep 21 07:25:35.577066: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Sep 21 07:25:35.577069: | libevent_free: release ptr-libevent@0x55799c8677b0 Sep 21 07:25:35.577071: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55799c867770 Sep 21 07:25:35.577074: | event_schedule: new EVENT_SA_REPLACE-pe@0x55799c867770 Sep 21 07:25:35.577078: | inserting event EVENT_SA_REPLACE, timeout in 60 seconds for #1 Sep 21 07:25:35.577080: | libevent_malloc: new ptr-libevent@0x55799c8677b0 size 128 Sep 21 07:25:35.577084: | parent state #1: PARENT_I1(half-open IKE SA) => PARENT_I2(open IKE SA) Sep 21 07:25:35.577090: | **emit ISAKMP Message: Sep 21 07:25:35.577093: | initiator cookie: Sep 21 07:25:35.577095: | 87 ec 50 e3 56 d0 d9 73 Sep 21 07:25:35.577098: | responder cookie: Sep 21 07:25:35.577100: | 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:35.577103: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:25:35.577105: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:25:35.577108: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:25:35.577111: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Sep 21 07:25:35.577113: | Message ID: 1 (0x1) Sep 21 07:25:35.577116: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:25:35.577119: | ***emit IKEv2 Encryption Payload: Sep 21 07:25:35.577122: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:35.577124: | flags: none (0x0) Sep 21 07:25:35.577127: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Sep 21 07:25:35.577130: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' Sep 21 07:25:35.577133: | emitting 16 zero bytes of IV into IKEv2 Encryption Payload Sep 21 07:25:35.577140: | IKEv2 CERT: send a certificate? Sep 21 07:25:35.577142: | IKEv2 CERT: no certificate to send Sep 21 07:25:35.577145: | IDr payload will be sent Sep 21 07:25:35.577157: | ****emit IKEv2 Identification - Initiator - Payload: Sep 21 07:25:35.577160: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:35.577162: | flags: none (0x0) Sep 21 07:25:35.577164: | ID type: ID_FQDN (0x2) Sep 21 07:25:35.577167: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Initiator - Payload (35:ISAKMP_NEXT_v2IDi) Sep 21 07:25:35.577170: | next payload chain: saving location 'IKEv2 Identification - Initiator - Payload'.'next payload type' in 'reply packet' Sep 21 07:25:35.577173: | emitting 5 raw bytes of my identity into IKEv2 Identification - Initiator - Payload Sep 21 07:25:35.577178: | my identity 6e 6f 72 74 68 Sep 21 07:25:35.577180: | emitting length of IKEv2 Identification - Initiator - Payload: 13 Sep 21 07:25:35.577187: | ****emit IKEv2 Identification - Responder - Payload: Sep 21 07:25:35.577190: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) Sep 21 07:25:35.577192: | flags: none (0x0) Sep 21 07:25:35.577194: | ID type: ID_FQDN (0x2) Sep 21 07:25:35.577197: | next payload chain: ignoring supplied 'IKEv2 Identification - Responder - Payload'.'next payload type' value 39:ISAKMP_NEXT_v2AUTH Sep 21 07:25:35.577200: | next payload chain: setting previous 'IKEv2 Identification - Initiator - Payload'.'next payload type' to current IKEv2 Identification - Responder - Payload (36:ISAKMP_NEXT_v2IDr) Sep 21 07:25:35.577203: | next payload chain: saving location 'IKEv2 Identification - Responder - Payload'.'next payload type' in 'reply packet' Sep 21 07:25:35.577206: | emitting 4 raw bytes of IDr into IKEv2 Identification - Responder - Payload Sep 21 07:25:35.577208: | IDr 65 61 73 74 Sep 21 07:25:35.577210: | emitting length of IKEv2 Identification - Responder - Payload: 12 Sep 21 07:25:35.577213: | not sending INITIAL_CONTACT Sep 21 07:25:35.577215: | ****emit IKEv2 Authentication Payload: Sep 21 07:25:35.577218: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:35.577220: | flags: none (0x0) Sep 21 07:25:35.577223: | auth method: IKEv2_AUTH_RSA (0x1) Sep 21 07:25:35.577226: | next payload chain: setting previous 'IKEv2 Identification - Responder - Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH) Sep 21 07:25:35.577228: | next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet' Sep 21 07:25:35.577234: | started looking for secret for @north->@east of kind PKK_RSA Sep 21 07:25:35.577237: | actually looking for secret for @north->@east of kind PKK_RSA Sep 21 07:25:35.577240: | line 1: key type PKK_RSA(@north) to type PKK_RSA Sep 21 07:25:35.577243: | 1: compared key (none) to @north / @east -> 002 Sep 21 07:25:35.577247: | 2: compared key (none) to @north / @east -> 002 Sep 21 07:25:35.577249: | line 1: match=002 Sep 21 07:25:35.577252: | match 002 beats previous best_match 000 match=0x55799c85b260 (line=1) Sep 21 07:25:35.577255: | concluding with best_match=002 best=0x55799c85b260 (lineno=1) Sep 21 07:25:35.582737: | #1 spent 5.15 milliseconds in ikev2_calculate_rsa_hash() calling sign_hash_RSA() Sep 21 07:25:35.582751: | emitting 274 raw bytes of rsa signature into IKEv2 Authentication Payload Sep 21 07:25:35.582754: | rsa signature ad de 47 fa 28 c2 12 c9 6d c0 65 9f 63 18 51 db Sep 21 07:25:35.582757: | rsa signature a4 96 cc 21 03 75 6f ec 4e ad 8a d7 17 7c 8f 04 Sep 21 07:25:35.582759: | rsa signature ea 48 17 0a 24 67 25 cb e8 13 ee f2 b5 af 59 7f Sep 21 07:25:35.582762: | rsa signature 34 fa 3f 69 9f ad 09 91 d2 a5 51 e6 84 94 20 a7 Sep 21 07:25:35.582764: | rsa signature 68 a2 52 a9 48 95 66 aa 5d 5d 2d 14 5a 55 ac 9b Sep 21 07:25:35.582767: | rsa signature a0 5e e2 af 32 73 7a bf 7c f2 b8 ed ab 54 16 41 Sep 21 07:25:35.582769: | rsa signature 5f 0e 2e 25 cb c0 12 8b 26 10 98 eb b3 39 4c 3d Sep 21 07:25:35.582771: | rsa signature 41 f9 0e 36 21 81 9e 9d 36 ed 08 fc 45 da 7f ca Sep 21 07:25:35.582774: | rsa signature fe ae b8 b8 90 7a dd 7c 14 cf 7d 90 d1 12 ac 05 Sep 21 07:25:35.582776: | rsa signature 01 a0 81 da e8 e1 8d b2 3f 04 5f ea f9 5f 63 13 Sep 21 07:25:35.582778: | rsa signature 30 dc cb 31 68 cb 13 94 6a 95 8c e7 24 e1 7d c1 Sep 21 07:25:35.582781: | rsa signature e8 58 80 30 3c 77 ca 99 4f b7 5e 6c 6b b2 10 cc Sep 21 07:25:35.582786: | rsa signature 1b 6f 8e 84 5b 40 c8 1d f2 43 b4 dc e7 25 0e 61 Sep 21 07:25:35.582790: | rsa signature be eb 18 eb 00 e6 bf 93 3c e7 97 41 85 a5 74 9d Sep 21 07:25:35.582793: | rsa signature 59 59 0b 5e a9 c0 ff 9a 17 62 d8 46 10 12 9c 6b Sep 21 07:25:35.582795: | rsa signature 04 3e 2f 24 35 89 32 4e e9 41 ea 6c 2f c2 a4 6d Sep 21 07:25:35.582801: | rsa signature 8a fe a5 8a bf 73 cd 22 49 66 d1 d3 e7 f2 b6 2b Sep 21 07:25:35.582803: | rsa signature 5f b0 Sep 21 07:25:35.582808: | #1 spent 5.26 milliseconds in ikev2_calculate_rsa_hash() Sep 21 07:25:35.582811: | emitting length of IKEv2 Authentication Payload: 282 Sep 21 07:25:35.582814: | getting first pending from state #1 Sep 21 07:25:35.582818: | Switching Child connection for #2 to "north-eastnets/0x1" from "north-eastnets/0x2" Sep 21 07:25:35.582824: | in connection_discard for connection north-eastnets/0x2 Sep 21 07:25:35.582842: | netlink_get_spi: allocated 0x5af53a14 for esp.0@192.1.3.33 Sep 21 07:25:35.582846: | constructing ESP/AH proposals with all DH removed for north-eastnets/0x1 (IKE SA initiator emitting ESP/AH proposals) Sep 21 07:25:35.582851: | converting proposal AES_CBC_128-HMAC_SHA2_512_256-MODP3072 to ikev2 ... Sep 21 07:25:35.582858: | ... ikev2_proposal: 1:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256;DH=NONE;ESN=DISABLED Sep 21 07:25:35.582863: "north-eastnets/0x1": constructed local ESP/AH proposals for north-eastnets/0x1 (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256;DH=NONE;ESN=DISABLED Sep 21 07:25:35.583052: | Emitting ikev2_proposals ... Sep 21 07:25:35.583058: | ****emit IKEv2 Security Association Payload: Sep 21 07:25:35.583062: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:35.583064: | flags: none (0x0) Sep 21 07:25:35.583068: | next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Sep 21 07:25:35.583071: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:25:35.583074: | discarding DH=NONE Sep 21 07:25:35.583076: | *****emit IKEv2 Proposal Substructure Payload: Sep 21 07:25:35.583079: | last proposal: v2_PROPOSAL_LAST (0x0) Sep 21 07:25:35.583082: | prop #: 1 (0x1) Sep 21 07:25:35.583084: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Sep 21 07:25:35.583086: | spi size: 4 (0x4) Sep 21 07:25:35.583089: | # transforms: 3 (0x3) Sep 21 07:25:35.583092: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Sep 21 07:25:35.583095: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Sep 21 07:25:35.583097: | our spi 5a f5 3a 14 Sep 21 07:25:35.583100: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:25:35.583102: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:35.583105: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:25:35.583107: | IKEv2 transform ID: AES_CBC (0xc) Sep 21 07:25:35.583110: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:25:35.583113: | *******emit IKEv2 Attribute Substructure Payload: Sep 21 07:25:35.583115: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:25:35.583118: | length/value: 128 (0x80) Sep 21 07:25:35.583120: | emitting length of IKEv2 Transform Substructure Payload: 12 Sep 21 07:25:35.583123: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:25:35.583125: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:35.583128: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:25:35.583130: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Sep 21 07:25:35.583133: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:35.583136: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:25:35.583138: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:25:35.583140: | discarding DH=NONE Sep 21 07:25:35.583143: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:25:35.583148: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:25:35.583150: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Sep 21 07:25:35.583153: | IKEv2 transform ID: ESN_DISABLED (0x0) Sep 21 07:25:35.583156: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:35.583158: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:25:35.583161: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:25:35.583163: | emitting length of IKEv2 Proposal Substructure Payload: 40 Sep 21 07:25:35.583166: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Sep 21 07:25:35.583168: | emitting length of IKEv2 Security Association Payload: 44 Sep 21 07:25:35.583171: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Sep 21 07:25:35.583175: | ****emit IKEv2 Traffic Selector - Initiator - Payload: Sep 21 07:25:35.583177: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:35.583180: | flags: none (0x0) Sep 21 07:25:35.583182: | number of TS: 1 (0x1) Sep 21 07:25:35.583185: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) Sep 21 07:25:35.583312: | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' Sep 21 07:25:35.583316: | *****emit IKEv2 Traffic Selector: Sep 21 07:25:35.583319: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Sep 21 07:25:35.583321: | IP Protocol ID: 0 (0x0) Sep 21 07:25:35.583324: | start port: 0 (0x0) Sep 21 07:25:35.583326: | end port: 65535 (0xffff) Sep 21 07:25:35.583329: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Sep 21 07:25:35.583332: | IP start c0 00 03 00 Sep 21 07:25:35.583334: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Sep 21 07:25:35.583336: | IP end c0 00 03 ff Sep 21 07:25:35.583339: | emitting length of IKEv2 Traffic Selector: 16 Sep 21 07:25:35.583341: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 Sep 21 07:25:35.583344: | ****emit IKEv2 Traffic Selector - Responder - Payload: Sep 21 07:25:35.583346: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:35.583348: | flags: none (0x0) Sep 21 07:25:35.583351: | number of TS: 1 (0x1) Sep 21 07:25:35.583354: | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) Sep 21 07:25:35.583357: | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' Sep 21 07:25:35.583359: | *****emit IKEv2 Traffic Selector: Sep 21 07:25:35.583361: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Sep 21 07:25:35.583364: | IP Protocol ID: 0 (0x0) Sep 21 07:25:35.583366: | start port: 0 (0x0) Sep 21 07:25:35.583368: | end port: 65535 (0xffff) Sep 21 07:25:35.583371: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Sep 21 07:25:35.583373: | IP start c0 00 02 00 Sep 21 07:25:35.583376: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Sep 21 07:25:35.583378: | IP end c0 00 02 ff Sep 21 07:25:35.583380: | emitting length of IKEv2 Traffic Selector: 16 Sep 21 07:25:35.583383: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 Sep 21 07:25:35.583385: | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE Sep 21 07:25:35.583388: | Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED Sep 21 07:25:35.583391: | adding 1 bytes of padding (including 1 byte padding-length) Sep 21 07:25:35.583394: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:35.583399: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Sep 21 07:25:35.583402: | emitting length of IKEv2 Encryption Payload: 436 Sep 21 07:25:35.583404: | emitting length of ISAKMP Message: 464 Sep 21 07:25:35.583447: | data being hmac: 87 ec 50 e3 56 d0 d9 73 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:35.583450: | data being hmac: 2e 20 23 08 00 00 00 01 00 00 01 d0 23 00 01 b4 Sep 21 07:25:35.583453: | data being hmac: 70 4b 41 9c 49 3c c4 41 8c aa dc e5 ef ea 03 f5 Sep 21 07:25:35.583455: | data being hmac: 44 1c 8c 0d d3 15 31 e4 72 db ed 3e ce 0f 34 3c Sep 21 07:25:35.583494: | data being hmac: ea 17 86 c5 1f 66 82 6d f8 24 05 d1 b8 51 40 e7 Sep 21 07:25:35.583497: | data being hmac: 74 1b e7 db b4 4e 5c 83 2e 65 76 a1 fb b9 8d 5d Sep 21 07:25:35.583499: | data being hmac: 12 89 8a ab a9 13 5e 14 f8 7d 23 10 49 57 b7 d7 Sep 21 07:25:35.583501: | data being hmac: 7f cd c4 bc 4e 11 ca f1 fa 3e 24 5b e7 e1 3c 39 Sep 21 07:25:35.583504: | data being hmac: 7b 5e 18 36 22 23 16 fd 3a 17 39 d0 40 1b 9c 83 Sep 21 07:25:35.583506: | data being hmac: dd e5 36 8e b6 ad fa db f2 0c 1f 1c ce 0b 0a 82 Sep 21 07:25:35.583508: | data being hmac: 1c c1 66 58 27 80 6b cd 79 4f bd be 80 10 72 0a Sep 21 07:25:35.583511: | data being hmac: 7e 38 b6 61 dc d6 b2 e4 f5 88 ed 76 d7 da b5 af Sep 21 07:25:35.583513: | data being hmac: 24 e6 53 0d d5 0c 08 f6 a8 3a 28 f6 1d 01 bb 29 Sep 21 07:25:35.583515: | data being hmac: 0c 04 6f 68 a4 df de f7 39 7f c7 57 83 af 99 d5 Sep 21 07:25:35.583517: | data being hmac: f7 c5 da ba 4b 98 77 99 67 f2 47 5a 79 35 32 bf Sep 21 07:25:35.583520: | data being hmac: df ad 12 7f 98 2f fd aa 17 e4 3b 0d a1 ba 82 06 Sep 21 07:25:35.583522: | data being hmac: 94 af 27 6c 15 53 17 4f 50 f1 f7 92 a6 50 2e 7f Sep 21 07:25:35.583524: | data being hmac: 19 bf 50 ab 10 8b 93 90 b2 db df 37 28 cf 1e d6 Sep 21 07:25:35.583527: | data being hmac: 9d be f6 8a f8 30 b9 b9 e0 c6 3f 22 4a c0 8d 82 Sep 21 07:25:35.583529: | data being hmac: e8 42 d2 5c 2a f4 2b 64 27 9a 91 93 3f 68 2d f1 Sep 21 07:25:35.583531: | data being hmac: cf b6 7a 96 0b 55 78 80 3f a7 5c 14 4e 3b 17 ab Sep 21 07:25:35.583533: | data being hmac: 0b 52 b5 f7 8c 85 5a f9 16 e9 0a 36 2b 7b b4 44 Sep 21 07:25:35.583536: | data being hmac: 68 8b b7 d4 7f 36 45 1a e7 7e b7 08 d0 08 1a 51 Sep 21 07:25:35.583538: | data being hmac: db 79 7f f0 bc 2a d1 4b 4f 3a 22 0b 83 03 19 cb Sep 21 07:25:35.583540: | data being hmac: e8 06 fb fb 0a 7b 3b 9e 2f 62 7c a5 e4 e7 1a 33 Sep 21 07:25:35.583543: | data being hmac: 58 52 5d dd 35 7b cb cb c7 e5 9f 69 a6 e6 af 13 Sep 21 07:25:35.583545: | data being hmac: 4d c3 fb a2 b4 54 7a 35 f9 09 e8 0f 1e eb b2 4d Sep 21 07:25:35.583547: | data being hmac: da 4d 21 e9 e1 15 9e f5 63 6a f0 bb da 0a 38 dd Sep 21 07:25:35.583550: | out calculated auth: Sep 21 07:25:35.583552: | d7 37 af 9e 23 c4 d7 2b 7e 48 25 64 aa 40 f3 54 Sep 21 07:25:35.583561: | suspend processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:25:35.583566: | start processing: state #2 connection "north-eastnets/0x1" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:25:35.583570: | #2 complete_v2_state_transition() md.from_state=PARENT_I1 md.svm.state[from]=PARENT_I1 UNDEFINED->PARENT_I2 with status STF_OK Sep 21 07:25:35.583573: | IKEv2: transition from state STATE_PARENT_I1 to state STATE_PARENT_I2 Sep 21 07:25:35.583577: | child state #2: UNDEFINED(ignore) => PARENT_I2(open IKE SA) Sep 21 07:25:35.583580: | Message ID: updating counters for #2 to 0 after switching state Sep 21 07:25:35.583585: | Message ID: recv #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1->0 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=-1 Sep 21 07:25:35.583590: | Message ID: sent #1.#2 request 1; ike: initiator.sent=0->1 initiator.recv=0 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->1 wip.responder=-1 Sep 21 07:25:35.583597: "north-eastnets/0x1" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_CBC_256 integ=HMAC_SHA2_256_128 prf=HMAC_SHA2_256 group=MODP2048} Sep 21 07:25:35.583696: | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.33:500) Sep 21 07:25:35.583704: | sending 464 bytes for STATE_PARENT_I1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Sep 21 07:25:35.583707: | 87 ec 50 e3 56 d0 d9 73 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:35.583709: | 2e 20 23 08 00 00 00 01 00 00 01 d0 23 00 01 b4 Sep 21 07:25:35.583712: | 70 4b 41 9c 49 3c c4 41 8c aa dc e5 ef ea 03 f5 Sep 21 07:25:35.583714: | 44 1c 8c 0d d3 15 31 e4 72 db ed 3e ce 0f 34 3c Sep 21 07:25:35.583716: | ea 17 86 c5 1f 66 82 6d f8 24 05 d1 b8 51 40 e7 Sep 21 07:25:35.583718: | 74 1b e7 db b4 4e 5c 83 2e 65 76 a1 fb b9 8d 5d Sep 21 07:25:35.583721: | 12 89 8a ab a9 13 5e 14 f8 7d 23 10 49 57 b7 d7 Sep 21 07:25:35.583723: | 7f cd c4 bc 4e 11 ca f1 fa 3e 24 5b e7 e1 3c 39 Sep 21 07:25:35.583725: | 7b 5e 18 36 22 23 16 fd 3a 17 39 d0 40 1b 9c 83 Sep 21 07:25:35.583727: | dd e5 36 8e b6 ad fa db f2 0c 1f 1c ce 0b 0a 82 Sep 21 07:25:35.583730: | 1c c1 66 58 27 80 6b cd 79 4f bd be 80 10 72 0a Sep 21 07:25:35.583732: | 7e 38 b6 61 dc d6 b2 e4 f5 88 ed 76 d7 da b5 af Sep 21 07:25:35.583734: | 24 e6 53 0d d5 0c 08 f6 a8 3a 28 f6 1d 01 bb 29 Sep 21 07:25:35.583736: | 0c 04 6f 68 a4 df de f7 39 7f c7 57 83 af 99 d5 Sep 21 07:25:35.583738: | f7 c5 da ba 4b 98 77 99 67 f2 47 5a 79 35 32 bf Sep 21 07:25:35.583741: | df ad 12 7f 98 2f fd aa 17 e4 3b 0d a1 ba 82 06 Sep 21 07:25:35.583743: | 94 af 27 6c 15 53 17 4f 50 f1 f7 92 a6 50 2e 7f Sep 21 07:25:35.583745: | 19 bf 50 ab 10 8b 93 90 b2 db df 37 28 cf 1e d6 Sep 21 07:25:35.583747: | 9d be f6 8a f8 30 b9 b9 e0 c6 3f 22 4a c0 8d 82 Sep 21 07:25:35.583752: | e8 42 d2 5c 2a f4 2b 64 27 9a 91 93 3f 68 2d f1 Sep 21 07:25:35.583755: | cf b6 7a 96 0b 55 78 80 3f a7 5c 14 4e 3b 17 ab Sep 21 07:25:35.583757: | 0b 52 b5 f7 8c 85 5a f9 16 e9 0a 36 2b 7b b4 44 Sep 21 07:25:35.583761: | 68 8b b7 d4 7f 36 45 1a e7 7e b7 08 d0 08 1a 51 Sep 21 07:25:35.583763: | db 79 7f f0 bc 2a d1 4b 4f 3a 22 0b 83 03 19 cb Sep 21 07:25:35.583765: | e8 06 fb fb 0a 7b 3b 9e 2f 62 7c a5 e4 e7 1a 33 Sep 21 07:25:35.583767: | 58 52 5d dd 35 7b cb cb c7 e5 9f 69 a6 e6 af 13 Sep 21 07:25:35.583769: | 4d c3 fb a2 b4 54 7a 35 f9 09 e8 0f 1e eb b2 4d Sep 21 07:25:35.583772: | da 4d 21 e9 e1 15 9e f5 63 6a f0 bb da 0a 38 dd Sep 21 07:25:35.583774: | d7 37 af 9e 23 c4 d7 2b 7e 48 25 64 aa 40 f3 54 Sep 21 07:25:35.585013: | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=50ms Sep 21 07:25:35.585026: | event_schedule: new EVENT_RETRANSMIT-pe@0x55799c86fb90 Sep 21 07:25:35.585031: | inserting event EVENT_RETRANSMIT, timeout in 0.05 seconds for #2 Sep 21 07:25:35.585035: | libevent_malloc: new ptr-libevent@0x7f1e24006900 size 128 Sep 21 07:25:35.585041: | #2 STATE_PARENT_I2: retransmits: first event in 0.05 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49381.953289 Sep 21 07:25:35.585046: | resume sending helper answer for #1 suppresed complete_v2_state_transition() Sep 21 07:25:35.585052: | #1 spent 6.09 milliseconds in resume sending helper answer Sep 21 07:25:35.585058: | stop processing: state #2 connection "north-eastnets/0x1" from 192.1.2.23:500 (in resume_handler() at server.c:833) Sep 21 07:25:35.585062: | libevent_free: release ptr-libevent@0x7f1e1c003060 Sep 21 07:25:35.608011: | spent 0.00295 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:25:35.608031: | *received 464 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Sep 21 07:25:35.608034: | 87 ec 50 e3 56 d0 d9 73 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:35.608036: | 2e 20 23 20 00 00 00 01 00 00 01 d0 24 00 01 b4 Sep 21 07:25:35.608038: | 19 58 cb bb 56 0a 40 9a 9d 6c a9 a8 37 53 ca 56 Sep 21 07:25:35.608043: | b5 1d e3 22 15 ec 91 7e 25 1f 45 4b 32 d3 27 88 Sep 21 07:25:35.608045: | 0d 3f 54 c1 f8 c5 9e 0b 3e 8d 28 96 74 e6 db 2c Sep 21 07:25:35.608047: | 81 cc 7a 8b 8d 1e 02 0b 0f 9f 68 3f 8d 0f 01 bc Sep 21 07:25:35.608049: | c5 23 7d c6 56 0b 12 a6 cd 96 04 b5 25 69 e3 6c Sep 21 07:25:35.608052: | 62 3c 30 fc c1 63 1d 85 7e 3b d4 e8 08 06 e7 9f Sep 21 07:25:35.608054: | 92 86 a4 50 30 92 04 3e f9 bf b3 3f d6 38 9d 7c Sep 21 07:25:35.608056: | 3a 41 f3 15 1d f2 f3 c7 bb 06 e6 3e 33 91 4f a9 Sep 21 07:25:35.608058: | 04 4c 53 d2 43 69 3c c8 1f 60 f6 95 a5 0a 16 af Sep 21 07:25:35.608060: | e4 9f 6d 07 88 a7 bf 07 3a ea b4 b6 03 0d 89 36 Sep 21 07:25:35.608063: | 73 57 e9 64 21 b4 ce 59 00 8b ec 1a f9 48 2e ea Sep 21 07:25:35.608065: | fa ea a8 cf e4 07 2a 5a fa 10 10 c4 37 d0 e9 d7 Sep 21 07:25:35.608067: | f5 53 0e 0e c1 0f d4 68 dc e6 00 c6 88 e6 89 ed Sep 21 07:25:35.608069: | 5e e0 da c6 8c 40 96 23 0c 78 ca 21 f2 9a 0f 81 Sep 21 07:25:35.608071: | d6 3a 96 63 5b 25 9c 1f ee 44 db 6c b1 6a 35 b3 Sep 21 07:25:35.608074: | 44 45 23 c1 a9 a5 90 b5 14 05 05 9f 7f db f8 c8 Sep 21 07:25:35.608076: | a1 15 f3 ab 80 ca be 73 0f 44 37 83 1b 62 43 5b Sep 21 07:25:35.608078: | ad 38 99 aa 95 eb fe ab 91 fb 3f fa 40 24 58 0d Sep 21 07:25:35.608080: | 7a 85 d8 e1 45 c4 cf 10 22 c9 9b 55 cf e3 9e 5c Sep 21 07:25:35.608082: | ce 06 fc e8 27 dc c5 da 77 77 fa 0e 69 64 e6 a1 Sep 21 07:25:35.608084: | c9 d4 df c1 73 a3 d6 6b d4 e9 5f 0f 94 43 31 bd Sep 21 07:25:35.608087: | 29 fb e5 15 91 58 a4 6f cf 0e 4e 52 ac 02 39 54 Sep 21 07:25:35.608089: | ea f9 cb 90 b8 ea 6d 76 25 07 74 a1 94 ff d1 fc Sep 21 07:25:35.608091: | 12 e8 a0 4d e6 c6 13 56 d4 65 d2 9a 1b 28 a5 25 Sep 21 07:25:35.608093: | c2 39 24 df 41 66 de d9 68 f2 c7 59 e7 b1 ee 4b Sep 21 07:25:35.608095: | 5b 1f 9d b5 22 91 bd 58 12 31 2c 8e 7f f5 f3 73 Sep 21 07:25:35.608098: | 77 80 9e fb b2 e8 59 10 90 e4 6b 1a 6e f2 2a 88 Sep 21 07:25:35.608102: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Sep 21 07:25:35.608106: | **parse ISAKMP Message: Sep 21 07:25:35.608109: | initiator cookie: Sep 21 07:25:35.608111: | 87 ec 50 e3 56 d0 d9 73 Sep 21 07:25:35.608113: | responder cookie: Sep 21 07:25:35.608115: | 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:35.608118: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Sep 21 07:25:35.608121: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:25:35.608123: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:25:35.608126: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:25:35.608128: | Message ID: 1 (0x1) Sep 21 07:25:35.608131: | length: 464 (0x1d0) Sep 21 07:25:35.608134: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Sep 21 07:25:35.608137: | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response Sep 21 07:25:35.608141: | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) Sep 21 07:25:35.608147: | start processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2016) Sep 21 07:25:35.608150: | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) Sep 21 07:25:35.608154: | suspend processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:25:35.608159: | start processing: state #2 connection "north-eastnets/0x1" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:25:35.608161: | #2 is idle Sep 21 07:25:35.608163: | #2 idle Sep 21 07:25:35.608166: | unpacking clear payload Sep 21 07:25:35.608168: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Sep 21 07:25:35.608171: | ***parse IKEv2 Encryption Payload: Sep 21 07:25:35.608173: | next payload type: ISAKMP_NEXT_v2IDr (0x24) Sep 21 07:25:35.608176: | flags: none (0x0) Sep 21 07:25:35.608178: | length: 436 (0x1b4) Sep 21 07:25:35.608182: | processing payload: ISAKMP_NEXT_v2SK (len=432) Sep 21 07:25:35.608184: | #2 in state PARENT_I2: sent v2I2, expected v2R2 Sep 21 07:25:35.608215: | data for hmac: 87 ec 50 e3 56 d0 d9 73 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:35.608218: | data for hmac: 2e 20 23 20 00 00 00 01 00 00 01 d0 24 00 01 b4 Sep 21 07:25:35.608220: | data for hmac: 19 58 cb bb 56 0a 40 9a 9d 6c a9 a8 37 53 ca 56 Sep 21 07:25:35.608223: | data for hmac: b5 1d e3 22 15 ec 91 7e 25 1f 45 4b 32 d3 27 88 Sep 21 07:25:35.608225: | data for hmac: 0d 3f 54 c1 f8 c5 9e 0b 3e 8d 28 96 74 e6 db 2c Sep 21 07:25:35.608227: | data for hmac: 81 cc 7a 8b 8d 1e 02 0b 0f 9f 68 3f 8d 0f 01 bc Sep 21 07:25:35.608230: | data for hmac: c5 23 7d c6 56 0b 12 a6 cd 96 04 b5 25 69 e3 6c Sep 21 07:25:35.608232: | data for hmac: 62 3c 30 fc c1 63 1d 85 7e 3b d4 e8 08 06 e7 9f Sep 21 07:25:35.608234: | data for hmac: 92 86 a4 50 30 92 04 3e f9 bf b3 3f d6 38 9d 7c Sep 21 07:25:35.608236: | data for hmac: 3a 41 f3 15 1d f2 f3 c7 bb 06 e6 3e 33 91 4f a9 Sep 21 07:25:35.608239: | data for hmac: 04 4c 53 d2 43 69 3c c8 1f 60 f6 95 a5 0a 16 af Sep 21 07:25:35.608241: | data for hmac: e4 9f 6d 07 88 a7 bf 07 3a ea b4 b6 03 0d 89 36 Sep 21 07:25:35.608243: | data for hmac: 73 57 e9 64 21 b4 ce 59 00 8b ec 1a f9 48 2e ea Sep 21 07:25:35.608246: | data for hmac: fa ea a8 cf e4 07 2a 5a fa 10 10 c4 37 d0 e9 d7 Sep 21 07:25:35.608248: | data for hmac: f5 53 0e 0e c1 0f d4 68 dc e6 00 c6 88 e6 89 ed Sep 21 07:25:35.608250: | data for hmac: 5e e0 da c6 8c 40 96 23 0c 78 ca 21 f2 9a 0f 81 Sep 21 07:25:35.608252: | data for hmac: d6 3a 96 63 5b 25 9c 1f ee 44 db 6c b1 6a 35 b3 Sep 21 07:25:35.608255: | data for hmac: 44 45 23 c1 a9 a5 90 b5 14 05 05 9f 7f db f8 c8 Sep 21 07:25:35.608257: | data for hmac: a1 15 f3 ab 80 ca be 73 0f 44 37 83 1b 62 43 5b Sep 21 07:25:35.608259: | data for hmac: ad 38 99 aa 95 eb fe ab 91 fb 3f fa 40 24 58 0d Sep 21 07:25:35.608262: | data for hmac: 7a 85 d8 e1 45 c4 cf 10 22 c9 9b 55 cf e3 9e 5c Sep 21 07:25:35.608264: | data for hmac: ce 06 fc e8 27 dc c5 da 77 77 fa 0e 69 64 e6 a1 Sep 21 07:25:35.608266: | data for hmac: c9 d4 df c1 73 a3 d6 6b d4 e9 5f 0f 94 43 31 bd Sep 21 07:25:35.608268: | data for hmac: 29 fb e5 15 91 58 a4 6f cf 0e 4e 52 ac 02 39 54 Sep 21 07:25:35.608271: | data for hmac: ea f9 cb 90 b8 ea 6d 76 25 07 74 a1 94 ff d1 fc Sep 21 07:25:35.608273: | data for hmac: 12 e8 a0 4d e6 c6 13 56 d4 65 d2 9a 1b 28 a5 25 Sep 21 07:25:35.608275: | data for hmac: c2 39 24 df 41 66 de d9 68 f2 c7 59 e7 b1 ee 4b Sep 21 07:25:35.608278: | data for hmac: 5b 1f 9d b5 22 91 bd 58 12 31 2c 8e 7f f5 f3 73 Sep 21 07:25:35.608280: | calculated auth: 77 80 9e fb b2 e8 59 10 90 e4 6b 1a 6e f2 2a 88 Sep 21 07:25:35.608282: | provided auth: 77 80 9e fb b2 e8 59 10 90 e4 6b 1a 6e f2 2a 88 Sep 21 07:25:35.608285: | authenticator matched Sep 21 07:25:35.608294: | #2 ikev2 ISAKMP_v2_IKE_AUTH decrypt success Sep 21 07:25:35.608297: | Now let's proceed with payload (ISAKMP_NEXT_v2IDr) Sep 21 07:25:35.608300: | **parse IKEv2 Identification - Responder - Payload: Sep 21 07:25:35.608303: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) Sep 21 07:25:35.608305: | flags: none (0x0) Sep 21 07:25:35.608307: | length: 12 (0xc) Sep 21 07:25:35.608310: | ID type: ID_FQDN (0x2) Sep 21 07:25:35.608312: | processing payload: ISAKMP_NEXT_v2IDr (len=4) Sep 21 07:25:35.608315: | Now let's proceed with payload (ISAKMP_NEXT_v2AUTH) Sep 21 07:25:35.608317: | **parse IKEv2 Authentication Payload: Sep 21 07:25:35.608320: | next payload type: ISAKMP_NEXT_v2SA (0x21) Sep 21 07:25:35.608322: | flags: none (0x0) Sep 21 07:25:35.608324: | length: 282 (0x11a) Sep 21 07:25:35.608326: | auth method: IKEv2_AUTH_RSA (0x1) Sep 21 07:25:35.608329: | processing payload: ISAKMP_NEXT_v2AUTH (len=274) Sep 21 07:25:35.608331: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Sep 21 07:25:35.608334: | **parse IKEv2 Security Association Payload: Sep 21 07:25:35.608337: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) Sep 21 07:25:35.608340: | flags: none (0x0) Sep 21 07:25:35.608342: | length: 44 (0x2c) Sep 21 07:25:35.608344: | processing payload: ISAKMP_NEXT_v2SA (len=40) Sep 21 07:25:35.608347: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) Sep 21 07:25:35.608350: | **parse IKEv2 Traffic Selector - Initiator - Payload: Sep 21 07:25:35.608352: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) Sep 21 07:25:35.608354: | flags: none (0x0) Sep 21 07:25:35.608356: | length: 24 (0x18) Sep 21 07:25:35.608359: | number of TS: 1 (0x1) Sep 21 07:25:35.608361: | processing payload: ISAKMP_NEXT_v2TSi (len=16) Sep 21 07:25:35.608363: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) Sep 21 07:25:35.608366: | **parse IKEv2 Traffic Selector - Responder - Payload: Sep 21 07:25:35.608368: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:35.608370: | flags: none (0x0) Sep 21 07:25:35.608373: | length: 24 (0x18) Sep 21 07:25:35.608375: | number of TS: 1 (0x1) Sep 21 07:25:35.608377: | processing payload: ISAKMP_NEXT_v2TSr (len=16) Sep 21 07:25:35.608380: | selected state microcode Initiator: process IKE_AUTH response Sep 21 07:25:35.608382: | Now let's proceed with state specific processing Sep 21 07:25:35.608384: | calling processor Initiator: process IKE_AUTH response Sep 21 07:25:35.608390: | offered CA: '%none' Sep 21 07:25:35.608394: "north-eastnets/0x1" #2: IKEv2 mode peer ID is ID_FQDN: '@east' Sep 21 07:25:35.608417: | verifying AUTH payload Sep 21 07:25:35.608432: | required RSA CA is '%any' Sep 21 07:25:35.608435: | checking RSA keyid '@east' for match with '@east' Sep 21 07:25:35.608438: | RSA key issuer CA is '%any' Sep 21 07:25:35.608501: | an RSA Sig check passed with *AQO9bJbr3 [preloaded keys] Sep 21 07:25:35.608508: | #1 spent 0.0642 milliseconds in try_all_keys() trying a pubkey Sep 21 07:25:35.608510: "north-eastnets/0x1" #2: Authenticated using RSA Sep 21 07:25:35.608517: | #1 spent 0.0947 milliseconds in ikev2_verify_rsa_hash() Sep 21 07:25:35.608520: | parent state #1: PARENT_I2(open IKE SA) => PARENT_I3(established IKE SA) Sep 21 07:25:35.608524: | #1 will start re-keying in 2607 seconds with margin of 993 seconds (attempting re-key) Sep 21 07:25:35.608527: | state #1 requesting EVENT_SA_REPLACE to be deleted Sep 21 07:25:35.608530: | libevent_free: release ptr-libevent@0x55799c8677b0 Sep 21 07:25:35.608533: | free_event_entry: release EVENT_SA_REPLACE-pe@0x55799c867770 Sep 21 07:25:35.608536: | event_schedule: new EVENT_SA_REKEY-pe@0x55799c867770 Sep 21 07:25:35.608539: | inserting event EVENT_SA_REKEY, timeout in 2607 seconds for #1 Sep 21 07:25:35.608542: | libevent_malloc: new ptr-libevent@0x55799c8677b0 size 128 Sep 21 07:25:35.608638: | pstats #1 ikev2.ike established Sep 21 07:25:35.608644: | TSi: parsing 1 traffic selectors Sep 21 07:25:35.608647: | ***parse IKEv2 Traffic Selector: Sep 21 07:25:35.608649: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Sep 21 07:25:35.608652: | IP Protocol ID: 0 (0x0) Sep 21 07:25:35.608654: | length: 16 (0x10) Sep 21 07:25:35.608656: | start port: 0 (0x0) Sep 21 07:25:35.608659: | end port: 65535 (0xffff) Sep 21 07:25:35.608661: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low Sep 21 07:25:35.608664: | TS low c0 00 03 00 Sep 21 07:25:35.608666: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high Sep 21 07:25:35.608668: | TS high c0 00 03 ff Sep 21 07:25:35.608671: | TSi: parsed 1 traffic selectors Sep 21 07:25:35.608673: | TSr: parsing 1 traffic selectors Sep 21 07:25:35.608676: | ***parse IKEv2 Traffic Selector: Sep 21 07:25:35.608678: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Sep 21 07:25:35.608680: | IP Protocol ID: 0 (0x0) Sep 21 07:25:35.608682: | length: 16 (0x10) Sep 21 07:25:35.608684: | start port: 0 (0x0) Sep 21 07:25:35.608687: | end port: 65535 (0xffff) Sep 21 07:25:35.608689: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low Sep 21 07:25:35.608691: | TS low c0 00 02 00 Sep 21 07:25:35.608694: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high Sep 21 07:25:35.608698: | TS high c0 00 02 ff Sep 21 07:25:35.608700: | TSr: parsed 1 traffic selectors Sep 21 07:25:35.608706: | evaluating our conn="north-eastnets/0x1" I=192.0.3.0/24:0:0/0 R=192.0.2.0/24:0:0/0 to their: Sep 21 07:25:35.608711: | TSi[0] .net=192.0.3.0-192.0.3.255 .iporotoid=0 .{start,end}port=0..65535 Sep 21 07:25:35.608718: | match address end->client=192.0.3.0/24 == TSi[0]net=192.0.3.0-192.0.3.255: YES fitness 32 Sep 21 07:25:35.608721: | narrow port end=0..65535 == TSi[0]=0..65535: 0 Sep 21 07:25:35.608723: | TSi[0] port match: YES fitness 65536 Sep 21 07:25:35.608726: | narrow protocol end=*0 == TSi[0]=*0: 0 Sep 21 07:25:35.608729: | match end->protocol=*0 == TSi[0].ipprotoid=*0: YES fitness 255 Sep 21 07:25:35.608734: | TSr[0] .net=192.0.2.0-192.0.2.255 .iporotoid=0 .{start,end}port=0..65535 Sep 21 07:25:35.608740: | match address end->client=192.0.2.0/24 == TSr[0]net=192.0.2.0-192.0.2.255: YES fitness 32 Sep 21 07:25:35.608742: | narrow port end=0..65535 == TSr[0]=0..65535: 0 Sep 21 07:25:35.608745: | TSr[0] port match: YES fitness 65536 Sep 21 07:25:35.608747: | narrow protocol end=*0 == TSr[0]=*0: 0 Sep 21 07:25:35.608750: | match end->protocol=*0 == TSr[0].ipprotoid=*0: YES fitness 255 Sep 21 07:25:35.608753: | best fit so far: TSi[0] TSr[0] Sep 21 07:25:35.608755: | found an acceptable TSi/TSr Traffic Selector Sep 21 07:25:35.608757: | printing contents struct traffic_selector Sep 21 07:25:35.608759: | ts_type: IKEv2_TS_IPV6_ADDR_RANGE Sep 21 07:25:35.608761: | ipprotoid: 0 Sep 21 07:25:35.608764: | port range: 0-65535 Sep 21 07:25:35.608767: | ip range: 192.0.3.0-192.0.3.255 Sep 21 07:25:35.608770: | printing contents struct traffic_selector Sep 21 07:25:35.608772: | ts_type: IKEv2_TS_IPV6_ADDR_RANGE Sep 21 07:25:35.608774: | ipprotoid: 0 Sep 21 07:25:35.608776: | port range: 0-65535 Sep 21 07:25:35.608780: | ip range: 192.0.2.0-192.0.2.255 Sep 21 07:25:35.608800: | using existing local ESP/AH proposals for north-eastnets/0x1 (IKE_AUTH initiator accepting remote ESP/AH proposal): 1:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256;DH=NONE;ESN=DISABLED Sep 21 07:25:35.608806: | Comparing remote proposals against IKE_AUTH initiator accepting remote ESP/AH proposal 1 local proposals Sep 21 07:25:35.608810: | local proposal 1 type ENCR has 1 transforms Sep 21 07:25:35.608812: | local proposal 1 type PRF has 0 transforms Sep 21 07:25:35.608815: | local proposal 1 type INTEG has 1 transforms Sep 21 07:25:35.608817: | local proposal 1 type DH has 1 transforms Sep 21 07:25:35.608819: | local proposal 1 type ESN has 1 transforms Sep 21 07:25:35.608823: | local proposal 1 transforms: required: ENCR+INTEG+ESN; optional: DH Sep 21 07:25:35.608826: | ***parse IKEv2 Proposal Substructure Payload: Sep 21 07:25:35.608828: | last proposal: v2_PROPOSAL_LAST (0x0) Sep 21 07:25:35.608830: | length: 40 (0x28) Sep 21 07:25:35.608833: | prop #: 1 (0x1) Sep 21 07:25:35.608835: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Sep 21 07:25:35.608837: | spi size: 4 (0x4) Sep 21 07:25:35.608840: | # transforms: 3 (0x3) Sep 21 07:25:35.608843: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Sep 21 07:25:35.608845: | remote SPI 60 2e b9 b6 Sep 21 07:25:35.608848: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 1 local proposals Sep 21 07:25:35.608851: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:25:35.608853: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:35.608856: | length: 12 (0xc) Sep 21 07:25:35.608858: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:25:35.608860: | IKEv2 transform ID: AES_CBC (0xc) Sep 21 07:25:35.608863: | *****parse IKEv2 Attribute Substructure Payload: Sep 21 07:25:35.608866: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:25:35.608868: | length/value: 128 (0x80) Sep 21 07:25:35.608872: | remote proposal 1 transform 0 (ENCR=AES_CBC_128) matches local proposal 1 type 1 (ENCR) transform 0 Sep 21 07:25:35.608877: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:25:35.608880: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:35.608882: | length: 8 (0x8) Sep 21 07:25:35.608885: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:25:35.608887: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Sep 21 07:25:35.608890: | remote proposal 1 transform 1 (INTEG=HMAC_SHA2_512_256) matches local proposal 1 type 3 (INTEG) transform 0 Sep 21 07:25:35.608893: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:25:35.608895: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:25:35.608898: | length: 8 (0x8) Sep 21 07:25:35.608900: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Sep 21 07:25:35.608902: | IKEv2 transform ID: ESN_DISABLED (0x0) Sep 21 07:25:35.608906: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 Sep 21 07:25:35.608909: | remote proposal 1 proposed transforms: ENCR+INTEG+ESN; matched: ENCR+INTEG+ESN; unmatched: none Sep 21 07:25:35.608914: | comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 1; required: ENCR+INTEG+ESN; optional: DH; matched: ENCR+INTEG+ESN Sep 21 07:25:35.608916: | remote proposal 1 matches local proposal 1 Sep 21 07:25:35.608919: | remote accepted the proposal 1:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256;ESN=DISABLED[first-match] Sep 21 07:25:35.608924: | IKE_AUTH initiator accepting remote ESP/AH proposal ikev2_proposal: 1:ESP:SPI=602eb9b6;ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256;ESN=DISABLED Sep 21 07:25:35.608927: | converting proposal to internal trans attrs Sep 21 07:25:35.608932: | integ=sha2_512: .key_size=64 encrypt=aes: .key_size=16 .salt_size=0 keymat_len=80 Sep 21 07:25:35.609237: | install_ipsec_sa() for #2: inbound and outbound Sep 21 07:25:35.609241: | could_route called for north-eastnets/0x1 (kind=CK_PERMANENT) Sep 21 07:25:35.609244: | FOR_EACH_CONNECTION_... in route_owner Sep 21 07:25:35.609247: | conn north-eastnets/0x1 mark 0/00000000, 0/00000000 vs Sep 21 07:25:35.609250: | conn north-eastnets/0x2 mark 0/00000000, 0/00000000 Sep 21 07:25:35.609252: | conn north-eastnets/0x1 mark 0/00000000, 0/00000000 vs Sep 21 07:25:35.609255: | conn north-eastnets/0x1 mark 0/00000000, 0/00000000 Sep 21 07:25:35.609260: | route owner of "north-eastnets/0x1" unrouted: NULL; eroute owner: NULL Sep 21 07:25:35.609263: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA2_512_256 Sep 21 07:25:35.609267: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 Sep 21 07:25:35.609269: | st->st_esp.keymat_len=80 is encrypt_keymat_size=16 + integ_keymat_size=64 Sep 21 07:25:35.609273: | setting IPsec SA replay-window to 32 Sep 21 07:25:35.609276: | NIC esp-hw-offload not for connection 'north-eastnets/0x1' not available on interface eth1 Sep 21 07:25:35.609279: | netlink: enabling tunnel mode Sep 21 07:25:35.609282: | netlink: setting IPsec SA replay-window to 32 using old-style req Sep 21 07:25:35.609285: | netlink: esp-hw-offload not set for IPsec SA Sep 21 07:25:35.609373: | netlink response for Add SA esp.602eb9b6@192.1.2.23 included non-error error Sep 21 07:25:35.609377: | set up outgoing SA, ref=0/0 Sep 21 07:25:35.609380: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA2_512_256 Sep 21 07:25:35.609382: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 Sep 21 07:25:35.609385: | st->st_esp.keymat_len=80 is encrypt_keymat_size=16 + integ_keymat_size=64 Sep 21 07:25:35.609388: | setting IPsec SA replay-window to 32 Sep 21 07:25:35.609391: | NIC esp-hw-offload not for connection 'north-eastnets/0x1' not available on interface eth1 Sep 21 07:25:35.609394: | netlink: enabling tunnel mode Sep 21 07:25:35.609396: | netlink: setting IPsec SA replay-window to 32 using old-style req Sep 21 07:25:35.609398: | netlink: esp-hw-offload not set for IPsec SA Sep 21 07:25:35.609446: | netlink response for Add SA esp.5af53a14@192.1.3.33 included non-error error Sep 21 07:25:35.609452: | priority calculation of connection "north-eastnets/0x1" is 0xfe7e7 Sep 21 07:25:35.609459: | add inbound eroute 192.0.2.0/24:0 --0-> 192.0.3.0/24:0 => tun.10000@192.1.3.33 (raw_eroute) Sep 21 07:25:35.609462: | IPsec Sa SPD priority set to 1042407 Sep 21 07:25:35.609505: | raw_eroute result=success Sep 21 07:25:35.609508: | set up incoming SA, ref=0/0 Sep 21 07:25:35.609510: | sr for #2: unrouted Sep 21 07:25:35.609513: | route_and_eroute() for proto 0, and source port 0 dest port 0 Sep 21 07:25:35.609515: | FOR_EACH_CONNECTION_... in route_owner Sep 21 07:25:35.609518: | conn north-eastnets/0x1 mark 0/00000000, 0/00000000 vs Sep 21 07:25:35.609521: | conn north-eastnets/0x2 mark 0/00000000, 0/00000000 Sep 21 07:25:35.609523: | conn north-eastnets/0x1 mark 0/00000000, 0/00000000 vs Sep 21 07:25:35.609526: | conn north-eastnets/0x1 mark 0/00000000, 0/00000000 Sep 21 07:25:35.609529: | route owner of "north-eastnets/0x1" unrouted: NULL; eroute owner: NULL Sep 21 07:25:35.609532: | route_and_eroute with c: north-eastnets/0x1 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2 Sep 21 07:25:35.609535: | priority calculation of connection "north-eastnets/0x1" is 0xfe7e7 Sep 21 07:25:35.609542: | eroute_connection add eroute 192.0.3.0/24:0 --0-> 192.0.2.0/24:0 => tun.0@192.1.2.23 (raw_eroute) Sep 21 07:25:35.609545: | IPsec Sa SPD priority set to 1042407 Sep 21 07:25:35.609565: | raw_eroute result=success Sep 21 07:25:35.609568: | running updown command "ipsec _updown" for verb up Sep 21 07:25:35.609571: | command executing up-client Sep 21 07:25:35.609597: | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-eastnets/0x1' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x6 Sep 21 07:25:35.609600: | popen cmd is 1041 chars long Sep 21 07:25:35.609603: | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-eastnets/0x1': Sep 21 07:25:35.609606: | cmd( 80): PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_: Sep 21 07:25:35.609608: | cmd( 160):MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PL: Sep 21 07:25:35.609611: | cmd( 240):UTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO: Sep 21 07:25:35.609613: | cmd( 320):_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@ea: Sep 21 07:25:35.609616: | cmd( 400):st' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEE: Sep 21 07:25:35.609618: | cmd( 480):R_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_: Sep 21 07:25:35.609621: | cmd( 560):PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCR: Sep 21 07:25:35.609623: | cmd( 640):YPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND: Sep 21 07:25:35.609626: | cmd( 720):='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO=: Sep 21 07:25:35.609628: | cmd( 800):'0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_: Sep 21 07:25:35.609631: | cmd( 880):CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROU: Sep 21 07:25:35.609635: | cmd( 960):TING='no' VTI_SHARED='no' SPI_IN=0x602eb9b6 SPI_OUT=0x5af53a14 ipsec _updown 2>&: Sep 21 07:25:35.609637: | cmd(1040):1: Sep 21 07:25:35.707429: | route_and_eroute: firewall_notified: true Sep 21 07:25:35.707445: | running updown command "ipsec _updown" for verb prepare Sep 21 07:25:35.707449: | command executing prepare-client Sep 21 07:25:35.707482: | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-eastnets/0x1' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' Sep 21 07:25:35.707485: | popen cmd is 1046 chars long Sep 21 07:25:35.707488: | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-eastnets: Sep 21 07:25:35.707491: | cmd( 80):/0x1' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' P: Sep 21 07:25:35.707494: | cmd( 160):LUTO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.: Sep 21 07:25:35.707496: | cmd( 240):0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' : Sep 21 07:25:35.707499: | cmd( 320):PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID: Sep 21 07:25:35.707502: | cmd( 400):='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUT: Sep 21 07:25:35.707504: | cmd( 480):O_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' P: Sep 21 07:25:35.707507: | cmd( 560):LUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG: Sep 21 07:25:35.707509: | cmd( 640):+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN: Sep 21 07:25:35.707512: | cmd( 720):_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_C: Sep 21 07:25:35.707515: | cmd( 800):ISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' P: Sep 21 07:25:35.707517: | cmd( 880):LUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VT: Sep 21 07:25:35.707520: | cmd( 960):I_ROUTING='no' VTI_SHARED='no' SPI_IN=0x602eb9b6 SPI_OUT=0x5af53a14 ipsec _updow: Sep 21 07:25:35.707522: | cmd(1040):n 2>&1: Sep 21 07:25:35.720946: | running updown command "ipsec _updown" for verb route Sep 21 07:25:35.720961: | command executing route-client Sep 21 07:25:35.720995: | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-eastnets/0x1' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_ Sep 21 07:25:35.721004: | popen cmd is 1044 chars long Sep 21 07:25:35.721008: | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-eastnets/0: Sep 21 07:25:35.721011: | cmd( 80):x1' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLU: Sep 21 07:25:35.721013: | cmd( 160):TO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0': Sep 21 07:25:35.721016: | cmd( 240): PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PL: Sep 21 07:25:35.721018: | cmd( 320):UTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID=': Sep 21 07:25:35.721021: | cmd( 400):@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_: Sep 21 07:25:35.721023: | cmd( 480):PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLU: Sep 21 07:25:35.721026: | cmd( 560):TO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+E: Sep 21 07:25:35.721029: | cmd( 640):NCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_K: Sep 21 07:25:35.721031: | cmd( 720):IND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CIS: Sep 21 07:25:35.721034: | cmd( 800):CO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLU: Sep 21 07:25:35.721036: | cmd( 880):TO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_: Sep 21 07:25:35.721039: | cmd( 960):ROUTING='no' VTI_SHARED='no' SPI_IN=0x602eb9b6 SPI_OUT=0x5af53a14 ipsec _updown : Sep 21 07:25:35.721041: | cmd(1040):2>&1: Sep 21 07:25:35.851676: | route_and_eroute: instance "north-eastnets/0x1", setting eroute_owner {spd=0x55799c866bf0,sr=0x55799c866bf0} to #2 (was #0) (newest_ipsec_sa=#0) Sep 21 07:25:35.851827: | #1 spent 0.879 milliseconds in install_ipsec_sa() Sep 21 07:25:35.851837: | inR2: instance north-eastnets/0x1[0], setting IKEv2 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1 Sep 21 07:25:35.851841: | state #2 requesting EVENT_RETRANSMIT to be deleted Sep 21 07:25:35.851844: | #2 STATE_PARENT_I2: retransmits: cleared Sep 21 07:25:35.851849: | libevent_free: release ptr-libevent@0x7f1e24006900 Sep 21 07:25:35.851853: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55799c86fb90 Sep 21 07:25:35.851860: | #2 spent 1.73 milliseconds in processing: Initiator: process IKE_AUTH response in ikev2_process_state_packet() Sep 21 07:25:35.851869: | [RE]START processing: state #2 connection "north-eastnets/0x1" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:25:35.851874: | #2 complete_v2_state_transition() PARENT_I2->V2_IPSEC_I with status STF_OK Sep 21 07:25:35.851877: | IKEv2: transition from state STATE_PARENT_I2 to state STATE_V2_IPSEC_I Sep 21 07:25:35.851881: | child state #2: PARENT_I2(open IKE SA) => V2_IPSEC_I(established CHILD SA) Sep 21 07:25:35.851883: | Message ID: updating counters for #2 to 1 after switching state Sep 21 07:25:35.851889: | Message ID: recv #1.#2 response 1; ike: initiator.sent=1 initiator.recv=0->1 responder.sent=-1 responder.recv=-1; child: wip.initiator=1->-1 wip.responder=-1 Sep 21 07:25:35.851894: | Message ID: #1.#2 skipping update_send as nothing to send; initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 Sep 21 07:25:35.851897: | pstats #2 ikev2.child established Sep 21 07:25:35.851903: "north-eastnets/0x1" #2: negotiated connection [192.0.3.0-192.0.3.255:0-65535 0] -> [192.0.2.0-192.0.2.255:0-65535 0] Sep 21 07:25:35.851914: | NAT-T: encaps is 'auto' Sep 21 07:25:35.851918: "north-eastnets/0x1" #2: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0x602eb9b6 <0x5af53a14 xfrm=AES_CBC_128-HMAC_SHA2_512_256 NATOA=none NATD=none DPD=passive} Sep 21 07:25:35.851922: | releasing whack for #2 (sock=fd@26) Sep 21 07:25:35.851928: | close_any(fd@26) (in release_whack() at state.c:654) Sep 21 07:25:35.851930: | releasing whack and unpending for parent #1 Sep 21 07:25:35.851933: | unpending state #1 connection "north-eastnets/0x1" Sep 21 07:25:35.851937: | delete from pending Child SA with 192.1.2.23 "north-eastnets/0x1" Sep 21 07:25:35.851939: | removing pending policy for no connection {0x55799c7f4540} Sep 21 07:25:35.851943: | FOR_EACH_STATE_... in find_pending_phase2 Sep 21 07:25:35.851946: | creating state object #3 at 0x55799c86d9a0 Sep 21 07:25:35.851949: | State DB: adding IKEv2 state #3 in UNDEFINED Sep 21 07:25:35.851956: | pstats #3 ikev2.child started Sep 21 07:25:35.851958: | duplicating state object #1 "north-eastnets/0x2" as #3 for IPSEC SA Sep 21 07:25:35.851962: | #3 setting local endpoint to 192.1.3.33:500 from #1.st_localport (in duplicate_state() at state.c:1481) Sep 21 07:25:35.851968: | Message ID: init_child #1.#3; ike: initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1 Sep 21 07:25:35.851972: | suspend processing: state #2 connection "north-eastnets/0x1" from 192.1.2.23:500 (in ikev2_initiate_child_sa() at ikev2_parent.c:5634) Sep 21 07:25:35.851976: | start processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ikev2_initiate_child_sa() at ikev2_parent.c:5634) Sep 21 07:25:35.851979: | child state #3: UNDEFINED(ignore) => V2_CREATE_I0(established IKE SA) Sep 21 07:25:35.851982: | create child proposal's DH changed from no-PFS to MODP2048, flushing Sep 21 07:25:35.851985: | constructing ESP/AH proposals with default DH MODP2048 for north-eastnets/0x2 (ESP/AH initiator emitting proposals) Sep 21 07:25:35.851989: | converting proposal AES_CBC_128-HMAC_SHA2_512_256-MODP3072 to ikev2 ... Sep 21 07:25:35.851994: | ... ikev2_proposal: 1:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256;DH=MODP3072;ESN=DISABLED Sep 21 07:25:35.851997: "north-eastnets/0x2": constructed local ESP/AH proposals for north-eastnets/0x2 (ESP/AH initiator emitting proposals): 1:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256;DH=MODP3072;ESN=DISABLED Sep 21 07:25:35.852004: | #3 schedule initiate IPsec SA RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO using IKE# 1 pfs=MODP3072 Sep 21 07:25:35.852007: | event_schedule: new EVENT_v2_INITIATE_CHILD-pe@0x55799c86fb90 Sep 21 07:25:35.852010: | inserting event EVENT_v2_INITIATE_CHILD, timeout in 0 seconds for #3 Sep 21 07:25:35.852014: | libevent_malloc: new ptr-libevent@0x7f1e24006900 size 128 Sep 21 07:25:35.852019: | RESET processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ikev2_initiate_child_sa() at ikev2_parent.c:5734) Sep 21 07:25:35.852022: | RESET processing: from 192.1.2.23:500 (in ikev2_initiate_child_sa() at ikev2_parent.c:5734) Sep 21 07:25:35.852025: | delete from pending Child SA with 192.1.2.23 "north-eastnets/0x2" Sep 21 07:25:35.852027: | removing pending policy for no connection {0x55799c7f0ef0} Sep 21 07:25:35.852030: | close_any(fd@24) (in release_whack() at state.c:654) Sep 21 07:25:35.852034: | #2 will start re-keying in 28048 seconds with margin of 752 seconds (attempting re-key) Sep 21 07:25:35.852036: | event_schedule: new EVENT_SA_REKEY-pe@0x55799c869c50 Sep 21 07:25:35.852039: | inserting event EVENT_SA_REKEY, timeout in 28048 seconds for #2 Sep 21 07:25:35.852041: | libevent_malloc: new ptr-libevent@0x55799c871190 size 128 Sep 21 07:25:35.852044: | processing: STOP state #0 (in ikev2_process_packet() at ikev2.c:2018) Sep 21 07:25:35.852048: | #1 spent 2.29 milliseconds in ikev2_process_packet() Sep 21 07:25:35.852051: | processing: STOP state #0 (in process_md() at demux.c:382) Sep 21 07:25:35.852053: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:25:35.852057: | spent 2.3 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:25:35.852069: | timer_event_cb: processing event@0x55799c86fb90 Sep 21 07:25:35.852072: | handling event EVENT_v2_INITIATE_CHILD for child state #3 Sep 21 07:25:35.852078: | start processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) Sep 21 07:25:35.852083: | adding Child Initiator KE and nonce ni work-order 3 for state #3 Sep 21 07:25:35.852086: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55799c870f50 Sep 21 07:25:35.852088: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 Sep 21 07:25:35.852091: | libevent_malloc: new ptr-libevent@0x55799c7f0c80 size 128 Sep 21 07:25:35.852098: | libevent_free: release ptr-libevent@0x7f1e24006900 Sep 21 07:25:35.852101: | free_event_entry: release EVENT_v2_INITIATE_CHILD-pe@0x55799c86fb90 Sep 21 07:25:35.852105: | crypto helper 4 resuming Sep 21 07:25:35.852114: | crypto helper 4 starting work-order 3 for state #3 Sep 21 07:25:35.852118: | crypto helper 4 doing build KE and nonce (Child Initiator KE and nonce ni); request ID 3 Sep 21 07:25:35.852120: | crypto helper is pausing for 1 seconds Sep 21 07:25:35.852106: | #3 spent 0.0355 milliseconds in timer_event_cb() EVENT_v2_INITIATE_CHILD Sep 21 07:25:35.852324: | stop processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) Sep 21 07:25:35.852329: | processing signal PLUTO_SIGCHLD Sep 21 07:25:35.852335: | waitpid returned ECHILD (no child processes left) Sep 21 07:25:35.852340: | spent 0.00595 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:25:35.852343: | processing signal PLUTO_SIGCHLD Sep 21 07:25:35.852346: | waitpid returned ECHILD (no child processes left) Sep 21 07:25:35.852350: | spent 0.00348 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:25:35.852352: | processing signal PLUTO_SIGCHLD Sep 21 07:25:35.852355: | waitpid returned ECHILD (no child processes left) Sep 21 07:25:35.852359: | spent 0.00353 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:25:36.854439: | crypto helper 4 finished build KE and nonce (Child Initiator KE and nonce ni); request ID 3 time elapsed 1.002319 seconds Sep 21 07:25:36.854457: | (#3) spent 2.25 milliseconds in crypto helper computing work-order 3: Child Initiator KE and nonce ni (pcr) Sep 21 07:25:36.854461: | crypto helper 4 sending results from work-order 3 for state #3 to event queue Sep 21 07:25:36.854465: | scheduling resume sending helper answer for #3 Sep 21 07:25:36.854469: | libevent_malloc: new ptr-libevent@0x7f1e20005780 size 128 Sep 21 07:25:36.854474: | libevent_realloc: release ptr-libevent@0x55799c8498c0 Sep 21 07:25:36.854477: | libevent_realloc: new ptr-libevent@0x55799c867270 size 128 Sep 21 07:25:36.854487: | crypto helper 4 waiting (nothing to do) Sep 21 07:25:36.854501: | processing resume sending helper answer for #3 Sep 21 07:25:36.854510: | start processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in resume_handler() at server.c:797) Sep 21 07:25:36.854514: | crypto helper 4 replies to request ID 3 Sep 21 07:25:36.854517: | calling continuation function 0x55799aef2630 Sep 21 07:25:36.854521: | ikev2_child_outI_continue for #3 STATE_V2_CREATE_I0 Sep 21 07:25:36.854525: | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted Sep 21 07:25:36.854528: | libevent_free: release ptr-libevent@0x55799c7f0c80 Sep 21 07:25:36.854531: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55799c870f50 Sep 21 07:25:36.854534: | event_schedule: new EVENT_SA_REPLACE-pe@0x55799c870f50 Sep 21 07:25:36.854538: | inserting event EVENT_SA_REPLACE, timeout in 200 seconds for #3 Sep 21 07:25:36.854541: | libevent_malloc: new ptr-libevent@0x55799c7f0c80 size 128 Sep 21 07:25:36.854546: | Message ID: #1 wakeing IKE SA (unack 0); initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 Sep 21 07:25:36.854550: | scheduling callback v2_msgid_schedule_next_initiator (#1) Sep 21 07:25:36.854553: | libevent_malloc: new ptr-libevent@0x7f1e24006900 size 128 Sep 21 07:25:36.854558: | [RE]START processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:25:36.854563: | #3 complete_v2_state_transition() V2_CREATE_I0->V2_CREATE_I with status STF_SUSPEND Sep 21 07:25:36.854568: | suspending state #3 and saving MD Sep 21 07:25:36.854571: | #3 is busy; has a suspended MD Sep 21 07:25:36.854575: | [RE]START processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in log_stf_suspend() at ikev2.c:3266) Sep 21 07:25:36.854579: | "north-eastnets/0x2" #3 complete v2 state STATE_V2_CREATE_I0 transition with STF_SUSPEND suspended from complete_v2_state_transition:3448 Sep 21 07:25:36.854582: | resume sending helper answer for #3 suppresed complete_v2_state_transition() Sep 21 07:25:36.854588: | #3 spent 0.0721 milliseconds in resume sending helper answer Sep 21 07:25:36.854592: | stop processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in resume_handler() at server.c:833) Sep 21 07:25:36.854596: | libevent_free: release ptr-libevent@0x7f1e20005780 Sep 21 07:25:36.854601: | processing callback v2_msgid_schedule_next_initiator for #1 Sep 21 07:25:36.854606: | start processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in callback_handler() at server.c:904) Sep 21 07:25:36.854611: | Message ID: #1.#3 resuming SA using IKE SA (unack 0); initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 Sep 21 07:25:36.854617: | suspend processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in initiate_next() at ikev2_msgid.c:553) Sep 21 07:25:36.854621: | start processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in initiate_next() at ikev2_msgid.c:553) Sep 21 07:25:36.854628: | **emit ISAKMP Message: Sep 21 07:25:36.854631: | initiator cookie: Sep 21 07:25:36.854633: | 87 ec 50 e3 56 d0 d9 73 Sep 21 07:25:36.854635: | responder cookie: Sep 21 07:25:36.854638: | 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:36.854640: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:25:36.854643: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:25:36.854646: | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) Sep 21 07:25:36.854649: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Sep 21 07:25:36.854651: | Message ID: 2 (0x2) Sep 21 07:25:36.854654: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:25:36.854658: | ***emit IKEv2 Encryption Payload: Sep 21 07:25:36.854661: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:36.854663: | flags: none (0x0) Sep 21 07:25:36.854666: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Sep 21 07:25:36.854669: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' Sep 21 07:25:36.854673: | emitting 16 zero bytes of IV into IKEv2 Encryption Payload Sep 21 07:25:36.854693: | netlink_get_spi: allocated 0xe98abc5c for esp.0@192.1.3.33 Sep 21 07:25:36.854697: | Emitting ikev2_proposals ... Sep 21 07:25:36.854700: | ****emit IKEv2 Security Association Payload: Sep 21 07:25:36.854703: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:36.854705: | flags: none (0x0) Sep 21 07:25:36.854708: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Sep 21 07:25:36.854711: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:25:36.854714: | *****emit IKEv2 Proposal Substructure Payload: Sep 21 07:25:36.854717: | last proposal: v2_PROPOSAL_LAST (0x0) Sep 21 07:25:36.854719: | prop #: 1 (0x1) Sep 21 07:25:36.854722: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Sep 21 07:25:36.854724: | spi size: 4 (0x4) Sep 21 07:25:36.854726: | # transforms: 4 (0x4) Sep 21 07:25:36.854729: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Sep 21 07:25:36.854733: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Sep 21 07:25:36.854737: | our spi e9 8a bc 5c Sep 21 07:25:36.854740: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:25:36.854743: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:36.854745: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:25:36.854748: | IKEv2 transform ID: AES_CBC (0xc) Sep 21 07:25:36.854751: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:25:36.854754: | *******emit IKEv2 Attribute Substructure Payload: Sep 21 07:25:36.854757: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:25:36.854759: | length/value: 128 (0x80) Sep 21 07:25:36.854762: | emitting length of IKEv2 Transform Substructure Payload: 12 Sep 21 07:25:36.854764: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:25:36.854767: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:36.854769: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:25:36.854772: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Sep 21 07:25:36.854775: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:36.854778: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:25:36.854780: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:25:36.854875: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:25:36.854883: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:36.854886: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:25:36.854888: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Sep 21 07:25:36.854891: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:36.854894: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:25:36.854897: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:25:36.854899: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:25:36.854901: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:25:36.854904: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Sep 21 07:25:36.854906: | IKEv2 transform ID: ESN_DISABLED (0x0) Sep 21 07:25:36.854909: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:36.854911: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:25:36.854914: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:25:36.854917: | emitting length of IKEv2 Proposal Substructure Payload: 48 Sep 21 07:25:36.854920: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Sep 21 07:25:36.854922: | emitting length of IKEv2 Security Association Payload: 52 Sep 21 07:25:36.854925: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Sep 21 07:25:36.854927: | ****emit IKEv2 Nonce Payload: Sep 21 07:25:36.854930: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:36.854932: | flags: none (0x0) Sep 21 07:25:36.854935: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Sep 21 07:25:36.854938: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' Sep 21 07:25:36.854941: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Sep 21 07:25:36.854944: | IKEv2 nonce 7c df 94 4b ad a8 b5 bc 27 ab 51 6f 48 bc e8 fb Sep 21 07:25:36.854946: | IKEv2 nonce 8b 79 ae 9f ac 16 6b 3b 71 0a d9 ab 1a f3 b5 7b Sep 21 07:25:36.854950: | emitting length of IKEv2 Nonce Payload: 36 Sep 21 07:25:36.854953: | ****emit IKEv2 Key Exchange Payload: Sep 21 07:25:36.854955: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:36.854958: | flags: none (0x0) Sep 21 07:25:36.854960: | DH group: OAKLEY_GROUP_MODP3072 (0xf) Sep 21 07:25:36.854963: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) Sep 21 07:25:36.854966: | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' Sep 21 07:25:36.854969: | emitting 384 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload Sep 21 07:25:36.854971: | ikev2 g^x 1b dc 56 27 9a 57 28 a3 18 29 48 c7 43 8d 17 04 Sep 21 07:25:36.854973: | ikev2 g^x 83 ae 08 c7 5b 5e 30 e2 2b 0c 68 c1 3d c4 fe 9a Sep 21 07:25:36.854976: | ikev2 g^x c2 c7 1e 3f 63 61 02 3f 16 13 68 99 3b db 2f 5b Sep 21 07:25:36.854978: | ikev2 g^x ef 3d 18 4a 3a 33 cf 40 19 e6 24 52 b6 0c 73 e0 Sep 21 07:25:36.854980: | ikev2 g^x 09 0c 11 cd 8e 60 b3 bb 87 2d c1 8d 49 07 c0 3e Sep 21 07:25:36.854982: | ikev2 g^x fd 75 dd 8a bc 98 e5 ef e7 f8 6c 5b 64 5c 07 4d Sep 21 07:25:36.854984: | ikev2 g^x 4c 8d 83 bd 74 9e 0e 09 57 2d 04 08 1f f3 a2 4f Sep 21 07:25:36.854987: | ikev2 g^x 7d 19 7b 06 6a 2d 1a c3 54 ba 3e 81 8e c1 a7 fc Sep 21 07:25:36.854989: | ikev2 g^x b5 76 6f 15 11 c3 64 bc 88 b9 50 1a 46 04 68 a6 Sep 21 07:25:36.854991: | ikev2 g^x 3d 15 dc f1 e9 f4 8e 73 f0 31 fc a3 51 8e 57 54 Sep 21 07:25:36.854994: | ikev2 g^x 57 8a e0 51 1b d4 1a 29 34 a1 d0 a5 1e 1b f4 d3 Sep 21 07:25:36.854996: | ikev2 g^x 8b 4c 96 ef e7 d2 5d 57 66 5f 41 bb 89 cb 85 8e Sep 21 07:25:36.854998: | ikev2 g^x 93 4d 6c 42 fb da e5 a7 41 67 b3 73 91 a2 de ff Sep 21 07:25:36.855001: | ikev2 g^x 67 ad e9 46 3f 21 fc dd 3c fd 39 13 93 c4 38 3f Sep 21 07:25:36.855003: | ikev2 g^x 25 33 a1 72 e9 d8 58 77 1b a3 d4 95 a1 54 3c 90 Sep 21 07:25:36.855005: | ikev2 g^x f5 63 4a 98 4d 60 cb 14 e2 83 d4 df d6 87 2f 19 Sep 21 07:25:36.855007: | ikev2 g^x 4d 69 d2 91 95 56 ee be 6c 8e 8d be 9d dd b5 20 Sep 21 07:25:36.855009: | ikev2 g^x 36 fb de 63 73 c2 95 db 85 28 27 57 9d a5 3e aa Sep 21 07:25:36.855012: | ikev2 g^x 26 1a d3 7a 3c e5 d7 4a fa 68 58 30 09 45 90 62 Sep 21 07:25:36.855014: | ikev2 g^x bc d7 13 23 5a cd 02 64 17 ee 50 a1 c6 76 64 6f Sep 21 07:25:36.855016: | ikev2 g^x 66 41 64 95 be 03 f2 fa 50 77 7e 71 a9 fa 22 e5 Sep 21 07:25:36.855019: | ikev2 g^x 8a de b7 01 08 36 a4 0e c7 19 81 49 b6 0c ef f5 Sep 21 07:25:36.855021: | ikev2 g^x a4 08 bc df 87 da 5b 33 9d 25 bf 97 15 75 2b 40 Sep 21 07:25:36.855023: | ikev2 g^x 5f a9 ca d9 25 f1 1f 9d 4c 8d 0e 45 18 f0 35 c4 Sep 21 07:25:36.855026: | emitting length of IKEv2 Key Exchange Payload: 392 Sep 21 07:25:36.855029: | ****emit IKEv2 Traffic Selector - Initiator - Payload: Sep 21 07:25:36.855032: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:36.855034: | flags: none (0x0) Sep 21 07:25:36.855036: | number of TS: 1 (0x1) Sep 21 07:25:36.855039: | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) Sep 21 07:25:36.855042: | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' Sep 21 07:25:36.855045: | *****emit IKEv2 Traffic Selector: Sep 21 07:25:36.855047: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Sep 21 07:25:36.855050: | IP Protocol ID: 0 (0x0) Sep 21 07:25:36.855052: | start port: 0 (0x0) Sep 21 07:25:36.855054: | end port: 65535 (0xffff) Sep 21 07:25:36.855057: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Sep 21 07:25:36.855060: | IP start c0 00 03 00 Sep 21 07:25:36.855062: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Sep 21 07:25:36.855065: | IP end c0 00 03 ff Sep 21 07:25:36.855069: | emitting length of IKEv2 Traffic Selector: 16 Sep 21 07:25:36.855071: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 Sep 21 07:25:36.855074: | ****emit IKEv2 Traffic Selector - Responder - Payload: Sep 21 07:25:36.855076: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:36.855078: | flags: none (0x0) Sep 21 07:25:36.855081: | number of TS: 1 (0x1) Sep 21 07:25:36.855084: | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) Sep 21 07:25:36.855087: | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' Sep 21 07:25:36.855089: | *****emit IKEv2 Traffic Selector: Sep 21 07:25:36.855092: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Sep 21 07:25:36.855094: | IP Protocol ID: 0 (0x0) Sep 21 07:25:36.855096: | start port: 0 (0x0) Sep 21 07:25:36.855099: | end port: 65535 (0xffff) Sep 21 07:25:36.855102: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Sep 21 07:25:36.855104: | IP start c0 00 16 00 Sep 21 07:25:36.855106: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Sep 21 07:25:36.855108: | IP end c0 00 16 ff Sep 21 07:25:36.855111: | emitting length of IKEv2 Traffic Selector: 16 Sep 21 07:25:36.855113: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 Sep 21 07:25:36.855116: | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE Sep 21 07:25:36.855119: | adding 16 bytes of padding (including 1 byte padding-length) Sep 21 07:25:36.855122: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855125: | emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855128: | emitting 1 0x02 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855131: | emitting 1 0x03 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855133: | emitting 1 0x04 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855136: | emitting 1 0x05 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855139: | emitting 1 0x06 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855142: | emitting 1 0x07 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855144: | emitting 1 0x08 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855147: | emitting 1 0x09 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855149: | emitting 1 0x0a repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855152: | emitting 1 0x0b repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855155: | emitting 1 0x0c repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855158: | emitting 1 0x0d repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855160: | emitting 1 0x0e repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855163: | emitting 1 0x0f repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:25:36.855166: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Sep 21 07:25:36.855169: | emitting length of IKEv2 Encryption Payload: 580 Sep 21 07:25:36.855171: | emitting length of ISAKMP Message: 608 Sep 21 07:25:36.855206: | data being hmac: 87 ec 50 e3 56 d0 d9 73 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:36.855211: | data being hmac: 2e 20 24 08 00 00 00 02 00 00 02 60 21 00 02 44 Sep 21 07:25:36.855213: | data being hmac: 77 8f bf ed 6f ce ef 50 a4 14 0e 41 c3 73 43 3e Sep 21 07:25:36.855215: | data being hmac: 99 45 92 2b 22 39 b7 3b de ce 7f dd fb 97 17 44 Sep 21 07:25:36.855217: | data being hmac: 6c 9f c3 92 57 72 45 c4 c3 b3 b7 c3 03 bd 3d 60 Sep 21 07:25:36.855222: | data being hmac: c0 60 9a 40 31 36 f9 39 5a 7e 1e ca a6 9d 43 66 Sep 21 07:25:36.855224: | data being hmac: 94 db 3f 45 19 be 52 89 4d b7 f7 83 dd f9 80 5b Sep 21 07:25:36.855226: | data being hmac: a9 86 11 55 34 28 72 59 af 9d 7f 94 6e 0a 72 31 Sep 21 07:25:36.855229: | data being hmac: 7b 70 ed 2a 13 84 c0 7c 5b 3b fd 3d 05 6f 03 94 Sep 21 07:25:36.855231: | data being hmac: f5 01 7d 0e e9 29 90 58 76 a8 f0 c4 84 f0 fa c0 Sep 21 07:25:36.855233: | data being hmac: ab cc 88 37 24 61 70 40 b6 f1 b8 77 5f f5 9b 5d Sep 21 07:25:36.855236: | data being hmac: 57 bb cc 7a 3f a9 bb ac 4a 80 60 27 dc 51 34 b7 Sep 21 07:25:36.855238: | data being hmac: bb 9e 3c fe fb be 9e ea 4a 48 8b cc 31 74 dc d3 Sep 21 07:25:36.855240: | data being hmac: b7 34 b5 45 7c 7a c4 9d a5 d3 55 a6 b8 98 c6 43 Sep 21 07:25:36.855242: | data being hmac: bc fc e3 1f c4 5b 8c d0 f9 ae 3d bc 6c 27 58 f6 Sep 21 07:25:36.855245: | data being hmac: 07 42 cc e0 39 b9 d6 e8 88 e4 dd f6 bf 50 44 2d Sep 21 07:25:36.855247: | data being hmac: 06 64 14 60 6d 3b 68 8f d6 43 e4 81 59 16 f2 0c Sep 21 07:25:36.855249: | data being hmac: 72 fe 6f c8 bc 07 98 78 78 a6 92 ca 52 9c e3 aa Sep 21 07:25:36.855251: | data being hmac: 74 a6 ac ec 78 ba 8a 97 84 ae da cf d2 5f 8e 5f Sep 21 07:25:36.855254: | data being hmac: 09 4f fb 4c 5a e0 5b 47 9e 94 c3 2a c3 80 75 bd Sep 21 07:25:36.855256: | data being hmac: 7a 80 dc 95 ba 90 64 c8 24 6a 21 7d 85 19 06 47 Sep 21 07:25:36.855258: | data being hmac: b5 97 31 c9 a9 e3 1d 37 7e ca 3b 42 6f 37 e8 30 Sep 21 07:25:36.855260: | data being hmac: d0 07 af 45 f7 24 b3 69 9a 6b 49 a1 ef 43 65 d5 Sep 21 07:25:36.855263: | data being hmac: b9 b1 54 68 85 b1 b0 9c 77 d1 a7 2e 23 9e f3 95 Sep 21 07:25:36.855265: | data being hmac: ae fe b6 f7 63 87 5e 8a cb 84 2e 02 41 5e c6 91 Sep 21 07:25:36.855267: | data being hmac: 27 cd cb 07 98 e4 f1 00 f7 e8 7d e6 6c f0 68 a4 Sep 21 07:25:36.855270: | data being hmac: 78 e6 cc d5 cc 0f c1 be 98 9e af aa 14 76 4c fb Sep 21 07:25:36.855272: | data being hmac: 27 8a f3 36 74 cf 2d ff b1 5b 17 20 98 2f 45 9d Sep 21 07:25:36.855275: | data being hmac: 66 b7 79 1c cf 83 a9 c9 a5 86 54 d9 3d d4 2a 46 Sep 21 07:25:36.855277: | data being hmac: e2 ca df ce 08 71 32 db 47 c1 cc cc a4 96 2d c2 Sep 21 07:25:36.855279: | data being hmac: 63 3c 01 a7 5e 6f 46 a8 3d c6 7c ef c5 2b df f3 Sep 21 07:25:36.855281: | data being hmac: c1 18 47 95 c8 3f b9 43 bb 29 f9 16 e9 2b e1 27 Sep 21 07:25:36.855284: | data being hmac: ad 96 8f fd e2 1e fc fb 6f 74 2b 0a dd ad e7 a1 Sep 21 07:25:36.855286: | data being hmac: 98 32 74 61 eb c3 13 08 4e eb 72 d2 0a 1f 08 3f Sep 21 07:25:36.855288: | data being hmac: 00 02 f9 2b 7a 1a 68 f6 ff 53 1d f6 4f 88 9e ff Sep 21 07:25:36.855291: | data being hmac: 12 02 c8 87 ac 39 ba f2 05 97 cf c5 96 0b 41 c8 Sep 21 07:25:36.855293: | data being hmac: 68 75 cc b4 78 cc 43 63 ae 76 38 08 c3 21 59 97 Sep 21 07:25:36.855295: | out calculated auth: Sep 21 07:25:36.855297: | 9e d3 48 7c af 43 02 da 31 9d 4c c2 27 bd d7 f5 Sep 21 07:25:36.855305: | [RE]START processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:25:36.855309: | #3 complete_v2_state_transition() V2_CREATE_I0->V2_CREATE_I with status STF_OK Sep 21 07:25:36.855312: | IKEv2: transition from state STATE_V2_CREATE_I0 to state STATE_V2_CREATE_I Sep 21 07:25:36.855315: | child state #3: V2_CREATE_I0(established IKE SA) => V2_CREATE_I(established IKE SA) Sep 21 07:25:36.855319: | Message ID: updating counters for #3 to 4294967295 after switching state Sep 21 07:25:36.855321: | Message ID: IKE #1 skipping update_recv as MD is fake Sep 21 07:25:36.855327: | Message ID: sent #1.#3 request 2; ike: initiator.sent=1->2 initiator.recv=1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->2 wip.responder=-1 Sep 21 07:25:36.855330: "north-eastnets/0x2" #3: STATE_V2_CREATE_I: sent IPsec Child req wait response Sep 21 07:25:36.855345: | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.33:500) Sep 21 07:25:36.855352: | sending 608 bytes for STATE_V2_CREATE_I0 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Sep 21 07:25:36.855355: | 87 ec 50 e3 56 d0 d9 73 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:36.855357: | 2e 20 24 08 00 00 00 02 00 00 02 60 21 00 02 44 Sep 21 07:25:36.855359: | 77 8f bf ed 6f ce ef 50 a4 14 0e 41 c3 73 43 3e Sep 21 07:25:36.855361: | 99 45 92 2b 22 39 b7 3b de ce 7f dd fb 97 17 44 Sep 21 07:25:36.855364: | 6c 9f c3 92 57 72 45 c4 c3 b3 b7 c3 03 bd 3d 60 Sep 21 07:25:36.855366: | c0 60 9a 40 31 36 f9 39 5a 7e 1e ca a6 9d 43 66 Sep 21 07:25:36.855368: | 94 db 3f 45 19 be 52 89 4d b7 f7 83 dd f9 80 5b Sep 21 07:25:36.855370: | a9 86 11 55 34 28 72 59 af 9d 7f 94 6e 0a 72 31 Sep 21 07:25:36.855372: | 7b 70 ed 2a 13 84 c0 7c 5b 3b fd 3d 05 6f 03 94 Sep 21 07:25:36.855375: | f5 01 7d 0e e9 29 90 58 76 a8 f0 c4 84 f0 fa c0 Sep 21 07:25:36.855377: | ab cc 88 37 24 61 70 40 b6 f1 b8 77 5f f5 9b 5d Sep 21 07:25:36.855379: | 57 bb cc 7a 3f a9 bb ac 4a 80 60 27 dc 51 34 b7 Sep 21 07:25:36.855381: | bb 9e 3c fe fb be 9e ea 4a 48 8b cc 31 74 dc d3 Sep 21 07:25:36.855383: | b7 34 b5 45 7c 7a c4 9d a5 d3 55 a6 b8 98 c6 43 Sep 21 07:25:36.855386: | bc fc e3 1f c4 5b 8c d0 f9 ae 3d bc 6c 27 58 f6 Sep 21 07:25:36.855388: | 07 42 cc e0 39 b9 d6 e8 88 e4 dd f6 bf 50 44 2d Sep 21 07:25:36.855390: | 06 64 14 60 6d 3b 68 8f d6 43 e4 81 59 16 f2 0c Sep 21 07:25:36.855392: | 72 fe 6f c8 bc 07 98 78 78 a6 92 ca 52 9c e3 aa Sep 21 07:25:36.855394: | 74 a6 ac ec 78 ba 8a 97 84 ae da cf d2 5f 8e 5f Sep 21 07:25:36.855396: | 09 4f fb 4c 5a e0 5b 47 9e 94 c3 2a c3 80 75 bd Sep 21 07:25:36.855398: | 7a 80 dc 95 ba 90 64 c8 24 6a 21 7d 85 19 06 47 Sep 21 07:25:36.855401: | b5 97 31 c9 a9 e3 1d 37 7e ca 3b 42 6f 37 e8 30 Sep 21 07:25:36.855403: | d0 07 af 45 f7 24 b3 69 9a 6b 49 a1 ef 43 65 d5 Sep 21 07:25:36.855405: | b9 b1 54 68 85 b1 b0 9c 77 d1 a7 2e 23 9e f3 95 Sep 21 07:25:36.855407: | ae fe b6 f7 63 87 5e 8a cb 84 2e 02 41 5e c6 91 Sep 21 07:25:36.855409: | 27 cd cb 07 98 e4 f1 00 f7 e8 7d e6 6c f0 68 a4 Sep 21 07:25:36.855412: | 78 e6 cc d5 cc 0f c1 be 98 9e af aa 14 76 4c fb Sep 21 07:25:36.855414: | 27 8a f3 36 74 cf 2d ff b1 5b 17 20 98 2f 45 9d Sep 21 07:25:36.855416: | 66 b7 79 1c cf 83 a9 c9 a5 86 54 d9 3d d4 2a 46 Sep 21 07:25:36.855418: | e2 ca df ce 08 71 32 db 47 c1 cc cc a4 96 2d c2 Sep 21 07:25:36.855420: | 63 3c 01 a7 5e 6f 46 a8 3d c6 7c ef c5 2b df f3 Sep 21 07:25:36.855423: | c1 18 47 95 c8 3f b9 43 bb 29 f9 16 e9 2b e1 27 Sep 21 07:25:36.855425: | ad 96 8f fd e2 1e fc fb 6f 74 2b 0a dd ad e7 a1 Sep 21 07:25:36.855427: | 98 32 74 61 eb c3 13 08 4e eb 72 d2 0a 1f 08 3f Sep 21 07:25:36.855429: | 00 02 f9 2b 7a 1a 68 f6 ff 53 1d f6 4f 88 9e ff Sep 21 07:25:36.855431: | 12 02 c8 87 ac 39 ba f2 05 97 cf c5 96 0b 41 c8 Sep 21 07:25:36.855433: | 68 75 cc b4 78 cc 43 63 ae 76 38 08 c3 21 59 97 Sep 21 07:25:36.855435: | 9e d3 48 7c af 43 02 da 31 9d 4c c2 27 bd d7 f5 Sep 21 07:25:36.855463: | state #3 requesting EVENT_SA_REPLACE to be deleted Sep 21 07:25:36.855467: | libevent_free: release ptr-libevent@0x55799c7f0c80 Sep 21 07:25:36.855470: | free_event_entry: release EVENT_SA_REPLACE-pe@0x55799c870f50 Sep 21 07:25:36.855473: | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=50ms Sep 21 07:25:36.855476: | event_schedule: new EVENT_RETRANSMIT-pe@0x55799c870f50 Sep 21 07:25:36.855480: | inserting event EVENT_RETRANSMIT, timeout in 0.05 seconds for #3 Sep 21 07:25:36.855483: | libevent_malloc: new ptr-libevent@0x55799c7f0c80 size 128 Sep 21 07:25:36.855488: | #3 STATE_V2_CREATE_I: retransmits: first event in 0.05 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49383.22374 Sep 21 07:25:36.855494: | stop processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in initiate_next() at ikev2_msgid.c:557) Sep 21 07:25:36.855501: | resume processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in initiate_next() at ikev2_msgid.c:557) Sep 21 07:25:36.855506: | #1 spent 0.814 milliseconds in callback v2_msgid_schedule_next_initiator Sep 21 07:25:36.855511: | stop processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in callback_handler() at server.c:908) Sep 21 07:25:36.855514: | libevent_free: release ptr-libevent@0x7f1e24006900 Sep 21 07:25:36.905587: | timer_event_cb: processing event@0x55799c870f50 Sep 21 07:25:36.905600: | handling event EVENT_RETRANSMIT for child state #3 Sep 21 07:25:36.905609: | start processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) Sep 21 07:25:36.905613: | IKEv2 retransmit event Sep 21 07:25:36.905619: | [RE]START processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) Sep 21 07:25:36.905624: | handling event EVENT_RETRANSMIT for 192.1.2.23 "north-eastnets/0x2" #3 attempt 2 of 0 Sep 21 07:25:36.905628: | and parent for 192.1.2.23 "north-eastnets/0x2" #1 keying attempt 1 of 0; retransmit 1 Sep 21 07:25:36.905635: | retransmits: current time 49383.273896; retransmit count 0 exceeds limit? NO; deltatime 0.05 exceeds limit? NO; monotime 0.050156 exceeds limit? NO Sep 21 07:25:36.905639: | event_schedule: new EVENT_RETRANSMIT-pe@0x55799c86fb90 Sep 21 07:25:36.905643: | inserting event EVENT_RETRANSMIT, timeout in 0.05 seconds for #3 Sep 21 07:25:36.905647: | libevent_malloc: new ptr-libevent@0x7f1e24006900 size 128 Sep 21 07:25:36.905652: "north-eastnets/0x2" #3: STATE_V2_CREATE_I: retransmission; will wait 0.05 seconds for response Sep 21 07:25:36.905667: | sending 608 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Sep 21 07:25:36.905671: | 87 ec 50 e3 56 d0 d9 73 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:36.905673: | 2e 20 24 08 00 00 00 02 00 00 02 60 21 00 02 44 Sep 21 07:25:36.905676: | 77 8f bf ed 6f ce ef 50 a4 14 0e 41 c3 73 43 3e Sep 21 07:25:36.905678: | 99 45 92 2b 22 39 b7 3b de ce 7f dd fb 97 17 44 Sep 21 07:25:36.905680: | 6c 9f c3 92 57 72 45 c4 c3 b3 b7 c3 03 bd 3d 60 Sep 21 07:25:36.905682: | c0 60 9a 40 31 36 f9 39 5a 7e 1e ca a6 9d 43 66 Sep 21 07:25:36.905684: | 94 db 3f 45 19 be 52 89 4d b7 f7 83 dd f9 80 5b Sep 21 07:25:36.905687: | a9 86 11 55 34 28 72 59 af 9d 7f 94 6e 0a 72 31 Sep 21 07:25:36.905689: | 7b 70 ed 2a 13 84 c0 7c 5b 3b fd 3d 05 6f 03 94 Sep 21 07:25:36.905691: | f5 01 7d 0e e9 29 90 58 76 a8 f0 c4 84 f0 fa c0 Sep 21 07:25:36.905693: | ab cc 88 37 24 61 70 40 b6 f1 b8 77 5f f5 9b 5d Sep 21 07:25:36.905695: | 57 bb cc 7a 3f a9 bb ac 4a 80 60 27 dc 51 34 b7 Sep 21 07:25:36.905698: | bb 9e 3c fe fb be 9e ea 4a 48 8b cc 31 74 dc d3 Sep 21 07:25:36.905700: | b7 34 b5 45 7c 7a c4 9d a5 d3 55 a6 b8 98 c6 43 Sep 21 07:25:36.905702: | bc fc e3 1f c4 5b 8c d0 f9 ae 3d bc 6c 27 58 f6 Sep 21 07:25:36.905704: | 07 42 cc e0 39 b9 d6 e8 88 e4 dd f6 bf 50 44 2d Sep 21 07:25:36.905707: | 06 64 14 60 6d 3b 68 8f d6 43 e4 81 59 16 f2 0c Sep 21 07:25:36.905709: | 72 fe 6f c8 bc 07 98 78 78 a6 92 ca 52 9c e3 aa Sep 21 07:25:36.905711: | 74 a6 ac ec 78 ba 8a 97 84 ae da cf d2 5f 8e 5f Sep 21 07:25:36.905713: | 09 4f fb 4c 5a e0 5b 47 9e 94 c3 2a c3 80 75 bd Sep 21 07:25:36.905715: | 7a 80 dc 95 ba 90 64 c8 24 6a 21 7d 85 19 06 47 Sep 21 07:25:36.905717: | b5 97 31 c9 a9 e3 1d 37 7e ca 3b 42 6f 37 e8 30 Sep 21 07:25:36.905720: | d0 07 af 45 f7 24 b3 69 9a 6b 49 a1 ef 43 65 d5 Sep 21 07:25:36.905722: | b9 b1 54 68 85 b1 b0 9c 77 d1 a7 2e 23 9e f3 95 Sep 21 07:25:36.905724: | ae fe b6 f7 63 87 5e 8a cb 84 2e 02 41 5e c6 91 Sep 21 07:25:36.905726: | 27 cd cb 07 98 e4 f1 00 f7 e8 7d e6 6c f0 68 a4 Sep 21 07:25:36.905728: | 78 e6 cc d5 cc 0f c1 be 98 9e af aa 14 76 4c fb Sep 21 07:25:36.905735: | 27 8a f3 36 74 cf 2d ff b1 5b 17 20 98 2f 45 9d Sep 21 07:25:36.905737: | 66 b7 79 1c cf 83 a9 c9 a5 86 54 d9 3d d4 2a 46 Sep 21 07:25:36.905739: | e2 ca df ce 08 71 32 db 47 c1 cc cc a4 96 2d c2 Sep 21 07:25:36.905741: | 63 3c 01 a7 5e 6f 46 a8 3d c6 7c ef c5 2b df f3 Sep 21 07:25:36.905744: | c1 18 47 95 c8 3f b9 43 bb 29 f9 16 e9 2b e1 27 Sep 21 07:25:36.905746: | ad 96 8f fd e2 1e fc fb 6f 74 2b 0a dd ad e7 a1 Sep 21 07:25:36.905748: | 98 32 74 61 eb c3 13 08 4e eb 72 d2 0a 1f 08 3f Sep 21 07:25:36.905750: | 00 02 f9 2b 7a 1a 68 f6 ff 53 1d f6 4f 88 9e ff Sep 21 07:25:36.905752: | 12 02 c8 87 ac 39 ba f2 05 97 cf c5 96 0b 41 c8 Sep 21 07:25:36.905754: | 68 75 cc b4 78 cc 43 63 ae 76 38 08 c3 21 59 97 Sep 21 07:25:36.905757: | 9e d3 48 7c af 43 02 da 31 9d 4c c2 27 bd d7 f5 Sep 21 07:25:36.905780: | libevent_free: release ptr-libevent@0x55799c7f0c80 Sep 21 07:25:36.905790: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55799c870f50 Sep 21 07:25:36.905799: | #3 spent 0.199 milliseconds in timer_event_cb() EVENT_RETRANSMIT Sep 21 07:25:36.905805: | stop processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) Sep 21 07:25:36.955902: | timer_event_cb: processing event@0x55799c86fb90 Sep 21 07:25:36.955962: | handling event EVENT_RETRANSMIT for child state #3 Sep 21 07:25:36.955996: | start processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) Sep 21 07:25:36.956002: | IKEv2 retransmit event Sep 21 07:25:36.956030: | [RE]START processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) Sep 21 07:25:36.956038: | handling event EVENT_RETRANSMIT for 192.1.2.23 "north-eastnets/0x2" #3 attempt 2 of 0 Sep 21 07:25:36.956043: | and parent for 192.1.2.23 "north-eastnets/0x2" #1 keying attempt 1 of 0; retransmit 1 Sep 21 07:25:36.956073: | retransmits: current time 49383.324333; retransmit count 1 exceeds limit? NO; deltatime 0.1 exceeds limit? NO; monotime 0.100593 exceeds limit? NO Sep 21 07:25:36.956078: | event_schedule: new EVENT_RETRANSMIT-pe@0x55799c870f50 Sep 21 07:25:36.956104: | inserting event EVENT_RETRANSMIT, timeout in 0.1 seconds for #3 Sep 21 07:25:36.956109: | libevent_malloc: new ptr-libevent@0x55799c7f0c80 size 128 Sep 21 07:25:36.956139: "north-eastnets/0x2" #3: STATE_V2_CREATE_I: retransmission; will wait 0.1 seconds for response Sep 21 07:25:36.956375: | sending 608 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Sep 21 07:25:36.956381: | 87 ec 50 e3 56 d0 d9 73 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:36.956546: | 2e 20 24 08 00 00 00 02 00 00 02 60 21 00 02 44 Sep 21 07:25:36.956550: | 77 8f bf ed 6f ce ef 50 a4 14 0e 41 c3 73 43 3e Sep 21 07:25:36.956553: | 99 45 92 2b 22 39 b7 3b de ce 7f dd fb 97 17 44 Sep 21 07:25:36.956555: | 6c 9f c3 92 57 72 45 c4 c3 b3 b7 c3 03 bd 3d 60 Sep 21 07:25:36.956557: | c0 60 9a 40 31 36 f9 39 5a 7e 1e ca a6 9d 43 66 Sep 21 07:25:36.956560: | 94 db 3f 45 19 be 52 89 4d b7 f7 83 dd f9 80 5b Sep 21 07:25:36.956562: | a9 86 11 55 34 28 72 59 af 9d 7f 94 6e 0a 72 31 Sep 21 07:25:36.956564: | 7b 70 ed 2a 13 84 c0 7c 5b 3b fd 3d 05 6f 03 94 Sep 21 07:25:36.956566: | f5 01 7d 0e e9 29 90 58 76 a8 f0 c4 84 f0 fa c0 Sep 21 07:25:36.956568: | ab cc 88 37 24 61 70 40 b6 f1 b8 77 5f f5 9b 5d Sep 21 07:25:36.956570: | 57 bb cc 7a 3f a9 bb ac 4a 80 60 27 dc 51 34 b7 Sep 21 07:25:36.956573: | bb 9e 3c fe fb be 9e ea 4a 48 8b cc 31 74 dc d3 Sep 21 07:25:36.956575: | b7 34 b5 45 7c 7a c4 9d a5 d3 55 a6 b8 98 c6 43 Sep 21 07:25:36.956577: | bc fc e3 1f c4 5b 8c d0 f9 ae 3d bc 6c 27 58 f6 Sep 21 07:25:36.956579: | 07 42 cc e0 39 b9 d6 e8 88 e4 dd f6 bf 50 44 2d Sep 21 07:25:36.956581: | 06 64 14 60 6d 3b 68 8f d6 43 e4 81 59 16 f2 0c Sep 21 07:25:36.956583: | 72 fe 6f c8 bc 07 98 78 78 a6 92 ca 52 9c e3 aa Sep 21 07:25:36.956586: | 74 a6 ac ec 78 ba 8a 97 84 ae da cf d2 5f 8e 5f Sep 21 07:25:36.956592: | 09 4f fb 4c 5a e0 5b 47 9e 94 c3 2a c3 80 75 bd Sep 21 07:25:36.956594: | 7a 80 dc 95 ba 90 64 c8 24 6a 21 7d 85 19 06 47 Sep 21 07:25:36.956596: | b5 97 31 c9 a9 e3 1d 37 7e ca 3b 42 6f 37 e8 30 Sep 21 07:25:36.956599: | d0 07 af 45 f7 24 b3 69 9a 6b 49 a1 ef 43 65 d5 Sep 21 07:25:36.956601: | b9 b1 54 68 85 b1 b0 9c 77 d1 a7 2e 23 9e f3 95 Sep 21 07:25:36.956603: | ae fe b6 f7 63 87 5e 8a cb 84 2e 02 41 5e c6 91 Sep 21 07:25:36.956605: | 27 cd cb 07 98 e4 f1 00 f7 e8 7d e6 6c f0 68 a4 Sep 21 07:25:36.956607: | 78 e6 cc d5 cc 0f c1 be 98 9e af aa 14 76 4c fb Sep 21 07:25:36.956609: | 27 8a f3 36 74 cf 2d ff b1 5b 17 20 98 2f 45 9d Sep 21 07:25:36.956611: | 66 b7 79 1c cf 83 a9 c9 a5 86 54 d9 3d d4 2a 46 Sep 21 07:25:36.956614: | e2 ca df ce 08 71 32 db 47 c1 cc cc a4 96 2d c2 Sep 21 07:25:36.956616: | 63 3c 01 a7 5e 6f 46 a8 3d c6 7c ef c5 2b df f3 Sep 21 07:25:36.956618: | c1 18 47 95 c8 3f b9 43 bb 29 f9 16 e9 2b e1 27 Sep 21 07:25:36.956620: | ad 96 8f fd e2 1e fc fb 6f 74 2b 0a dd ad e7 a1 Sep 21 07:25:36.956622: | 98 32 74 61 eb c3 13 08 4e eb 72 d2 0a 1f 08 3f Sep 21 07:25:36.956625: | 00 02 f9 2b 7a 1a 68 f6 ff 53 1d f6 4f 88 9e ff Sep 21 07:25:36.956627: | 12 02 c8 87 ac 39 ba f2 05 97 cf c5 96 0b 41 c8 Sep 21 07:25:36.956629: | 68 75 cc b4 78 cc 43 63 ae 76 38 08 c3 21 59 97 Sep 21 07:25:36.956631: | 9e d3 48 7c af 43 02 da 31 9d 4c c2 27 bd d7 f5 Sep 21 07:25:36.956656: | libevent_free: release ptr-libevent@0x7f1e24006900 Sep 21 07:25:36.956660: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55799c86fb90 Sep 21 07:25:36.956668: | #3 spent 0.233 milliseconds in timer_event_cb() EVENT_RETRANSMIT Sep 21 07:25:36.956674: | stop processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) Sep 21 07:25:36.978806: | spent 0.00236 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:25:36.978825: | *received 608 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Sep 21 07:25:36.978828: | 87 ec 50 e3 56 d0 d9 73 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:36.978831: | 2e 20 24 20 00 00 00 02 00 00 02 60 21 00 02 44 Sep 21 07:25:36.978833: | 61 23 6e b3 b2 e5 ca 46 b5 3b 19 2e 66 d0 fa ab Sep 21 07:25:36.978835: | 6e 74 d1 68 8c 55 4e c8 38 3a a6 08 8a 48 cc 76 Sep 21 07:25:36.978837: | 08 fd a9 07 20 38 da 15 9a e7 16 91 ea 11 8b 24 Sep 21 07:25:36.978840: | 63 a6 93 7d a3 54 8b 01 54 cd 7e ed 9b a8 34 55 Sep 21 07:25:36.978842: | 1b c5 4c c4 ec 41 45 1e 1d 3c 05 e5 25 c6 40 ee Sep 21 07:25:36.978844: | f5 03 0d 3d 47 6c 74 d5 2e 87 43 c1 21 4b 2d 65 Sep 21 07:25:36.978846: | 42 5d a9 92 e3 85 f8 81 08 7d 02 11 68 68 2a 83 Sep 21 07:25:36.978849: | 75 f3 0f 0c c0 86 86 e3 7a 8f cb 09 6f d5 91 6b Sep 21 07:25:36.978851: | 82 f7 06 37 5f e3 08 07 1d 11 12 a9 79 78 a0 44 Sep 21 07:25:36.978853: | 74 b3 1b e2 a7 ee a3 a1 dd 22 f3 45 fb 05 c1 60 Sep 21 07:25:36.978855: | de 0b f0 49 25 79 1d a9 8e fc ff 12 d3 9d 85 a1 Sep 21 07:25:36.978858: | f4 f7 18 aa ca b7 60 96 ce 5d 2f 26 2a 9e fc 4f Sep 21 07:25:36.978860: | fc d0 09 d8 c0 48 69 62 b6 ff 4b 06 7b 92 f2 ce Sep 21 07:25:36.978862: | 80 53 a0 ff 90 ef 41 c2 22 48 5b 5b e4 f5 2d 96 Sep 21 07:25:36.978864: | e0 1e 8a 2a de 47 9d 7a 5c 36 3a 41 3e 01 d8 2e Sep 21 07:25:36.978866: | de 4c cf fc 99 ea 21 18 94 f7 e8 08 be 3b f0 f1 Sep 21 07:25:36.978869: | ac 86 49 76 8d 8e 24 8a d8 c1 e3 d8 3d e1 72 10 Sep 21 07:25:36.978871: | 33 52 d5 d2 c4 56 9f cf ba 29 6f 97 26 d2 49 06 Sep 21 07:25:36.978873: | a7 23 89 1e 85 f3 d9 c9 32 56 4c 9a ad 7c 64 b3 Sep 21 07:25:36.978875: | aa 7c 71 f7 3b 7e a5 f2 44 7d ba b5 14 58 db 74 Sep 21 07:25:36.978878: | ca 08 c4 1d 83 49 64 a1 1c 3e 5c c3 c2 7a 7d 2b Sep 21 07:25:36.978880: | 08 d9 67 b0 dd a8 2d a0 e4 bf 1e c3 c0 a8 a5 42 Sep 21 07:25:36.978882: | e5 30 08 d0 98 36 11 e7 ae a9 51 fd 40 52 d1 15 Sep 21 07:25:36.978888: | 46 b9 17 6a 94 cc c8 97 e2 67 f7 19 ac 9d bb 8f Sep 21 07:25:36.978891: | 84 8c 5d 66 29 ec 23 2b 79 0e a6 4c 3d 88 0f de Sep 21 07:25:36.978893: | 44 d1 b6 15 25 ec 82 fa 85 3c b4 37 b2 02 0d cc Sep 21 07:25:36.978895: | 49 8d bd bd 5b b0 b0 11 6f c0 fc a3 14 62 45 a2 Sep 21 07:25:36.978898: | 01 41 f0 7b c7 5e 7d 6a ad 65 d2 8c b5 da 1d 6f Sep 21 07:25:36.978900: | 66 19 51 9c ad 9c 27 93 b8 fb 55 54 bf 66 f6 b2 Sep 21 07:25:36.978902: | 77 1b c4 11 4d 4b 51 d7 5d 83 10 17 9a c9 54 0a Sep 21 07:25:36.978904: | 7a 4f 25 f8 4e 1f 71 06 33 c5 b8 27 4e 14 55 bf Sep 21 07:25:36.978907: | a9 47 c5 b4 16 a5 b5 67 46 af b3 d9 4d 27 ce d3 Sep 21 07:25:36.978909: | 7f 21 19 c0 15 4c 91 9b f2 09 a1 e9 88 20 d6 16 Sep 21 07:25:36.978911: | 36 1c d5 1b c8 9f ce c3 5e 01 eb 9b 63 1b 6b d3 Sep 21 07:25:36.978913: | 83 ff 23 fe 49 46 d0 ec 42 f0 68 3a 44 ba 14 b7 Sep 21 07:25:36.978916: | 57 b3 fb b6 a3 5d 50 37 b0 4c 34 91 f0 97 4b 97 Sep 21 07:25:36.978920: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Sep 21 07:25:36.978923: | **parse ISAKMP Message: Sep 21 07:25:36.978926: | initiator cookie: Sep 21 07:25:36.978928: | 87 ec 50 e3 56 d0 d9 73 Sep 21 07:25:36.978930: | responder cookie: Sep 21 07:25:36.978933: | 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:36.978935: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Sep 21 07:25:36.978938: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:25:36.978940: | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) Sep 21 07:25:36.978943: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:25:36.978945: | Message ID: 2 (0x2) Sep 21 07:25:36.978948: | length: 608 (0x260) Sep 21 07:25:36.978951: | processing version=2.0 packet with exchange type=ISAKMP_v2_CREATE_CHILD_SA (36) Sep 21 07:25:36.978954: | I am the IKE SA Original Initiator receiving an IKEv2 CREATE_CHILD_SA response Sep 21 07:25:36.978958: | State DB: found IKEv2 state #1 in PARENT_I3 (find_v2_ike_sa) Sep 21 07:25:36.978964: | start processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2016) Sep 21 07:25:36.978967: | State DB: found IKEv2 state #3 in V2_CREATE_I (find_v2_sa_by_initiator_wip) Sep 21 07:25:36.978971: | suspend processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:25:36.978976: | start processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:25:36.978979: | #3 is idle Sep 21 07:25:36.978981: | #3 idle Sep 21 07:25:36.978983: | unpacking clear payload Sep 21 07:25:36.978985: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Sep 21 07:25:36.978988: | ***parse IKEv2 Encryption Payload: Sep 21 07:25:36.978991: | next payload type: ISAKMP_NEXT_v2SA (0x21) Sep 21 07:25:36.978993: | flags: none (0x0) Sep 21 07:25:36.978995: | length: 580 (0x244) Sep 21 07:25:36.978998: | processing payload: ISAKMP_NEXT_v2SK (len=576) Sep 21 07:25:36.979001: | #3 in state V2_CREATE_I: sent IPsec Child req wait response Sep 21 07:25:36.979031: | data for hmac: 87 ec 50 e3 56 d0 d9 73 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:36.979035: | data for hmac: 2e 20 24 20 00 00 00 02 00 00 02 60 21 00 02 44 Sep 21 07:25:36.979037: | data for hmac: 61 23 6e b3 b2 e5 ca 46 b5 3b 19 2e 66 d0 fa ab Sep 21 07:25:36.979039: | data for hmac: 6e 74 d1 68 8c 55 4e c8 38 3a a6 08 8a 48 cc 76 Sep 21 07:25:36.979041: | data for hmac: 08 fd a9 07 20 38 da 15 9a e7 16 91 ea 11 8b 24 Sep 21 07:25:36.979044: | data for hmac: 63 a6 93 7d a3 54 8b 01 54 cd 7e ed 9b a8 34 55 Sep 21 07:25:36.979046: | data for hmac: 1b c5 4c c4 ec 41 45 1e 1d 3c 05 e5 25 c6 40 ee Sep 21 07:25:36.979048: | data for hmac: f5 03 0d 3d 47 6c 74 d5 2e 87 43 c1 21 4b 2d 65 Sep 21 07:25:36.979051: | data for hmac: 42 5d a9 92 e3 85 f8 81 08 7d 02 11 68 68 2a 83 Sep 21 07:25:36.979055: | data for hmac: 75 f3 0f 0c c0 86 86 e3 7a 8f cb 09 6f d5 91 6b Sep 21 07:25:36.979057: | data for hmac: 82 f7 06 37 5f e3 08 07 1d 11 12 a9 79 78 a0 44 Sep 21 07:25:36.979059: | data for hmac: 74 b3 1b e2 a7 ee a3 a1 dd 22 f3 45 fb 05 c1 60 Sep 21 07:25:36.979062: | data for hmac: de 0b f0 49 25 79 1d a9 8e fc ff 12 d3 9d 85 a1 Sep 21 07:25:36.979064: | data for hmac: f4 f7 18 aa ca b7 60 96 ce 5d 2f 26 2a 9e fc 4f Sep 21 07:25:36.979066: | data for hmac: fc d0 09 d8 c0 48 69 62 b6 ff 4b 06 7b 92 f2 ce Sep 21 07:25:36.979069: | data for hmac: 80 53 a0 ff 90 ef 41 c2 22 48 5b 5b e4 f5 2d 96 Sep 21 07:25:36.979071: | data for hmac: e0 1e 8a 2a de 47 9d 7a 5c 36 3a 41 3e 01 d8 2e Sep 21 07:25:36.979073: | data for hmac: de 4c cf fc 99 ea 21 18 94 f7 e8 08 be 3b f0 f1 Sep 21 07:25:36.979076: | data for hmac: ac 86 49 76 8d 8e 24 8a d8 c1 e3 d8 3d e1 72 10 Sep 21 07:25:36.979078: | data for hmac: 33 52 d5 d2 c4 56 9f cf ba 29 6f 97 26 d2 49 06 Sep 21 07:25:36.979080: | data for hmac: a7 23 89 1e 85 f3 d9 c9 32 56 4c 9a ad 7c 64 b3 Sep 21 07:25:36.979082: | data for hmac: aa 7c 71 f7 3b 7e a5 f2 44 7d ba b5 14 58 db 74 Sep 21 07:25:36.979085: | data for hmac: ca 08 c4 1d 83 49 64 a1 1c 3e 5c c3 c2 7a 7d 2b Sep 21 07:25:36.979087: | data for hmac: 08 d9 67 b0 dd a8 2d a0 e4 bf 1e c3 c0 a8 a5 42 Sep 21 07:25:36.979090: | data for hmac: e5 30 08 d0 98 36 11 e7 ae a9 51 fd 40 52 d1 15 Sep 21 07:25:36.979092: | data for hmac: 46 b9 17 6a 94 cc c8 97 e2 67 f7 19 ac 9d bb 8f Sep 21 07:25:36.979094: | data for hmac: 84 8c 5d 66 29 ec 23 2b 79 0e a6 4c 3d 88 0f de Sep 21 07:25:36.979097: | data for hmac: 44 d1 b6 15 25 ec 82 fa 85 3c b4 37 b2 02 0d cc Sep 21 07:25:36.979099: | data for hmac: 49 8d bd bd 5b b0 b0 11 6f c0 fc a3 14 62 45 a2 Sep 21 07:25:36.979101: | data for hmac: 01 41 f0 7b c7 5e 7d 6a ad 65 d2 8c b5 da 1d 6f Sep 21 07:25:36.979104: | data for hmac: 66 19 51 9c ad 9c 27 93 b8 fb 55 54 bf 66 f6 b2 Sep 21 07:25:36.979106: | data for hmac: 77 1b c4 11 4d 4b 51 d7 5d 83 10 17 9a c9 54 0a Sep 21 07:25:36.979108: | data for hmac: 7a 4f 25 f8 4e 1f 71 06 33 c5 b8 27 4e 14 55 bf Sep 21 07:25:36.979111: | data for hmac: a9 47 c5 b4 16 a5 b5 67 46 af b3 d9 4d 27 ce d3 Sep 21 07:25:36.979113: | data for hmac: 7f 21 19 c0 15 4c 91 9b f2 09 a1 e9 88 20 d6 16 Sep 21 07:25:36.979115: | data for hmac: 36 1c d5 1b c8 9f ce c3 5e 01 eb 9b 63 1b 6b d3 Sep 21 07:25:36.979118: | data for hmac: 83 ff 23 fe 49 46 d0 ec 42 f0 68 3a 44 ba 14 b7 Sep 21 07:25:36.979120: | calculated auth: 57 b3 fb b6 a3 5d 50 37 b0 4c 34 91 f0 97 4b 97 Sep 21 07:25:36.979122: | provided auth: 57 b3 fb b6 a3 5d 50 37 b0 4c 34 91 f0 97 4b 97 Sep 21 07:25:36.979125: | authenticator matched Sep 21 07:25:36.979134: | #3 ikev2 ISAKMP_v2_CREATE_CHILD_SA decrypt success Sep 21 07:25:36.979137: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Sep 21 07:25:36.979140: | **parse IKEv2 Security Association Payload: Sep 21 07:25:36.979142: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Sep 21 07:25:36.979145: | flags: none (0x0) Sep 21 07:25:36.979147: | length: 52 (0x34) Sep 21 07:25:36.979149: | processing payload: ISAKMP_NEXT_v2SA (len=48) Sep 21 07:25:36.979152: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Sep 21 07:25:36.979154: | **parse IKEv2 Nonce Payload: Sep 21 07:25:36.979157: | next payload type: ISAKMP_NEXT_v2KE (0x22) Sep 21 07:25:36.979159: | flags: none (0x0) Sep 21 07:25:36.979161: | length: 36 (0x24) Sep 21 07:25:36.979163: | processing payload: ISAKMP_NEXT_v2Ni (len=32) Sep 21 07:25:36.979166: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) Sep 21 07:25:36.979168: | **parse IKEv2 Key Exchange Payload: Sep 21 07:25:36.979171: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) Sep 21 07:25:36.979173: | flags: none (0x0) Sep 21 07:25:36.979175: | length: 392 (0x188) Sep 21 07:25:36.979178: | DH group: OAKLEY_GROUP_MODP3072 (0xf) Sep 21 07:25:36.979180: | processing payload: ISAKMP_NEXT_v2KE (len=384) Sep 21 07:25:36.979184: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) Sep 21 07:25:36.979187: | **parse IKEv2 Traffic Selector - Initiator - Payload: Sep 21 07:25:36.979189: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) Sep 21 07:25:36.979191: | flags: none (0x0) Sep 21 07:25:36.979194: | length: 24 (0x18) Sep 21 07:25:36.979196: | number of TS: 1 (0x1) Sep 21 07:25:36.979198: | processing payload: ISAKMP_NEXT_v2TSi (len=16) Sep 21 07:25:36.979200: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) Sep 21 07:25:36.979203: | **parse IKEv2 Traffic Selector - Responder - Payload: Sep 21 07:25:36.979205: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:25:36.979207: | flags: none (0x0) Sep 21 07:25:36.979210: | length: 24 (0x18) Sep 21 07:25:36.979212: | number of TS: 1 (0x1) Sep 21 07:25:36.979214: | processing payload: ISAKMP_NEXT_v2TSr (len=16) Sep 21 07:25:36.979217: | selected state microcode Process CREATE_CHILD_SA IPsec SA Response Sep 21 07:25:36.979223: | #1 updating local interface from 192.1.3.33:500 to 192.1.3.33:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:25:36.979225: | forcing ST #3 to CHILD #1.#3 in FSM processor Sep 21 07:25:36.979228: | Now let's proceed with state specific processing Sep 21 07:25:36.979230: | calling processor Process CREATE_CHILD_SA IPsec SA Response Sep 21 07:25:36.979238: | using existing local ESP/AH proposals for north-eastnets/0x2 (CREATE_CHILD_SA initiator accepting remote ESP/AH proposal): 1:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256;DH=MODP3072;ESN=DISABLED Sep 21 07:25:36.979241: | Comparing remote proposals against CREATE_CHILD_SA initiator accepting remote ESP/AH proposal 1 local proposals Sep 21 07:25:36.979245: | local proposal 1 type ENCR has 1 transforms Sep 21 07:25:36.979247: | local proposal 1 type PRF has 0 transforms Sep 21 07:25:36.979250: | local proposal 1 type INTEG has 1 transforms Sep 21 07:25:36.979252: | local proposal 1 type DH has 1 transforms Sep 21 07:25:36.979254: | local proposal 1 type ESN has 1 transforms Sep 21 07:25:36.979258: | local proposal 1 transforms: required: ENCR+INTEG+DH+ESN; optional: none Sep 21 07:25:36.979260: | ***parse IKEv2 Proposal Substructure Payload: Sep 21 07:25:36.979263: | last proposal: v2_PROPOSAL_LAST (0x0) Sep 21 07:25:36.979265: | length: 48 (0x30) Sep 21 07:25:36.979267: | prop #: 1 (0x1) Sep 21 07:25:36.979270: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Sep 21 07:25:36.979272: | spi size: 4 (0x4) Sep 21 07:25:36.979274: | # transforms: 4 (0x4) Sep 21 07:25:36.979277: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Sep 21 07:25:36.979279: | remote SPI b0 df 2a 5a Sep 21 07:25:36.979283: | Comparing remote proposal 1 containing 4 transforms against local proposal [1..1] of 1 local proposals Sep 21 07:25:36.979286: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:25:36.979288: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:36.979290: | length: 12 (0xc) Sep 21 07:25:36.979293: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:25:36.979295: | IKEv2 transform ID: AES_CBC (0xc) Sep 21 07:25:36.979298: | *****parse IKEv2 Attribute Substructure Payload: Sep 21 07:25:36.979300: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:25:36.979303: | length/value: 128 (0x80) Sep 21 07:25:36.979307: | remote proposal 1 transform 0 (ENCR=AES_CBC_128) matches local proposal 1 type 1 (ENCR) transform 0 Sep 21 07:25:36.979309: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:25:36.979312: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:36.979314: | length: 8 (0x8) Sep 21 07:25:36.979316: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:25:36.979319: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Sep 21 07:25:36.979322: | remote proposal 1 transform 1 (INTEG=HMAC_SHA2_512_256) matches local proposal 1 type 3 (INTEG) transform 0 Sep 21 07:25:36.979325: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:25:36.979327: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:25:36.979330: | length: 8 (0x8) Sep 21 07:25:36.979333: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:25:36.979335: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Sep 21 07:25:36.979338: | remote proposal 1 transform 2 (DH=MODP3072) matches local proposal 1 type 4 (DH) transform 0 Sep 21 07:25:36.979341: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:25:36.979343: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:25:36.979345: | length: 8 (0x8) Sep 21 07:25:36.979348: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Sep 21 07:25:36.979351: | IKEv2 transform ID: ESN_DISABLED (0x0) Sep 21 07:25:36.979354: | remote proposal 1 transform 3 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 Sep 21 07:25:36.979358: | remote proposal 1 proposed transforms: ENCR+INTEG+DH+ESN; matched: ENCR+INTEG+DH+ESN; unmatched: none Sep 21 07:25:36.979362: | comparing remote proposal 1 containing ENCR+INTEG+DH+ESN transforms to local proposal 1; required: ENCR+INTEG+DH+ESN; optional: none; matched: ENCR+INTEG+DH+ESN Sep 21 07:25:36.979365: | remote proposal 1 matches local proposal 1 Sep 21 07:25:36.979367: | remote accepted the proposal 1:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256;DH=MODP3072;ESN=DISABLED[first-match] Sep 21 07:25:36.979373: | CREATE_CHILD_SA initiator accepting remote ESP/AH proposal ikev2_proposal: 1:ESP:SPI=b0df2a5a;ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256;DH=MODP3072;ESN=DISABLED Sep 21 07:25:36.979375: | converting proposal to internal trans attrs Sep 21 07:25:36.979380: | updating #3's .st_oakley with preserved PRF, but why update? Sep 21 07:25:36.979388: | adding ikev2 Child SA initiator pfs=yes work-order 4 for state #3 Sep 21 07:25:36.979391: | state #3 requesting EVENT_RETRANSMIT to be deleted Sep 21 07:25:36.979394: | #3 STATE_V2_CREATE_I: retransmits: cleared Sep 21 07:25:36.979397: | libevent_free: release ptr-libevent@0x55799c7f0c80 Sep 21 07:25:36.979400: | free_event_entry: release EVENT_RETRANSMIT-pe@0x55799c870f50 Sep 21 07:25:36.979403: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x55799c870f50 Sep 21 07:25:36.979407: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 Sep 21 07:25:36.979410: | libevent_malloc: new ptr-libevent@0x55799c7f0c80 size 128 Sep 21 07:25:36.979420: | #3 spent 0.185 milliseconds in processing: Process CREATE_CHILD_SA IPsec SA Response in ikev2_process_state_packet() Sep 21 07:25:36.979426: | [RE]START processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:25:36.979427: | crypto helper 5 resuming Sep 21 07:25:36.979442: | crypto helper 5 starting work-order 4 for state #3 Sep 21 07:25:36.979448: | crypto helper 5 doing crypto (ikev2 Child SA initiator pfs=yes); request ID 4 Sep 21 07:25:36.979451: | crypto helper is pausing for 1 seconds Sep 21 07:25:36.979429: | #3 complete_v2_state_transition() V2_CREATE_I->V2_IPSEC_I with status STF_SUSPEND Sep 21 07:25:36.979460: | suspending state #3 and saving MD Sep 21 07:25:36.979462: | #3 is busy; has a suspended MD Sep 21 07:25:36.979468: | [RE]START processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in log_stf_suspend() at ikev2.c:3266) Sep 21 07:25:36.979472: | "north-eastnets/0x2" #3 complete v2 state STATE_V2_CREATE_I transition with STF_SUSPEND suspended from complete_v2_state_transition:3448 Sep 21 07:25:36.979477: | stop processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2018) Sep 21 07:25:36.979483: | #1 spent 0.641 milliseconds in ikev2_process_packet() Sep 21 07:25:36.979487: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Sep 21 07:25:36.979490: | processing: STOP state #0 (in process_md() at demux.c:382) Sep 21 07:25:36.979493: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:25:36.979497: | spent 0.656 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:25:36.979507: | spent 0.00167 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:25:36.979523: | *received 608 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Sep 21 07:25:36.979527: | 87 ec 50 e3 56 d0 d9 73 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:36.979529: | 2e 20 24 20 00 00 00 02 00 00 02 60 21 00 02 44 Sep 21 07:25:36.979531: | 61 23 6e b3 b2 e5 ca 46 b5 3b 19 2e 66 d0 fa ab Sep 21 07:25:36.979534: | 6e 74 d1 68 8c 55 4e c8 38 3a a6 08 8a 48 cc 76 Sep 21 07:25:36.979536: | 08 fd a9 07 20 38 da 15 9a e7 16 91 ea 11 8b 24 Sep 21 07:25:36.979538: | 63 a6 93 7d a3 54 8b 01 54 cd 7e ed 9b a8 34 55 Sep 21 07:25:36.979540: | 1b c5 4c c4 ec 41 45 1e 1d 3c 05 e5 25 c6 40 ee Sep 21 07:25:36.979542: | f5 03 0d 3d 47 6c 74 d5 2e 87 43 c1 21 4b 2d 65 Sep 21 07:25:36.979545: | 42 5d a9 92 e3 85 f8 81 08 7d 02 11 68 68 2a 83 Sep 21 07:25:36.979547: | 75 f3 0f 0c c0 86 86 e3 7a 8f cb 09 6f d5 91 6b Sep 21 07:25:36.979549: | 82 f7 06 37 5f e3 08 07 1d 11 12 a9 79 78 a0 44 Sep 21 07:25:36.979551: | 74 b3 1b e2 a7 ee a3 a1 dd 22 f3 45 fb 05 c1 60 Sep 21 07:25:36.979554: | de 0b f0 49 25 79 1d a9 8e fc ff 12 d3 9d 85 a1 Sep 21 07:25:36.979556: | f4 f7 18 aa ca b7 60 96 ce 5d 2f 26 2a 9e fc 4f Sep 21 07:25:36.979558: | fc d0 09 d8 c0 48 69 62 b6 ff 4b 06 7b 92 f2 ce Sep 21 07:25:36.979560: | 80 53 a0 ff 90 ef 41 c2 22 48 5b 5b e4 f5 2d 96 Sep 21 07:25:36.979563: | e0 1e 8a 2a de 47 9d 7a 5c 36 3a 41 3e 01 d8 2e Sep 21 07:25:36.979565: | de 4c cf fc 99 ea 21 18 94 f7 e8 08 be 3b f0 f1 Sep 21 07:25:36.979567: | ac 86 49 76 8d 8e 24 8a d8 c1 e3 d8 3d e1 72 10 Sep 21 07:25:36.979569: | 33 52 d5 d2 c4 56 9f cf ba 29 6f 97 26 d2 49 06 Sep 21 07:25:36.979571: | a7 23 89 1e 85 f3 d9 c9 32 56 4c 9a ad 7c 64 b3 Sep 21 07:25:36.979573: | aa 7c 71 f7 3b 7e a5 f2 44 7d ba b5 14 58 db 74 Sep 21 07:25:36.979576: | ca 08 c4 1d 83 49 64 a1 1c 3e 5c c3 c2 7a 7d 2b Sep 21 07:25:36.979578: | 08 d9 67 b0 dd a8 2d a0 e4 bf 1e c3 c0 a8 a5 42 Sep 21 07:25:36.979580: | e5 30 08 d0 98 36 11 e7 ae a9 51 fd 40 52 d1 15 Sep 21 07:25:36.979582: | 46 b9 17 6a 94 cc c8 97 e2 67 f7 19 ac 9d bb 8f Sep 21 07:25:36.979585: | 84 8c 5d 66 29 ec 23 2b 79 0e a6 4c 3d 88 0f de Sep 21 07:25:36.979587: | 44 d1 b6 15 25 ec 82 fa 85 3c b4 37 b2 02 0d cc Sep 21 07:25:36.979589: | 49 8d bd bd 5b b0 b0 11 6f c0 fc a3 14 62 45 a2 Sep 21 07:25:36.979592: | 01 41 f0 7b c7 5e 7d 6a ad 65 d2 8c b5 da 1d 6f Sep 21 07:25:36.979594: | 66 19 51 9c ad 9c 27 93 b8 fb 55 54 bf 66 f6 b2 Sep 21 07:25:36.979596: | 77 1b c4 11 4d 4b 51 d7 5d 83 10 17 9a c9 54 0a Sep 21 07:25:36.979598: | 7a 4f 25 f8 4e 1f 71 06 33 c5 b8 27 4e 14 55 bf Sep 21 07:25:36.979601: | a9 47 c5 b4 16 a5 b5 67 46 af b3 d9 4d 27 ce d3 Sep 21 07:25:36.979603: | 7f 21 19 c0 15 4c 91 9b f2 09 a1 e9 88 20 d6 16 Sep 21 07:25:36.979605: | 36 1c d5 1b c8 9f ce c3 5e 01 eb 9b 63 1b 6b d3 Sep 21 07:25:36.979607: | 83 ff 23 fe 49 46 d0 ec 42 f0 68 3a 44 ba 14 b7 Sep 21 07:25:36.979609: | 57 b3 fb b6 a3 5d 50 37 b0 4c 34 91 f0 97 4b 97 Sep 21 07:25:36.979613: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Sep 21 07:25:36.979617: | **parse ISAKMP Message: Sep 21 07:25:36.979619: | initiator cookie: Sep 21 07:25:36.979622: | 87 ec 50 e3 56 d0 d9 73 Sep 21 07:25:36.979624: | responder cookie: Sep 21 07:25:36.979626: | 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:36.979629: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Sep 21 07:25:36.979632: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:25:36.979634: | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) Sep 21 07:25:36.979637: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:25:36.979639: | Message ID: 2 (0x2) Sep 21 07:25:36.979641: | length: 608 (0x260) Sep 21 07:25:36.979644: | processing version=2.0 packet with exchange type=ISAKMP_v2_CREATE_CHILD_SA (36) Sep 21 07:25:36.979647: | I am the IKE SA Original Initiator receiving an IKEv2 CREATE_CHILD_SA response Sep 21 07:25:36.979653: | State DB: found IKEv2 state #1 in PARENT_I3 (find_v2_ike_sa) Sep 21 07:25:36.979659: | start processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2016) Sep 21 07:25:36.979662: | State DB: found IKEv2 state #3 in V2_CREATE_I (find_v2_sa_by_initiator_wip) Sep 21 07:25:36.979667: | suspend processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:25:36.979671: | start processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:25:36.979674: | #3 is busy; has a suspended MD Sep 21 07:25:36.979677: "north-eastnets/0x2" #3: discarding packet received during asynchronous work (DNS or crypto) in STATE_V2_CREATE_I Sep 21 07:25:36.979681: | stop processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2018) Sep 21 07:25:36.979686: | #1 spent 0.172 milliseconds in ikev2_process_packet() Sep 21 07:25:36.979690: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Sep 21 07:25:36.979693: | processing: STOP state #0 (in process_md() at demux.c:382) Sep 21 07:25:36.979696: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:25:36.979699: | spent 0.186 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:25:36.979730: | spent 0.00188 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:25:36.979740: | *received 608 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Sep 21 07:25:36.979743: | 87 ec 50 e3 56 d0 d9 73 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:36.979745: | 2e 20 24 20 00 00 00 02 00 00 02 60 21 00 02 44 Sep 21 07:25:36.979748: | 61 23 6e b3 b2 e5 ca 46 b5 3b 19 2e 66 d0 fa ab Sep 21 07:25:36.979750: | 6e 74 d1 68 8c 55 4e c8 38 3a a6 08 8a 48 cc 76 Sep 21 07:25:36.979752: | 08 fd a9 07 20 38 da 15 9a e7 16 91 ea 11 8b 24 Sep 21 07:25:36.979754: | 63 a6 93 7d a3 54 8b 01 54 cd 7e ed 9b a8 34 55 Sep 21 07:25:36.979756: | 1b c5 4c c4 ec 41 45 1e 1d 3c 05 e5 25 c6 40 ee Sep 21 07:25:36.979759: | f5 03 0d 3d 47 6c 74 d5 2e 87 43 c1 21 4b 2d 65 Sep 21 07:25:36.979761: | 42 5d a9 92 e3 85 f8 81 08 7d 02 11 68 68 2a 83 Sep 21 07:25:36.979763: | 75 f3 0f 0c c0 86 86 e3 7a 8f cb 09 6f d5 91 6b Sep 21 07:25:36.979765: | 82 f7 06 37 5f e3 08 07 1d 11 12 a9 79 78 a0 44 Sep 21 07:25:36.979767: | 74 b3 1b e2 a7 ee a3 a1 dd 22 f3 45 fb 05 c1 60 Sep 21 07:25:36.979770: | de 0b f0 49 25 79 1d a9 8e fc ff 12 d3 9d 85 a1 Sep 21 07:25:36.979772: | f4 f7 18 aa ca b7 60 96 ce 5d 2f 26 2a 9e fc 4f Sep 21 07:25:36.979774: | fc d0 09 d8 c0 48 69 62 b6 ff 4b 06 7b 92 f2 ce Sep 21 07:25:36.979776: | 80 53 a0 ff 90 ef 41 c2 22 48 5b 5b e4 f5 2d 96 Sep 21 07:25:36.979778: | e0 1e 8a 2a de 47 9d 7a 5c 36 3a 41 3e 01 d8 2e Sep 21 07:25:36.979780: | de 4c cf fc 99 ea 21 18 94 f7 e8 08 be 3b f0 f1 Sep 21 07:25:36.979786: | ac 86 49 76 8d 8e 24 8a d8 c1 e3 d8 3d e1 72 10 Sep 21 07:25:36.979791: | 33 52 d5 d2 c4 56 9f cf ba 29 6f 97 26 d2 49 06 Sep 21 07:25:36.979794: | a7 23 89 1e 85 f3 d9 c9 32 56 4c 9a ad 7c 64 b3 Sep 21 07:25:36.979796: | aa 7c 71 f7 3b 7e a5 f2 44 7d ba b5 14 58 db 74 Sep 21 07:25:36.979798: | ca 08 c4 1d 83 49 64 a1 1c 3e 5c c3 c2 7a 7d 2b Sep 21 07:25:36.979800: | 08 d9 67 b0 dd a8 2d a0 e4 bf 1e c3 c0 a8 a5 42 Sep 21 07:25:36.979802: | e5 30 08 d0 98 36 11 e7 ae a9 51 fd 40 52 d1 15 Sep 21 07:25:36.979804: | 46 b9 17 6a 94 cc c8 97 e2 67 f7 19 ac 9d bb 8f Sep 21 07:25:36.979806: | 84 8c 5d 66 29 ec 23 2b 79 0e a6 4c 3d 88 0f de Sep 21 07:25:36.979808: | 44 d1 b6 15 25 ec 82 fa 85 3c b4 37 b2 02 0d cc Sep 21 07:25:36.979811: | 49 8d bd bd 5b b0 b0 11 6f c0 fc a3 14 62 45 a2 Sep 21 07:25:36.979813: | 01 41 f0 7b c7 5e 7d 6a ad 65 d2 8c b5 da 1d 6f Sep 21 07:25:36.979815: | 66 19 51 9c ad 9c 27 93 b8 fb 55 54 bf 66 f6 b2 Sep 21 07:25:36.979819: | 77 1b c4 11 4d 4b 51 d7 5d 83 10 17 9a c9 54 0a Sep 21 07:25:36.979821: | 7a 4f 25 f8 4e 1f 71 06 33 c5 b8 27 4e 14 55 bf Sep 21 07:25:36.979823: | a9 47 c5 b4 16 a5 b5 67 46 af b3 d9 4d 27 ce d3 Sep 21 07:25:36.979825: | 7f 21 19 c0 15 4c 91 9b f2 09 a1 e9 88 20 d6 16 Sep 21 07:25:36.979827: | 36 1c d5 1b c8 9f ce c3 5e 01 eb 9b 63 1b 6b d3 Sep 21 07:25:36.979829: | 83 ff 23 fe 49 46 d0 ec 42 f0 68 3a 44 ba 14 b7 Sep 21 07:25:36.979831: | 57 b3 fb b6 a3 5d 50 37 b0 4c 34 91 f0 97 4b 97 Sep 21 07:25:36.979835: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Sep 21 07:25:36.979837: | **parse ISAKMP Message: Sep 21 07:25:36.979839: | initiator cookie: Sep 21 07:25:36.979841: | 87 ec 50 e3 56 d0 d9 73 Sep 21 07:25:36.979843: | responder cookie: Sep 21 07:25:36.979845: | 25 d2 d9 39 74 08 76 d0 Sep 21 07:25:36.979848: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Sep 21 07:25:36.979850: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:25:36.979852: | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) Sep 21 07:25:36.979854: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:25:36.979857: | Message ID: 2 (0x2) Sep 21 07:25:36.979859: | length: 608 (0x260) Sep 21 07:25:36.979862: | processing version=2.0 packet with exchange type=ISAKMP_v2_CREATE_CHILD_SA (36) Sep 21 07:25:36.979864: | I am the IKE SA Original Initiator receiving an IKEv2 CREATE_CHILD_SA response Sep 21 07:25:36.979868: | State DB: found IKEv2 state #1 in PARENT_I3 (find_v2_ike_sa) Sep 21 07:25:36.979873: | start processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2016) Sep 21 07:25:36.979877: | State DB: found IKEv2 state #3 in V2_CREATE_I (find_v2_sa_by_initiator_wip) Sep 21 07:25:36.979881: | suspend processing: state #1 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:25:36.979885: | start processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:25:36.979888: | #3 is busy; has a suspended MD Sep 21 07:25:36.979891: "north-eastnets/0x2" #3: discarding packet received during asynchronous work (DNS or crypto) in STATE_V2_CREATE_I Sep 21 07:25:36.979895: | stop processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2018) Sep 21 07:25:36.979900: | #1 spent 0.161 milliseconds in ikev2_process_packet() Sep 21 07:25:36.979904: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Sep 21 07:25:36.979907: | processing: STOP state #0 (in process_md() at demux.c:382) Sep 21 07:25:36.979910: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:25:36.979913: | spent 0.175 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:25:37.982012: | crypto helper 5 finished crypto (ikev2 Child SA initiator pfs=yes); request ID 4 time elapsed 1.002562 seconds Sep 21 07:25:37.982028: | (#3) spent 2.48 milliseconds in crypto helper computing work-order 4: ikev2 Child SA initiator pfs=yes (dh) Sep 21 07:25:37.982032: | crypto helper 5 sending results from work-order 4 for state #3 to event queue Sep 21 07:25:37.982035: | scheduling resume sending helper answer for #3 Sep 21 07:25:37.982039: | libevent_malloc: new ptr-libevent@0x7f1e14001100 size 128 Sep 21 07:25:37.982050: | crypto helper 5 waiting (nothing to do) Sep 21 07:25:37.982063: | processing resume sending helper answer for #3 Sep 21 07:25:37.982071: | start processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in resume_handler() at server.c:797) Sep 21 07:25:37.982075: | crypto helper 5 replies to request ID 4 Sep 21 07:25:37.982077: | calling continuation function 0x55799aef34f0 Sep 21 07:25:37.982081: | ikev2_child_inR_continue for #3 STATE_V2_CREATE_I Sep 21 07:25:37.982084: | TSi: parsing 1 traffic selectors Sep 21 07:25:37.982088: | ***parse IKEv2 Traffic Selector: Sep 21 07:25:37.982093: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Sep 21 07:25:37.982095: | IP Protocol ID: 0 (0x0) Sep 21 07:25:37.982098: | length: 16 (0x10) Sep 21 07:25:37.982100: | start port: 0 (0x0) Sep 21 07:25:37.982103: | end port: 65535 (0xffff) Sep 21 07:25:37.982105: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low Sep 21 07:25:37.982108: | TS low c0 00 03 00 Sep 21 07:25:37.982110: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high Sep 21 07:25:37.982113: | TS high c0 00 03 ff Sep 21 07:25:37.982115: | TSi: parsed 1 traffic selectors Sep 21 07:25:37.982117: | TSr: parsing 1 traffic selectors Sep 21 07:25:37.982120: | ***parse IKEv2 Traffic Selector: Sep 21 07:25:37.982122: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Sep 21 07:25:37.982125: | IP Protocol ID: 0 (0x0) Sep 21 07:25:37.982127: | length: 16 (0x10) Sep 21 07:25:37.982129: | start port: 0 (0x0) Sep 21 07:25:37.982131: | end port: 65535 (0xffff) Sep 21 07:25:37.982134: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low Sep 21 07:25:37.982136: | TS low c0 00 16 00 Sep 21 07:25:37.982138: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high Sep 21 07:25:37.982141: | TS high c0 00 16 ff Sep 21 07:25:37.982143: | TSr: parsed 1 traffic selectors Sep 21 07:25:37.982149: | evaluating our conn="north-eastnets/0x2" I=192.0.3.0/24:0:0/0 R=192.0.22.0/24:0:0/0 to their: Sep 21 07:25:37.982154: | TSi[0] .net=192.0.3.0-192.0.3.255 .iporotoid=0 .{start,end}port=0..65535 Sep 21 07:25:37.982161: | match address end->client=192.0.3.0/24 == TSi[0]net=192.0.3.0-192.0.3.255: YES fitness 32 Sep 21 07:25:37.982164: | narrow port end=0..65535 == TSi[0]=0..65535: 0 Sep 21 07:25:37.982167: | TSi[0] port match: YES fitness 65536 Sep 21 07:25:37.982170: | narrow protocol end=*0 == TSi[0]=*0: 0 Sep 21 07:25:37.982173: | match end->protocol=*0 == TSi[0].ipprotoid=*0: YES fitness 255 Sep 21 07:25:37.982177: | TSr[0] .net=192.0.22.0-192.0.22.255 .iporotoid=0 .{start,end}port=0..65535 Sep 21 07:25:37.982183: | match address end->client=192.0.22.0/24 == TSr[0]net=192.0.22.0-192.0.22.255: YES fitness 32 Sep 21 07:25:37.982186: | narrow port end=0..65535 == TSr[0]=0..65535: 0 Sep 21 07:25:37.982188: | TSr[0] port match: YES fitness 65536 Sep 21 07:25:37.982191: | narrow protocol end=*0 == TSr[0]=*0: 0 Sep 21 07:25:37.982194: | match end->protocol=*0 == TSr[0].ipprotoid=*0: YES fitness 255 Sep 21 07:25:37.982196: | best fit so far: TSi[0] TSr[0] Sep 21 07:25:37.982198: | found an acceptable TSi/TSr Traffic Selector Sep 21 07:25:37.982201: | printing contents struct traffic_selector Sep 21 07:25:37.982203: | ts_type: IKEv2_TS_IPV6_ADDR_RANGE Sep 21 07:25:37.982205: | ipprotoid: 0 Sep 21 07:25:37.982207: | port range: 0-65535 Sep 21 07:25:37.982211: | ip range: 192.0.3.0-192.0.3.255 Sep 21 07:25:37.982213: | printing contents struct traffic_selector Sep 21 07:25:37.982216: | ts_type: IKEv2_TS_IPV6_ADDR_RANGE Sep 21 07:25:37.982218: | ipprotoid: 0 Sep 21 07:25:37.982220: | port range: 0-65535 Sep 21 07:25:37.982224: | ip range: 192.0.22.0-192.0.22.255 Sep 21 07:25:37.982228: | integ=sha2_512: .key_size=64 encrypt=aes: .key_size=16 .salt_size=0 keymat_len=80 Sep 21 07:25:37.982625: | install_ipsec_sa() for #3: inbound and outbound Sep 21 07:25:37.982631: | could_route called for north-eastnets/0x2 (kind=CK_PERMANENT) Sep 21 07:25:37.982634: | FOR_EACH_CONNECTION_... in route_owner Sep 21 07:25:37.982637: | conn north-eastnets/0x2 mark 0/00000000, 0/00000000 vs Sep 21 07:25:37.982640: | conn north-eastnets/0x2 mark 0/00000000, 0/00000000 Sep 21 07:25:37.982643: | conn north-eastnets/0x2 mark 0/00000000, 0/00000000 vs Sep 21 07:25:37.982645: | conn north-eastnets/0x1 mark 0/00000000, 0/00000000 Sep 21 07:25:37.982649: | route owner of "north-eastnets/0x2" unrouted: NULL; eroute owner: NULL Sep 21 07:25:37.982653: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA2_512_256 Sep 21 07:25:37.982658: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 Sep 21 07:25:37.982661: | st->st_esp.keymat_len=80 is encrypt_keymat_size=16 + integ_keymat_size=64 Sep 21 07:25:37.982665: | setting IPsec SA replay-window to 32 Sep 21 07:25:37.982668: | NIC esp-hw-offload not for connection 'north-eastnets/0x2' not available on interface eth1 Sep 21 07:25:37.982671: | netlink: enabling tunnel mode Sep 21 07:25:37.982674: | netlink: setting IPsec SA replay-window to 32 using old-style req Sep 21 07:25:37.982677: | netlink: esp-hw-offload not set for IPsec SA Sep 21 07:25:37.982767: | netlink response for Add SA esp.b0df2a5a@192.1.2.23 included non-error error Sep 21 07:25:37.984135: | set up outgoing SA, ref=0/0 Sep 21 07:25:37.984147: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA2_512_256 Sep 21 07:25:37.984151: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 Sep 21 07:25:37.984154: | st->st_esp.keymat_len=80 is encrypt_keymat_size=16 + integ_keymat_size=64 Sep 21 07:25:37.984159: | setting IPsec SA replay-window to 32 Sep 21 07:25:37.984166: | NIC esp-hw-offload not for connection 'north-eastnets/0x2' not available on interface eth1 Sep 21 07:25:37.984169: | netlink: enabling tunnel mode Sep 21 07:25:37.984172: | netlink: setting IPsec SA replay-window to 32 using old-style req Sep 21 07:25:37.984176: | netlink: esp-hw-offload not set for IPsec SA Sep 21 07:25:37.984252: | netlink response for Add SA esp.e98abc5c@192.1.3.33 included non-error error Sep 21 07:25:37.984258: | priority calculation of connection "north-eastnets/0x2" is 0xfe7e7 Sep 21 07:25:37.984266: | add inbound eroute 192.0.22.0/24:0 --0-> 192.0.3.0/24:0 => tun.10000@192.1.3.33 (raw_eroute) Sep 21 07:25:37.984269: | IPsec Sa SPD priority set to 1042407 Sep 21 07:25:37.984320: | raw_eroute result=success Sep 21 07:25:37.984325: | set up incoming SA, ref=0/0 Sep 21 07:25:37.984331: | sr for #3: unrouted Sep 21 07:25:37.984335: | route_and_eroute() for proto 0, and source port 0 dest port 0 Sep 21 07:25:37.984338: | FOR_EACH_CONNECTION_... in route_owner Sep 21 07:25:37.984342: | conn north-eastnets/0x2 mark 0/00000000, 0/00000000 vs Sep 21 07:25:37.984345: | conn north-eastnets/0x2 mark 0/00000000, 0/00000000 Sep 21 07:25:37.984349: | conn north-eastnets/0x2 mark 0/00000000, 0/00000000 vs Sep 21 07:25:37.984352: | conn north-eastnets/0x1 mark 0/00000000, 0/00000000 Sep 21 07:25:37.984357: | route owner of "north-eastnets/0x2" unrouted: NULL; eroute owner: NULL Sep 21 07:25:37.984361: | route_and_eroute with c: north-eastnets/0x2 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #3 Sep 21 07:25:37.984365: | priority calculation of connection "north-eastnets/0x2" is 0xfe7e7 Sep 21 07:25:37.984374: | eroute_connection add eroute 192.0.3.0/24:0 --0-> 192.0.22.0/24:0 => tun.0@192.1.2.23 (raw_eroute) Sep 21 07:25:37.984377: | IPsec Sa SPD priority set to 1042407 Sep 21 07:25:37.984403: | raw_eroute result=success Sep 21 07:25:37.984407: | running updown command "ipsec _updown" for verb up Sep 21 07:25:37.984410: | command executing up-client Sep 21 07:25:37.984448: | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-eastnets/0x2' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0 Sep 21 07:25:37.984457: | popen cmd is 1043 chars long Sep 21 07:25:37.984462: | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-eastnets/0x2': Sep 21 07:25:37.984466: | cmd( 80): PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_: Sep 21 07:25:37.984469: | cmd( 160):MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PL: Sep 21 07:25:37.984473: | cmd( 240):UTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO: Sep 21 07:25:37.984477: | cmd( 320):_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@ea: Sep 21 07:25:37.984480: | cmd( 400):st' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_P: Sep 21 07:25:37.984484: | cmd( 480):EER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUT: Sep 21 07:25:37.984487: | cmd( 560):O_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+EN: Sep 21 07:25:37.984491: | cmd( 640):CRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KI: Sep 21 07:25:37.984497: | cmd( 720):ND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISC: Sep 21 07:25:37.984502: | cmd( 800):O='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUT: Sep 21 07:25:37.984506: | cmd( 880):O_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_R: Sep 21 07:25:37.984509: | cmd( 960):OUTING='no' VTI_SHARED='no' SPI_IN=0xb0df2a5a SPI_OUT=0xe98abc5c ipsec _updown 2: Sep 21 07:25:37.984512: | cmd(1040):>&1: Sep 21 07:25:38.120340: | route_and_eroute: firewall_notified: true Sep 21 07:25:38.120354: | running updown command "ipsec _updown" for verb prepare Sep 21 07:25:38.120358: | command executing prepare-client Sep 21 07:25:38.120397: | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-eastnets/0x2' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no Sep 21 07:25:38.120401: | popen cmd is 1048 chars long Sep 21 07:25:38.120405: | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-eastnets: Sep 21 07:25:38.120408: | cmd( 80):/0x2' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' P: Sep 21 07:25:38.120412: | cmd( 160):LUTO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.: Sep 21 07:25:38.120415: | cmd( 240):0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' : Sep 21 07:25:38.120419: | cmd( 320):PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID: Sep 21 07:25:38.120422: | cmd( 400):='@east' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PL: Sep 21 07:25:38.120425: | cmd( 480):UTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0': Sep 21 07:25:38.120429: | cmd( 560): PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSAS: Sep 21 07:25:38.120432: | cmd( 640):IG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CO: Sep 21 07:25:38.120439: | cmd( 720):NN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER: Sep 21 07:25:38.120442: | cmd( 800):_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='': Sep 21 07:25:38.120446: | cmd( 880): PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' : Sep 21 07:25:38.120449: | cmd( 960):VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xb0df2a5a SPI_OUT=0xe98abc5c ipsec _upd: Sep 21 07:25:38.120452: | cmd(1040):own 2>&1: Sep 21 07:25:38.295044: | running updown command "ipsec _updown" for verb route Sep 21 07:25:38.295064: | command executing route-client Sep 21 07:25:38.295097: | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-eastnets/0x2' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SP Sep 21 07:25:38.295102: | popen cmd is 1046 chars long Sep 21 07:25:38.295106: | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-eastnets/0: Sep 21 07:25:38.295108: | cmd( 80):x2' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.3.33' PLU: Sep 21 07:25:38.295111: | cmd( 160):TO_MY_ID='@north' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0': Sep 21 07:25:38.295113: | cmd( 240): PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PL: Sep 21 07:25:38.295116: | cmd( 320):UTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID=': Sep 21 07:25:38.295119: | cmd( 400):@east' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUT: Sep 21 07:25:38.295121: | cmd( 480):O_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' P: Sep 21 07:25:38.295124: | cmd( 560):LUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG: Sep 21 07:25:38.295127: | cmd( 640):+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN: Sep 21 07:25:38.295129: | cmd( 720):_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_C: Sep 21 07:25:38.295132: | cmd( 800):ISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' P: Sep 21 07:25:38.295135: | cmd( 880):LUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VT: Sep 21 07:25:38.295137: | cmd( 960):I_ROUTING='no' VTI_SHARED='no' SPI_IN=0xb0df2a5a SPI_OUT=0xe98abc5c ipsec _updow: Sep 21 07:25:38.295139: | cmd(1040):n 2>&1: Sep 21 07:25:38.528127: | route_and_eroute: instance "north-eastnets/0x2", setting eroute_owner {spd=0x55799c867c40,sr=0x55799c867c40} to #3 (was #0) (newest_ipsec_sa=#0) Sep 21 07:25:38.528209: | #1 spent 1.04 milliseconds in install_ipsec_sa() Sep 21 07:25:38.528216: | inR2: instance north-eastnets/0x2[0], setting IKEv2 newest_ipsec_sa to #3 (was #0) (spd.eroute=#3) cloned from #1 Sep 21 07:25:38.528220: | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted Sep 21 07:25:38.528226: | libevent_free: release ptr-libevent@0x55799c7f0c80 Sep 21 07:25:38.528229: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x55799c870f50 Sep 21 07:25:38.528239: | [RE]START processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:25:38.528247: | #3 complete_v2_state_transition() V2_CREATE_I->V2_IPSEC_I with status STF_OK Sep 21 07:25:38.528251: | IKEv2: transition from state STATE_V2_CREATE_I to state STATE_V2_IPSEC_I Sep 21 07:25:38.528255: | child state #3: V2_CREATE_I(established IKE SA) => V2_IPSEC_I(established CHILD SA) Sep 21 07:25:38.528259: | Message ID: updating counters for #3 to 2 after switching state Sep 21 07:25:38.528266: | Message ID: recv #1.#3 response 2; ike: initiator.sent=2 initiator.recv=1->2 responder.sent=-1 responder.recv=-1; child: wip.initiator=2->-1 wip.responder=-1 Sep 21 07:25:38.528272: | Message ID: #1.#3 skipping update_send as nothing to send; initiator.sent=2 initiator.recv=2 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 Sep 21 07:25:38.528275: | pstats #3 ikev2.child established Sep 21 07:25:38.528284: "north-eastnets/0x2" #3: negotiated connection [192.0.3.0-192.0.3.255:0-65535 0] -> [192.0.22.0-192.0.22.255:0-65535 0] Sep 21 07:25:38.528295: | NAT-T: encaps is 'auto' Sep 21 07:25:38.528300: "north-eastnets/0x2" #3: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0xb0df2a5a <0xe98abc5c xfrm=AES_CBC_128-HMAC_SHA2_512_256-MODP3072 NATOA=none NATD=none DPD=passive} Sep 21 07:25:38.528305: | releasing whack for #3 (sock=fd@25) Sep 21 07:25:38.528312: | close_any(fd@25) (in release_whack() at state.c:654) Sep 21 07:25:38.528315: | releasing whack and unpending for parent #1 Sep 21 07:25:38.528318: | unpending state #1 connection "north-eastnets/0x2" Sep 21 07:25:38.528324: | #3 will start re-keying in 27838 seconds with margin of 962 seconds (attempting re-key) Sep 21 07:25:38.528327: | event_schedule: new EVENT_SA_REKEY-pe@0x55799c870f50 Sep 21 07:25:38.528331: | inserting event EVENT_SA_REKEY, timeout in 27838 seconds for #3 Sep 21 07:25:38.528335: | libevent_malloc: new ptr-libevent@0x55799c7f0c80 size 128 Sep 21 07:25:38.528342: | #3 spent 1.69 milliseconds in resume sending helper answer Sep 21 07:25:38.528348: | stop processing: state #3 connection "north-eastnets/0x2" from 192.1.2.23:500 (in resume_handler() at server.c:833) Sep 21 07:25:38.528352: | libevent_free: release ptr-libevent@0x7f1e14001100 Sep 21 07:25:38.528362: | processing signal PLUTO_SIGCHLD Sep 21 07:25:38.528368: | waitpid returned ECHILD (no child processes left) Sep 21 07:25:38.528373: | spent 0.00548 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:25:38.528376: | processing signal PLUTO_SIGCHLD Sep 21 07:25:38.528379: | waitpid returned ECHILD (no child processes left) Sep 21 07:25:38.528383: | spent 0.00375 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:25:38.528386: | processing signal PLUTO_SIGCHLD Sep 21 07:25:38.528390: | waitpid returned ECHILD (no child processes left) Sep 21 07:25:38.528394: | spent 0.00375 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:25:53.181815: | processing global timer EVENT_SHUNT_SCAN Sep 21 07:25:53.181829: | expiring aged bare shunts from shunt table Sep 21 07:25:53.181834: | spent 0.00463 milliseconds in global timer EVENT_SHUNT_SCAN